Summary: | <dev-python/Levenshtein-0.12.1: Possible remote code execution | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Sam James <sam> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | IN_PROGRESS --- | ||
Severity: | normal | CC: | python |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | B2 [glsa?] | ||
Package list: |
dev-python/python-levenshtein-0.12.1
|
Runtime testing required: | --- |
Description
Sam James
2021-01-18 15:33:16 UTC
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=c856599b527a6710e1a47d36719604d7b38554e8 commit c856599b527a6710e1a47d36719604d7b38554e8 Author: Sam James <sam@gentoo.org> AuthorDate: 2021-01-18 15:34:25 +0000 Commit: Sam James <sam@gentoo.org> CommitDate: 2021-01-18 15:34:31 +0000 dev-python/python-levenshtein: (security) bump to 0.12.1 Bug: https://bugs.gentoo.org/766009 Package-Manager: Portage-3.0.12, Repoman-3.0.2 Signed-off-by: Sam James <sam@gentoo.org> dev-python/python-levenshtein/Manifest | 1 + .../python-levenshtein-0.12.1.ebuild | 24 ++++++++++++++++++++++ 2 files changed, 25 insertions(+) amd64 stable arm64 done x86 stable. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one. Cleanup done in https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=a07c03b4e16689f3b446eedb16e78433f7472469. Unable to check for sanity:
> no match for package: dev-python/python-levenshtein-0.12.1
|