Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.122171
Category:Oracle Linux Local Security Checks
Title:Oracle: Security Advisory (ELSA-2011-0554)
Summary:The remote host is missing an update for the 'python, python-docs' package(s) announced via the ELSA-2011-0554 advisory.
Description:Summary:
The remote host is missing an update for the 'python, python-docs' package(s) announced via the ELSA-2011-0554 advisory.

Vulnerability Insight:
python:
[2.6.6-20]
Resolves: CVE-2010-3493

[2.6.6-19]
Resolves: CVE-2011-1015

[2.6.6-18]
Resolves: CVE-2011-1521

[2.6.6-17]
- recompile against systemtap 1.4
Related: rhbz#569695

[2.6.6-16]
- recompile against systemtap 1.4
Related: rhbz#569695

[2.6.6-15]
- fix race condition that sometimes breaks the build with parallel make
Resolves: rhbz#690315

[2.6.6-14]
- backport pre-canned ways of salting a password to the 'crypt' module
Resolves: rhbz#681878

[2.6.6-13]
- move lib2to3/tests to the python-test subpackage
Related: rhbz#625395

[2.6.6-12]
- fix a new test in 2.6.6 that was failing on 64-bit big-endian architectures
Resolves: rhbz#677392

[2.6.6-11]
- fix incompatibility between 2.6.6 and our non-standard M2Crypto.SSL.SSLTimeoutError
Resolves: rhbz#681811

[2.6.6-10]
- add workaround for bug in rhythmbox-0.12 exposed by python 2.6.6
Resolves: rhbz#684991

[2.6.6-9]
- prevent tracebacks for the 'py-bt' gdb command on x86_64
Resolves: rhbz#639392

[2.6.6-8]
- fix a regression in 2.6.6 relative to 2.6.5 in urllib2
Resolves: rhbz#669847

[2.6.6-7]
- add an optional 'timeout' argument to the subprocess module (patch 131)
Resolves: rhbz#567229

[2.6.6-6]
- prevent _sqlite3.so being built with a redundant RPATH of _libdir (patch 130)
- remove DOS batch file 'idle.bat'
- remove shebang lines from .py files that aren't executable, and remove
executability from .py files that don't have a shebang line
Related: rhbz#634944
- add 'Obsoletes: python-ssl' to core package, as 2.6 contains the ssl module
Resolves: rhbz#529274

[2.6.6-5]
- allow the 'no_proxy' environment variable to override 'ftp_proxy' in
urllib2 (patch 128)
Resolves: rhbz#637895
- make garbage-collection assertion failures more informative (patch 129)
Resolves: rhbz#614680

[2.6.6-4]
- backport subprocess fixes to use the 'poll' system call, rather than 'select'
Resolves: rhbz#650588

[2.6.6-3]
- use an ephemeral port for IDLE, enabling multiple instances to be run
Resolves: rhbz#639222
- add systemtap static markers, tapsets, and example scripts
Resolves: rhbz#569695

[2.6.6-2]
- fix dbm.release on ppc64/s390x
Resolves: rhbz#626756
- fix missing lib2to3 test files
Resolves: rhbz#625395
- fix test.test_commands SELinux incompatibility
Resolves: rhbz#625393
- make 'pydoc -k' more robust in the face of broken modules
Resolves: rhbz#603073

[2.6.6-1]
- rebase to 2.6.6: (which contains the big whitespace cleanup of r81031)
[link moved to references]
- fixup patch 102, patch 11, patch 52, patch 110
- drop upstreamed patches: patch 113 (CVE-2010-1634), patch 114
(CVE-2010-2089), patch 115 (CVE-2008-5983), patch 116 (rhbz598564),
patch 118 (rhbz540518)
- add fix for upstream bug in test_posix.py introduced in 2.6.6 (patch 120)
Resolves: rhbz#627301

python-docs:

[2.6.6-2]
- rebuild

[2.6.6-1]
- rebase to 2.6.6 to track the main python package
Related: rhbz#627301

Affected Software/OS:
'python, python-docs' package(s) on Oracle Linux 6.

Solution:
Please install the updated package(s).

CVSS Score:
6.4

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2010-3493
BugTraq ID: 44533
http://www.securityfocus.com/bid/44533
http://www.mandriva.com/security/advisories?name=MDVSA-2010:215
http://www.mandriva.com/security/advisories?name=MDVSA-2010:216
http://bugs.python.org/issue6706
https://bugs.launchpad.net/zodb/+bug/135108
http://www.openwall.com/lists/oss-security/2010/09/09/6
http://www.openwall.com/lists/oss-security/2010/09/11/2
http://www.openwall.com/lists/oss-security/2010/09/22/3
http://www.openwall.com/lists/oss-security/2010/09/24/3
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12210
http://secunia.com/advisories/43068
http://secunia.com/advisories/50858
http://secunia.com/advisories/51024
http://secunia.com/advisories/51040
SuSE Security Announcement: SUSE-SR:2010:024 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
SuSE Security Announcement: SUSE-SR:2011:002 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
http://www.ubuntu.com/usn/USN-1596-1
http://www.ubuntu.com/usn/USN-1613-1
http://www.ubuntu.com/usn/USN-1613-2
http://www.vupen.com/english/advisories/2011/0212
Common Vulnerability Exposure (CVE) ID: CVE-2011-1015
1025489
http://securitytracker.com/id?1025489
46541
http://www.securityfocus.com/bid/46541
50858
51024
51040
MDVSA-2011:096
http://www.mandriva.com/security/advisories?name=MDVSA-2011:096
USN-1596-1
USN-1613-1
USN-1613-2
[oss-security] 20110223 CVE request: Information disclosure in CGIHTTPServer from Python
http://openwall.com/lists/oss-security/2011/02/23/27
[oss-security] 20110224 Re: CVE request: Information disclosure in CGIHTTPServer from Python
http://openwall.com/lists/oss-security/2011/02/24/10
http://bugs.python.org/issue2254
http://hg.python.org/cpython/rev/c6c4398293bd/
http://svn.python.org/view?view=revision&revision=71303
https://bugzilla.redhat.com/show_bug.cgi?id=680094
Common Vulnerability Exposure (CVE) ID: CVE-2011-1521
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
http://openwall.com/lists/oss-security/2011/03/24/5
http://openwall.com/lists/oss-security/2011/03/28/2
http://openwall.com/lists/oss-security/2011/09/11/1
http://openwall.com/lists/oss-security/2011/09/13/2
http://openwall.com/lists/oss-security/2011/09/15/5
http://securitytracker.com/id?1025488
SuSE Security Announcement: SUSE-SR:2011:009 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html
http://www.ubuntu.com/usn/USN-1592-1
CopyrightCopyright (C) 2015 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.