Skip to navigation

Security Advisory Moderate: python security update

Advisory: RHSA-2009:1176-1
Type: Security Advisory
Severity: Moderate
Issued on: 2009-07-27
Last updated on: 2009-07-27
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux EUS (v. 5.3.z server)
Red Hat Enterprise Linux Long Life (v. 5.3 server)
CVEs (cve.mitre.org): CVE-2007-2052
CVE-2007-4965
CVE-2008-1721
CVE-2008-1887
CVE-2008-2315
CVE-2008-3142
CVE-2008-3143
CVE-2008-3144
CVE-2008-4864
CVE-2008-5031

Details

Updated python packages that fix multiple security issues are now available
for Red Hat Enterprise Linux 5.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

Python is an interpreted, interactive, object-oriented programming
language.

When the assert() system call was disabled, an input sanitization flaw was
revealed in the Python string object implementation that led to a buffer
overflow. The missing check for negative size values meant the Python
memory allocator could allocate less memory than expected. This could
result in arbitrary code execution with the Python interpreter's
privileges. (CVE-2008-1887)

Multiple buffer and integer overflow flaws were found in the Python Unicode
string processing and in the Python Unicode and string object
implementations. An attacker could use these flaws to cause a denial of
service (Python application crash). (CVE-2008-3142, CVE-2008-5031)

Multiple integer overflow flaws were found in the Python imageop module. If
a Python application used the imageop module to process untrusted images,
it could cause the application to disclose sensitive information, crash or,
potentially, execute arbitrary code with the Python interpreter's
privileges. (CVE-2007-4965, CVE-2008-4864)

Multiple integer underflow and overflow flaws were found in the Python
snprintf() wrapper implementation. An attacker could use these flaws to
cause a denial of service (memory corruption). (CVE-2008-3144)

Multiple integer overflow flaws were found in various Python modules. An
attacker could use these flaws to cause a denial of service (Python
application crash). (CVE-2008-2315, CVE-2008-3143)

An integer signedness error, leading to a buffer overflow, was found
in the Python zlib extension module. If a Python application requested
the negative byte count be flushed for a decompression stream, it could
cause the application to crash or, potentially, execute arbitrary code
with the Python interpreter's privileges. (CVE-2008-1721)

A flaw was discovered in the strxfrm() function of the Python locale
module. Strings generated by this function were not properly
NULL-terminated, which could possibly cause disclosure of data stored in
the memory of a Python application using this function. (CVE-2007-2052)

Red Hat would like to thank David Remahl of the Apple Product Security team
for responsibly reporting the CVE-2008-2315 issue.

All Python users should upgrade to these updated packages, which contain
backported patches to correct these issues.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
python-2.4.3-24.el5_3.6.src.rpm
File outdated by:  RHBA-2013:0045
    MD5: 632ec52d939f55dce497a9ce31dcb779
 
IA-32:
python-devel-2.4.3-24.el5_3.6.i386.rpm
File outdated by:  RHBA-2013:0045
    MD5: 2e93026cd56d5c8b48b9166a448461fd
 
x86_64:
python-devel-2.4.3-24.el5_3.6.i386.rpm
File outdated by:  RHBA-2013:0045
    MD5: 2e93026cd56d5c8b48b9166a448461fd
python-devel-2.4.3-24.el5_3.6.x86_64.rpm
File outdated by:  RHBA-2013:0045
    MD5: 28cd2ca78e0e9a3250cb756321e5b468
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
python-2.4.3-24.el5_3.6.src.rpm
File outdated by:  RHBA-2013:0045
    MD5: 632ec52d939f55dce497a9ce31dcb779
 
