Mageia alert MGASA-2021-0064 (python and python3)
| From: | Mageia Updates <buildsystem-daemon@mageia.org> | |
| To: | updates-announce@ml.mageia.org | |
| Subject: | [updates-announce] MGASA-2021-0064: Updated python and python3 packages fix security vulnerability | |
| Date: | Thu, 04 Feb 2021 14:41:28 +0100 | |
| Message-ID: | <20210204134128.39E799F736@duvel.mageia.org> | |
| Archive-link: | Article |
MGASA-2021-0064 - Updated python and python3 packages fix security vulnerability Publication date: 04 Feb 2021 URL: https://advisories.mageia.org/MGASA-2021-0064.html Type: security Affected Mageia releases: 7 CVE: CVE-2021-3177 Description: A flaw was found in python. A stack-based buffer overflow was discovered in the ctypes module provided within Python. Applications that use ctypes without carefully validating the input passed to it may be vulnerable to this flaw, which would allow an attacker to overflow a buffer on the stack and crash the application. The highest threat from this vulnerability is to system availability (CVE-2021-3177). References: - https://bugs.mageia.org/show_bug.cgi?id=28204 - https://lists.fedoraproject.org/archives/list/package-ann... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177 SRPMS: - 7/core/python-2.7.18-1.2.mga7 - 7/core/python3-3.7.9-1.2.mga7
