Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2007-2052 (GCVE-0-2007-2052)
Vulnerability from cvelistv5
Published
2007-04-16 22:00
Modified
2024-08-07 13:23
Severity ?
EPSS score ?
16.67%
(0.94505)
Summary
Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T13:23:50.498Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "[Security-announce] 20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://lists.vmware.com/pipermail/security-announce/2008/000005.html", }, { name: "28050", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/28050", }, { name: "25190", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/25190", }, { name: "25217", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/25217", }, { name: "37471", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/37471", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.python.org/download/releases/2.5.1/NEWS.txt", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=416934", }, { name: "DSA-1551", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2008/dsa-1551", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.vmware.com/security/advisories/VMSA-2009-0016.html", }, { name: "29303", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/29303", }, { name: "ADV-2007-1465", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2007/1465", }, { name: "29032", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/29032", }, { name: "31492", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/31492", }, { name: "oval:org.mitre.oval:def:8353", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8353", }, { name: "20070521 FLEA-2007-0019-1: python", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/469294/30/6450/threaded", }, { name: "RHSA-2008:0629", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2008-0629.html", }, { name: "RHSA-2007:1077", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2007-1077.html", }, { name: "20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/488457/100/0/threaded", }, { name: "RHSA-2007:1076", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2007-1076.html", }, { name: "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/507985/100/0/threaded", }, { name: "ADV-2008-0637", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2008/0637", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=235093", }, { name: "25353", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/25353", }, { name: "25233", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/25233", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://issues.rpath.com/browse/RPL-1358", }, { name: "USN-585-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/usn-585-1", }, { name: "2007-0019", tags: [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred", ], url: "http://www.trustix.org/errata/2007/0019/", }, { name: "28027", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/28027", }, { name: "SUSE-SR:2007:013", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://www.novell.com/linux/security/advisories/2007_13_sr.html", }, { name: "31255", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/31255", }, { name: "DSA-1620", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2008/dsa-1620", }, { name: "25787", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/25787", }, { name: "23887", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/23887", }, { name: "python-localemodule-information-disclosure(34060)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/34060", }, { name: "oval:org.mitre.oval:def:11716", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11716", }, { name: "ADV-2009-3316", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2009/3316", }, { name: "MDKSA-2007:099", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:099", }, { name: "29889", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/29889", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2007-03-31T00:00:00", descriptions: [ { lang: "en", value: "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-16T14:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "[Security-announce] 20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://lists.vmware.com/pipermail/security-announce/2008/000005.html", }, { name: "28050", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/28050", }, { name: "25190", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/25190", }, { name: "25217", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/25217", }, { name: "37471", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/37471", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.python.org/download/releases/2.5.1/NEWS.txt", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=416934", }, { name: "DSA-1551", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2008/dsa-1551", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.vmware.com/security/advisories/VMSA-2009-0016.html", }, { name: "29303", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/29303", }, { name: "ADV-2007-1465", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2007/1465", }, { name: "29032", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/29032", }, { name: "31492", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/31492", }, { name: "oval:org.mitre.oval:def:8353", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8353", }, { name: "20070521 FLEA-2007-0019-1: python", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://www.securityfocus.com/archive/1/469294/30/6450/threaded", }, { name: "RHSA-2008:0629", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2008-0629.html", }, { name: "RHSA-2007:1077", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2007-1077.html", }, { name: "20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://www.securityfocus.com/archive/1/488457/100/0/threaded", }, { name: "RHSA-2007:1076", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2007-1076.html", }, { name: "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://www.securityfocus.com/archive/1/507985/100/0/threaded", }, { name: "ADV-2008-0637", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2008/0637", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=235093", }, { name: "25353", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/25353", }, { name: "25233", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/25233", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://issues.rpath.com/browse/RPL-1358", }, { name: "USN-585-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/usn-585-1", }, { name: "2007-0019", tags: [ "vendor-advisory", "x_refsource_TRUSTIX", ], url: "http://www.trustix.org/errata/2007/0019/", }, { name: "28027", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/28027", }, { name: "SUSE-SR:2007:013", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://www.novell.com/linux/security/advisories/2007_13_sr.html", }, { name: "31255", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/31255", }, { name: "DSA-1620", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2008/dsa-1620", }, { name: "25787", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/25787", }, { name: "23887", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/23887", }, { name: "python-localemodule-information-disclosure(34060)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/34060", }, { name: "oval:org.mitre.oval:def:11716", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11716", }, { name: "ADV-2009-3316", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2009/3316", }, { name: "MDKSA-2007:099", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:099", }, { name: "29889", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/29889", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2007-2052", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "[Security-announce] 20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates", refsource: "MLIST", url: "http://lists.vmware.com/pipermail/security-announce/2008/000005.html", }, { name: "28050", refsource: "SECUNIA", url: "http://secunia.com/advisories/28050", }, { name: "25190", refsource: "SECUNIA", url: "http://secunia.com/advisories/25190", }, { name: "25217", refsource: "SECUNIA", url: "http://secunia.com/advisories/25217", }, { name: "37471", refsource: "SECUNIA", url: "http://secunia.com/advisories/37471", }, { name: "http://www.python.org/download/releases/2.5.1/NEWS.txt", refsource: "CONFIRM", url: "http://www.python.org/download/releases/2.5.1/NEWS.txt", }, { name: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=416934", refsource: "CONFIRM", url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=416934", }, { name: "DSA-1551", refsource: "DEBIAN", url: "http://www.debian.org/security/2008/dsa-1551", }, { name: "http://www.vmware.com/security/advisories/VMSA-2009-0016.html", refsource: "CONFIRM", url: "http://www.vmware.com/security/advisories/VMSA-2009-0016.html", }, { name: "29303", refsource: "SECUNIA", url: "http://secunia.com/advisories/29303", }, { name: "ADV-2007-1465", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2007/1465", }, { name: "29032", refsource: "SECUNIA", url: "http://secunia.com/advisories/29032", }, { name: "31492", refsource: "SECUNIA", url: "http://secunia.com/advisories/31492", }, { name: "oval:org.mitre.oval:def:8353", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8353", }, { name: "20070521 FLEA-2007-0019-1: python", refsource: "BUGTRAQ", url: "http://www.securityfocus.com/archive/1/469294/30/6450/threaded", }, { name: "RHSA-2008:0629", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2008-0629.html", }, { name: "RHSA-2007:1077", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2007-1077.html", }, { name: "20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates", refsource: "BUGTRAQ", url: "http://www.securityfocus.com/archive/1/488457/100/0/threaded", }, { name: "RHSA-2007:1076", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2007-1076.html", }, { name: "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", refsource: "BUGTRAQ", url: "http://www.securityfocus.com/archive/1/507985/100/0/threaded", }, { name: "ADV-2008-0637", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2008/0637", }, { name: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=235093", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=235093", }, { name: "25353", refsource: "SECUNIA", url: "http://secunia.com/advisories/25353", }, { name: "25233", refsource: "SECUNIA", url: "http://secunia.com/advisories/25233", }, { name: "https://issues.rpath.com/browse/RPL-1358", refsource: "CONFIRM", url: "https://issues.rpath.com/browse/RPL-1358", }, { name: "USN-585-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/usn-585-1", }, { name: "2007-0019", refsource: "TRUSTIX", url: "http://www.trustix.org/errata/2007/0019/", }, { name: "28027", refsource: "SECUNIA", url: "http://secunia.com/advisories/28027", }, { name: "SUSE-SR:2007:013", refsource: "SUSE", url: "http://www.novell.com/linux/security/advisories/2007_13_sr.html", }, { name: "31255", refsource: "SECUNIA", url: "http://secunia.com/advisories/31255", }, { name: "DSA-1620", refsource: "DEBIAN", url: "http://www.debian.org/security/2008/dsa-1620", }, { name: "25787", refsource: "SECUNIA", url: "http://secunia.com/advisories/25787", }, { name: "23887", refsource: "BID", url: "http://www.securityfocus.com/bid/23887", }, { name: "python-localemodule-information-disclosure(34060)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/34060", }, { name: "oval:org.mitre.oval:def:11716", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11716", }, { name: "ADV-2009-3316", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2009/3316", }, { name: "MDKSA-2007:099", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:099", }, { name: "29889", refsource: "SECUNIA", url: "http://secunia.com/advisories/29889", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2007-2052", datePublished: "2007-04-16T22:00:00", dateReserved: "2007-04-16T00:00:00", dateUpdated: "2024-08-07T13:23:50.498Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { fkie_nvd: { configurations: "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:python:python:2.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE315FF0-8715-4FF6-ADBD-AD99AB0D0882\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:python:python:2.5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"690CBE11-2D97-4D59-A21C-2AC388E67273\"}]}]}]", descriptions: "[{\"lang\": \"en\", \"value\": \"Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.\"}, {\"lang\": \"es\", \"value\": \"Error de superaci\\u00f3n de l\\u00edmite (off-by-one) en la funci\\u00f3n PyLocale_strxfrm de Modules/_localemodule.c para Python 2.4 y 2.5 provoca que se utilice un tama\\u00f1o de b\\u00fafer incorrecto para la funci\\u00f3n strxfrm, lo cual permite a atacantes locales o remotos dependiendo del contexto leer porciones de memoria mediante manipulaciones desconocidas que disparan una lectura fuera de l\\u00edmite del b\\u00fafer debido a la falta de una terminaci\\u00f3n null.\"}]", id: "CVE-2007-2052", lastModified: "2024-11-21T00:29:47.320", metrics: "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:N/A:N\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", published: "2007-04-16T22:19:00.000", references: "[{\"url\": \"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=416934\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://lists.vmware.com/pipermail/security-announce/2008/000005.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/25190\", \"source\": \"cve@mitre.org\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://secunia.com/advisories/25217\", \"source\": \"cve@mitre.org\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://secunia.com/advisories/25233\", \"source\": \"cve@mitre.org\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://secunia.com/advisories/25353\", \"source\": \"cve@mitre.org\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://secunia.com/advisories/25787\", \"source\": \"cve@mitre.org\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://secunia.com/advisories/28027\", \"source\": \"cve@mitre.org\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://secunia.com/advisories/28050\", \"source\": \"cve@mitre.org\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://secunia.com/advisories/29032\", \"source\": \"cve@mitre.org\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://secunia.com/advisories/29303\", \"source\": \"cve@mitre.org\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://secunia.com/advisories/29889\", \"source\": \"cve@mitre.org\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://secunia.com/advisories/31255\", \"source\": \"cve@mitre.org\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://secunia.com/advisories/31492\", \"source\": \"cve@mitre.org\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://secunia.com/advisories/37471\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.debian.org/security/2008/dsa-1551\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.debian.org/security/2008/dsa-1620\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDKSA-2007:099\", \"source\": \"cve@mitre.org\", \"tags\": [\"Broken Link\", \"Third Party Advisory\"]}, {\"url\": \"http://www.novell.com/linux/security/advisories/2007_13_sr.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.python.org/download/releases/2.5.1/NEWS.txt\", \"source\": \"cve@mitre.org\", \"tags\": [\"Broken Link\", \"Vendor Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2007-1076.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2007-1077.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2008-0629.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/469294/30/6450/threaded\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/488457/100/0/threaded\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/507985/100/0/threaded\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securityfocus.com/bid/23887\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.trustix.org/errata/2007/0019/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.ubuntu.com/usn/usn-585-1\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vmware.com/security/advisories/VMSA-2009-0016.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Broken Link\", \"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2007/1465\", \"source\": \"cve@mitre.org\", \"tags\": [\"Broken Link\", \"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/0637\", \"source\": \"cve@mitre.org\", \"tags\": [\"Broken Link\", \"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2009/3316\", \"source\": \"cve@mitre.org\", \"tags\": [\"Broken Link\", \"Third Party Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=235093\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/34060\", \"source\": \"cve@mitre.org\", \"tags\": [\"VDB Entry\"]}, {\"url\": \"https://issues.rpath.com/browse/RPL-1358\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11716\", \"source\": \"cve@mitre.org\", \"tags\": [\"Broken Link\"]}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8353\", \"source\": \"cve@mitre.org\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=416934\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://lists.vmware.com/pipermail/security-announce/2008/000005.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/25190\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://secunia.com/advisories/25217\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://secunia.com/advisories/25233\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://secunia.com/advisories/25353\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://secunia.com/advisories/25787\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://secunia.com/advisories/28027\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://secunia.com/advisories/28050\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://secunia.com/advisories/29032\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://secunia.com/advisories/29303\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://secunia.com/advisories/29889\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://secunia.com/advisories/31255\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://secunia.com/advisories/31492\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://secunia.com/advisories/37471\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.debian.org/security/2008/dsa-1551\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.debian.org/security/2008/dsa-1620\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDKSA-2007:099\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\", \"Third Party Advisory\"]}, {\"url\": \"http://www.novell.com/linux/security/advisories/2007_13_sr.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.python.org/download/releases/2.5.1/NEWS.txt\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\", \"Vendor Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2007-1076.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2007-1077.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2008-0629.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/469294/30/6450/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/488457/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/507985/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securityfocus.com/bid/23887\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.trustix.org/errata/2007/0019/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.ubuntu.com/usn/usn-585-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vmware.com/security/advisories/VMSA-2009-0016.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\", \"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2007/1465\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\", \"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/0637\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\", \"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2009/3316\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\", \"Third Party Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=235093\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/34060\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"VDB Entry\"]}, {\"url\": \"https://issues.rpath.com/browse/RPL-1358\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11716\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8353\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}]", sourceIdentifier: "cve@mitre.org", vendorComments: "[{\"organization\": \"Red Hat\", \"comment\": \"Red Hat is aware of this issue and is tracking it via the following bug:\\nhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=235093\\n\\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\\nhttp://www.redhat.com/security/updates/classification/\\n\", \"lastModified\": \"2007-04-19T00:00:00\"}]", vulnStatus: "Modified", weaknesses: "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-193\"}]}]", }, nvd: "{\"cve\":{\"id\":\"CVE-2007-2052\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2007-04-16T22:19:00.000\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.\"},{\"lang\":\"es\",\"value\":\"Error de superación de límite (off-by-one) en la función PyLocale_strxfrm de Modules/_localemodule.c para Python 2.4 y 2.5 provoca que se utilice un tamaño de búfer incorrecto para la función strxfrm, lo cual permite a atacantes locales o remotos dependiendo del contexto leer porciones de memoria mediante manipulaciones desconocidas que disparan una lectura fuera de límite del búfer debido a la falta de una terminación null.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-193\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:2.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE315FF0-8715-4FF6-ADBD-AD99AB0D0882\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:2.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"690CBE11-2D97-4D59-A21C-2AC388E67273\"}]}]}],\"references\":[{\"url\":\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=416934\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.vmware.com/pipermail/security-announce/2008/000005.