Updated python-typed-ast packages fix security vulnerability
Publication date: 10 Jun 2020Modification date: 10 Jun 2020
Type: security
Affected Mageia releases : 7
CVE: CVE-2019-19274 , CVE-2019-19275
Description
Updated python-typed-ast package fixes security vulnerabilities:
typed_ast 1.3.0 and 1.3.1 has a handle_keywordonly_args out-of-bounds
read. An attacker with the ability to cause a Python interpreter to
parse Python source (but not necessarily execute it) may be able to crash
the interpreter process. This could be a concern, for example, in a
web-based service that parses (but does not execute) Python code
(CVE-2019-19274).
typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An
attacker with the ability to cause a Python interpreter to parse Python
source but not necessarily execute it) may be able to crash the
interpreter process. This could be a concern, for example, in a web-based
service that parses (but does not execute) Python code (CVE-2019-19275).
References
SRPMS
7/core
- python-typed-ast-1.3.1-1.1.mga7