summaryrefslogtreecommitdiffstats
path: root/meta
diff options
context:
space:
mode:
authorTim Orling <timothy.t.orling@intel.com>2021-06-15 19:36:25 -0700
committerRichard Purdie <richard.purdie@linuxfoundation.org>2021-07-02 07:44:59 +0100
commit2b16173faf6653bf9dadb1896dbef70f154c71bc (patch)
tree2d39c21d570528416c578341dcfabbb255942c76 /meta
parentfccee0d4a537ce75c44e392828446aacb0a3e0c4 (diff)
downloadpoky-2b16173faf6653bf9dadb1896dbef70f154c71bc.tar.gz
python3: upgrade 3.8.3 -> 3.8.4
Release Date: July 13, 2020 Note: The release you're looking at is Python 3.8.4, a bugfix release for the legacy 3.8 series. Python 3.9 is now the latest feature release series of Python 3. * Drop patch for CVE-2020-14422 fixed in 3.8.4 * Refresh CVE-2021-23336 patch References: https://nvd.nist.gov/vuln/detail/CVE-2020-14422 https://www.python.org/downloads/release/python-384/ https://docs.python.org/release/3.8.4/whatsnew/changelog.html#changelog (From OE-Core rev: c2c6df391a2634e83930219d1b574dbf64066d8a) Signed-off-by: Tim Orling <timothy.t.orling@intel.com> Signed-off-by: Steve Sakoman <steve@sakoman.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta')
-rw-r--r--meta/recipes-devtools/python/python3/CVE-2020-14422.patch77
-rw-r--r--meta/recipes-devtools/python/python3_3.8.4.bb (renamed from meta/recipes-devtools/python/python3_3.8.3.bb)5
2 files changed, 2 insertions, 80 deletions
diff --git a/meta/recipes-devtools/python/python3/CVE-2020-14422.patch b/meta/recipes-devtools/python/python3/CVE-2020-14422.patch
deleted file mode 100644
index 6889e46da9..0000000000
--- a/meta/recipes-devtools/python/python3/CVE-2020-14422.patch
+++ /dev/null
@@ -1,77 +0,0 @@
1From dc8ce8ead182de46584cc1ed8a8c51d48240cbd5 Mon Sep 17 00:00:00 2001
2From: "Miss Islington (bot)"
3 <31488909+miss-islington@users.noreply.github.com>
4Date: Mon, 29 Jun 2020 11:12:50 -0700
5Subject: [PATCH] bpo-41004: Resolve hash collisions for IPv4Interface and
6 IPv6Interface (GH-21033)
7
8The __hash__() methods of classes IPv4Interface and IPv6Interface had issue
9of generating constant hash values of 32 and 128 respectively causing hash collisions.
10The fix uses the hash() function to generate hash values for the objects
11instead of XOR operation
12(cherry picked from commit b30ee26e366bf509b7538d79bfec6c6d38d53f28)
13
14Co-authored-by: Ravi Teja P <rvteja92@gmail.com>
15
16Upstream-Status: Backport [https://github.com/python/cpython/commit/dc8ce8ead182de46584cc1ed8a8c51d48240cbd5]
17CVE: CVE-2020-14422
18Signed-off-by: Chee Yang Lee <chee.yang.lee@intel.com>
19---
20 Lib/ipaddress.py | 4 ++--
21 Lib/test/test_ipaddress.py | 12 ++++++++++++
22 .../2020-06-29-16-02-29.bpo-41004.ovF0KZ.rst | 1 +
23 3 files changed, 15 insertions(+), 2 deletions(-)
24 create mode 100644 Misc/NEWS.d/next/Security/2020-06-29-16-02-29.bpo-41004.ovF0KZ.rst
25
26diff --git a/Lib/ipaddress.py b/Lib/ipaddress.py
27index 873c7644081af..a3a04f7f4b309 100644
28--- a/Lib/ipaddress.py
29+++ b/Lib/ipaddress.py
30@@ -1370,7 +1370,7 @@ def __lt__(self, other):
31 return False
32
33 def __hash__(self):
34- return self._ip ^ self._prefixlen ^ int(self.network.network_address)
35+ return hash((self._ip, self._prefixlen, int(self.network.network_address)))
36
37 __reduce__ = _IPAddressBase.__reduce__
38
39@@ -2017,7 +2017,7 @@ def __lt__(self, other):
40 return False
41
42 def __hash__(self):
43- return self._ip ^ self._prefixlen ^ int(self.network.network_address)
