Login
Newsletter
Werbung

Sicherheit: Pufferüberläufe in Python
Aktuelle Meldungen Distributionen
Name: Pufferüberläufe in Python
ID: FEDORA-2015-6010
Distribution: Fedora
Plattformen: Fedora 20
Datum: Do, 23. April 2015, 07:40
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1752
Applikationen: Python

Originalnachricht

Name        : python
Product : Fedora 20
Version : 2.7.5
Release : 16.fc20
URL : http://www.python.org/
Summary : An interpreted, interactive, object-oriented programming language
Description :
Python is an interpreted, interactive, object-oriented programming
language often compared to Tcl, Perl, Scheme or Java. Python includes
modules, classes, exceptions, very high level dynamic data types and
dynamic typing. Python supports interfaces to many system calls and
libraries, as well as to various windowing systems (X11, Motif, Tk,
Mac and MFC).

Programmers can write new built-in modules for Python in C or C++.
Python can be used as an extension language for applications that need
a programmable interface.

Note that documentation for Python is provided in the python-docs
package.

This package provides the "python" executable; most of the actual
implementation is within the "python-libs" package.

-------------------------------------------------------------------------------
-
Update Information:

Security fix for CVE-2013-1752




multiple unbound readline() DoS flaws in python stdlib



following fixes (which all relates to this CVE) are in this patch:

* ftplib: Limit amount of data read by limiting the call to readline(). #16038

* imaplib: limit line length in imaplib readline calls. #16039

* nntplib: Limit maximum line lengths to 2048 to prevent readline() calls from
consuming too much memory. #16040
* poplib: limit maximum line length that we read from the network #16041

* smtplib: limit amount read from the network #16042
-------------------------------------------------------------------------------
-
ChangeLog:

* Fri Apr 10 2015 Robert Kuska <rkuska@redhat.com> - 2.7.5-16
- Fix CVE-2013-1752 multiple unbound readline() DoS flaws in python stdlib
Resolves: rhbz#1159200
* Mon Nov 3 2014 Slavek Kabrda <bkabrda@redhat.com> - 2.7.5-15
- Fix CVE-2014-4650 - CGIHTTPServer URL handling
Resolves: rhbz#1113528
* Thu Sep 25 2014 Robert Kuska <rkuska@redhat.com> - 2.7.5-14
- potential buffer overflow
Resolves: rhbz#1146027
* Wed Jun 25 2014 Matej Stuchlik <mstuchli@redhat.com> - 2.7.5-13
- JSON module could read arbitrary process memory
Resolves: rhbz#1112293
* Thu Jun 19 2014 Bohuslav Kabrda <bkabrda@redhat.com> - 2.7.5-12
- Fix test failures with SQLite 3.8.4
- Fix double close of subprocess pipes when child process fails
Resolves: rhbz#1103450
* Wed Feb 19 2014 Bohuslav Kabrda <bkabrda@redhat.com> - 2.7.5-11
- Enable loading sqlite extensions.
Resolves: rhbz#1066708
* Mon Feb 10 2014 Tomas Radej <tradej@redhat.com> - 2.7.5-10
- Fixed buffer overflow (upstream patch)
Resolves: rhbz#1062375
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1046174 - CVE-2013-1752 python: multiple unbound readline() DoS
flaws in python stdlib
https://bugzilla.redhat.com/show_bug.cgi?id=1046174
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update python' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung