[Python-checkins] Add link to zlib v1.1.3 vulnerability (GH-17156)

T. Wouters webhook-mailer at python.org
Fri Jan 3 07:10:32 EST 2020


https://github.com/python/cpython/commit/b789202cbedd93898c29b08a44ca085bf0723d81
commit: b789202cbedd93898c29b08a44ca085bf0723d81
branch: master
author: Emmanuel Nosa E <emmanuelnosa.e at gmail.com>
committer: T. Wouters <thomas at python.org>
date: 2020-01-03T13:10:16+01:00
summary:

Add link to zlib v1.1.3 vulnerability (GH-17156)

files:
M Doc/library/zlib.rst

diff --git a/Doc/library/zlib.rst b/Doc/library/zlib.rst
index 339acfd0e5786..ec60ea24db662 100644
--- a/Doc/library/zlib.rst
+++ b/Doc/library/zlib.rst
@@ -9,9 +9,9 @@
 
 For applications that require data compression, the functions in this module
 allow compression and decompression, using the zlib library. The zlib library
-has its own home page at http://www.zlib.net.   There are known
+has its own home page at https://www.zlib.net.   There are known
 incompatibilities between the Python module and versions of the zlib library
-earlier than 1.1.3; 1.1.3 has a security vulnerability, so we recommend using
+earlier than 1.1.3; 1.1.3 has a `security vulnerability <https://zlib.net/zlib_faq.html#faq33>`_, so we recommend using
 1.1.4 or later.
 
 zlib's functions have many options and often need to be used in a particular
@@ -337,4 +337,3 @@ the following constants:
    http://www.zlib.net/manual.html
       The zlib manual explains  the semantics and usage of the library's many
       functions.
-



More information about the Python-checkins mailing list