ALT-PU-2015-2174-1
Closed vulnerabilities
BDU:2015-09649
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации
Modified: 2025-04-11
CVE-2011-1521
The urllib and urllib2 modules in Python 2.x before 2.7.2 and 3.x before 3.2.1 process Location headers that specify redirection to file: URLs, which makes it easier for remote attackers to obtain sensitive information or cause a denial of service (resource consumption) via a crafted URL, as demonstrated by the file:///etc/passwd and file:///dev/zero URLs.
- http://bugs.python.org/issue11662
- http://hg.python.org/cpython/file/96a6c128822b/Misc/NEWS
- http://hg.python.org/cpython/file/b2934d98dac1/Misc/NEWS
- http://hg.python.org/cpython/rev/96a6c128822b/
- http://hg.python.org/cpython/rev/b2934d98dac1/
- http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html
- http://openwall.com/lists/oss-security/2011/03/24/5
- http://openwall.com/lists/oss-security/2011/03/28/2
- http://openwall.com/lists/oss-security/2011/09/11/1
- http://openwall.com/lists/oss-security/2011/09/13/2
- http://openwall.com/lists/oss-security/2011/09/15/5
- http://secunia.com/advisories/50858
- http://secunia.com/advisories/51024
- http://secunia.com/advisories/51040
- http://securitytracker.com/id?1025488
- http://support.apple.com/kb/HT5002
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:096
- http://www.ubuntu.com/usn/USN-1592-1
- http://www.ubuntu.com/usn/USN-1596-1
- http://www.ubuntu.com/usn/USN-1613-1
- http://www.ubuntu.com/usn/USN-1613-2
- https://bugzilla.redhat.com/show_bug.cgi?id=690560
- https://bugzilla.redhat.com/show_bug.cgi?id=737366
- https://www.djangoproject.com/weblog/2011/sep/09/
- https://www.djangoproject.com/weblog/2011/sep/10/127/
- http://bugs.python.org/issue11662
- http://hg.python.org/cpython/file/96a6c128822b/Misc/NEWS
- http://hg.python.org/cpython/file/b2934d98dac1/Misc/NEWS
- http://hg.python.org/cpython/rev/96a6c128822b/
- http://hg.python.org/cpython/rev/b2934d98dac1/
- http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html
- http://openwall.com/lists/oss-security/2011/03/24/5
- http://openwall.com/lists/oss-security/2011/03/28/2
- http://openwall.com/lists/oss-security/2011/09/11/1
- http://openwall.com/lists/oss-security/2011/09/13/2
- http://openwall.com/lists/oss-security/2011/09/15/5
- http://secunia.com/advisories/50858
- http://secunia.com/advisories/51024
- http://secunia.com/advisories/51040
- http://securitytracker.com/id?1025488
- http://support.apple.com/kb/HT5002
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:096
- http://www.ubuntu.com/usn/USN-1592-1
- http://www.ubuntu.com/usn/USN-1596-1
- http://www.ubuntu.com/usn/USN-1613-1
- http://www.ubuntu.com/usn/USN-1613-2
- https://bugzilla.redhat.com/show_bug.cgi?id=690560
- https://bugzilla.redhat.com/show_bug.cgi?id=737366
- https://www.djangoproject.com/weblog/2011/sep/09/
- https://www.djangoproject.com/weblog/2011/sep/10/127/
Modified: 2025-04-11
CVE-2011-4940
The list_directory function in Lib/SimpleHTTPServer.py in SimpleHTTPServer in Python before 2.5.6c1, 2.6.x before 2.6.7 rc2, and 2.7.x before 2.7.2 does not place a charset parameter in the Content-Type HTTP header, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks against Internet Explorer 7 via UTF-7 encoding.
- http://bugs.python.org/issue11442
- http://jvn.jp/en/jp/JVN51176027/index.html
- http://jvndb.jvn.jp/jvndb/JVNDB-2012-000063
- http://secunia.com/advisories/50858
- http://secunia.com/advisories/51024
- http://secunia.com/advisories/51040
- http://www.securityfocus.com/bid/54083
- http://www.ubuntu.com/usn/USN-1592-1
- http://www.ubuntu.com/usn/USN-1596-1
- http://www.ubuntu.com/usn/USN-1613-1
- http://www.ubuntu.com/usn/USN-1613-2
- https://bugzilla.redhat.com/show_bug.cgi?id=803500
- http://bugs.python.org/issue11442
- http://jvn.jp/en/jp/JVN51176027/index.html
- http://jvndb.jvn.jp/jvndb/JVNDB-2012-000063
- http://secunia.com/advisories/50858
- http://secunia.com/advisories/51024
- http://secunia.com/advisories/51040
- http://www.securityfocus.com/bid/54083
- http://www.ubuntu.com/usn/USN-1592-1
- http://www.ubuntu.com/usn/USN-1596-1
- http://www.ubuntu.com/usn/USN-1613-1
- http://www.ubuntu.com/usn/USN-1613-2
- https://bugzilla.redhat.com/show_bug.cgi?id=803500
Modified: 2025-04-11
CVE-2011-4944
Python 2.6 through 3.2 creates ~/.pypirc with world-readable permissions before changing them after data has been written, which introduces a race condition that allows local users to obtain a username and password by reading this file.
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=650555
- http://bugs.python.org/file23824/pypirc-secure.diff
- http://bugs.python.org/issue13512
- http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
- http://secunia.com/advisories/50858
- http://secunia.com/advisories/51024
- http://secunia.com/advisories/51040
- http://secunia.com/advisories/51087
- http://secunia.com/advisories/51089
- http://www.openwall.com/lists/oss-security/2012/03/27/10
- http://www.openwall.com/lists/oss-security/2012/03/27/2
- http://www.openwall.com/lists/oss-security/2012/03/27/5
- http://www.ubuntu.com/usn/USN-1592-1
- http://www.ubuntu.com/usn/USN-1596-1
- http://www.ubuntu.com/usn/USN-1613-1
- http://www.ubuntu.com/usn/USN-1613-2
- http://www.ubuntu.com/usn/USN-1615-1
- http://www.ubuntu.com/usn/USN-1616-1
- https://bugzilla.redhat.com/show_bug.cgi?id=758905
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=650555
- http://bugs.python.org/file23824/pypirc-secure.diff
- http://bugs.python.org/issue13512
- http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
- http://secunia.com/advisories/50858
- http://secunia.com/advisories/51024
- http://secunia.com/advisories/51040
- http://secunia.com/advisories/51087
- http://secunia.com/advisories/51089
- http://www.openwall.com/lists/oss-security/2012/03/27/10
- http://www.openwall.com/lists/oss-security/2012/03/27/2
- http://www.openwall.com/lists/oss-security/2012/03/27/5
- http://www.ubuntu.com/usn/USN-1592-1
- http://www.ubuntu.com/usn/USN-1596-1
- http://www.ubuntu.com/usn/USN-1613-1
- http://www.ubuntu.com/usn/USN-1613-2
- http://www.ubuntu.com/usn/USN-1615-1
- http://www.ubuntu.com/usn/USN-1616-1
- https://bugzilla.redhat.com/show_bug.cgi?id=758905
Modified: 2025-04-11
CVE-2012-0845
SimpleXMLRPCServer.py in SimpleXMLRPCServer in Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an XML-RPC POST request that contains a smaller amount of data than specified by the Content-Length header.
- http://bugs.python.org/issue14001
- http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
- http://python.org/download/releases/2.6.8/
- http://python.org/download/releases/2.7.3/
- http://python.org/download/releases/3.1.5/
- http://python.org/download/releases/3.2.3/
- http://secunia.com/advisories/50858
- http://secunia.com/advisories/51024
- http://secunia.com/advisories/51040
- http://secunia.com/advisories/51087
- http://secunia.com/advisories/51089
- http://www.openwall.com/lists/oss-security/2012/02/13/4
- http://www.securitytracker.com/id?1026689
- http://www.ubuntu.com/usn/USN-1592-1
- http://www.ubuntu.com/usn/USN-1596-1
- http://www.ubuntu.com/usn/USN-1613-1
- http://www.ubuntu.com/usn/USN-1613-2
- http://www.ubuntu.com/usn/USN-1615-1
- http://www.ubuntu.com/usn/USN-1616-1
- https://bugzilla.redhat.com/show_bug.cgi?id=789790
- http://bugs.python.org/issue14001
- http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
- http://python.org/download/releases/2.6.8/
- http://python.org/download/releases/2.7.3/
- http://python.org/download/releases/3.1.5/
- http://python.org/download/releases/3.2.3/
- http://secunia.com/advisories/50858
- http://secunia.com/advisories/51024
- http://secunia.com/advisories/51040
- http://secunia.com/advisories/51087
- http://secunia.com/advisories/51089
- http://www.openwall.com/lists/oss-security/2012/02/13/4
- http://www.securitytracker.com/id?1026689
- http://www.ubuntu.com/usn/USN-1592-1
- http://www.ubuntu.com/usn/USN-1596-1
- http://www.ubuntu.com/usn/USN-1613-1
- http://www.ubuntu.com/usn/USN-1613-2
- http://www.ubuntu.com/usn/USN-1615-1
- http://www.ubuntu.com/usn/USN-1616-1
- https://bugzilla.redhat.com/show_bug.cgi?id=789790
Modified: 2025-04-11
CVE-2012-0876
The XML parser (xmlparse.c) in expat before 2.1.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML file with many identifiers with the same value.
- http://bugs.python.org/issue13703#msg151870
- http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
- http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html
- http://mail.libexpat.org/pipermail/expat-discuss/2012-March/002768.html
- http://rhn.redhat.com/errata/RHSA-2012-0731.html
- http://rhn.redhat.com/errata/RHSA-2016-0062.html
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
- http://secunia.com/advisories/49504
- http://secunia.com/advisories/51024
- http://secunia.com/advisories/51040
- http://sourceforge.net/projects/expat/files/expat/2.1.0/
- http://sourceforge.net/tracker/?func=detail&atid=110127&aid=3496608&group_id=10127
- http://www.debian.org/security/2012/dsa-2525
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:041
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.securityfocus.com/bid/52379
- http://www.ubuntu.com/usn/USN-1527-1
- http://www.ubuntu.com/usn/USN-1613-1
- http://www.ubuntu.com/usn/USN-1613-2
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- https://support.apple.com/HT205637
- https://www.tenable.com/security/tns-2016-20
- http://bugs.python.org/issue13703#msg151870
- http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
- http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html
- http://mail.libexpat.org/pipermail/expat-discuss/2012-March/002768.html
- http://rhn.redhat.com/errata/RHSA-2012-0731.html
- http://rhn.redhat.com/errata/RHSA-2016-0062.html
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
- http://secunia.com/advisories/49504
- http://secunia.com/advisories/51024
- http://secunia.com/advisories/51040
- http://sourceforge.net/projects/expat/files/expat/2.1.0/
- http://sourceforge.net/tracker/?func=detail&atid=110127&aid=3496608&group_id=10127
- http://www.debian.org/security/2012/dsa-2525
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:041
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.securityfocus.com/bid/52379
- http://www.ubuntu.com/usn/USN-1527-1
- http://www.ubuntu.com/usn/USN-1613-1
- http://www.ubuntu.com/usn/USN-1613-2
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- https://support.apple.com/HT205637
- https://www.tenable.com/security/tns-2016-20
Modified: 2025-04-11
CVE-2012-1150
Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
- http://bugs.python.org/issue13703
- http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
- http://mail.python.org/pipermail/python-dev/2011-December/115116.html
- http://mail.python.org/pipermail/python-dev/2012-January/115892.html
- http://python.org/download/releases/2.6.8/
- http://python.org/download/releases/2.7.3/
- http://python.org/download/releases/3.1.5/
- http://python.org/download/releases/3.2.3/
- http://secunia.com/advisories/50858
- http://secunia.com/advisories/51087
- http://secunia.com/advisories/51089
- http://www.openwall.com/lists/oss-security/2012/03/10/3
- http://www.ubuntu.com/usn/USN-1592-1
- http://www.ubuntu.com/usn/USN-1596-1
- http://www.ubuntu.com/usn/USN-1615-1
- http://www.ubuntu.com/usn/USN-1616-1
- https://bugzilla.redhat.com/show_bug.cgi?id=750555
- http://bugs.python.org/issue13703
- http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
- http://mail.python.org/pipermail/python-dev/2011-December/115116.html
- http://mail.python.org/pipermail/python-dev/2012-January/115892.html
- http://python.org/download/releases/2.6.8/
- http://python.org/download/releases/2.7.3/
- http://python.org/download/releases/3.1.5/
- http://python.org/download/releases/3.2.3/
- http://secunia.com/advisories/50858
- http://secunia.com/advisories/51087
- http://secunia.com/advisories/51089
- http://www.openwall.com/lists/oss-security/2012/03/10/3
- http://www.ubuntu.com/usn/USN-1592-1
- http://www.ubuntu.com/usn/USN-1596-1
- http://www.ubuntu.com/usn/USN-1615-1
- http://www.ubuntu.com/usn/USN-1616-1
- https://bugzilla.redhat.com/show_bug.cgi?id=750555
Modified: 2025-04-11
CVE-2013-4238
The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
- http://bugs.python.org/issue18709
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
- http://lists.opensuse.org/opensuse-updates/2013-09/msg00026.html
- http://lists.opensuse.org/opensuse-updates/2013-09/msg00027.html
- http://lists.opensuse.org/opensuse-updates/2013-09/msg00028.html
- http://lists.opensuse.org/opensuse-updates/2013-09/msg00029.html
- http://lists.opensuse.org/opensuse-updates/2013-09/msg00042.html
- http://lists.opensuse.org/opensuse-updates/2013-09/msg00043.html
- http://rhn.redhat.com/errata/RHSA-2013-1582.html
- http://seclists.org/fulldisclosure/2014/Dec/23
- http://www.debian.org/security/2014/dsa-2880
- http://www.securityfocus.com/archive/1/534161/100/0/threaded
- http://www.ubuntu.com/usn/USN-1982-1
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- https://bugzilla.redhat.com/show_bug.cgi?id=996381
- http://bugs.python.org/issue18709
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
- http://lists.opensuse.org/opensuse-updates/2013-09/msg00026.html
- http://lists.opensuse.org/opensuse-updates/2013-09/msg00027.html
- http://lists.opensuse.org/opensuse-updates/2013-09/msg00028.html
- http://lists.opensuse.org/opensuse-updates/2013-09/msg00029.html
- http://lists.opensuse.org/opensuse-updates/2013-09/msg00042.html
- http://lists.opensuse.org/opensuse-updates/2013-09/msg00043.html
- http://rhn.redhat.com/errata/RHSA-2013-1582.html
- http://seclists.org/fulldisclosure/2014/Dec/23
- http://www.debian.org/security/2014/dsa-2880
- http://www.securityfocus.com/archive/1/534161/100/0/threaded
- http://www.ubuntu.com/usn/USN-1982-1
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- https://bugzilla.redhat.com/show_bug.cgi?id=996381
Modified: 2025-04-12
CVE-2014-1912
Buffer overflow in the socket.recvfrom_into function in Modules/socketmodule.c in Python 2.5 before 2.7.7, 3.x before 3.3.4, and 3.4.x before 3.4rc1 allows remote attackers to execute arbitrary code via a crafted string.
