drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Pufferüberläufe in Python
Name: |
Pufferüberläufe in Python |
|
ID: |
FEDORA-2015-6010 |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 20 |
|
Datum: |
Do, 23. April 2015, 07:40 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1752 |
|
Applikationen: |
Python |
|
Originalnachricht |
Name : python Product : Fedora 20 Version : 2.7.5 Release : 16.fc20 URL : http://www.python.org/ Summary : An interpreted, interactive, object-oriented programming language Description : Python is an interpreted, interactive, object-oriented programming language often compared to Tcl, Perl, Scheme or Java. Python includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems (X11, Motif, Tk, Mac and MFC).
Programmers can write new built-in modules for Python in C or C++. Python can be used as an extension language for applications that need a programmable interface.
Note that documentation for Python is provided in the python-docs package.
This package provides the "python" executable; most of the actual implementation is within the "python-libs" package.
------------------------------------------------------------------------------- - Update Information:
Security fix for CVE-2013-1752
multiple unbound readline() DoS flaws in python stdlib
following fixes (which all relates to this CVE) are in this patch:
* ftplib: Limit amount of data read by limiting the call to readline(). #16038
* imaplib: limit line length in imaplib readline calls. #16039
* nntplib: Limit maximum line lengths to 2048 to prevent readline() calls from consuming too much memory. #16040
* poplib: limit maximum line length that we read from the network #16041
* smtplib: limit amount read from the network #16042 ------------------------------------------------------------------------------- - ChangeLog:
* Fri Apr 10 2015 Robert Kuska <rkuska@redhat.com> - 2.7.5-16 - Fix CVE-2013-1752 multiple unbound readline() DoS flaws in python stdlib Resolves: rhbz#1159200 * Mon Nov 3 2014 Slavek Kabrda <bkabrda@redhat.com> - 2.7.5-15 - Fix CVE-2014-4650 - CGIHTTPServer URL handling Resolves: rhbz#1113528 * Thu Sep 25 2014 Robert Kuska <rkuska@redhat.com> - 2.7.5-14 - potential buffer overflow Resolves: rhbz#1146027 * Wed Jun 25 2014 Matej Stuchlik <mstuchli@redhat.com> - 2.7.5-13 - JSON module could read arbitrary process memory Resolves: rhbz#1112293 * Thu Jun 19 2014 Bohuslav Kabrda <bkabrda@redhat.com> - 2.7.5-12 - Fix test failures with SQLite 3.8.4 - Fix double close of subprocess pipes when child process fails Resolves: rhbz#1103450 * Wed Feb 19 2014 Bohuslav Kabrda <bkabrda@redhat.com> - 2.7.5-11 - Enable loading sqlite extensions. Resolves: rhbz#1066708 * Mon Feb 10 2014 Tomas Radej <tradej@redhat.com> - 2.7.5-10 - Fixed buffer overflow (upstream patch) Resolves: rhbz#1062375 ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #1046174 - CVE-2013-1752 python: multiple unbound readline() DoS flaws in python stdlib https://bugzilla.redhat.com/show_bug.cgi?id=1046174 ------------------------------------------------------------------------------- -
This update can be installed with the "yum" update program. Use su -c 'yum update python' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-announce
|
|
|
|