User: Password:
|
|
Subscribe / Log in / New account

Mandriva alert MDVSA-2014:074 (python)

From:  security@mandriva.com
To:  security-announce@lists.mandriva.com
Subject:  [Security Announce] [ MDVSA-2014:074 ] python
Date:  Wed, 09 Apr 2014 19:01:00 +0200
Message-ID:  <E1WXvrw-0000jv-Hg@titan.mandriva.com>

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2014:074 http://www.mandriva.com/en/support/security/ _______________________________________________________________________ Package : python Date : April 9, 2014 Affected: Business Server 1.0 _______________________________________________________________________ Problem Description: Updated python package fixes security vulnerabilities: Denial of service flaws due to unbound readline() calls in the imaplib, poplib, and smtplib modules (CVE-2013-1752). A gzip bomb and unbound read denial of service flaw in python XMLRPC library (CVE-2013-1753). _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1752 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1753 http://advisories.mageia.org/MGASA-2014-0139.html _______________________________________________________________________ Updated Packages: Mandriva Business Server 1/X86_64: 0b4dbc5612aefe31d96fe0b76ae2d25e mbs1/x86_64/lib64python2.7-2.7.3-4.6.mbs1.x86_64.rpm 8fea893a25e07e3f05dbc86a48c51434 mbs1/x86_64/lib64python-devel-2.7.3-4.6.mbs1.x86_64.rpm 9fcdf93fa35c2486c5f31cece8fde06f mbs1/x86_64/python-2.7.3-4.6.mbs1.x86_64.rpm 1fdfb41cd0d9437dc5657c58f36c00d0 mbs1/x86_64/python-docs-2.7.3-4.6.mbs1.noarch.rpm 9ba84d15644a54d44a25105bf0113bf6 mbs1/x86_64/tkinter-2.7.3-4.6.mbs1.x86_64.rpm 5f952f18652533f372392ac5abb7799e mbs1/x86_64/tkinter-apps-2.7.3-4.6.mbs1.x86_64.rpm a4bf7af0f079f07bb0da7cb8f19e5cf5 mbs1/SRPMS/python-2.7.3-4.6.mbs1.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/en/support/security/advisories/ If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iD8DBQFTRVK6mqjQ0CJFipgRAiXXAKDMFbfCmubwnKIlM4LNnNXDy/nbiwCgiW/k RGHVso/EuQEuZACnuIdYHsg= =Xccq -----END PGP SIGNATURE----- To unsubscribe, send a email to sympa@mandrivalinux.org with this subject : unsubscribe security-announce _______________________________________________________ Want to buy your Pack or Services from Mandriva? Go to http://store.mandriva.com _______________________________________________________


(Log in to post comments)


Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds