Gentoo Archives: gentoo-announce

From: Thierry Carrez <koon@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200509-08 ] Python: Heap overflow in the included PCRE library
Date: Mon, 12 Sep 2005 20:41:27
Message-Id: 4325E2DC.1020506@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200509-08
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: Python: Heap overflow in the included PCRE library
9 Date: September 12, 2005
10 Bugs: #104009
11 ID: 200509-08
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 The "re" Python module is vulnerable to a heap overflow, possibly
19 leading to the execution of arbitrary code.
20
21 Background
22 ==========
23
24 Python is an interpreted, interactive, object-oriented, cross-platform
25 programming language. The "re" Python module provides regular
26 expression functions.
27
28 Affected packages
29 =================
30
31 -------------------------------------------------------------------
32 Package / Vulnerable / Unaffected
33 -------------------------------------------------------------------
34 1 dev-lang/python < 2.3.5-r2 >= 2.3.5-r2
35
36 Description
37 ===========
38
39 The "re" Python module makes use of a private copy of libpcre which is
40 subject to an integer overflow leading to a heap overflow (see GLSA
41 200508-17).
42
43 Impact
44 ======
45
46 An attacker could target a Python-based web application (or SUID
47 application) that would use untrusted data as regular expressions,
48 potentially resulting in the execution of arbitrary code (or privilege
49 escalation).
50
51 Workaround
52 ==========
53
54 Python users that don't run any Python web application or SUID
55 application (or that run one that wouldn't use untrusted inputs as
56 regular expressions) are not affected by this issue.
57
58 Resolution
59 ==========
60
61 All Python users should upgrade to the latest version:
62
63 # emerge --sync
64 # emerge --ask --oneshot --verbose ">=dev-lang/python-2.3.5-r2"
65
66 References
67 ==========
68
69 [ 1 ] CAN-2005-2491
70 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2491
71 [ 2 ] GLSA 200508-17
72 http://www.gentoo.org/security/en/glsa/glsa-200508-17.xml
73
74 Availability
75 ============
76
77 This GLSA and any updates to it are available for viewing at
78 the Gentoo Security Website:
79
80 http://security.gentoo.org/glsa/glsa-200509-08.xml
81
82 Concerns?
83 =========
84
85 Security is a primary focus of Gentoo Linux and ensuring the
86 confidentiality and security of our users machines is of utmost
87 importance to us. Any security concerns should be addressed to
88 security@g.o or alternatively, you may file a bug at
89 http://bugs.gentoo.org.
90
91 License
92 =======
93
94 Copyright 2005 Gentoo Foundation, Inc; referenced text
95 belongs to its owner(s).
96
97 The contents of this document are licensed under the
98 Creative Commons - Attribution / Share Alike license.
99
100 http://creativecommons.org/licenses/by-sa/2.0

Attachments

File name MIME type
signature.asc application/pgp-signature