[Python-checkins] Add link to zlib v1.1.3 vulnerability (GH-17156)
T. Wouters
webhook-mailer at python.org
Fri Jan 3 07:10:32 EST 2020
https://github.com/python/cpython/commit/b789202cbedd93898c29b08a44ca085bf0723d81
commit: b789202cbedd93898c29b08a44ca085bf0723d81
branch: master
author: Emmanuel Nosa E <emmanuelnosa.e at gmail.com>
committer: T. Wouters <thomas at python.org>
date: 2020-01-03T13:10:16+01:00
summary:
Add link to zlib v1.1.3 vulnerability (GH-17156)
files:
M Doc/library/zlib.rst
diff --git a/Doc/library/zlib.rst b/Doc/library/zlib.rst
index 339acfd0e5786..ec60ea24db662 100644
--- a/Doc/library/zlib.rst
+++ b/Doc/library/zlib.rst
@@ -9,9 +9,9 @@
For applications that require data compression, the functions in this module
allow compression and decompression, using the zlib library. The zlib library
-has its own home page at http://www.zlib.net. There are known
+has its own home page at https://www.zlib.net. There are known
incompatibilities between the Python module and versions of the zlib library
-earlier than 1.1.3; 1.1.3 has a security vulnerability, so we recommend using
+earlier than 1.1.3; 1.1.3 has a `security vulnerability <https://zlib.net/zlib_faq.html#faq33>`_, so we recommend using
1.1.4 or later.
zlib's functions have many options and often need to be used in a particular
@@ -337,4 +337,3 @@ the following constants:
http://www.zlib.net/manual.html
The zlib manual explains the semantics and usage of the library's many
functions.
-
More information about the Python-checkins
mailing list