First published: Thu May 05 2011(Updated: )
Python is an interpreted, interactive, object-oriented programming<br>language.<br>A flaw was found in the Python urllib and urllib2 libraries where they<br>would not differentiate between different target URLs when handling<br>automatic redirects. This caused Python applications using these modules to<br>follow any new URL that they understood, including the "file://" URL type.<br>This could allow a remote server to force a local Python application to<br>read a local file instead of the remote one, possibly exposing local files<br>that were not meant to be exposed. (CVE-2011-1521)<br>Multiple flaws were found in the Python audioop module. Supplying certain<br>inputs could cause the audioop module to crash or, possibly, execute<br>arbitrary code. (CVE-2010-1634, CVE-2010-2089)<br>A race condition was found in the way the Python smtpd module handled new<br>connections. A remote user could use this flaw to cause a Python script<br>using the smtpd module to terminate. (CVE-2010-3493)<br>An information disclosure flaw was found in the way the Python<br>CGIHTTPServer module processed certain HTTP GET requests. A remote attacker<br>could use a specially-crafted request to obtain the CGI script's source<br>code. (CVE-2011-1015)<br>A buffer over-read flaw was found in the way the Python Expat parser<br>handled malformed UTF-8 sequences when processing XML files. A<br>specially-crafted XML file could cause Python applications using the Python<br>Expat parser to crash while parsing the file. (CVE-2009-3720)<br>This update makes Python use the system Expat library rather than its own<br>internal copy; therefore, users must have the version of Expat shipped with<br>RHSA-2009:1625 installed, or a later version, to resolve the CVE-2009-3720<br>issue.<br>All Python users should upgrade to these updated packages, which contain<br>backported patches to correct these issues.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/python | <2.3.4-14.10.el4 | 2.3.4-14.10.el4 |
redhat/python | <2.3.4-14.10.el4 | 2.3.4-14.10.el4 |
redhat/python-devel | <2.3.4-14.10.el4 | 2.3.4-14.10.el4 |
redhat/python-docs | <2.3.4-14.10.el4 | 2.3.4-14.10.el4 |
redhat/python-tools | <2.3.4-14.10.el4 | 2.3.4-14.10.el4 |
redhat/tkinter | <2.3.4-14.10.el4 | 2.3.4-14.10.el4 |
redhat/python-devel | <2.3.4-14.10.el4 | 2.3.4-14.10.el4 |
redhat/python-docs | <2.3.4-14.10.el4 | 2.3.4-14.10.el4 |
redhat/python-tools | <2.3.4-14.10.el4 | 2.3.4-14.10.el4 |
redhat/tkinter | <2.3.4-14.10.el4 | 2.3.4-14.10.el4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.