The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[RHSA-2002:202-25] Updated python packages fix predictable temporary file


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Tue, 21 Jan 2003 15:00 -0500
From: [email protected]
To: [email protected], [email protected]
Subject: [RHSA-2002:202-25] Updated python packages fix predictable temporary file

---------------------------------------------------------------------
                   Red Hat, Inc. Red Hat Security Advisory

Synopsis:          Updated python packages fix predictable temporary file
Advisory ID:       RHSA-2002:202-25
Issue date:        2003-01-21
Updated on:        2003-01-21
Product:           Red Hat Linux
Ключевые слова: , , , , , , , , , symlink, os.excvpe, flaw:link,  (найти похожие документы)
Cross references:=20=20 Obsoletes:=20=20=20=20=20=20=20=20=20 CVE Names: CAN-2002-1119 --------------------------------------------------------------------- 1. Topic: An insecure use of a temporary file has been found in Python. This erratum provides updated Python packages. 2. Relevant releases/architectures: Red Hat Linux 6.2 - i386 Red Hat Linux 7.0 - i386 Red Hat Linux 7.1 - i386 Red Hat Linux 7.2 - i386, ia64 Red Hat Linux 7.3 - i386 3. Problem description: Python is an interpreted, interactive, object-oriented programming language. Zack Weinberg discovered that os._execvpe from os.py in Python 2.2.1 and earlier creates temporary files with predictable names. This could allow local users to execute arbitrary code via a symlink attack. All users should upgrade to these errata packages which contain a patch to python 1.5.2 and are not vulnerable to this issue. Please note that for Red Hat Linux 7.3 we have updated the python2 packages from version 2.2 to version 2.2.2. Red Hat Linux 8.0 shipped a version of Python that already contained a fix for this issue and is therefore not vulnerable to this issu= e. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. To update all RPMs for your particular architecture, run: rpm -Fvh [filenames] where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directory *only* contains the desired RPMs. Please note that this update is also available via Red Hat Network. Many people find this an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. RPMs required: Red Hat Linux 6.2: SRPMS: ftp://updates.redhat.com/6.2/en/os/SRPMS/python-1.5.2-42.62.src.rpm i386: ftp://updates.redhat.com/6.2/en/os/i386/python-1.5.2-42.62.i386.rpm ftp://updates.redhat.com/6.2/en/os/i386/python-devel-1.5.2-42.62.i386.rpm ftp://updates.redhat.com/6.2/en/os/i386/python-docs-1.5.2-42.62.i386.rpm ftp://updates.redhat.com/6.2/en/os/i386/python-tools-1.5.2-42.62.i386.rpm ftp://updates.redhat.com/6.2/en/os/i386/tkinter-1.5.2-42.62.i386.rpm Red Hat Linux 7.0: SRPMS: ftp://updates.redhat.com/7.0/en/os/SRPMS/python-1.5.2-42.71.src.rpm i386: ftp://updates.redhat.com/7.0/en/os/i386/python-1.5.2-42.71.i386.rpm ftp://updates.redhat.com/7.0/en/os/i386/python-devel-1.5.2-42.71.i386.rpm ftp://updates.redhat.com/7.0/en/os/i386/python-docs-1.5.2-42.71.i386.rpm ftp://updates.redhat.com/7.0/en/os/i386/python-tools-1.5.2-42.71.i386.rpm ftp://updates.redhat.com/7.0/en/os/i386/tkinter-1.5.2-42.71.i386.rpm Red Hat Linux 7.1: SRPMS: ftp://updates.redhat.com/7.1/en/os/SRPMS/python-1.5.2-42.71.src.rpm i386: