Overview

Request 919164 accepted

- Update to 3.6.15:
- bpo-43124: Made the internal putcmd function in smtplib
sanitize input for presence of \r and \n characters to avoid
(unlikely) command injection. Library
- bpo-45001: Made email date parsing more robust against
malformed input, namely a whitespace-only Date: header. Patch
by Wouter Bolsterlee. Tests
- bpo-38965: Fix test_faulthandler on GCC 10. Use the
“volatile” keyword in faulthandler._stack_overflow() to
prevent tail call optimization on any compiler, rather than
relying on compiler specific pragma.
- Remove upstreamed patches:
- faulthandler_stack_overflow_on_GCC10.patch

- bpo-44022 (bsc#1189241, CVE-2021-3737): mod:http.client now
avoids infinitely reading potential HTTP headers after
a 100 Continue status response from the server.
- bpo-42988 (CVE-2021-3426, bsc#1183374): Remove the getfile feature
of the pydoc module which could be abused to read arbitrary files
on the disk (directory traversal vulnerability). Moreover, even
- bpo-43075 (CVE-2021-3733, bsc#1189287): Fix Regular Expression
Denial of Service (ReDoS) vulnerability in
urllib.request.AbstractBasicAuthHandler. The ReDoS-vulnerable
regex has quadratic worst-case complexity and it allows cause
a denial of service when identifying crafted invalid RFCs. This
ReDoS issue is on the client side and needs remote attackers to
control the HTTP server.

Loading...
Request History
Matej Cepl's avatar

mcepl created request

- Update to 3.6.15:
- bpo-43124: Made the internal putcmd function in smtplib
sanitize input for presence of \r and \n characters to avoid
(unlikely) command injection. Library
- bpo-45001: Made email date parsing more robust against
malformed input, namely a whitespace-only Date: header. Patch
by Wouter Bolsterlee. Tests
- bpo-38965: Fix test_faulthandler on GCC 10. Use the
“volatile” keyword in faulthandler._stack_overflow() to
prevent tail call optimization on any compiler, rather than
relying on compiler specific pragma.
- Remove upstreamed patches:
- faulthandler_stack_overflow_on_GCC10.patch

- bpo-44022 (bsc#1189241, CVE-2021-3737): mod:http.client now
avoids infinitely reading potential HTTP headers after
a 100 Continue status response from the server.
- bpo-42988 (CVE-2021-3426, bsc#1183374): Remove the getfile feature
of the pydoc module which could be abused to read arbitrary files
on the disk (directory traversal vulnerability). Moreover, even
- bpo-43075 (CVE-2021-3733, bsc#1189287): Fix Regular Expression
Denial of Service (ReDoS) vulnerability in
urllib.request.AbstractBasicAuthHandler. The ReDoS-vulnerable
regex has quadratic worst-case complexity and it allows cause
a denial of service when identifying crafted invalid RFCs. This
ReDoS issue is on the client side and needs remote attackers to
control the HTTP server.


Factory Auto's avatar

factory-auto added opensuse-review-team as a reviewer

Please review sources


Factory Auto's avatar

factory-auto accepted review

Check script succeeded


Saul Goodman's avatar

licensedigger accepted review

ok


Dominique Leuenberger's avatar

dimstar_suse set openSUSE:Factory:Staging:F as a staging project

Being evaluated by staging project "openSUSE:Factory:Staging:F"


Dominique Leuenberger's avatar

dimstar_suse accepted review

Picked "openSUSE:Factory:Staging:F"


Dominique Leuenberger's avatar

dimstar accepted review


Dominique Leuenberger's avatar

dimstar_suse accepted review

Staging Project openSUSE:Factory:Staging:F got accepted.


Dominique Leuenberger's avatar

dimstar_suse approved review

Staging Project openSUSE:Factory:Staging:F got accepted.


Dominique Leuenberger's avatar

dimstar_suse accepted request

Staging Project openSUSE:Factory:Staging:F got accepted.

openSUSE Build Service is sponsored by