Ubuntu 1592-1: Python 2.7 vulnerabilities

    Date02 Oct 2012
    CategoryUbuntu
    26
    Posted ByLinuxSecurity Advisories
    Several security issues were fixed in Python 2.7.
    ==========================================================================
    Ubuntu Security Notice USN-1592-1
    October 02, 2012
    
    python2.7 vulnerabilities
    ==========================================================================
    
    A security issue affects these releases of Ubuntu and its derivatives:
    
    - Ubuntu 11.10
    - Ubuntu 11.04
    
    Summary:
    
    Several security issues were fixed in Python 2.7.
    
    Software Description:
    - python2.7: An interactive high-level object-oriented language
      (version 2.7)
    
    Details:
    
    Niels Heinen discovered that the urllib and urllib2 modules would
    process Location headers that specify a redirection to file: URLs. A
    remote attacker could exploit this to obtain sensitive information or
    cause a denial of service. This issue only affected Ubuntu 11.04.
    (CVE-2011-1521)
    
    It was discovered that SimpleHTTPServer did not use a charset parameter
    in the Content-Type HTTP header. An attacker could potentially exploit
    this to conduct cross-site scripting (XSS) attacks against Internet
    Explorer 7 users. This issue only affected Ubuntu 11.04. (CVE-2011-4940)
    
    It was discovered that Python distutils contained a race condition when
    creating the ~/.pypirc file. A local attacker could exploit this to
    obtain sensitive information. (CVE-2011-4944)
    
    It was discovered that SimpleXMLRPCServer did not properly validate its
    input when handling HTTP POST requests. A remote attacker could exploit
    this to cause a denial of service via excessive CPU utilization.
    (CVE-2012-0845)
    
    It was discovered that Python was susceptible to hash algorithm attacks.
    An attacker could cause a denial of service under certian circumstances.
    This updates adds the '-R' command line option and honors setting the
    PYTHONHASHSEED environment variable to 'random' to salt str and datetime
    objects with an unpredictable value. (CVE-2012-1150)
    
    Update instructions:
    
    The problem can be corrected by updating your system to the following
    package versions:
    
    Ubuntu 11.10:
      python2.7                       2.7.2-5ubuntu1.1
      python2.7-minimal               2.7.2-5ubuntu1.1
    
    Ubuntu 11.04:
      python2.7                       2.7.1-5ubuntu2.2
      python2.7-minimal               2.7.1-5ubuntu2.2
    
    In general, a standard system update will make all the necessary changes.
    
    References:
      http://www.ubuntu.com/usn/usn-1592-1
      CVE-2011-1521, CVE-2011-4940, CVE-2011-4944, CVE-2012-0845,
      CVE-2012-1150
    
    Package Information:
      https://launchpad.net/ubuntu/+source/python2.7/2.7.2-5ubuntu1.1
      https://launchpad.net/ubuntu/+source/python2.7/2.7.1-5ubuntu2.2
    
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"36","type":"x","order":"1","pct":50.7,"resources":[]},{"id":"88","title":"Should be more technical","votes":"10","type":"x","order":"2","pct":14.08,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"25","type":"x","order":"3","pct":35.21,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.