Bug 1062370 (CVE-2014-1912)
Summary: | CVE-2014-1912 python: buffer overflow in socket.recvfrom_into() | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Vincent Danen <vdanen> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | adev88, amcnabb, bkabrda, contribs, derks, dmalcolm, drieden, extras-orphan, hhorak, ivazqueznet, jberan, jeffrey.ness, jkurik, jonathansteffan, jorton, katzj, mdshaikh, mharris, mmaslano, mmcgrath, ncoghlan, nobody+bgollahe, python-maint, tdawson, tomspur, yozone |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | python 2.7.7, python 3.3.4, python 3.4.0 | Doc Type: | Bug Fix |
Doc Text: |
It was discovered that the socket.recvfrom_into() function failed to check the size of the supplied buffer. This could lead to a buffer overflow when the function was called with an insufficiently sized buffer.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2016-11-03 21:05:05 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1062374, 1062375, 1062376, 1157721, 1187779, 1206572 | ||
Bug Blocks: | 1062373 |
Description
Vincent Danen
2014-02-06 18:16:46 UTC
Created python tracking bugs for this issue: Affects: fedora-all [bug 1062375] Created python3 tracking bugs for this issue: Affects: fedora-all [bug 1062374] MITRE assigned CVE-2014-1912 to this issue: http://seclists.org/oss-sec/2014/q1/336 python-2.7.5-10.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report. python3-3.3.2-9.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report. Statement: This issue did not affect the versions of python as shipped with Red Hat Enterprise Linux 5 as they did not include the vulnerable socket.recvfrom_into() function. This issue was also corrected in the version of python shipped with Red Hat Enterprise Linux 7.0 prior to release. The Red Hat Security Response Team has rated this issue as having Moderate security impact. A future update may address this issue in Red Hat Software Collections. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/. This was fixed upstream in Python 3.3.4 and 2.7.7: https://docs.python.org/3.3/whatsnew/changelog.html#python-3-3-4 https://hg.python.org/cpython/raw-file/f89216059edf/Misc/NEWS Created python26 tracking bugs for this issue: Affects: epel-5 [bug 1157721] This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 6 Red Hat Software Collections for Red Hat Enterprise Linux 6.5 EUS Red Hat Software Collections for Red Hat Enterprise Linux 6.6 EUS Via RHSA-2015:1064 https://rhn.redhat.com/errata/RHSA-2015-1064.html This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2015:1330 https://rhn.redhat.com/errata/RHSA-2015-1330.html |