public inbox for gentoo-commits@lists.gentoo.org
 help / color / mirror / Atom feed
* [gentoo-commits] gentoo commit in xml/htdocs/security/en/glsa: glsa-200711-07.xml
@ 2007-11-07 19:35 Pierre-Yves Rofes (py)
  0 siblings, 0 replies; only message in thread
From: Pierre-Yves Rofes (py) @ 2007-11-07 19:35 UTC (permalink / raw
  To: gentoo-commits

py          07/11/07 19:35:58

  Added:                glsa-200711-07.xml
  Log:
  GLSA 200711-07

Revision  Changes    Path
1.1                  xml/htdocs/security/en/glsa/glsa-200711-07.xml

file : http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/security/en/glsa/glsa-200711-07.xml?rev=1.1&view=markup
plain: http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/security/en/glsa/glsa-200711-07.xml?rev=1.1&content-type=text/plain

Index: glsa-200711-07.xml
===================================================================
<?xml version="1.0" encoding="utf-8"?>
<?xml-stylesheet href="/xsl/glsa.xsl" type="text/xsl"?>
<?xml-stylesheet href="/xsl/guide.xsl" type="text/xsl"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">

<glsa id="200711-07">
  <title>Python: User-assisted execution of arbitrary code</title>
  <synopsis>
    Multiple integer overflow vulnerabilities have been discovered in Python,
    possibly resulting in the execution of arbitrary code or a Denial of
    Service.
  </synopsis>
  <product type="ebuild">python</product>
  <announced>November 07, 2007</announced>
  <revised>November 07, 2007: 01</revised>
  <bug>192876</bug>
  <access>remote</access>
  <affected>
    <package name="dev-lang/python" auto="yes" arch="*">
      <unaffected range="rge">2.3.6-r3</unaffected>
      <unaffected range="ge">2.4.4-r6</unaffected>
      <vulnerable range="lt">2.4.4-r6</vulnerable>
    </package>
  </affected>
  <background>
    <p>
    Python is an interpreted, interactive, object-oriented programming
    language.
    </p>
  </background>
  <description>
    <p>
    Slythers Bro discovered multiple integer overflows in the imageop
    module, one of them in the tovideo() method, in various locations in
    files imageop.c, rbgimgmodule.c, and also in other files.
    </p>
  </description>
  <impact type="normal">
    <p>
    A remote attacker could entice a user to process specially crafted
    images with an application using the Python imageop module, resulting
    in the execution of arbitrary code with the privileges of the user
    running the application, or a Denial of Service. Note that this
    vulnerability may or may not be exploitable, depending on the
    application using the module.
    </p>
  </impact>
  <workaround>
    <p>
    There is no known workaround at this time.
    </p>
  </workaround>
  <resolution>
    <p>
    All Python 2.3.x users should upgrade to the latest version:
    </p>
    <code>
    # emerge --sync
    # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/python-2.3.6-r3&quot;</code>
    <p>
    All Python 2.4.x users should upgrade to the latest version:
    </p>
    <code>
    # emerge --sync
    # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/python-2.4.4-r6&quot;</code>
  </resolution>
  <references>
    <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4965">CVE-2007-4965</uri>
  </references>
  <metadata tag="requester" timestamp="Sat, 27 Oct 2007 13:38:30 +0000">
    rbu
  </metadata>
  <metadata tag="submitter" timestamp="Thu, 01 Nov 2007 20:41:20 +0000">
    p-y
  </metadata>
  <metadata tag="bugReady" timestamp="Thu, 01 Nov 2007 20:41:27 +0000">
    p-y
  </metadata>
</glsa>



-- 
gentoo-commits@gentoo.org mailing list



^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2007-11-07 19:36 UTC | newest]

Thread overview: (only message) (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2007-11-07 19:35 [gentoo-commits] gentoo commit in xml/htdocs/security/en/glsa: glsa-200711-07.xml Pierre-Yves Rofes (py)

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox