MGASA-2020-0249 - Updated python-typed-ast packages fix security vulnerability

Publication date: 10 Jun 2020
URL: https://advisories.mageia.org/MGASA-2020-0249.html
Type: security
Affected Mageia releases: 7
CVE: CVE-2019-19274,
     CVE-2019-19275

Advisory text to describe the update.
Wrap lines at ~75 chars.
Updated python-typed-ast package fixes security vulnerabilities:

typed_ast 1.3.0 and 1.3.1 has a handle_keywordonly_args out-of-bounds
read. An attacker with the ability to cause a Python interpreter to
parse Python source (but not necessarily execute it) may be able to crash
the interpreter process. This could be a concern, for example, in a
web-based service that parses (but does not execute) Python code 
(CVE-2019-19274).

typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An
attacker with the ability to cause a Python interpreter to parse Python
source but not necessarily execute it) may be able to crash the
interpreter process. This could be a concern, for example, in a web-based
service that parses (but does not execute) Python code (CVE-2019-19275).

References:
- https://bugs.mageia.org/show_bug.cgi?id=26590
- - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19274
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19275

SRPMS:
- 7/core/python-typed-ast-1.3.1-1.1.mga7

Mageia 2020-0249: python-typed-ast security update

Advisory text to describe the update

Summary

Advisory text to describe the update. Wrap lines at ~75 chars. Updated python-typed-ast package fixes security vulnerabilities:
typed_ast 1.3.0 and 1.3.1 has a handle_keywordonly_args out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not execute) Python code (CVE-2019-19274).
typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not execute) Python code (CVE-2019-19275).

References

- https://bugs.mageia.org/show_bug.cgi?id=26590

- - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19274

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19275

Resolution

MGASA-2020-0249 - Updated python-typed-ast packages fix security vulnerability

SRPMS

- 7/core/python-typed-ast-1.3.1-1.1.mga7

Severity
Publication date: 10 Jun 2020
URL: https://advisories.mageia.org/MGASA-2020-0249.html
Type: security
CVE: CVE-2019-19274, CVE-2019-19275

Related News