44+ return hash((self._ip, self._prefixlen, int(self.network.network_address)))
45
46 __reduce__ = _IPAddressBase.__reduce__
47
48diff --git a/Lib/test/test_ipaddress.py b/Lib/test/test_ipaddress.py
49index de77111705b69..2eba740e5e7a4 100644
50--- a/Lib/test/test_ipaddress.py
51+++ b/Lib/test/test_ipaddress.py
52@@ -2053,6 +2053,18 @@ def testsixtofour(self):
53 sixtofouraddr.sixtofour)
54 self.assertFalse(bad_addr.sixtofour)
55
56+ # issue41004 Hash collisions in IPv4Interface and IPv6Interface
57+ def testV4HashIsNotConstant(self):
58+ ipv4_address1 = ipaddress.IPv4Interface("1.2.3.4")
59+ ipv4_address2 = ipaddress.IPv4Interface("2.3.4.5")
60+ self.assertNotEqual(ipv4_address1.__hash__(), ipv4_address2.__hash__())
61+
62+ # issue41004 Hash collisions in IPv4Interface and IPv6Interface
63+ def testV6HashIsNotConstant(self):
64+ ipv6_address1 = ipaddress.IPv6Interface("2001:658:22a:cafe:200:0:0:1")
65+ ipv6_address2 = ipaddress.IPv6Interface("2001:658:22a:cafe:200:0:0:2")
66+ self.assertNotEqual(ipv6_address1.__hash__(), ipv6_address2.__hash__())
67+
68
69 if __name__ == '__main__':
70 unittest.main()
71diff --git a/Misc/NEWS.d/next/Security/2020-06-29-16-02-29.bpo-41004.ovF0KZ.rst b/Misc/NEWS.d/next/Security/2020-06-29-16-02-29.bpo-41004.ovF0KZ.rst
72new file mode 100644
73index 0000000000000..1380b31fbe9f4
74--- /dev/null
75+++ b/Misc/NEWS.d/next/Security/2020-06-29-16-02-29.bpo-41004.ovF0KZ.rst
76@@ -0,0 +1 @@
77+The __hash__() methods of ipaddress.IPv4Interface and ipaddress.IPv6Interface incorrectly generated constant hash values of 32 and 128 respectively. This resulted in always causing hash collisions. The fix uses hash() to generate hash values for the tuple of (address, mask length, network address).
diff --git a/meta/recipes-devtools/python/python3_3.8.3.bb b/meta/recipes-devtools/python/python3_3.8.4.bb
index 3aa8980e13..438b3e5504 100644
--- a/meta/recipes-devtools/python/python3_3.8.3.bb
+++ b/meta/recipes-devtools/python/python3_3.8.4.bb
@@ -34,7 +34,6 @@ SRC_URI = "http://www.python.org/ftp/python/${PV}/Python-${PV}.tar.xz \
34 file://0001-python3-Do-not-hardcode-lib-for-distutils.patch \ 34 file://0001-python3-Do-not-hardcode-lib-for-distutils.patch \
35 file://0020-configure.ac-setup.py-do-not-add-a-curses-include-pa.patch \ 35 file://0020-configure.ac-setup.py-do-not-add-a-curses-include-pa.patch \
36 file://CVE-2019-20907.patch \ 36 file://CVE-2019-20907.patch \
37 file://CVE-2020-14422.patch \
38 file://CVE-2020-26116.patch \ 37 file://CVE-2020-26116.patch \
39 file://CVE-2020-27619.patch \ 38 file://CVE-2020-27619.patch \
40 file://CVE-2021-3177.patch \ 39 file://CVE-2021-3177.patch \
@@ -46,8 +45,8 @@ SRC_URI_append_class-native = " \
46 file://0001-Don-t-search-system-for-headers-libraries.patch \ 45 file://0001-Don-t-search-system-for-headers-libraries.patch \
47 " 46 "
48 47
49SRC_URI[md5sum] = "3000cf50aaa413052aef82fd2122ca78" 48SRC_URI[md5sum] = "e16df33cd7b58702e57e137f8f5d13e7"
50SRC_URI[sha256sum] = "dfab5ec723c218082fe3d5d7ae17ecbdebffa9a1aea4d64aa3a2ecdd2e795864" 49SRC_URI[sha256sum] = "5f41968a95afe9bc12192d7e6861aab31e80a46c46fa59d3d837def6a4cd4d37"
51 50
52# exclude pre-releases for both python 2.x and 3.x 51# exclude pre-releases for both python 2.x and 3.x
53UPSTREAM_CHECK_REGEX = "[Pp]ython-(?P<pver>\d+(\.\d+)+).tar" 52UPSTREAM_CHECK_REGEX = "[Pp]ython-(?P<pver>\d+(\.\d+)+).tar"