First published: Mon Dec 10 2007(Updated: )
Python is an interpreted, interactive, object-oriented programming<br>language.<br>An integer overflow flaw was discovered in the way Python's pcre module<br>handled certain regular expressions. If a Python application used the pcre<br>module to compile and execute untrusted regular expressions, it may be<br>possible to cause the application to crash, or allow arbitrary code<br>execution with the privileges of the Python interpreter. (CVE-2006-7228)<br>A flaw was discovered in the strxfrm() function of Python's locale module.<br>Strings generated by this function were not properly NULL-terminated, which<br>could possibly cause disclosure of data stored in the memory of a Python<br>application using this function. (CVE-2007-2052)<br>Users of Python are advised to upgrade to these updated packages, which<br>contain backported patches to resolve these issues.
Affected Software | Affected Version | How to fix |
---|---|---|
Python 2.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2007:1077 is classified as important.
You can fix RHSA-2007:1077 by updating the Python package to the latest version provided by your distribution.
RHSA-2007:1077 affects systems using the Python pcre module that process untrusted regular expressions.
RHSA-2007:1077 is an integer overflow vulnerability in Python's pcre module.
Yes, RHSA-2007:1077 can potentially be exploited remotely if an application processes untrusted input.