drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Zwei Probleme in python
Name: |
Zwei Probleme in python |
|
ID: |
RHSA-2007:1077-01 |
|
Distribution: |
Red Hat |
|
Plattformen: |
Red Hat Enterprise Linux |
|
Datum: |
Mo, 10. Dezember 2007, 19:43 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7228
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2052 |
|
Applikationen: |
Python |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
- --------------------------------------------------------------------- Red Hat Security Advisory
Synopsis: Moderate: python security update Advisory ID: RHSA-2007:1077-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2007-1077.html Issue date: 2007-12-10 Updated on: 2007-12-10 Product: Red Hat Enterprise Linux CVE Names: CVE-2006-7228 CVE-2007-2052 - ---------------------------------------------------------------------
1. Summary:
Updated python packages that fix several security issues are now available for Red Hat Enterprise Linux 2.1.
This update has been rated as having moderate security impact by the Red Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 Red Hat Enterprise Linux ES version 2.1 - i386 Red Hat Enterprise Linux WS version 2.1 - i386
3. Problem description:
Python is an interpreted, interactive, object-oriented programming language.
An integer overflow flaw was discovered in the way Python's pcre module handled certain regular expressions. If a Python application used the pcre module to compile and execute untrusted regular expressions, it may be possible to cause the application to crash, or allow arbitrary code execution with the privileges of the Python interpreter. (CVE-2006-7228)
A flaw was discovered in the strxfrm() function of Python's locale module. Strings generated by this function were not properly NULL-terminated, which could possibly cause disclosure of data stored in the memory of a Python application using this function. (CVE-2007-2052)
Users of Python are advised to upgrade to these updated packages, which contain backported patches to resolve these issues.
4. Solution:
Before applying this update, make sure that all previously-released errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188
5. Bug IDs fixed (http://bugzilla.redhat.com/):
235093 - CVE-2007-2052 Off-by-one in python's locale.strxfrm() 383371 - CVE-2006-7228 pcre integer overflow
6. RPMs required:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1 :
SRPMS: python-1.5.2-43.72.2.src.rpm d187bd2b804cb0aa532b1d7ea1abe927 python-1.5.2-43.72.2.src.rpm
i386: 2eedfdef76a114b2249a0d8aead905c8 python-1.5.2-43.72.2.i386.rpm d7bf8b0ceacec84d025fd4ea65f58c77 python-devel-1.5.2-43.72.2.i386.rpm b9218c661a5efac21f011b48553e26f1 python-docs-1.5.2-43.72.2.i386.rpm 865e1d43ac445880137638a8574f8e6f python-tools-1.5.2-43.72.2.i386.rpm 057a0423a93e1bc9d4c01917628aa3af tkinter-1.5.2-43.72.2.i386.rpm
ia64: b81ce154379e65cd37e8cb559eb2ae1d python-1.5.2-43.72.2.ia64.rpm 9f4af6774469976ecc55bcd106aab7eb python-devel-1.5.2-43.72.2.ia64.rpm 7c5b50475dfc7d6874cd79ecca36c706 python-docs-1.5.2-43.72.2.ia64.rpm 484c39c1e535e79d5d36bbe75ff0f9d9 python-tools-1.5.2-43.72.2.ia64.rpm 7f95d845167e93fd722e53ca35e28776 tkinter-1.5.2-43.72.2.ia64.rpm
Red Hat Linux Advanced Workstation 2.1:
SRPMS: python-1.5.2-43.72.2.src.rpm d187bd2b804cb0aa532b1d7ea1abe927 python-1.5.2-43.72.2.src.rpm
ia64: b81ce154379e65cd37e8cb559eb2ae1d python-1.5.2-43.72.2.ia64.rpm 9f4af6774469976ecc55bcd106aab7eb python-devel-1.5.2-43.72.2.ia64.rpm 7c5b50475dfc7d6874cd79ecca36c706 python-docs-1.5.2-43.72.2.ia64.rpm 484c39c1e535e79d5d36bbe75ff0f9d9 python-tools-1.5.2-43.72.2.ia64.rpm 7f95d845167e93fd722e53ca35e28776 tkinter-1.5.2-43.72.2.ia64.rpm
Red Hat Enterprise Linux ES version 2.1:
SRPMS: python-1.5.2-43.72.2.src.rpm d187bd2b804cb0aa532b1d7ea1abe927 python-1.5.2-43.72.2.src.rpm
i386: 2eedfdef76a114b2249a0d8aead905c8 python-1.5.2-43.72.2.i386.rpm d7bf8b0ceacec84d025fd4ea65f58c77 python-devel-1.5.2-43.72.2.i386.rpm b9218c661a5efac21f011b48553e26f1 python-docs-1.5.2-43.72.2.i386.rpm 865e1d43ac445880137638a8574f8e6f python-tools-1.5.2-43.72.2.i386.rpm 057a0423a93e1bc9d4c01917628aa3af tkinter-1.5.2-43.72.2.i386.rpm
Red Hat Enterprise Linux WS version 2.1:
SRPMS: python-1.5.2-43.72.2.src.rpm d187bd2b804cb0aa532b1d7ea1abe927 python-1.5.2-43.72.2.src.rpm
i386: 2eedfdef76a114b2249a0d8aead905c8 python-1.5.2-43.72.2.i386.rpm d7bf8b0ceacec84d025fd4ea65f58c77 python-devel-1.5.2-43.72.2.i386.rpm b9218c661a5efac21f011b48553e26f1 python-docs-1.5.2-43.72.2.i386.rpm 865e1d43ac445880137638a8574f8e6f python-tools-1.5.2-43.72.2.i386.rpm 057a0423a93e1bc9d4c01917628aa3af tkinter-1.5.2-43.72.2.i386.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7228 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2052 http://www.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/
Copyright 2007 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFHXYWPXlSAg2UNWIIRAgsaAJ9/CC6eQs/dMuHeQ/gKt86l7+eRqwCfbSTv DypFwizG77kZca+GTI45fgU= =LOOL -----END PGP SIGNATURE-----
-- Enterprise-watch-list mailing list Enterprise-watch-list@redhat.com https://www.redhat.com/mailman/listinfo/enterprise-watch-list
|
|
|
|