[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

DESA-2004-015 - python2.2: buffer overflow



- --------------------------------------------------------------------------
Debian-Edu/Skolelinux Security Advisory DESA 2004-015
http://www.skolelinux.no/security/                      Morten Werner Olsen
September 01, 2004              debian-edu-security@lists.alioth.debian.org
- --------------------------------------------------------------------------

Package             : python2.2
Vulnerability       : buffer overflow
Problem-Type        : local
Need reboot         : no
Debian-Edu-specific : no
CVE ID              : CAN-2004-0150
DSA ID              : DSA-458-2

This security advisory corrects DSA 458-1 which caused some
segmentation faults in gethostbyaddr with non-localhost input. This
update also disables IPv6 on all architectures.

The original advisory said:

  Sebastian Schmidt discovered a buffer overflow bug in Python's
  getaddrinfo function, which could allow an IPv6 address, supplied by
  a remote attacker via DNS, to overwrite memory on the stack.

  This bug only exists in python 2.2 and 2.2.1, and only when IPv6
  support is disabled. The python2.2 package in Debian woody meets
  these conditions (the 'python' package does not).

We recommend that you update your python2.2 package.


Upgrade Instructions
- --------------------

Make sure the line

  deb http://security.debian.org/ stable/updates main contrib non-free

is present in your /etc/apt/sources.list and run 'apt-get update' to
update your package lists. Then run

  'apt-get install python2.2'

to upgrade your python2.2 package.

- --------------------------------------------------------------------------
Mailing list: bruker@skolelinux.no, debian-edu@lists.debian.org,
              linuxiskolen@skolelinux.no, user@skolelinux.de
Package info: `apt-cache show <pkg>'



Reply to: