- Issued:
- 2010-12-16
- Updated:
- 2010-12-16
RHBA-2010:0993 - Bug Fix Advisory
Synopsis
m2crypto bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated m2crypto package that fixes a memory leak is now available for Red
Hat Enterprise Linux 5.
Description
m2crypto is a Python wrapper for OpenSSL. It makes it possible to call OpenSSL
functions from Python scripts.
This updated m2crypto package fixes the following bug:
- When an "M2Crypto.SSL.Connection" object was created without setting up a
connection, an SSL object was allocated and never freed. Over time, this could
result in a significant memory leak. This update ensures the memory is correctly
deallocated. (BZ#661869)
Users of m2crypto are advised to upgrade to this updated package, which resolves
this issue.
Solution
Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 661869 - memory leak in the attached script
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
m2crypto-0.16-6.1.el5_5.1.src.rpm | SHA-256: 0572d1e67ae4d3adcaa8b2a22ef96d86e703e9e8b6dead0461468cb601b9bb05 |
x86_64 | |
m2crypto-0.16-6.1.el5_5.1.x86_64.rpm | SHA-256: e6f4e5622477152be06acc4271fdc44146e49c55a285b1e76f8727ed12b185ef |
ia64 | |
m2crypto-0.16-6.1.el5_5.1.ia64.rpm | SHA-256: 926dcbf064b6fb9e8c2d63780eb05d7a543735321353b9cc70a2c61de508723d |
i386 | |
m2crypto-0.16-6.1.el5_5.1.i386.rpm | SHA-256: d08f4a8d273a3b166608e66075c3483e9edd4e6f61023a07b63bb6f058e55a99 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
m2crypto-0.16-6.1.el5_5.1.src.rpm | SHA-256: 0572d1e67ae4d3adcaa8b2a22ef96d86e703e9e8b6dead0461468cb601b9bb05 |
x86_64 | |
m2crypto-0.16-6.1.el5_5.1.x86_64.rpm | SHA-256: e6f4e5622477152be06acc4271fdc44146e49c55a285b1e76f8727ed12b185ef |
i386 | |
m2crypto-0.16-6.1.el5_5.1.i386.rpm | SHA-256: d08f4a8d273a3b166608e66075c3483e9edd4e6f61023a07b63bb6f058e55a99 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
m2crypto-0.16-6.1.el5_5.1.src.rpm | SHA-256: 0572d1e67ae4d3adcaa8b2a22ef96d86e703e9e8b6dead0461468cb601b9bb05 |
x86_64 | |
m2crypto-0.16-6.1.el5_5.1.x86_64.rpm | SHA-256: e6f4e5622477152be06acc4271fdc44146e49c55a285b1e76f8727ed12b185ef |
i386 | |
m2crypto-0.16-6.1.el5_5.1.i386.rpm | SHA-256: d08f4a8d273a3b166608e66075c3483e9edd4e6f61023a07b63bb6f058e55a99 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
m2crypto-0.16-6.1.el5_5.1.src.rpm | SHA-256: 0572d1e67ae4d3adcaa8b2a22ef96d86e703e9e8b6dead0461468cb601b9bb05 |
s390x | |
m2crypto-0.16-6.1.el5_5.1.s390x.rpm | SHA-256: 1c054caab062d7ee7e7f048e779c51af749a97d33dbae7d8cd61949a83b3b325 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
m2crypto-0.16-6.1.el5_5.1.src.rpm | SHA-256: 0572d1e67ae4d3adcaa8b2a22ef96d86e703e9e8b6dead0461468cb601b9bb05 |
ppc | |
m2crypto-0.16-6.1.el5_5.1.ppc.rpm | SHA-256: 57211c142dfc8c14848040713aa5c47f3f576bd7df64af29cdd834049a0e2e4f |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
m2crypto-0.16-6.1.el5_5.1.src.rpm | SHA-256: 0572d1e67ae4d3adcaa8b2a22ef96d86e703e9e8b6dead0461468cb601b9bb05 |
x86_64 | |
m2crypto-0.16-6.1.el5_5.1.x86_64.rpm | SHA-256: e6f4e5622477152be06acc4271fdc44146e49c55a285b1e76f8727ed12b185ef |
i386 | |
m2crypto-0.16-6.1.el5_5.1.i386.rpm | SHA-256: d08f4a8d273a3b166608e66075c3483e9edd4e6f61023a07b63bb6f058e55a99 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.