- http://bugs.python.org/issue20246
- http://hg.python.org/cpython/rev/87673659d8f7
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- http://lists.opensuse.org/opensuse-updates/2014-04/msg00035.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00008.html
- http://pastebin.com/raw.php?i=GHXSmNEg
- http://rhn.redhat.com/errata/RHSA-2015-1064.html
- http://rhn.redhat.com/errata/RHSA-2015-1330.html
- http://www.debian.org/security/2014/dsa-2880
- http://www.exploit-db.com/exploits/31875
- http://www.openwall.com/lists/oss-security/2014/02/12/16
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.securityfocus.com/bid/65379
- http://www.securitytracker.com/id/1029831
- http://www.ubuntu.com/usn/USN-2125-1
- https://security.gentoo.org/glsa/201503-10
- https://support.apple.com/kb/HT205031
- https://www.trustedsec.com/february-2014/python-remote-code-execution-socket-recvfrom_into/
- http://bugs.python.org/issue20246
- http://hg.python.org/cpython/rev/87673659d8f7
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- http://lists.opensuse.org/opensuse-updates/2014-04/msg00035.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00008.html
- http://pastebin.com/raw.php?i=GHXSmNEg
- http://rhn.redhat.com/errata/RHSA-2015-1064.html
- http://rhn.redhat.com/errata/RHSA-2015-1330.html
- http://www.debian.org/security/2014/dsa-2880
- http://www.exploit-db.com/exploits/31875
- http://www.openwall.com/lists/oss-security/2014/02/12/16
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.securityfocus.com/bid/65379
- http://www.securitytracker.com/id/1029831
- http://www.ubuntu.com/usn/USN-2125-1
- https://security.gentoo.org/glsa/201503-10
- https://support.apple.com/kb/HT205031
- https://www.trustedsec.com/february-2014/python-remote-code-execution-socket-recvfrom_into/
Modified: 2025-04-12
CVE-2014-9365
The HTTP clients in the (1) httplib, (2) urllib, (3) urllib2, and (4) xmlrpclib libraries in CPython (aka Python) 2.x before 2.7.9 and 3.x before 3.4.3, when accessing an HTTPS URL, do not (a) check the certificate against a trust store or verify that the server hostname matches a domain name in the subject's (b) Common Name or (c) subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
- http://bugs.python.org/issue22417
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- http://www.openwall.com/lists/oss-security/2014/12/11/1
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.securityfocus.com/bid/71639
- https://access.redhat.com/errata/RHSA-2016:1166
- https://access.redhat.com/errata/RHSA-2017:1162
- https://access.redhat.com/errata/RHSA-2017:1868
- https://security.gentoo.org/glsa/201503-10
- https://support.apple.com/kb/HT205031
- https://www.python.org/dev/peps/pep-0476/
- https://www.python.org/downloads/release/python-279/
- http://bugs.python.org/issue22417
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- http://www.openwall.com/lists/oss-security/2014/12/11/1
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.securityfocus.com/bid/71639
- https://access.redhat.com/errata/RHSA-2016:1166
- https://access.redhat.com/errata/RHSA-2017:1162
- https://access.redhat.com/errata/RHSA-2017:1868
- https://security.gentoo.org/glsa/201503-10
- https://support.apple.com/kb/HT205031
- https://www.python.org/dev/peps/pep-0476/
- https://www.python.org/downloads/release/python-279/