-
-
Notifications
You must be signed in to change notification settings - Fork 31.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update Windows builds to use latest zlib #111239
Comments
There is not a release with a fix for CVE-2023-45853 yet, and we aren't using the affected API anyway. We should probably update 3.13 to 1.3.1 when it becomes available, and probably update 3.11-3.12 to 1.2.14 if it appears. But until there's a release, there's nothing for us to do here. As such, I'm going to go ahead and close the current PR but leave this issue open. Thanks for bringing this to our attention! |
I'm going to mark this as a 'deferred-blocker': we don't want to forget about it before final releases, but it's also not a release blocker. |
@python/release-managers-in-development-maintenance-and-security-mode:
How far do we want to backport the update? I can see arguments for backporting to 3.8-3.12, 3.11-3.12, or not at all, so I'll leave it up to you all to set the backport labels you want on #114877 or close this issue :) |
Upgrading to |
Has this been backported to 3.12 yet? (3.12.2 is scheduled for today.) |
@ned-deily pointed out there wasn't a clear decision on what to backport to. (I thought #111239 (comment) meant it was decided.) I think a backport to 3.12 is warranted; 3.11 and earlier is up to @pablogsal and @ambv. |
) (cherry picked from commit 618d725) Co-authored-by: Zachary Ware <[email protected]>
Since there's a CVE attached, I vote for backporting all the way. Even if it doesn't affect us, users regularly fail to recognise that, and we'll get called out for not shipping security fixes in our security releases (all builds on Windows will default to the version we have in the repo - overriding is possible, but it's not automatic). Plus if another actual security issue comes up that does require full backports, we'll potentially have had some experience with any other changes by then (i.e. less of a version jump). I created all the backport PRs, but have not set any to merge. Let's at least get the PR validation before deciding. |
) (cherry picked from commit 618d725) Co-authored-by: Zachary Ware <[email protected]>
) (cherry picked from commit 618d725) Co-authored-by: Zachary Ware <[email protected]>
I agree with Steve. |
…GH-114877) (cherry picked from commit 618d725) Co-authored-by: Zachary Ware <[email protected]>
…GH-114877) (cherry picked from commit 618d725) Co-authored-by: Zachary Ware <[email protected]>
…H-115087) (cherry picked from commit 618d725) Co-authored-by: Zachary Ware <[email protected]>
…115086) (cherry picked from commit 618d725) Co-authored-by: Zachary Ware <[email protected]>
3.8 - 3.13 updated. This can be closed. |
Sorry for the confusion, was just trying to raise visibility before impending releases. |
Am I missing something? I just installed Python 3.12.7 and got zlib1.dll v 1.2.13.0. |
It looks like |
Bug report
Bug description:
A new version of zlib is out: 1.3 - https://zlib.net/
zlib 1.2.13 has CVE-2023-45853
https://www.openwall.com/lists/oss-security/2023/10/20/9
minizip is part of the contrib directory in zlib, but we do not appear to use this API. The CVSS v3 score is 9.8.
We would rather patch Python to use the latest library because people will ask us about that CVE.
CPython versions tested on:
3.11, 3.12, 3.13
Operating systems tested on:
Linux, Windows
Linked PRs
The text was updated successfully, but these errors were encountered: