ALT-BU-2016-2677-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2015-00666
Уязвимость программного обеспечения Python, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2025-04-11
CVE-2012-2135
The utf-16 decoder in Python 3.1 through 3.3 does not update the aligned_end variable after calling the unicode_decode_call_errorhandler function, which allows remote attackers to obtain sensitive information (process memory) or cause a denial of service (memory corruption and crash) via unspecified vectors.
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=670389
- http://bugs.python.org/issue14579
- http://secunia.com/advisories/51087
- http://secunia.com/advisories/51089
- http://www.openwall.com/lists/oss-security/2012/04/25/2
- http://www.openwall.com/lists/oss-security/2012/04/25/4
- http://www.ubuntu.com/usn/USN-1615-1
- http://www.ubuntu.com/usn/USN-1616-1
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=670389
- http://bugs.python.org/issue14579
- http://secunia.com/advisories/51087
- http://secunia.com/advisories/51089
- http://www.openwall.com/lists/oss-security/2012/04/25/2
- http://www.openwall.com/lists/oss-security/2012/04/25/4
- http://www.ubuntu.com/usn/USN-1615-1
- http://www.ubuntu.com/usn/USN-1616-1
Modified: 2024-11-21
CVE-2013-1753
The gzip_decode function in the xmlrpc client library in Python 3.4 and earlier allows remote attackers to cause a denial of service (memory consumption) via a crafted HTTP request.
Modified: 2025-04-11
CVE-2013-2099
Algorithmic complexity vulnerability in the ssl.match_hostname function in Python 3.2.x, 3.3.x, and earlier, and unspecified versions of python-backports-ssl_match_hostname as used for older Python versions, allows remote attackers to cause a denial of service (CPU consumption) via multiple wildcard characters in the common name in a certificate.
- http://bugs.python.org/issue17980
- http://rhn.redhat.com/errata/RHSA-2014-1690.html
- http://secunia.com/advisories/55107
- http://secunia.com/advisories/55116
- http://www.openwall.com/lists/oss-security/2013/05/16/6
- http://www.ubuntu.com/usn/USN-1983-1
- http://www.ubuntu.com/usn/USN-1984-1
- http://www.ubuntu.com/usn/USN-1985-1
- https://access.redhat.com/errata/RHSA-2016:1166
- https://bugzilla.redhat.com/show_bug.cgi?id=963260
- http://bugs.python.org/issue17980
- http://rhn.redhat.com/errata/RHSA-2014-1690.html
- http://secunia.com/advisories/55107
- http://secunia.com/advisories/55116
- http://www.openwall.com/lists/oss-security/2013/05/16/6
- http://www.ubuntu.com/usn/USN-1983-1
- http://www.ubuntu.com/usn/USN-1984-1
- http://www.ubuntu.com/usn/USN-1985-1
- https://access.redhat.com/errata/RHSA-2016:1166
- https://bugzilla.redhat.com/show_bug.cgi?id=963260
Modified: 2025-04-12
CVE-2013-7040
Python 2.7 before 3.4 only uses the last eight bits of the prefix to randomize hash values, which causes it to compute hash values without restricting the ability to trigger hash collisions predictably and makes it easier for context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1150.
- http://bugs.python.org/issue14621
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- http://www.openwall.com/lists/oss-security/2013/12/09/13
- http://www.openwall.com/lists/oss-security/2013/12/09/3
- http://www.securityfocus.com/bid/64194
- https://support.apple.com/kb/HT205031
- http://bugs.python.org/issue14621
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- http://www.openwall.com/lists/oss-security/2013/12/09/13
- http://www.openwall.com/lists/oss-security/2013/12/09/3
- http://www.securityfocus.com/bid/64194
- https://support.apple.com/kb/HT205031
Modified: 2025-04-12
CVE-2013-7338
Python before 3.3.4 RC1 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a file size value larger than the size of the zip file to the (1) ZipExtFile.read, (2) ZipExtFile.read(n), (3) ZipExtFile.readlines, (4) ZipFile.extract, or (5) ZipFile.extractall function.
- http://bugs.python.org/issue20078
- http://hg.python.org/cpython/rev/79ea4ce431b1
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00008.html
- http://seclists.org/oss-sec/2014/q1/592
- http://seclists.org/oss-sec/2014/q1/595
- http://www.securityfocus.com/bid/65179
- http://www.securitytracker.com/id/1029973
- https://docs.python.org/3.3/whatsnew/changelog.html
- https://security.gentoo.org/glsa/201503-10
- https://support.apple.com/kb/HT205031
- http://bugs.python.org/issue20078
- http://hg.python.org/cpython/rev/79ea4ce431b1
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00008.html
- http://seclists.org/oss-sec/2014/q1/592
- http://seclists.org/oss-sec/2014/q1/595
- http://www.securityfocus.com/bid/65179
- http://www.securitytracker.com/id/1029973
- https://docs.python.org/3.3/whatsnew/changelog.html
- https://security.gentoo.org/glsa/201503-10
- https://support.apple.com/kb/HT205031
Modified: 2025-04-12
CVE-2013-7440
The ssl.match_hostname function in CPython (aka Python) before 2.7.9 and 3.x before 3.3.3 does not properly handle wildcards in hostnames, which might allow man-in-the-middle attackers to spoof servers via a crafted certificate.
