"0.12.1 ------ * Fixed handling of numerous possible wraparounds in calculating the size of memory allocations; incorrect handling of which could cause denial of service or even possible remote code execution in previous versions of the library."
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=c856599b527a6710e1a47d36719604d7b38554e8 commit c856599b527a6710e1a47d36719604d7b38554e8 Author: Sam James <sam@gentoo.org> AuthorDate: 2021-01-18 15:34:25 +0000 Commit: Sam James <sam@gentoo.org> CommitDate: 2021-01-18 15:34:31 +0000 dev-python/python-levenshtein: (security) bump to 0.12.1 Bug: https://bugs.gentoo.org/766009 Package-Manager: Portage-3.0.12, Repoman-3.0.2 Signed-off-by: Sam James <sam@gentoo.org> dev-python/python-levenshtein/Manifest | 1 + .../python-levenshtein-0.12.1.ebuild | 24 ++++++++++++++++++++++ 2 files changed, 25 insertions(+)
amd64 stable
arm64 done
x86 stable. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one.
Cleanup done in https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=a07c03b4e16689f3b446eedb16e78433f7472469.
Unable to check for sanity: > no match for package: dev-python/python-levenshtein-0.12.1