Date: Thu, 8 Sep 2022 00:24:11 GMT From: Wen Heping <wen@FreeBSD.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org Subject: git: 7ea8878841d9 - main - security/vuxml: Document python multiple vulnerabilities Message-ID: <202209080024.2880OBE1091724@gitrepo.freebsd.org>
next in thread | raw e-mail | index | archive | help
The branch main has been updated by wen: URL: https://cgit.FreeBSD.org/ports/commit/?id=7ea8878841d965d16d8066651a12002998c9de31 commit 7ea8878841d965d16d8066651a12002998c9de31 Author: Wen Heping <wen@FreeBSD.org> AuthorDate: 2022-09-08 00:22:51 +0000 Commit: Wen Heping <wen@FreeBSD.org> CommitDate: 2022-09-08 00:22:51 +0000 security/vuxml: Document python multiple vulnerabilities --- security/vuxml/vuln-2022.xml | 44 ++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 44 insertions(+) diff --git a/security/vuxml/vuln-2022.xml b/security/vuxml/vuln-2022.xml index 93c0613e9eca..8c8ccd70683a 100644 --- a/security/vuxml/vuln-2022.xml +++ b/security/vuxml/vuln-2022.xml @@ -1,3 +1,47 @@ + <vuln vid="80e057e7-2f0a-11ed-978f-fcaa147e860e"> + <topic>Python -- multiple vulnerabilities</topic> + <affects> + <package> + <name>python37</name> + <range><lt>3.7.14</lt></range> + </package> + <package> + <name>python38</name> + <range><lt>3.8.14</lt></range> + </package> + <package> + <name>python39</name> + <range><lt>3.9.14</lt></range> + </package> + <package> + <name>python310</name> + <range><lt>3.10.7</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Python reports:</p> + <blockquote cite="https://docs.python.org/release/3.7.14/whatsnew/changelog.html#changelog"> + <p>gh-95778: Converting between int and str in bases other than 2 (binary), 4, 8 (octal), + 16 (hexadecimal), or 32 such as base 10 (decimal) now raises a ValueError if the number + of digits in string form is above a limit to avoid potential denial of service attacks + due to the algorithmic complexity.</p> + <p>gh-87389: http.server: Fix an open redirection vulnerability in the HTTP server when + an URI path starts with //. Vulnerability discovered, and initial fix proposed, by + Hamza Avvan.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2020-10735</cvename> + <url>https://docs.python.org/release/3.7.14/whatsnew/changelog.html#changelog</url> + </references> + <dates> + <discovery>2020-03-20</discovery> + <entry>2022-09-08</entry> + </dates> + </vuln> + <vuln vid="6fea7103-2ea4-11ed-b403-3dae8ac60d3e"> <topic>go -- multiple vulnerabilities</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202209080024.2880OBE1091724>