Red Hat 9037 Published by

A new update is available for Red Hat Enterprise Linux. Here the announcement:



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Moderate: python security update
Advisory ID: RHSA-2007:1077-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2007-1077.html
Issue date: 2007-12-10
Updated on: 2007-12-10
Product: Red Hat Enterprise Linux
CVE Names: CVE-2006-7228 CVE-2007-2052
- ---------------------------------------------------------------------

1. Summary:

Updated python packages that fix several security issues are now available
for Red Hat Enterprise Linux 2.1.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
Red Hat Enterprise Linux WS version 2.1 - i386

3. Problem description:

Python is an interpreted, interactive, object-oriented programming
language.

An integer overflow flaw was discovered in the way Python's pcre module
handled certain regular expressions. If a Python application used the pcre
module to compile and execute untrusted regular expressions, it may be
possible to cause the application to crash, or allow arbitrary code
execution with the privileges of the Python interpreter. (CVE-2006-7228)

A flaw was discovered in the strxfrm() function of Python's locale module.
Strings generated by this function were not properly NULL-terminated, which
could possibly cause disclosure of data stored in the memory of a Python
application using this function. (CVE-2007-2052)

Users of Python are advised to upgrade to these updated packages, which
contain backported patches to resolve these issues.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

5. Bug IDs fixed (http://bugzilla.redhat.com/):

235093 - CVE-2007-2052 Off-by-one in python's locale.strxfrm()
383371 - CVE-2006-7228 pcre integer overflow

6. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 :

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/python-1.5.2-43.72.2.src.rpm
d187bd2b804cb0aa532b1d7ea1abe927 python-1.5.2-43.72.2.src.rpm

i386:
2eedfdef76a114b2249a0d8aead905c8 python-1.5.2-43.72.2.i386.rpm
d7bf8b0ceacec84d025fd4ea65f58c77 python-devel-1.5.2-43.72.2.i386.rpm
b9218c661a5efac21f011b48553e26f1 python-docs-1.5.2-43.72.2.i386.rpm
865e1d43ac445880137638a8574f8e6f python-tools-1.5.2-43.72.2.i386.rpm
057a0423a93e1bc9d4c01917628aa3af tkinter-1.5.2-43.72.2.i386.rpm

ia64:
b81ce154379e65cd37e8cb559eb2ae1d python-1.5.2-43.72.2.ia64.rpm
9f4af6774469976ecc55bcd106aab7eb python-devel-1.5.2-43.72.2.ia64.rpm
7c5b50475dfc7d6874cd79ecca36c706 python-docs-1.5.2-43.72.2.ia64.rpm
484c39c1e535e79d5d36bbe75ff0f9d9 python-tools-1.5.2-43.72.2.ia64.rpm
7f95d845167e93fd722e53ca35e28776 tkinter-1.5.2-43.72.2.ia64.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/python-1.5.2-43.72.2.src.rpm
d187bd2b804cb0aa532b1d7ea1abe927 python-1.5.2-43.72.2.src.rpm

ia64:
b81ce154379e65cd37e8cb559eb2ae1d python-1.5.2-43.72.2.ia64.rpm
9f4af6774469976ecc55bcd106aab7eb python-devel-1.5.2-43.72.2.ia64.rpm
7c5b50475dfc7d6874cd79ecca36c706 python-docs-1.5.2-43.72.2.ia64.rpm
484c39c1e535e79d5d36bbe75ff0f9d9 python-tools-1.5.2-43.72.2.ia64.rpm
7f95d845167e93fd722e53ca35e28776 tkinter-1.5.2-43.72.2.ia64.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/python-1.5.2-43.72.2.src.rpm
d187bd2b804cb0aa532b1d7ea1abe927 python-1.5.2-43.72.2.src.rpm

i386:
2eedfdef76a114b2249a0d8aead905c8 python-1.5.2-43.72.2.i386.rpm
d7bf8b0ceacec84d025fd4ea65f58c77 python-devel-1.5.2-43.72.2.i386.rpm
b9218c661a5efac21f011b48553e26f1 python-docs-1.5.2-43.72.2.i386.rpm
865e1d43ac445880137638a8574f8e6f python-tools-1.5.2-43.72.2.i386.rpm
057a0423a93e1bc9d4c01917628aa3af tkinter-1.5.2-43.72.2.i386.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/python-1.5.2-43.72.2.src.rpm
d187bd2b804cb0aa532b1d7ea1abe927 python-1.5.2-43.72.2.src.rpm

i386:
2eedfdef76a114b2249a0d8aead905c8 python-1.5.2-43.72.2.i386.rpm
d7bf8b0ceacec84d025fd4ea65f58c77 python-devel-1.5.2-43.72.2.i386.rpm
b9218c661a5efac21f011b48553e26f1 python-docs-1.5.2-43.72.2.i386.rpm
865e1d43ac445880137638a8574f8e6f python-tools-1.5.2-43.72.2.i386.rpm
057a0423a93e1bc9d4c01917628aa3af tkinter-1.5.2-43.72.2.i386.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7228
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2052
http://www.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2007 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFHXYWPXlSAg2UNWIIRAgsaAJ9/CC6eQs/dMuHeQ/gKt86l7+eRqwCfbSTv
DypFwizG77kZca+GTI45fgU=
=LOOL
-----END PGP SIGNATURE-----