Mageia 2020-0249: python-typed-ast security update
Summary
Advisory text to describe the update.
Wrap lines at ~75 chars.
Updated python-typed-ast package fixes security vulnerabilities:
typed_ast 1.3.0 and 1.3.1 has a handle_keywordonly_args out-of-bounds
read. An attacker with the ability to cause a Python interpreter to
parse Python source (but not necessarily execute it) may be able to crash
the interpreter process. This could be a concern, for example, in a
web-based service that parses (but does not execute) Python code
(CVE-2019-19274).
typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An
attacker with the ability to cause a Python interpreter to parse Python
source but not necessarily execute it) may be able to crash the
interpreter process. This could be a concern, for example, in a web-based
service that parses (but does not execute) Python code (CVE-2019-19275).
References
- https://bugs.mageia.org/show_bug.cgi?id=26590
- - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19274
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19275
Resolution
MGASA-2020-0249 - Updated python-typed-ast packages fix security vulnerability
SRPMS
- 7/core/python-typed-ast-1.3.1-1.1.mga7