Gentoo Logo

Python: Multiple vulnerabilities

Content:

1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 201401-04 / python
Release Date January 06, 2014
Latest Revision January 08, 2014: 3
Impact normal
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
dev-lang/python < 3.3.2-r1 revision >= 3.2.5-r1, revision >= 2.6.8, revision >= 2.7.3-r1, >= 3.3.2-r1, revision >= 2.6.9, revision >= 2.7.4, revision >= 2.7.5, revision >= 2.7.6 All supported architectures

Related bugreports: #325593, #355927, #358663, #396329, #403437, #469988

Synopsis

Multiple vulnerabilities have been found in Python, the worst of which allow remote attackers to cause a Denial of Service condition.

2.  Impact Information

Background

Python is an interpreted, interactive, object-oriented programming language.

Description

Multiple vulnerabilities have been discovered in Python. Please review the CVE identifiers referenced below for details.

Impact

A remote attacker could possibly cause a Denial of Service condition or perform a man-in-the-middle attack to disclose sensitive information.

3.  Resolution Information

Workaround

There is no known workaround at this time.

Resolution

All Python 3.3 users should upgrade to the latest version:

Code Listing 3.1: Resolution

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=dev-lang/python-3.3.2-r1"

All Python 3.2 users should upgrade to the latest version:

Code Listing 3.2: Resolution

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=dev-lang/python-3.2.5-r1"

All Python 2.6 users should upgrade to the latest version:

Code Listing 3.3: Resolution

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=dev-lang/python-2.6.8"

All Python 2.7 users should upgrade to the latest version:

Code Listing 3.4: Resolution

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=dev-lang/python-2.7.3-r1"

4.  References



Print

Page updated January 06, 2014

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2014 Gentoo Foundation, Inc. Questions, Comments? Contact us.