python-2.4.3-43.0.1.AXS3
エラータID: AXSA:2011-10:01
Python is an interpreted, interactive, object-oriented programming language often compared to Tcl, Perl, Scheme or Java. Python includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems (X11, Motif, Tk, Mac and MFC).
Programmers can write new built-in modules for Python in C or C++. Python can be used as an extension language for applications that need a programmable interface. This package contains most of the standard Python modules, as well as modules for interfacing to the Tix widget set for Tk and RPM.
Note that documentation for Python is provided in the python-docs package.
Security issues fixed with this release:
CVE-2008-5983
Untrusted search path vulnerability in the PySys_SetArgv API function in Python 2.6 and earlier, and possibly later versions, prepends an empty string to sys.path when the argv[0] argument does not contain a path separator, which might allow local users to execute arbitrary code via a Trojan horse Python file in the current working directory.
CVE-2009-4134
Buffer underflow in the rgbimg module in Python 2.5 allows remote attackers to cause a denial of service (application crash) via a large ZSIZE value in a black-and-white (aka B/W) RGB image that triggers an invalid pointer dereference.
CVE-2010-1449
Integer overflow in rgbimgmodule.c in the rgbimg module in Python 2.5 allows remote attackers to have an unspecified impact via a large image that triggers a buffer overflow. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-3143.12.
CVE-2010-1450
Multiple buffer overflows in the RLE decoder in the rgbimg module in Python 2.5 allow remote attackers to have an unspecified impact via an image file containing crafted data that triggers improper processing within the (1) longimagedata or (2) expandrow function.
CVE-2010-1634
Multiple integer overflows in audioop.c in the audioop module in Python 2.6, 2.7, 3.1, and 3.2 allow context-dependent attackers to cause a denial of service (application crash) via a large fragment, as demonstrated by a call to audioop.lin2lin with a long string in the first argument, leading to a buffer overflow. NOTE: this vulnerability exists because of an incorrect fix for CVE-2008-3143.5.
CVE-2010-2089
The audioop module in Python 2.7 and 3.2 does not verify the relationships between size arguments and byte string lengths, which allows context-dependent attackers to cause a denial of service (memory corruption and application crash) via crafted arguments, as demonstrated by a call to audioop.reverse with a one-byte string, a different vulnerability than CVE-2010-1634.
Fixed bugs:
* When starting a child process from the subprocess module in Python 2.4, the parent process could leak file descriptors if an error occurred. This update resolves the issue.
* Prior to Python 2.7, programs that used 'ulimit -n' to enable communication with large numbers of subprocesses could still monitor only 1024 file descriptors at a time, which caused an exception:
ValueError: filedescriptor out of range in select()
This was due to the subprocess module using the 'select' system call. The module now uses the 'poll' system call, removing this limitation.
* Prior to Python 2.5, the tarfile module failed to unpack tar files if the path was longer than 100 characters. This update backports the tarfile module from Python 2.5 and the issue no longer occurs.
* The email module incorrectly implemented the logic for obtaining attachment file names: the get_filename() fallback for using the deprecated 'name' parameter of the 'Content-Type' header erroneously used the 'Content-Disposition' header. This update backports a fix from Python 2.6, which resolves this issue.
* Prior to version 2.5, Python's optimized memory allocator never released memory back to the system. The memory usage of a long-running Python process would resemble a 'high-water mark'. This update backports a fix from Python 2.5a1, which frees unused arenas, and adds a non-standard sys._debugmallocstats() function, which prints diagnostic information to stderr. Finally, when running under Valgrind, the optimized allocator is deactivated, to allow more convenient debugging of Python memory usage issues.
* The urllib and urllib2 modules ignored the no_proxy variable, which could lead to programs such as 'yum' erroneously accessing a proxy server for URLs covered by a 'no_proxy' exclusion. This has been fixed by backporting fixes of urllib and urllib2, which respect the 'no_proxy' variable.
Enhancements:
* This update introduces a new python-libs package, subsuming the majority of the content of the core python package. This makes both 32-bit and 64-bit Python libraries available on PowerPC systems.
* The python-libs.i386 package is now available for 64-bit Itanium with the 32-bit Itanium compatibility mode.
Update packages.
Untrusted search path vulnerability in the PySys_SetArgv API function in Python 2.6 and earlier, and possibly later versions, prepends an empty string to sys.path when the argv[0] argument does not contain a path separator, which might allow local users to execute arbitrary code via a Trojan horse Python file in the current working directory.
