MGASA-2020-0249 - Updated python-typed-ast packages fix security vulnerability

Publication date: 10 Jun 2020
URL: https://advisories.mageia.org/MGASA-2020-0249.html
Type: security
Affected Mageia releases: 7
CVE: CVE-2019-19274,
     CVE-2019-19275

Advisory text to describe the update.
Wrap lines at ~75 chars.
Updated python-typed-ast package fixes security vulnerabilities:

typed_ast 1.3.0 and 1.3.1 has a handle_keywordonly_args out-of-bounds
read. An attacker with the ability to cause a Python interpreter to
parse Python source (but not necessarily execute it) may be able to crash
the interpreter process. This could be a concern, for example, in a
web-based service that parses (but does not execute) Python code 
(CVE-2019-19274).

typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An
attacker with the ability to cause a Python interpreter to parse Python
source but not necessarily execute it) may be able to crash the
interpreter process. This could be a concern, for example, in a web-based
service that parses (but does not execute) Python code (CVE-2019-19275).

References:
- https://bugs.mageia.org/show_bug.cgi?id=26590
- https://lists.opensuse.org/opensuse-updates/2020-05/msg00001.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19274
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19275

SRPMS:
- 7/core/python-typed-ast-1.3.1-1.1.mga7