ftp://updates.redhat.com/7.1/en/os/i386/python-1.5.2-42.71.i386.rpm ftp://updates.redhat.com/7.1/en/os/i386/python-devel-1.5.2-42.71.i386.rpm ftp://updates.redhat.com/7.1/en/os/i386/python-docs-1.5.2-42.71.i386.rpm ftp://updates.redhat.com/7.1/en/os/i386/python-tools-1.5.2-42.71.i386.rpm ftp://updates.redhat.com/7.1/en/os/i386/tkinter-1.5.2-42.71.i386.rpm Red Hat Linux 7.2: SRPMS: ftp://updates.redhat.com/7.2/en/os/SRPMS/python-1.5.2-42.72.src.rpm ftp://updates.redhat.com/7.2/en/os/SRPMS/python2-2.1.1-2.72.src.rpm i386: ftp://updates.redhat.com/7.2/en/os/i386/python-1.5.2-42.72.i386.rpm ftp://updates.redhat.com/7.2/en/os/i386/python-devel-1.5.2-42.72.i386.rpm ftp://updates.redhat.com/7.2/en/os/i386/python-docs-1.5.2-42.72.i386.rpm ftp://updates.redhat.com/7.2/en/os/i386/python-tools-1.5.2-42.72.i386.rpm ftp://updates.redhat.com/7.2/en/os/i386/tkinter-1.5.2-42.72.i386.rpm ftp://updates.redhat.com/7.2/en/os/i386/python2-2.1.1-2.72.i386.rpm ftp://updates.redhat.com/7.2/en/os/i386/python2-devel-2.1.1-2.72.i386.rpm ia64: ftp://updates.redhat.com/7.2/en/os/ia64/python-1.5.2-42.72.ia64.rpm ftp://updates.redhat.com/7.2/en/os/ia64/python-devel-1.5.2-42.72.ia64.rpm ftp://updates.redhat.com/7.2/en/os/ia64/python-docs-1.5.2-42.72.ia64.rpm ftp://updates.redhat.com/7.2/en/os/ia64/python-tools-1.5.2-42.72.ia64.rpm ftp://updates.redhat.com/7.2/en/os/ia64/tkinter-1.5.2-42.72.ia64.rpm ftp://updates.redhat.com/7.2/en/os/ia64/python2-2.1.1-2.72.ia64.rpm ftp://updates.redhat.com/7.2/en/os/ia64/python2-devel-2.1.1-2.72.ia64.rpm Red Hat Linux 7.3: SRPMS: ftp://updates.redhat.com/7.3/en/os/SRPMS/python-1.5.2-42.73.src.rpm ftp://updates.redhat.com/7.3/en/os/SRPMS/python2-2.2.2-3.7.3.src.rpm i386: ftp://updates.redhat.com/7.3/en/os/i386/python-1.5.2-42.73.i386.rpm ftp://updates.redhat.com/7.3/en/os/i386/python-devel-1.5.2-42.73.i386.rpm ftp://updates.redhat.com/7.3/en/os/i386/python-docs-1.5.2-42.73.i386.rpm ftp://updates.redhat.com/7.3/en/os/i386/python-tools-1.5.2-42.73.i386.rpm ftp://updates.redhat.com/7.3/en/os/i386/tkinter-1.5.2-42.73.i386.rpm ftp://updates.redhat.com/7.3/en/os/i386/python2-2.2.2-3.7.3.i386.rpm ftp://updates.redhat.com/7.3/en/os/i386/python2-devel-2.2.2-3.7.3.i386.rpm ftp://updates.redhat.com/7.3/en/os/i386/python2-docs-2.2.2-3.7.3.i386.rpm ftp://updates.redhat.com/7.3/en/os/i386/tkinter2-2.2.2-3.7.3.i386.rpm 6. Verification: MD5 sum Package Name -------------------------------------------------------------------------- ea2c7e1f03253f7abf020bd20501a9ed 6.2/en/os/SRPMS/python-1.5.2-42.62.src.rpm ae807f2515d48688feb63a7d1c36fd41 6.2/en/os/i386/python-1.5.2-42.62.i386.rpm 9e7ec6bea6aeac1f55d7268c17bd005e 6.2/en/os/i386/python-devel-1.5.2-42.62.i3= 86.rpm 24989340e51d52302fed720a304da5fb 6.2/en/os/i386/python-docs-1.5.2-42.62.i38= 6.rpm c32cfd08bd1b8c1485f9faf992ae4e47 6.2/en/os/i386/python-tools-1.5.2-42.62.i3= 86.rpm 9e6ef79c21074cfd2ba6a9e8f82269fe 6.2/en/os/i386/tkinter-1.5.2-42.62.i386.rpm f284fbc3bffb9750628b854c66240884 7.0/en/os/SRPMS/python-1.5.2-42.71.src.rpm 67a8b9f482122c94e59be63fb35a6c09 7.0/en/os/i386/python-1.5.2-42.71.i386.rpm 6bb2441e4e774d4036e06470a37f2d05 7.0/en/os/i386/python-devel-1.5.2-42.71.i3= 86.rpm 4bbbde224af5008bcde30363fc97146c 7.0/en/os/i386/python-docs-1.5.2-42.71.i38= 6.rpm a2d3161c06c800c522da141baa5118b7 7.0/en/os/i386/python-tools-1.5.2-42.71.i3= 86.rpm 55275a32efb84977fa93653fb9cbae2c 