python-docs-2.6.6-2.AXS4
エラータID: AXSA:2011-586:01
The python-docs package contains documentation on the Python programming language and interpreter.
Install the python-docs package if you'd like to use the documentation for the Python language.
Security issues fixed with this release:
CVE-2010-3493
Multiple race conditions in smtpd.py in the smtpd module in Python 2.6, 2.7, 3.1, and 3.2 alpha allow remote attackers to cause a denial of service (daemon outage) by establishing and then immediately closing a TCP connection, leading to the accept function having an unexpected return value of None, an unexpected value of None for the address, or an ECONNABORTED, EAGAIN, or EWOULDBLOCK error, or the getpeername function having an ENOTCONN error, a related issue to CVE-2010-3492.
CVE-2011-1015
The is_cgi method in CGIHTTPServer.py in the CGIHTTPServer module in Python 2.5, 2.6, and 3.0 allows remote attackers to read script source code via an HTTP GET request that lacks a / (slash) character at the beginning of the URI.
CVE-2011-1521
The urllib and urllib2 modules in Python 2.x before 2.7.2 and 3.x before 3.2.1 process Location headers that specify redirection to file: URLs, which makes it easier for remote attackers to obtain sensitive information or cause a denial of service (resource consumption) via a crafted URL, as demonstrated by the file:///etc/passwd and file:///dev/zero URLs.
Update packages.
Multiple race conditions in smtpd.py in the smtpd module in Python 2.6, 2.7, 3.1, and 3.2 alpha allow remote attackers to cause a denial of service (daemon outage) by establishing and then immediately closing a TCP connection, leading to the accept function having an unexpected return value of None, an unexpected value of None for the address, or an ECONNABORTED, EAGAIN, or EWOULDBLOCK error, or the getpeername function having an ENOTCONN error, a related issue to CVE-2010-3492.
The urllib and urllib2 modules in Python 2.x before 2.7.2 and 3.x before 3.2.1 process Location headers that specify redirection to file: URLs, which makes it easier for remote attackers to obtain sensitive information or cause a denial of service (resource consumption) via a crafted URL, as demonstrated by the file:///etc/passwd and file:///dev/zero URLs.
From Asianux Server 4 SP1.
SRPMS
- python-docs-2.6.6-2.AXS4.src.rpm
MD5: 909324fe4d68b2714fcfd90a2ba4b56d
SHA-256: 5206c092e251e51c6eca600ebe57e3d495c10ce165d73ee3b9813b9363aedd9d
Size: 10.55 MB
Asianux Server 4 for x86
- python-docs-2.6.6-2.AXS4.noarch.rpm
MD5: f321d1fd22455ea1682748538870433a
SHA-256: d254c937c97dc766f02682f13de5c3abb683aa08617b5655d3d9c3801f3af08f
Size: 4.94 MB
Asianux Server 4 for x86_64
- python-docs-2.6.6-2.AXS4.noarch.rpm
MD5: 1da5ec2fb2543e586267c65d3e84819c
SHA-256: 197a8272f19b8fee05bcdb70437a78c9a9c4683118ff01d47329e525d4a70e15
Size: 4.94 MB