English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 143769 CVE descriptions
and 71225 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Moderate: python security update
Advisory ID:       RHSA-2007:1077-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2007-1077.html
Issue date:        2007-12-10
Updated on:        2007-12-10
Product:           Red Hat Enterprise Linux
CVE Names:         CVE-2006-7228 CVE-2007-2052 
- ---------------------------------------------------------------------

1. Summary:

Updated python packages that fix several security issues are now available
for Red Hat Enterprise Linux 2.1.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1  - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
Red Hat Enterprise Linux WS version 2.1 - i386

3. Problem description:

Python is an interpreted, interactive, object-oriented programming
language.

An integer overflow flaw was discovered in the way Python's pcre module
handled certain regular expressions. If a Python application used the pcre
module to compile and execute untrusted regular expressions, it may be
possible to cause the application to crash, or allow arbitrary code
execution with the privileges of the Python interpreter. (CVE-2006-7228)

A flaw was discovered in the strxfrm() function of Python's locale module.
Strings generated by this function were not properly NULL-terminated, which
could possibly cause disclosure of data stored in the memory of a Python
application using this function. (CVE-2007-2052)

Users of Python are advised to upgrade to these updated packages, which
contain backported patches to resolve these issues.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  

This update is available via Red Hat Network.  Details on how to use 
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

5. Bug IDs fixed (http://bugzilla.redhat.com/):

235093 - CVE-2007-2052 Off-by-one in python's locale.strxfrm()
383371 - CVE-2006-7228 pcre integer overflow

6. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 :

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/python-1.5.2-43.72.2.src.rpm
d187bd2b804cb0aa532b1d7ea1abe927  python-1.5.2-43.72.2.src.rpm

i386:
2eedfdef76a114b2249a0d8aead905c8  python-1.5.2-43.72.2.i386.rpm
d7bf8b0ceacec84d025fd4ea65f58c77  python-devel-1.5.2-43.72.2.i386.rpm
b9218c661a5efac21f011b48553e26f1  python-docs-1.5.2-43.72.2.i386.rpm
865e1d43ac445880137638a8574f8e6f  python-tools-1.5.2-43.72.2.i386.rpm
057a0423a93e1bc9d4c01917628aa3af  tkinter-1.5.2-43.72.2.i386.rpm

ia64:
b81ce154379e65cd37e8cb559eb2ae1d  python-1.5.2-43.72.2.ia64.rpm
9f4af6774469976ecc55bcd106aab7eb  python-devel-1.5.2-43.72.2.ia64.rpm
7c5b50475dfc7d6874cd79ecca36c706  python-docs-1.5.2-43.72.2.ia64.rpm
484c39c1e535e79d5d36bbe75ff0f9d9  python-tools-1.5.2-43.72.2.ia64.rpm
7f95d845167e93fd722e53ca35e28776  tkinter-1.5.2-43.72.2.ia64.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/python-1.5.2-43.72.2.src.rpm
d187bd2b804cb0aa532b1d7ea1abe927  python-1.5.2-43.72.2.src.rpm

ia64:
b81ce154379e65cd37e8cb559eb2ae1d  python-1.5.2-43.72.2.ia64.rpm
9f4af6774469976ecc55bcd106aab7eb  python-devel-1.5.2-43.72.2.ia64.rpm
7c5b50475dfc7d6874cd79ecca36c706  python-docs-1.5.2-43.72.2.ia64.rpm
484c39c1e535e79d5d36bbe75ff0f9d9  python-tools-1.5.2-43.72.2.ia64.rpm
7f95d845167e93fd722e53ca35e28776  tkinter-1.5.2-43.72.2.ia64.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/python-1.5.2-43.72.2.src.rpm
d187bd2b804cb0aa532b1d7ea1abe927  python-1.5.2-43.72.2.src.rpm

i386:
2eedfdef76a114b2249a0d8aead905c8  python-1.5.2-43.72.2.i386.rpm
d7bf8b0ceacec84d025fd4ea65f58c77  python-devel-1.5.2-43.72.2.i386.rpm
b9218c661a5efac21f011b48553e26f1  python-docs-1.5.2-43.72.2.i386.rpm
865e1d43ac445880137638a8574f8e6f  python-tools-1.5.2-43.72.2.i386.rpm
057a0423a93e1bc9d4c01917628aa3af  tkinter-1.5.2-43.72.2.i386.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/python-1.5.2-43.72.2.src.rpm
d187bd2b804cb0aa532b1d7ea1abe927  python-1.5.2-43.72.2.src.rpm

i386:
2eedfdef76a114b2249a0d8aead905c8  python-1.5.2-43.72.2.i386.rpm
d7bf8b0ceacec84d025fd4ea65f58c77  python-devel-1.5.2-43.72.2.i386.rpm
b9218c661a5efac21f011b48553e26f1  python-docs-1.5.2-43.72.2.i386.rpm
865e1d43ac445880137638a8574f8e6f  python-tools-1.5.2-43.72.2.i386.rpm
057a0423a93e1bc9d4c01917628aa3af  tkinter-1.5.2-43.72.2.i386.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7228
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2052
http://www.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2007 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFHXYWPXlSAg2UNWIIRAgsaAJ9/CC6eQs/dMuHeQ/gKt86l7+eRqwCfbSTv
DypFwizG77kZca+GTI45fgU=
=LOOL
-----END PGP SIGNATURE-----

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe

© 1998-2019 E-Soft Inc. All rights reserved.