IA-32:
python-2.4.3-24.el5_3.6.i386.rpm
File outdated by:  RHBA-2013:0045
    MD5: 13b726df6033f7a4b2e8f307b3278b8b
python-devel-2.4.3-24.el5_3.6.i386.rpm
File outdated by:  RHBA-2013:0045
    MD5: 2e93026cd56d5c8b48b9166a448461fd
python-tools-2.4.3-24.el5_3.6.i386.rpm
File outdated by:  RHBA-2013:0045
    MD5: 66aafad38bbcd1f2188108c02c2ee437
tkinter-2.4.3-24.el5_3.6.i386.rpm
File outdated by:  RHBA-2013:0045
    MD5: d678cbddf0784d29da6136bb31890b07
 
IA-64:
python-2.4.3-24.el5_3.6.ia64.rpm
File outdated by:  RHBA-2013:0045
    MD5: ee3a4e187356433312a86a47e3a58ad0
python-devel-2.4.3-24.el5_3.6.ia64.rpm
File outdated by:  RHBA-2013:0045
    MD5: b43788d7c6500b689581e79086012c8a
python-tools-2.4.3-24.el5_3.6.ia64.rpm
File outdated by:  RHBA-2013:0045
    MD5: c616b13c7468f39b4e2b166a283b6df8
tkinter-2.4.3-24.el5_3.6.ia64.rpm
File outdated by:  RHBA-2013:0045
    MD5: e405143df937a7549c1ca77ddd6d2cc6
 
PPC:
python-2.4.3-24.el5_3.6.ppc.rpm
File outdated by:  RHBA-2013:0045
    MD5: fa6f9c99410ef02b39304c2f94ad427b
python-devel-2.4.3-24.el5_3.6.ppc.rpm
File outdated by:  RHBA-2013:0045
    MD5: 46efab8d2a012981ebb5bf49cb9f9a8f
python-devel-2.4.3-24.el5_3.6.ppc64.rpm
File outdated by:  RHBA-2013:0045
    MD5: 56842fd644e4ebdd933ab5edff572ff3
python-tools-2.4.3-24.el5_3.6.ppc.rpm
File outdated by:  RHBA-2013:0045
    MD5: 82273206cda1d5e8e7b2274829046fe1
tkinter-2.4.3-24.el5_3.6.ppc.rpm
File outdated by:  RHBA-2013:0045
    MD5: 002ddd536125c544708095ee0e16422a
 
s390x:
python-2.4.3-24.el5_3.6.s390x.rpm
File outdated by:  RHBA-2013:0045
    MD5: 36f217ae4784c9b711d4f37625b4e56a
python-devel-2.4.3-24.el5_3.6.s390.rpm
File outdated by:  RHBA-2013:0045
    MD5: 3a7ce6de20d8836c06bc57e9eb0aa3a2
python-devel-2.4.3-24.el5_3.6.s390x.rpm
File outdated by:  RHBA-2013:0045
    MD5: c89230b920a3a365ce9e8028c7a89200
python-tools-2.4.3-24.el5_3.6.s390x.rpm
File outdated by:  RHBA-2013:0045
    MD5: 85bead969c72c9bd923a6504bef053f0
tkinter-2.4.3-24.el5_3.6.s390x.rpm
File outdated by:  RHBA-2013:0045
    MD5: 5919f329c16e5514d0cfa384828ce221
 
x86_64:
python-2.4.3-24.el5_3.6.x86_64.rpm
File outdated by:  RHBA-2013:0045
    MD5: 12aa5f9012ff1d76758727aed3726d0c
python-devel-2.4.3-24.el5_3.6.i386.rpm
File outdated by:  RHBA-2013:0045
    MD5: 2e93026cd56d5c8b48b9166a448461fd
python-devel-2.4.3-24.el5_3.6.x86_64.rpm
File outdated by:  RHBA-2013:0045
    MD5: 28cd2ca78e0e9a3250cb756321e5b468
python-tools-2.4.3-24.el5_3.6.x86_64.rpm
File outdated by:  RHBA-2013:0045
    MD5: 2bddb31f3d37e6a59b7d6a9733f3cfa8
tkinter-2.4.3-24.el5_3.6.x86_64.rpm
File outdated by:  RHBA-2013:0045
    MD5: 82295dad05cece83d6876496efc5dd87
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
python-2.4.3-24.el5_3.6.src.rpm
File outdated by:  RHBA-2013:0045
    MD5: 632ec52d939f55dce497a9ce31dcb779
 
