exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 27460

Secunia Security Advisory 27460
Posted Oct 30, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for python. This fixes a security issue, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, python
systems | linux, fedora
SHA-256 | bf10d0dedf92ffcabf7ace280342704e48cd85db9ae0c200ed1cf019edbf6171

Secunia Security Advisory 27460

Change Mirror Download


----------------------------------------------------------------------

2003: 2,700 advisories published
2004: 3,100 advisories published
2005: 4,600 advisories published
2006: 5,300 advisories published

How do you know which Secunia advisories are important to you?

The Secunia Vulnerability Intelligence Solutions allows you to filter
and structure all the information you need, so you can address issues
effectively.

Get a free trial of the Secunia Vulnerability Intelligence Solutions:
http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv

----------------------------------------------------------------------

TITLE:
Fedora update for python

SECUNIA ADVISORY ID:
SA27460

VERIFY ADVISORY:
http://secunia.com/advisories/27460/

CRITICAL:
Less critical

IMPACT:
System access, DoS

WHERE:
>From remote

OPERATING SYSTEM:
Fedora 7
http://secunia.com/product/15552/

DESCRIPTION:
Fedora has issued an update for python. This fixes a security issue,
which can be exploited by malicious people to cause a DoS (Denial of
Service) and potentially compromise a vulnerable system.

For more information:
SA26837

SOLUTION:
Apply updated packages.

19b48c55d1c81dde82c6ff5577ec8aeee741a004
python-devel-2.5-14.fc7.ppc64.rpm
e3780a0d8ee1f0831840e46d69ec4856b993e531
python-debuginfo-2.5-14.fc7.ppc64.rpm
4702d8d8b56a41f9a809d6513012eaff97053f5b
tkinter-2.5-14.fc7.ppc64.rpm
d2912c0f1ec7049e2e12511c7df4bf3b0fbf1e62
python-tools-2.5-14.fc7.ppc64.rpm
d53809ea841182f22ee59e3e4fe1ca10e68a999c python-2.5-14.fc7.ppc64.rpm
88fb6c0c27a77ffe9d7d5f536a95a35d635ae12d
python-libs-2.5-14.fc7.ppc64.rpm
787611a8a8654d34199a8c9e4dcc19daf63244b7 tkinter-2.5-14.fc7.i386.rpm
078edabdd4ef06d96ba129119aa07b692187813c
python-debuginfo-2.5-14.fc7.i386.rpm
8b1e8a6356dc193022a21ba5edf49da5e5f324e1 python-2.5-14.fc7.i386.rpm
bc80242891a2ec1f2c5ee388c46fc7bb964c106d
python-devel-2.5-14.fc7.i386.rpm
b79080fa4731b51d12f979a16900a45320314d5f
python-libs-2.5-14.fc7.i386.rpm
7bd18c479ef53f84caf4d7ec947b4aaae9b86423
python-tools-2.5-14.fc7.i386.rpm
e616ee4bd058011a934aeb9f2b021fa7750985c9
tkinter-2.5-14.fc7.x86_64.rpm
bf6ed59b839c0479a56a23283983d68a057bc0bc
python-2.5-14.fc7.x86_64.rpm
db37ad76506450cc64f05ae9eb1d8be81c139aaa
python-debuginfo-2.5-14.fc7.x86_64.rpm
9c15efd777c73df234a28d4ac9d0a60a8ba486c9
python-devel-2.5-14.fc7.x86_64.rpm
77de8859ac4745449f54adef2e7c2b280130db82
python-libs-2.5-14.fc7.x86_64.rpm
79a0b699e4250eefbf926299bfb7eac79262f5c9
python-tools-2.5-14.fc7.x86_64.rpm
ff3650bb1385ca3e27368317ab03e1d52a03c372
python-libs-2.5-14.fc7.ppc.rpm
da2e84ae407934e1d510a6c5ea1a4105794182d8 python-2.5-14.fc7.ppc.rpm
e330edb0f1e6f9082564455112cc285d8c6b5ceb
python-devel-2.5-14.fc7.ppc.rpm
f1a52deecfcaef1444352e68b55025a1414d0cae
python-debuginfo-2.5-14.fc7.ppc.rpm
90fb955eac390e0fa49e51b9d29db4bdf2162833
python-tools-2.5-14.fc7.ppc.rpm
a25e11ffe4add7fad8b8a4bc4031a1521689f77b tkinter-2.5-14.fc7.ppc.rpm
d4d994f7acc67000375e0fa2f927a3eb0b6b1c80 python-2.5-14.fc7.src.rpm

ORIGINAL ADVISORY:
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00378.html

OTHER REFERENCES:
SA26837:
http://secunia.com/advisories/26837/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close