what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2008-012

Mandriva Linux Security Advisory 2008-012
Posted Jan 14, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - An integer overflow flaw was discovered in how python's pcre module handled certain regular expressions. If a python application using the pcre module were to compile and execute untrusted regular expressions, it could possibly lead to an application crash or the execution of arbitrary code with the privileges of the python interpreter. Multiple integer overflows were found in python's imageop module. If an application written in python used the imageop module to process untrusted images, it could cause the application to crash, enter an infinite loop, or possibly execute arbitrary code with the privileges of the python interpreter.

tags | advisory, overflow, arbitrary, python
systems | linux, mandriva
advisories | CVE-2006-7228, CVE-2007-4965
SHA-256 | 768924f6a4c4dc0d8aa6d014cd64650fde1304e861e573e4128b3711365bab10

Mandriva Linux Security Advisory 2008-012

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2008:012
http://www.mandriva.com/security/
_______________________________________________________________________

Package : python
Date : January 14, 2008
Affected: Corporate 3.0, Multi Network Firewall 2.0
_______________________________________________________________________

Problem Description:

An integer overflow flaw was discovered in how python's pcre module
handled certain regular expressions. If a python application using the
pcre module were to compile and execute untrusted regular expressions,
it could possibly lead to an application crash or the excution
of arbitrary code with the privileges of the python interpreter
(CVE-2006-7228).

Multiple integer overflows were found in python's imageop module.
If an application written in python used the imageop module to
process untrusted images, it could cause the application to crash,
enter an infinite loop, or possibly execute arbitrary code with the
privileges of the python interpreter (CVE-2007-4965).

The updated packages have been patched to correct these issues.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7228
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4965
_______________________________________________________________________

Updated Packages:

Corporate 3.0:
6c3c9196c69a9590c2337ec47b812512 corporate/3.0/i586/libpython2.3-2.3.3-2.5.C30mdk.i586.rpm
633d4e1b82ffb0bab95dbad17c8658c7 corporate/3.0/i586/libpython2.3-devel-2.3.3-2.5.C30mdk.i586.rpm
2437c3ef65df378ea6b91e18515e31a5 corporate/3.0/i586/python-2.3.3-2.5.C30mdk.i586.rpm
4cbdfcb886ccfea966976a0e8b45eed7 corporate/3.0/i586/python-base-2.3.3-2.5.C30mdk.i586.rpm
2b0da1499ae353820f062b2566964c56 corporate/3.0/i586/python-docs-2.3.3-2.5.C30mdk.i586.rpm
9cfe879d13ca873e5b3f925e01afe738 corporate/3.0/i586/tkinter-2.3.3-2.5.C30mdk.i586.rpm
d45b5129aa7e97f4b486a2b54e2b10e0 corporate/3.0/SRPMS/python-2.3.3-2.5.C30mdk.src.rpm

Corporate 3.0/X86_64:
58eb34e9829788ee0d0c9a2aca9d9b4d corporate/3.0/x86_64/lib64python2.3-2.3.3-2.5.C30mdk.x86_64.rpm
a7c01d1746edbf260c67c982d62ab5f8 corporate/3.0/x86_64/lib64python2.3-devel-2.3.3-2.5.C30mdk.x86_64.rpm
e5e3cd26caee40c1a89896b3dd99f183 corporate/3.0/x86_64/python-2.3.3-2.5.C30mdk.x86_64.rpm
250e98c26995e58d5c074b483bc5168b corporate/3.0/x86_64/python-base-2.3.3-2.5.C30mdk.x86_64.rpm
d3763c75ed560b944f2900ec27fc3a24 corporate/3.0/x86_64/python-docs-2.3.3-2.5.C30mdk.x86_64.rpm
aefa7c0274efa2d0c4d546b88940f7d0 corporate/3.0/x86_64/tkinter-2.3.3-2.5.C30mdk.x86_64.rpm
d45b5129aa7e97f4b486a2b54e2b10e0 corporate/3.0/SRPMS/python-2.3.3-2.5.C30mdk.src.rpm

Multi Network Firewall 2.0:
f431a6aadd0f4e952c4b0515bbd21d9e mnf/2.0/i586/libpython2.3-2.3.3-2.5.M20mdk.i586.rpm
ed3b1c628b9165e1562e56b91c8762b2 mnf/2.0/i586/libpython2.3-devel-2.3.3-2.5.M20mdk.i586.rpm
fa2bc6f689c780f406a5eb7a035d3d51 mnf/2.0/i586/python-2.3.3-2.5.M20mdk.i586.rpm
a6a3082c9a938ae17ac55a90e1f34159 mnf/2.0/i586/python-base-2.3.3-2.5.M20mdk.i586.rpm
aa492f1068bdaeaa07450844a36e53f0 mnf/2.0/i586/python-docs-2.3.3-2.5.M20mdk.i586.rpm
69e1686a9dcc20bd77e2925b2fc9f4ca mnf/2.0/i586/tkinter-2.3.3-2.5.M20mdk.i586.rpm
b4f010845985ce30fd8eef89d348f61f mnf/2.0/SRPMS/python-2.3.3-2.5.M20mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (GNU/Linux)

iD8DBQFHi79lmqjQ0CJFipgRAubYAKCZBEYNbwsnhywcAm7zAiQL61MyvQCg1DOd
Xr5C7PIEgYrp28fE1yD4TzE=
=tyfR
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close