IA-32:
python-2.4.3-24.el5_3.6.i386.rpm
File outdated by:  RHBA-2013:0045
    MD5: 13b726df6033f7a4b2e8f307b3278b8b
python-tools-2.4.3-24.el5_3.6.i386.rpm
File outdated by:  RHBA-2013:0045
    MD5: 66aafad38bbcd1f2188108c02c2ee437
tkinter-2.4.3-24.el5_3.6.i386.rpm
File outdated by:  RHBA-2013:0045
    MD5: d678cbddf0784d29da6136bb31890b07
 
x86_64:
python-2.4.3-24.el5_3.6.x86_64.rpm
File outdated by:  RHBA-2013:0045
    MD5: 12aa5f9012ff1d76758727aed3726d0c
python-tools-2.4.3-24.el5_3.6.x86_64.rpm
File outdated by:  RHBA-2013:0045
    MD5: 2bddb31f3d37e6a59b7d6a9733f3cfa8
tkinter-2.4.3-24.el5_3.6.x86_64.rpm
File outdated by:  RHBA-2013:0045
    MD5: 82295dad05cece83d6876496efc5dd87
 
Red Hat Enterprise Linux EUS (v. 5.3.z server)

SRPMS:
python-2.4.3-24.el5_3.6.src.rpm
File outdated by:  RHBA-2013:0045
    MD5: 632ec52d939f55dce497a9ce31dcb779
 
IA-32:
python-2.4.3-24.el5_3.6.i386.rpm     MD5: 13b726df6033f7a4b2e8f307b3278b8b
python-devel-2.4.3-24.el5_3.6.i386.rpm     MD5: 2e93026cd56d5c8b48b9166a448461fd
python-tools-2.4.3-24.el5_3.6.i386.rpm     MD5: 66aafad38bbcd1f2188108c02c2ee437
tkinter-2.4.3-24.el5_3.6.i386.rpm     MD5: d678cbddf0784d29da6136bb31890b07
 
IA-64:
python-2.4.3-24.el5_3.6.ia64.rpm     MD5: ee3a4e187356433312a86a47e3a58ad0
python-devel-2.4.3-24.el5_3.6.ia64.rpm     MD5: b43788d7c6500b689581e79086012c8a
python-tools-2.4.3-24.el5_3.6.ia64.rpm     MD5: c616b13c7468f39b4e2b166a283b6df8
tkinter-2.4.3-24.el5_3.6.ia64.rpm     MD5: e405143df937a7549c1ca77ddd6d2cc6
 
PPC:
python-2.4.3-24.el5_3.6.ppc.rpm     MD5: fa6f9c99410ef02b39304c2f94ad427b
python-devel-2.4.3-24.el5_3.6.ppc.rpm     MD5: 46efab8d2a012981ebb5bf49cb9f9a8f
python-devel-2.4.3-24.el5_3.6.ppc64.rpm     MD5: 56842fd644e4ebdd933ab5edff572ff3
python-tools-2.4.3-24.el5_3.6.ppc.rpm     MD5: 82273206cda1d5e8e7b2274829046fe1
tkinter-2.4.3-24.el5_3.6.ppc.rpm     MD5: 002ddd536125c544708095ee0e16422a
 
s390x:
python-2.4.3-24.el5_3.6.s390x.rpm     MD5: 36f217ae4784c9b711d4f37625b4e56a
python-devel-2.4.3-24.el5_3.6.s390.rpm     MD5: 3a7ce6de20d8836c06bc57e9eb0aa3a2
python-devel-2.4.3-24.el5_3.6.s390x.rpm     MD5: c89230b920a3a365ce9e8028c7a89200
python-tools-2.4.3-24.el5_3.6.s390x.rpm     MD5: 85bead969c72c9bd923a6504bef053f0
tkinter-2.4.3-24.el5_3.6.s390x.rpm     MD5: 5919f329c16e5514d0cfa384828ce221
 
x86_64:
python-2.4.3-24.el5_3.6.x86_64.rpm     MD5: 12aa5f9012ff1d76758727aed3726d0c
python-devel-2.4.3-24.el5_3.6.i386.rpm     MD5: 2e93026cd56d5c8b48b9166a448461fd
python-devel-2.4.3-24.el5_3.6.x86_64.rpm     MD5: 28cd2ca78e0e9a3250cb756321e5b468
python-tools-2.4.3-24.el5_3.6.x86_64.rpm     MD5: 2bddb31f3d37e6a59b7d6a9733f3cfa8
tkinter-2.4.3-24.el5_3.6.x86_64.rpm     MD5: 82295dad05cece83d6876496efc5dd87
 
Red Hat Enterprise Linux Long Life (v. 5.3 server)

SRPMS:
python-2.4.3-24.el5_3.6.src.rpm
File outdated by:  RHBA-2013:0045
    MD5: 632ec52d939f55dce497a9ce31dcb779
 
IA-32:
python-2.4.3-24.el5_3.6.i386.rpm     MD5: 13b726df6033f7a4b2e8f307b3278b8b
python-devel-2.4.3-24.el5_3.6.i386.rpm     MD5: 2e93026cd56d5c8b48b9166a448461fd
python-tools-2.4.3-24.el5_3.6.i386.rpm     MD5: 66aafad38bbcd1f2188108c02c2ee437
tkinter-2.4.3-24.el5_3.6.i386.rpm     MD5: d678cbddf0784d29da6136bb31890b07
 
IA-64:
python-2.4.3-24.el5_3.6.ia64.rpm     MD5: ee3a4e187356433312a86a47e3a58ad0
python-devel-2.4.3-24.el5_3.6.ia64.rpm     MD5: b43788d7c6500b689581e79086012c8a
python-tools-2.4.3-24.el5_3.6.ia64.rpm     MD5: c616b13c7468f39b4e2b166a283b6df8
tkinter-2.4.3-24.el5_3.6.ia64.rpm     MD5: e405143df937a7549c1ca77ddd6d2cc6
 
x86_64:
python-2.4.3-24.el5_3.6.x86_64.rpm     MD5: 12aa5f9012ff1d76758727aed3726d0c
python-devel-2.4.3-24.el5_3.6.i386.rpm     MD5: 2e93026cd56d5c8b48b9166a448461fd
python-devel-2.4.3-24.el5_3.6.x86_64.rpm     MD5: 28cd2ca78e0e9a3250cb756321e5b468
python-tools-2.4.3-24.el5_3.6.x86_64.rpm     MD5: 2bddb31f3d37e6a59b7d6a9733f3cfa8
tkinter-2.4.3-24.el5_3.6.x86_64.rpm     MD5: 82295dad05cece83d6876496efc5dd87
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

235093 - CVE-2007-2052 python off-by-one locale.strxfrm() (possible memory disclosure)
295971 - CVE-2007-4965 python imageop module heap corruption
442005 - CVE-2008-1721 python: integer signedness error in the zlib extension module
443810 - CVE-2008-1887 python: PyString_FromStringAndSize does not check for negative size values
454990 - CVE-2008-3142 python: Multiple buffer overflows in unicode processing
455008 - CVE-2008-2315 python: Multiple integer overflows in python core
455013 - CVE-2008-3143 python: Multiple integer overflows discovered by Google
455018 - CVE-2008-3144 python: Potential integer underflow and overflow in the PyOS_vsnprintf C API function
469656 - CVE-2008-4864 python: imageop module multiple integer overflows
470915 - CVE-2008-5031 python: stringobject, unicodeobject integer overflows


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/