Fix for CVE-2021-28861
This commit is contained in:
parent
1fa182b4cb
commit
cd4147361f
3 changed files with 155 additions and 1 deletions
|
|
@ -17,7 +17,7 @@ URL: https://www.python.org/
|
|||
#global prerel ...
|
||||
%global upstream_version %{general_version}%{?prerel}
|
||||
Version: %{general_version}%{?prerel:~%{prerel}}
|
||||
Release: 10%{?dist}
|
||||
Release: 11%{?dist}
|
||||
License: Python
|
||||
|
||||
|
||||
|
|
@ -497,6 +497,20 @@ Patch378: 00378-support-expat-2-4-5.patch
|
|||
# Tracker bug: https://bugzilla.redhat.com/show_bug.cgi?id=2075390
|
||||
Patch382: 00382-cve-2015-20107.patch
|
||||
|
||||
# 00386 # 0e4bced7d3cd0f94ebfbcc209e10dbf81607b073
|
||||
# CVE-2021-28861
|
||||
#
|
||||
# Fix an open redirection vulnerability in the `http.server` module when
|
||||
# an URI path starts with `//` that could produce a 301 Location header
|
||||
# with a misleading target. Vulnerability discovered, and logic fix
|
||||
# proposed, by Hamza Avvan (@hamzaavvan).
|
||||
#
|
||||
# Test and comments authored by Gregory P. Smith [Google].
|
||||
#
|
||||
# Upstream: https://github.com/python/cpython/pull/93879
|
||||
# Tracking bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=2120642
|
||||
Patch386: 00386-cve-2021-28861.patch
|
||||
|
||||
# (New patches go here ^^^)
|
||||
#
|
||||
# When adding new patches to "python" and "python3" in Fedora, EL, etc.,
|
||||
|
|
@ -1687,6 +1701,10 @@ CheckPython optimized
|
|||
# ======================================================
|
||||
|
||||
%changelog
|
||||
* Wed Sep 14 2022 Lumír Balhar <lbalhar@redhat.com> - 3.6.15-11
|
||||
- Fix for CVE-2021-28861
|
||||
Resolves: rhbz#2120785
|
||||
|
||||
* Wed Jul 20 2022 Charalampos Stratakis <cstratak@redhat.com> - 3.6.15-10
|
||||
- Fix test_tarfile on ppc64le
|
||||
Resolves: rhbz#2109120
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue