|Category:||Red Hat Local Security Checks|
|Title:||RedHat Update for python-paste-script RHSA-2012:1206-01|
|Summary:||The remote host is missing an update for the 'python-paste-script'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'python-paste-script'
package(s) announced via the referenced advisory.
Python Paste provides middleware for building and running Python web
applications. The python-paste-script package includes paster, a tool for
working with and running Python Paste applications.
It was discovered that paster did not drop supplementary group privileges
when started by the root user. Running 'paster serve' as root to start a
Python web application that will run as a non-root user and group resulted
in that application running with root group privileges. This could possibly
allow a remote attacker to gain access to files that should not be
accessible to the application. (CVE-2012-0878)
All paster users should upgrade to this updated package, which contains a
backported patch to resolve this issue. All running paster instances
configured to drop privileges must be restarted for this update to take
python-paste-script on Red Hat Enterprise Linux Server (v. 6),
Red Hat Enterprise Linux Workstation (v. 6)
Please Install the Updated Packages.
Common Vulnerability Exposure (CVE) ID: CVE-2012-0878|
RedHat Security Advisories: RHSA-2012:1206
|Copyright||Copyright (c) 2012 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.