Updated python-typed-ast packages fix security vulnerability
Publication date: 10 Jun 2020Modification date: 10 Jun 2020
Type: security
Affected Mageia releases : 7
CVE: CVE-2019-19274 , CVE-2019-19275
Description
Updated python-typed-ast package fixes security vulnerabilities: typed_ast 1.3.0 and 1.3.1 has a handle_keywordonly_args out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not execute) Python code (CVE-2019-19274). typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not execute) Python code (CVE-2019-19275).
References
SRPMS
7/core
- python-typed-ast-1.3.1-1.1.mga7