ALT-PU-2015-2174-1
Closed vulnerabilities
BDU:2015-09649
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации
Modified: 2024-11-21
CVE-2011-1521
The urllib and urllib2 modules in Python 2.x before 2.7.2 and 3.x before 3.2.1 process Location headers that specify redirection to file: URLs, which makes it easier for remote attackers to obtain sensitive information or cause a denial of service (resource consumption) via a crafted URL, as demonstrated by the file:///etc/passwd and file:///dev/zero URLs.
- http://bugs.python.org/issue11662
- http://hg.python.org/cpython/file/96a6c128822b/Misc/NEWS
- http://hg.python.org/cpython/file/b2934d98dac1/Misc/NEWS
- http://hg.python.org/cpython/rev/96a6c128822b/
- http://hg.python.org/cpython/rev/b2934d98dac1/
- APPLE-SA-2011-10-12-3
- SUSE-SR:2011:009
- [oss-security] 20110324 CVE Request -- Python (urllib, urllib2): Improper management of ftp:// and file:// URL schemes
- [oss-security] 20110328 Re: CVE Request -- Python (urllib, urllib2): Improper management of ftp:// and file:// URL schemes
- [oss-security] 20110911 CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws
- [oss-security] 20110913 Re: CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws
- [oss-security] 20110916 Re: CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws
- 50858
- 51024
- 51040
- 1025488
- http://support.apple.com/kb/HT5002
- MDVSA-2011:096
- USN-1592-1
- USN-1596-1
- USN-1613-1
- USN-1613-2
- https://bugzilla.redhat.com/show_bug.cgi?id=690560
- https://bugzilla.redhat.com/show_bug.cgi?id=737366
- https://www.djangoproject.com/weblog/2011/sep/09/
- https://www.djangoproject.com/weblog/2011/sep/10/127/
- http://bugs.python.org/issue11662
- https://www.djangoproject.com/weblog/2011/sep/10/127/
- https://www.djangoproject.com/weblog/2011/sep/09/
- https://bugzilla.redhat.com/show_bug.cgi?id=737366
- https://bugzilla.redhat.com/show_bug.cgi?id=690560
- USN-1613-2
- USN-1613-1
- USN-1596-1
- USN-1592-1
- MDVSA-2011:096
- http://support.apple.com/kb/HT5002
- 1025488
- 51040
- 51024
- 50858
- [oss-security] 20110916 Re: CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws
- [oss-security] 20110913 Re: CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws
- [oss-security] 20110911 CVE Request -- Django: v1.3.1, v1.2.7 multiple security flaws
- [oss-security] 20110328 Re: CVE Request -- Python (urllib, urllib2): Improper management of ftp:// and file:// URL schemes
- [oss-security] 20110324 CVE Request -- Python (urllib, urllib2): Improper management of ftp:// and file:// URL schemes
- SUSE-SR:2011:009
- APPLE-SA-2011-10-12-3
- http://hg.python.org/cpython/rev/b2934d98dac1/
- http://hg.python.org/cpython/rev/96a6c128822b/
- http://hg.python.org/cpython/file/b2934d98dac1/Misc/NEWS
- http://hg.python.org/cpython/file/96a6c128822b/Misc/NEWS
Modified: 2024-11-21
CVE-2011-4940
The list_directory function in Lib/SimpleHTTPServer.py in SimpleHTTPServer in Python before 2.5.6c1, 2.6.x before 2.6.7 rc2, and 2.7.x before 2.7.2 does not place a charset parameter in the Content-Type HTTP header, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks against Internet Explorer 7 via UTF-7 encoding.
- http://bugs.python.org/issue11442
- JVN#51176027
- JVNDB-2012-000063
- 50858
- 51024
- 51040
- 54083
- USN-1592-1
- USN-1596-1
- USN-1613-1
- USN-1613-2
- https://bugzilla.redhat.com/show_bug.cgi?id=803500
- http://bugs.python.org/issue11442
- https://bugzilla.redhat.com/show_bug.cgi?id=803500
- USN-1613-2
- USN-1613-1
- USN-1596-1
- USN-1592-1
- 54083
- 51040
- 51024
- 50858
- JVNDB-2012-000063
- JVN#51176027
Modified: 2024-11-21
CVE-2011-4944
Python 2.6 through 3.2 creates ~/.pypirc with world-readable permissions before changing them after data has been written, which introduces a race condition that allows local users to obtain a username and password by reading this file.
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=650555
- http://bugs.python.org/file23824/pypirc-secure.diff
- http://bugs.python.org/issue13512
- APPLE-SA-2013-10-22-3
- openSUSE-SU-2020:0086
- 50858
- 51024
- 51040
- 51087
- 51089
- [oss-security] 20120327 Re: CVE request: distutils creates ~/.pypirc insecurely
- [oss-security] 20120327 CVE request: distutils creates ~/.pypirc insecurely
- [oss-security] 20120327 Re: CVE request: distutils creates ~/.pypirc insecurely
- USN-1592-1
- USN-1596-1
- USN-1613-1
- USN-1613-2
- USN-1615-1
- USN-1616-1
- https://bugzilla.redhat.com/show_bug.cgi?id=758905
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=650555
- https://bugzilla.redhat.com/show_bug.cgi?id=758905
- USN-1616-1
- USN-1615-1
- USN-1613-2
- USN-1613-1
- USN-1596-1
- USN-1592-1
- [oss-security] 20120327 Re: CVE request: distutils creates ~/.pypirc insecurely
- [oss-security] 20120327 CVE request: distutils creates ~/.pypirc insecurely
- [oss-security] 20120327 Re: CVE request: distutils creates ~/.pypirc insecurely
- 51089
- 51087
- 51040
- 51024
- 50858
- openSUSE-SU-2020:0086
- APPLE-SA-2013-10-22-3
- http://bugs.python.org/issue13512
- http://bugs.python.org/file23824/pypirc-secure.diff
Modified: 2024-11-21
CVE-2012-0845
SimpleXMLRPCServer.py in SimpleXMLRPCServer in Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an XML-RPC POST request that contains a smaller amount of data than specified by the Content-Length header.
- http://bugs.python.org/issue14001
- APPLE-SA-2013-10-22-3
- openSUSE-SU-2020:0086
- http://python.org/download/releases/2.6.8/
- http://python.org/download/releases/2.7.3/
- http://python.org/download/releases/3.1.5/
- http://python.org/download/releases/3.2.3/
- 50858
- 51024
- 51040
- 51087
- 51089
- [oss-security] 20120213 Re: CVE Request -- python (SimpleXMLRPCServer): DoS (excessive CPU usage) via malformed XML-RPC / HTTP POST request
- 1026689
- USN-1592-1
- USN-1596-1
- USN-1613-1
- USN-1613-2
- USN-1615-1
- USN-1616-1
- https://bugzilla.redhat.com/show_bug.cgi?id=789790
- http://bugs.python.org/issue14001
- https://bugzilla.redhat.com/show_bug.cgi?id=789790
- USN-1616-1
- USN-1615-1
- USN-1613-2
- USN-1613-1
- USN-1596-1
- USN-1592-1
- 1026689
- [oss-security] 20120213 Re: CVE Request -- python (SimpleXMLRPCServer): DoS (excessive CPU usage) via malformed XML-RPC / HTTP POST request
- 51089
- 51087
- 51040
- 51024
- 50858
- http://python.org/download/releases/3.2.3/
- http://python.org/download/releases/3.1.5/
- http://python.org/download/releases/2.7.3/
- http://python.org/download/releases/2.6.8/
- openSUSE-SU-2020:0086
- APPLE-SA-2013-10-22-3
Modified: 2024-11-21
CVE-2012-0876
The XML parser (xmlparse.c) in expat before 2.1.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML file with many identifiers with the same value.
- http://bugs.python.org/issue13703#msg151870
- APPLE-SA-2013-10-22-3
- APPLE-SA-2015-12-08-3
- [Expat-discuss] 20120304 Announcement: Expat 2.1.0 Beta can be tested
- RHSA-2012:0731
- RHSA-2016:0062
- RHSA-2016:2957
- 49504
- 51024
- 51040
- http://sourceforge.net/projects/expat/files/expat/2.1.0/
- http://sourceforge.net/tracker/?func=detail&atid=110127&aid=3496608&group_id=10127
- DSA-2525
- MDVSA-2012:041
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- 52379
- USN-1527-1
- USN-1613-1
- USN-1613-2
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- https://support.apple.com/HT205637
- https://www.tenable.com/security/tns-2016-20
- http://bugs.python.org/issue13703#msg151870
- https://www.tenable.com/security/tns-2016-20
- https://support.apple.com/HT205637
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- USN-1613-2
- USN-1613-1
- USN-1527-1
- 52379
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- MDVSA-2012:041
- DSA-2525
- http://sourceforge.net/tracker/?func=detail&atid=110127&aid=3496608&group_id=10127
- http://sourceforge.net/projects/expat/files/expat/2.1.0/
- 51040
- 51024
- 49504
- RHSA-2016:2957
- RHSA-2016:0062
- RHSA-2012:0731
- [Expat-discuss] 20120304 Announcement: Expat 2.1.0 Beta can be tested
- APPLE-SA-2015-12-08-3
- APPLE-SA-2013-10-22-3
Modified: 2024-11-21
CVE-2012-1150
Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
- http://bugs.python.org/issue13703
- http://bugs.python.org/issue13703
- APPLE-SA-2013-10-22-3
- APPLE-SA-2013-10-22-3
- openSUSE-SU-2020:0086
- openSUSE-SU-2020:0086
- [python-dev] 20111229 Hash collision security issue (now public)
- [python-dev] 20111229 Hash collision security issue (now public)
- [python-dev] 20120128 plugging the hash attack
- [python-dev] 20120128 plugging the hash attack
- http://python.org/download/releases/2.6.8/
- http://python.org/download/releases/2.6.8/
- http://python.org/download/releases/2.7.3/
- http://python.org/download/releases/2.7.3/
- http://python.org/download/releases/3.1.5/
- http://python.org/download/releases/3.1.5/
- http://python.org/download/releases/3.2.3/
- http://python.org/download/releases/3.2.3/
- 50858
- 50858
- 51087
- 51087
- 51089
- 51089
- [oss-security] 20120309 Re: CVE Request: Python Hash DoS (Issue 13703)
- [oss-security] 20120309 Re: CVE Request: Python Hash DoS (Issue 13703)
- USN-1592-1
- USN-1592-1
- USN-1596-1
- USN-1596-1
- USN-1615-1
- USN-1615-1
- USN-1616-1
- USN-1616-1
- https://bugzilla.redhat.com/show_bug.cgi?id=750555
- https://bugzilla.redhat.com/show_bug.cgi?id=750555
Modified: 2024-11-21
CVE-2013-4238
The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
- http://bugs.python.org/issue18709
- http://bugs.python.org/issue18709
- openSUSE-SU-2020:0086
- openSUSE-SU-2020:0086
- openSUSE-SU-2013:1437
- openSUSE-SU-2013:1437
- openSUSE-SU-2013:1438
- openSUSE-SU-2013:1438
- openSUSE-SU-2013:1439
- openSUSE-SU-2013:1439
- openSUSE-SU-2013:1440
- openSUSE-SU-2013:1440
- openSUSE-SU-2013:1462
- openSUSE-SU-2013:1462
- openSUSE-SU-2013:1463
- openSUSE-SU-2013:1463
- RHSA-2013:1582
- RHSA-2013:1582
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- DSA-2880
- DSA-2880
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- USN-1982-1
- USN-1982-1
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- https://bugzilla.redhat.com/show_bug.cgi?id=996381
- https://bugzilla.redhat.com/show_bug.cgi?id=996381
Modified: 2024-11-21
CVE-2014-1912
Buffer overflow in the socket.recvfrom_into function in Modules/socketmodule.c in Python 2.5 before 2.7.7, 3.x before 3.3.4, and 3.4.x before 3.4rc1 allows remote attackers to execute arbitrary code via a crafted string.
- http://bugs.python.org/issue20246
- http://bugs.python.org/issue20246
- http://hg.python.org/cpython/rev/87673659d8f7
- http://hg.python.org/cpython/rev/87673659d8f7
- APPLE-SA-2015-08-13-2
- APPLE-SA-2015-08-13-2
- openSUSE-SU-2014:0518
- openSUSE-SU-2014:0518
- openSUSE-SU-2014:0597
- openSUSE-SU-2014:0597
- http://pastebin.com/raw.php?i=GHXSmNEg
- http://pastebin.com/raw.php?i=GHXSmNEg
- RHSA-2015:1064
- RHSA-2015:1064
- RHSA-2015:1330
- RHSA-2015:1330
- DSA-2880
- DSA-2880
- 31875
- 31875
- [oss-security] 20140212 Re: CVE request? buffer overflow in socket.recvfrom_into
- [oss-security] 20140212 Re: CVE request? buffer overflow in socket.recvfrom_into
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- 65379
- 65379
- 1029831
- 1029831
- USN-2125-1
- USN-2125-1
- GLSA-201503-10
- GLSA-201503-10
- https://support.apple.com/kb/HT205031
- https://support.apple.com/kb/HT205031
- https://www.trustedsec.com/february-2014/python-remote-code-execution-socket-recvfrom_into/
- https://www.trustedsec.com/february-2014/python-remote-code-execution-socket-recvfrom_into/
Modified: 2024-11-21
CVE-2014-9365
The HTTP clients in the (1) httplib, (2) urllib, (3) urllib2, and (4) xmlrpclib libraries in CPython (aka Python) 2.x before 2.7.9 and 3.x before 3.4.3, when accessing an HTTPS URL, do not (a) check the certificate against a trust store or verify that the server hostname matches a domain name in the subject's (b) Common Name or (c) subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
- http://bugs.python.org/issue22417
- http://bugs.python.org/issue22417
- APPLE-SA-2015-08-13-2
- APPLE-SA-2015-08-13-2
- [oss-security] 20141211 CVE request: Python, standard library HTTP clients
- [oss-security] 20141211 CVE request: Python, standard library HTTP clients
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- 71639
- 71639
- RHSA-2016:1166
- RHSA-2016:1166
- RHSA-2017:1162
- RHSA-2017:1162
- RHSA-2017:1868
- RHSA-2017:1868
- GLSA-201503-10
- GLSA-201503-10
- https://support.apple.com/kb/HT205031
- https://support.apple.com/kb/HT205031
- https://www.python.org/dev/peps/pep-0476/
- https://www.python.org/dev/peps/pep-0476/
- https://www.python.org/downloads/release/python-279/
- https://www.python.org/downloads/release/python-279/