Security fix for CVE-2020-8492

This protects urllib HTTP clients against Regular Expression Denial of Service (ReDoS) attacks performed by a malicious server. Note that there is a change in behavior in handling responses with multiple WWW-Authenticate headers (which are quite rare; also Python's old behavior in these cases was definitely not correct).

This update has been submitted for testing by pviktori.

4 months ago

This update's test gating status has been changed to 'waiting'.

4 months ago

This update's test gating status has been changed to 'ignored'.

4 months ago

This update has been pushed to testing.

4 months ago

This update can be pushed to stable now if the maintainer wishes

4 months ago
User Icon churchyard commented & provided feedback 2 months ago

May I push this in?

This update has been submitted for stable by pviktori.

a week ago
User Icon pviktori commented & provided feedback a week ago

Oops, I missed the notification. Pushed now.

This update has been pushed to stable.

a week ago

Please login to add feedback.

Metadata
Type
security
Severity
medium
Karma
0
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-3
Stable by Karma
3
Stable by Time
15 days
Dates
submitted
4 months ago
in testing
4 months ago
in stable
a week ago
BZ#1809068 CVE-2020-8492 python34: python: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS [epel-all]
0
0

Automated Test Results