Buffer underflow in the rgbimg module in Python 2.5 allows remote attackers to cause a denial of service (application crash) via a large ZSIZE value in a black-and-white (aka B/W) RGB image that triggers an invalid pointer dereference.
Integer overflow in rgbimgmodule.c in the rgbimg module in Python 2.5 allows remote attackers to have an unspecified impact via a large image that triggers a buffer overflow. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-3143.12.
Multiple buffer overflows in the RLE decoder in the rgbimg module in Python 2.5 allow remote attackers to have an unspecified impact via an image file containing crafted data that triggers improper processing within the (1) longimagedata or (2) expandrow function.
Multiple integer overflows in audioop.c in the audioop module in Python 2.6, 2.7, 3.1, and 3.2 allow context-dependent attackers to cause a denial of service (application crash) via a large fragment, as demonstrated by a call to audioop.lin2lin with a long string in the first argument, leading to a buffer overflow. NOTE: this vulnerability exists because of an incorrect fix for CVE-2008-3143.5.
The audioop module in Python 2.7 and 3.2 does not verify the relationships between size arguments and byte string lengths, which allows context-dependent attackers to cause a denial of service (memory corruption and application crash) via crafted arguments, as demonstrated by a call to audioop.reverse with a one-byte string, a different vulnerability than CVE-2010-1634.
N/A
SRPMS
- python-2.4.3-43.0.1.AXS3.src.rpm
MD5: 4fd049d60c41c69eadbee056d544f745
SHA-256: 849b235120877c832cfee8d87a935c52f548e517493f541162cdf82f4b842e90
Size: 8.03 MB
Asianux Server 3 for x86
- python-2.4.3-43.0.1.AXS3.i386.rpm
MD5: 63f683805d6231bd8e11d5cc1c07b829
SHA-256: bdbdd1a1801697d8387583b2f9275c3e454324839081b16bfc714c2fb0dd3e1c
Size: 57.25 kB - python-devel-2.4.3-43.0.1.AXS3.i386.rpm
MD5: 340dd9ac2c5a0f82df06a66413ecf09a
SHA-256: 1ea7c2c1bb9cdd28fc4d541362fd026e968a96e09bec2a09618a4597d31d5421
Size: 2.98 MB - python-libs-2.4.3-43.0.1.AXS3.i386.rpm
MD5: 86e3c0ba035c860902a5e985eefe1b32
SHA-256: c82e393ffa376b84179e940e134f7a69afb020da055878bd09bd747eca13e539
Size: 5.93 MB - python-tools-2.4.3-43.0.1.AXS3.i386.rpm
MD5: 1985a045d11e65f48bc38367a6212003
SHA-256: 0e798ca562e8683bf19fc359c049cfacc948b990de0467740be405ecf0e96e77
Size: 967.59 kB - tkinter-2.4.3-43.0.1.AXS3.i386.rpm
MD5: 3846e754064f5e9d44a6a77387331a3c
SHA-256: 5875104a5c5ee63210043e49ecebda3612dd17547fa5efe33b7a06bb4b1c3c2d
Size: 279.45 kB
Asianux Server 3 for x86_64
- python-2.4.3-43.0.1.AXS3.x86_64.rpm
MD5: cbfbc285c0a2d6353b3be59f6934fb60
SHA-256: 93640e12ececbabc6720641ef173d4c299fa013adb7aace3f4d9a10741fb0382
Size: 57.30 kB - python-devel-2.4.3-43.0.1.AXS3.x86_64.rpm
MD5: 972a97bc27922d610f7a71e363580b5d
SHA-256: ce8c4db43c6e9eb96958276ec69f6f34377ad992f6ca1da8d7fdc99decf3dc23
Size: 3.00 MB - python-libs-2.4.3-43.0.1.AXS3.x86_64.rpm
MD5: f52455ee68e631ec7940ed1698c6003a
SHA-256: 457f7d2b3d0ba1c670f89ec8473c88c2ad22abd3ce928ad87b61769519081941
Size: 5.99 MB - python-tools-2.4.3-43.0.1.AXS3.x86_64.rpm
MD5: 602f0516db51757aa59319dfe958db80
SHA-256: cc22d70e535d5e939e96e68ba3176ecc3a1f9443cde26164860bf0f63def90d0
Size: 967.94 kB - tkinter-2.4.3-43.0.1.AXS3.x86_64.rpm
MD5: 683f140ce8c11b3e67e744ec2dbd291d
SHA-256: cf893dfd4a18e078806b516c25f3361da342d2cecf4ff6474013e7941d394b56
Size: 280.90 kB