- http://seclists.org/oss-sec/2015/q2/483
- http://seclists.org/oss-sec/2015/q2/523
- http://www.securityfocus.com/bid/74707
- https://access.redhat.com/errata/RHSA-2016:1166
- https://bugs.python.org/issue17997
- https://bugzilla.redhat.com/show_bug.cgi?id=1224999
- https://hg.python.org/cpython/rev/10d0edadbcdd
- http://seclists.org/oss-sec/2015/q2/483
- http://seclists.org/oss-sec/2015/q2/523
- http://www.securityfocus.com/bid/74707
- https://access.redhat.com/errata/RHSA-2016:1166
- https://bugs.python.org/issue17997
- https://bugzilla.redhat.com/show_bug.cgi?id=1224999
- https://hg.python.org/cpython/rev/10d0edadbcdd
Modified: 2025-04-12
CVE-2014-1912
Buffer overflow in the socket.recvfrom_into function in Modules/socketmodule.c in Python 2.5 before 2.7.7, 3.x before 3.3.4, and 3.4.x before 3.4rc1 allows remote attackers to execute arbitrary code via a crafted string.
- http://bugs.python.org/issue20246
- http://hg.python.org/cpython/rev/87673659d8f7
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- http://lists.opensuse.org/opensuse-updates/2014-04/msg00035.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00008.html
- http://pastebin.com/raw.php?i=GHXSmNEg
- http://rhn.redhat.com/errata/RHSA-2015-1064.html
- http://rhn.redhat.com/errata/RHSA-2015-1330.html
- http://www.debian.org/security/2014/dsa-2880
- http://www.exploit-db.com/exploits/31875
- http://www.openwall.com/lists/oss-security/2014/02/12/16
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.securityfocus.com/bid/65379
- http://www.securitytracker.com/id/1029831
- http://www.ubuntu.com/usn/USN-2125-1
- https://security.gentoo.org/glsa/201503-10
- https://support.apple.com/kb/HT205031
- https://www.trustedsec.com/february-2014/python-remote-code-execution-socket-recvfrom_into/
- http://bugs.python.org/issue20246
- http://hg.python.org/cpython/rev/87673659d8f7
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- http://lists.opensuse.org/opensuse-updates/2014-04/msg00035.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00008.html
- http://pastebin.com/raw.php?i=GHXSmNEg
- http://rhn.redhat.com/errata/RHSA-2015-1064.html
- http://rhn.redhat.com/errata/RHSA-2015-1330.html
- http://www.debian.org/security/2014/dsa-2880
- http://www.exploit-db.com/exploits/31875
- http://www.openwall.com/lists/oss-security/2014/02/12/16
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.securityfocus.com/bid/65379
- http://www.securitytracker.com/id/1029831
- http://www.ubuntu.com/usn/USN-2125-1
- https://security.gentoo.org/glsa/201503-10
- https://support.apple.com/kb/HT205031
- https://www.trustedsec.com/february-2014/python-remote-code-execution-socket-recvfrom_into/
Modified: 2025-04-12
CVE-2014-2667
Race condition in the _get_masked_mode function in Lib/os.py in Python 3.2 through 3.5, when exist_ok is set to true and multiple threads are used, might allow local users to bypass intended file permissions by leveraging a separate application vulnerability before the umask has been set to the expected value.
- http://bugs.python.org/issue21082
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00007.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00008.html
- http://www.openwall.com/lists/oss-security/2014/03/28/15
- http://www.openwall.com/lists/oss-security/2014/03/29/5
- http://www.openwall.com/lists/oss-security/2014/03/30/4
- https://security.gentoo.org/glsa/201503-10
- http://bugs.python.org/issue21082
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00007.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00008.html
- http://www.openwall.com/lists/oss-security/2014/03/28/15
- http://www.openwall.com/lists/oss-security/2014/03/29/5
- http://www.openwall.com/lists/oss-security/2014/03/30/4
- https://security.gentoo.org/glsa/201503-10
Modified: 2025-04-20
CVE-2014-4616
Array index error in the scanstring function in the _json module in Python 2.7 through 3.5 and simplejson before 2.6.1 allows context-dependent attackers to read arbitrary process memory via a negative index value in the idx argument to the raw_decode function.
- http://bugs.python.org/issue21529
- http://lists.opensuse.org/opensuse-updates/2014-07/msg00015.html
- http://openwall.com/lists/oss-security/2014/06/24/7
- http://rhn.redhat.com/errata/RHSA-2015-1064.html
- http://www.securityfocus.com/bid/68119
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=752395
- https://bugzilla.redhat.com/show_bug.cgi?id=1112285
- https://hackerone.com/reports/12297
- https://security.gentoo.org/glsa/201503-10
- http://bugs.python.org/issue21529
- http://lists.opensuse.org/opensuse-updates/2014-07/msg00015.html
- http://openwall.com/lists/oss-security/2014/06/24/7
- http://rhn.redhat.com/errata/RHSA-2015-1064.html
- http://www.securityfocus.com/bid/68119
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=752395
- https://bugzilla.redhat.com/show_bug.cgi?id=1112285
- https://hackerone.com/reports/12297
- https://security.gentoo.org/glsa/201503-10
Modified: 2024-11-21
CVE-2014-4650
The CGIHTTPServer module in Python 2.7.5 and 3.3.4 does not properly handle URLs in which URL encoding is used for path separators, which allows remote attackers to read script source code or conduct directory traversal attacks and execute unintended code via a crafted character sequence, as demonstrated by a %2f separator.
Modified: 2025-04-12
CVE-2014-9365
The HTTP clients in the (1) httplib, (2) urllib, (3) urllib2, and (4) xmlrpclib libraries in CPython (aka Python) 2.x before 2.7.9 and 3.x before 3.4.3, when accessing an HTTPS URL, do not (a) check the certificate against a trust store or verify that the server hostname matches a domain name in the subject's (b) Common Name or (c) subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
- http://bugs.python.org/issue22417
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- http://www.openwall.com/lists/oss-security/2014/12/11/1
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.securityfocus.com/bid/71639
- https://access.redhat.com/errata/RHSA-2016:1166
- https://access.redhat.com/errata/RHSA-2017:1162
- https://access.redhat.com/errata/RHSA-2017:1868
- https://security.gentoo.org/glsa/201503-10
- https://support.apple.com/kb/HT205031
- https://www.python.org/dev/peps/pep-0476/
- https://www.python.org/downloads/release/python-279/
- http://bugs.python.org/issue22417
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- http://www.openwall.com/lists/oss-security/2014/12/11/1
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.securityfocus.com/bid/71639
- https://access.redhat.com/errata/RHSA-2016:1166
- https://access.redhat.com/errata/RHSA-2017:1162
- https://access.redhat.com/errata/RHSA-2017:1868
- https://security.gentoo.org/glsa/201503-10
- https://support.apple.com/kb/HT205031
- https://www.python.org/dev/peps/pep-0476/
- https://www.python.org/downloads/release/python-279/
Modified: 2025-04-12
CVE-2016-5699
CRLF injection vulnerability in the HTTPConnection.putheader function in urllib2 and urllib in CPython (aka Python) before 2.7.10 and 3.x before 3.4.4 allows remote attackers to inject arbitrary HTTP headers via CRLF sequences in a URL.
- http://blog.blindspotsecurity.com/2016/06/advisory-http-header-injection-in.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
- http://rhn.redhat.com/errata/RHSA-2016-1626.html
- http://rhn.redhat.com/errata/RHSA-2016-1627.html
- http://rhn.redhat.com/errata/RHSA-2016-1628.html
- http://rhn.redhat.com/errata/RHSA-2016-1629.html
- http://rhn.redhat.com/errata/RHSA-2016-1630.html
- http://www.openwall.com/lists/oss-security/2016/06/14/7
- http://www.openwall.com/lists/oss-security/2016/06/15/12
- http://www.openwall.com/lists/oss-security/2016/06/16/2
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.securityfocus.com/bid/91226
- http://www.splunk.com/view/SP-CAAAPSV
- http://www.splunk.com/view/SP-CAAAPUE
- https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-4
- https://hg.python.org/cpython/raw-file/v2.7.10/Misc/NEWS
- https://hg.python.org/cpython/rev/1c45047c5102
- https://hg.python.org/cpython/rev/bf3e1c9b80e9
- https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html
- http://blog.blindspotsecurity.com/2016/06/advisory-http-header-injection-in.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
- http://rhn.redhat.com/errata/RHSA-2016-1626.html
- http://rhn.redhat.com/errata/RHSA-2016-1627.html
- http://rhn.redhat.com/errata/RHSA-2016-1628.html
- http://rhn.redhat.com/errata/RHSA-2016-1629.html
- http://rhn.redhat.com/errata/RHSA-2016-1630.html
- http://www.openwall.com/lists/oss-security/2016/06/14/7
- http://www.openwall.com/lists/oss-security/2016/06/15/12
- http://www.openwall.com/lists/oss-security/2016/06/16/2
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.securityfocus.com/bid/91226
- http://www.splunk.com/view/SP-CAAAPSV
- http://www.splunk.com/view/SP-CAAAPUE
- https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-4
- https://hg.python.org/cpython/raw-file/v2.7.10/Misc/NEWS
- https://hg.python.org/cpython/rev/1c45047c5102
- https://hg.python.org/cpython/rev/bf3e1c9b80e9
- https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html