7.0/en/os/i386/tkinter-1.5.2-42.71.i386.rpm f284fbc3bffb9750628b854c66240884 7.1/en/os/SRPMS/python-1.5.2-42.71.src.rpm 67a8b9f482122c94e59be63fb35a6c09 7.1/en/os/i386/python-1.5.2-42.71.i386.rpm 6bb2441e4e774d4036e06470a37f2d05 7.1/en/os/i386/python-devel-1.5.2-42.71.i3= 86.rpm 4bbbde224af5008bcde30363fc97146c 7.1/en/os/i386/python-docs-1.5.2-42.71.i38= 6.rpm a2d3161c06c800c522da141baa5118b7 7.1/en/os/i386/python-tools-1.5.2-42.71.i3= 86.rpm 55275a32efb84977fa93653fb9cbae2c 7.1/en/os/i386/tkinter-1.5.2-42.71.i386.rpm a47d3a73c49783e1cd5b83cbef60652f 7.2/en/os/SRPMS/python-1.5.2-42.72.src.rpm b4e68654b049c6af907f098afd29a4be 7.2/en/os/SRPMS/python2-2.1.1-2.72.src.rpm 389afc3097788a96b0835ebc46ac16d3 7.2/en/os/i386/python-1.5.2-42.72.i386.rpm a4fd8f4787c56603613e9f3e12d6aa27 7.2/en/os/i386/python-devel-1.5.2-42.72.i3= 86.rpm 686d90f9f8462ebc2dc7f0c05bf1612e 7.2/en/os/i386/python-docs-1.5.2-42.72.i38= 6.rpm ac3c101c4d388b2086412fa1ecae38c6 7.2/en/os/i386/python-tools-1.5.2-42.72.i3= 86.rpm d1832d93442ddac585427b460b02c1c8 7.2/en/os/i386/python2-2.1.1-2.72.i386.rpm e1c3352394e1cd824e615742ca029298 7.2/en/os/i386/python2-devel-2.1.1-2.72.i3= 86.rpm 9bee09c2165510ef87d5b1d6c5170760 7.2/en/os/i386/tkinter-1.5.2-42.72.i386.rpm a59c47d8d4d089f83b834105b9d22f69 7.2/en/os/ia64/python-1.5.2-42.72.ia64.rpm 1a2c0e209e264928d2f84154e182248d 7.2/en/os/ia64/python-devel-1.5.2-42.72.ia= 64.rpm 290383a0ec1a271e5f6a17b7bc821ed8 7.2/en/os/ia64/python-docs-1.5.2-42.72.ia6= 4.rpm 694c91d88fbfd31a6408781431a5b7fe 7.2/en/os/ia64/python-tools-1.5.2-42.72.ia= 64.rpm c5e288bfb51f7cdb1fc7de5a0c900639 7.2/en/os/ia64/python2-2.1.1-2.72.ia64.rpm 729305369876da105810446e32a119bc 7.2/en/os/ia64/python2-devel-2.1.1-2.72.ia= 64.rpm 85ddf2fcb9679153dc179a3e41d76993 7.2/en/os/ia64/tkinter-1.5.2-42.72.ia64.rpm f2cf7600b4de21bcb7eaa2e73218cb7c 7.3/en/os/SRPMS/python-1.5.2-42.73.src.rpm 183717dbd2d209c4ab19162c21c41527 7.3/en/os/SRPMS/python2-2.2.2-3.7.3.src.rpm 3349177afa68f1bb3cdefacd2202edad 7.3/en/os/i386/python-1.5.2-42.73.i386.rpm 4d046510dd987f72e521f528d95db38b 7.3/en/os/i386/python-devel-1.5.2-42.73.i3= 86.rpm ec0936c1821670d1ebb9639bc9f41d5f 7.3/en/os/i386/python-docs-1.5.2-42.73.i38= 6.rpm b55c4b23cdf5779e244923e944ffdab0 7.3/en/os/i386/python-tools-1.5.2-42.73.i3= 86.rpm cdd195d8cd81e8c6c42964b7efda4a53 7.3/en/os/i386/python2-2.2.2-3.7.3.i386.rpm 3804e8f39fe53ca69eb9b08e0847239e 7.3/en/os/i386/python2-devel-2.2.2-3.7.3.i= 386.rpm e15f24a15999724eb6aad307a3cda429 7.3/en/os/i386/python2-docs-2.2.2-3.7.3.i3= 86.rpm 7e68369c396be300c8abb8334d4cae2d 7.3/en/os/i386/tkinter-1.5.2-42.73.i386.rpm c4fced6272839041ce9252d06079d43c 7.3/en/os/i386/tkinter2-2.2.2-3.7.3.i386.r= pm These packages are GPG signed by Red Hat, Inc. for security. Our key is available at http://www.redhat.com/about/contact/pgpkey.html You can verify each package with the following command: =20=20=20=20 rpm --checksig -v <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: =20=20=20=20 md5sum <filename> 7. References: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=3D156556 http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCAN-2002-1119 8. Contact: The Red Hat security contact is <[email protected]>. More contact details at http://www.redhat.com/solutions/security/news/contact.html Copyright 2003 Red Hat, Inc.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру