[ubuntu/precise-security] python2.7 2.7.3-0ubuntu3.8 (Accepted)

Marc Deslauriers marc.deslauriers at canonical.com
Thu Jun 25 11:43:26 UTC 2015


python2.7 (2.7.3-0ubuntu3.8) precise-security; urgency=medium

  * SECURITY UPDATE: denial of service in multiple servers
    - debian/patches/CVE-2013-1752-ftplib.patch: limit amount of data read
      in Lib/ftplib.py, added test to Lib/test/test_ftplib.py.
    - debian/patches/CVE-2013-1752-httplib-1.patch: limit long lines in
      Lib/httplib.py.
    - debian/patches/CVE-2013-1752-httplib-2.patch: limit amount of headers
      in Lib/httplib.py, added test to Lib/test/test_httplib.py.
    - debian/patches/CVE-2013-1752-imaplib-1.patch: limit line length in
      Lib/imaplib.py, added test to Lib/test/test_imaplib.py.
    - debian/patches/CVE-2013-1752-imaplib-2.patch: disable broken test in
      Lib/test/test_imaplib.py.
    - debian/patches/CVE-2013-1752-nntplib.patch: limit line length in
      Lib/nntplib.py, added test to Lib/test/test_nntplib.py.
    - debian/patches/CVE-2013-1752-poplib.patch: limit maximum line length
      in Lib/poplib.py, added test to Lib/test/test_poplib.py.
    - debian/patches/CVE-2013-1752-smtplib.patch: limit amount read from
      the network in Lib/smtplib.py, added test to
      Lib/test/test_smtplib.py.
    - CVE-2013-1752
  * SECURITY UPDATE: denial of service via xmlrpc gzip-compressed
    HTTP bodies
    - debian/patches/CVE-2013-1753.patch: add default limit in
      Lib/xmlrpclib.py, added test to Lib/test/test_xmlrpc.py.
    - CVE-2013-1753
  * SECURITY UPDATE: arbitrary memory read via idx argument
    - debian/patches/CVE-2014-4616.patch: reject negative idx values in
      Modules/_json.c, added test to Lib/json/tests/test_decode.py.
    - CVE-2014-4616
  * SECURITY UPDATE: code execution or file disclosure via CGIHTTPServer
    - debian/patches/CVE-2014-4650.patch: url unquote path in
      Lib/CGIHTTPServer.py, added test to Lib/test/test_httpservers.py.
    - CVE-2014-4650
  * SECURITY UPDATE: information disclosure via buffer function
    - debian/patches/CVE-2014-7185.patch: avoid overflow in
      Objects/bufferobject.c, added test to Lib/test/test_buffer.py.
    - CVE-2014-7185

python2.7 (2.7.3-0ubuntu3.6) precise-proposed; urgency=medium

  * Ensure failed connections to /dev/log are full closed, preventing
    infinite loop on logging applications due to socket state (LP: #1081022):
    - d/p/syslog.diff: Cherry picked fix from upstream bugtracker.

Date: 2015-06-22 18:53:12.821167+00:00
Changed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/+source/python2.7/2.7.3-0ubuntu3.8
-------------- next part --------------
Sorry, changesfile not available.


More information about the Precise-changes mailing list