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/25190\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/25217\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/25233\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/25353\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/25787\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/28027\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/28050\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/29032\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/29303\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/29889\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/31255\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/31492\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/37471\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2008/dsa-1551\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2008/dsa-1620\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:099\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_13_sr.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.python.org/download/releases/2.5.1/NEWS.txt\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-1076.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-1077.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0629.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/469294/30/6450/threaded\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/488457/100/0/threaded\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/507985/100/0/threaded\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/23887\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.trustix.org/errata/2007/0019/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/usn-585-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2009-0016.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/1465\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/0637\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/3316\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=235093\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/34060\",\"source\":\"cve@mitre.org\",\"tags\":[\"VDB Entry\"]},{\"url\":\"https://issues.rpath.com/browse/RPL-1358\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11716\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8353\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=416934\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.vmware.com/pipermail/security-announce/2008/000005.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/25190\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/25217\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/25233\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/25353\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/25787\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/28027\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/28050\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/29032\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/29303\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/29889\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/31255\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/31492\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/37471\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2008/dsa-1551\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2008/dsa-1620\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:099\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_13_sr.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.python.org/download/releases/2.5.1/NEWS.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-1076.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-1077.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0629.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/469294/30/6450/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/488457/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/507985/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/23887\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.trustix.org/errata/2007/0019/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/usn-585-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2009-0016.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/1465\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/0637\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/3316\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=235093\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/34060\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"VDB Entry\"]},{\"url\":\"https://issues.rpath.com/browse/RPL-1358\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11716\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8353\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"Red Hat is aware of this issue and is tracking it via the following bug:\\nhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=235093\\n\\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\\nhttp://www.redhat.com/security/updates/classification/\\n\",\"lastModified\":\"2007-04-19T00:00:00\"}]}}", }, }
RHSA-2009:1176
Vulnerability from csaf_redhat
Published
2009-07-27 09:22
Modified
2024-11-22 02:31
Summary
Red Hat Security Advisory: python security update
Notes
Topic
Updated python packages that fix multiple security issues are now available
for Red Hat Enterprise Linux 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
Python is an interpreted, interactive, object-oriented programming
language.
When the assert() system call was disabled, an input sanitization flaw was
revealed in the Python string object implementation that led to a buffer
overflow. The missing check for negative size values meant the Python
memory allocator could allocate less memory than expected. This could
result in arbitrary code execution with the Python interpreter's
privileges. (CVE-2008-1887)
Multiple buffer and integer overflow flaws were found in the Python Unicode
string processing and in the Python Unicode and string object
implementations. An attacker could use these flaws to cause a denial of
service (Python application crash). (CVE-2008-3142, CVE-2008-5031)
Multiple integer overflow flaws were found in the Python imageop module. If
a Python application used the imageop module to process untrusted images,
it could cause the application to disclose sensitive information, crash or,
potentially, execute arbitrary code with the Python interpreter's
privileges. (CVE-2007-4965, CVE-2008-4864)
Multiple integer underflow and overflow flaws were found in the Python
snprintf() wrapper implementation. An attacker could use these flaws to
cause a denial of service (memory corruption). (CVE-2008-3144)
Multiple integer overflow flaws were found in various Python modules. An
attacker could use these flaws to cause a denial of service (Python
application crash). (CVE-2008-2315, CVE-2008-3143)
An integer signedness error, leading to a buffer overflow, was found
in the Python zlib extension module. If a Python application requested
the negative byte count be flushed for a decompression stream, it could
cause the application to crash or, potentially, execute arbitrary code
with the Python interpreter's privileges. (CVE-2008-1721)
A flaw was discovered in the strxfrm() function of the Python locale
module. Strings generated by this function were not properly
NULL-terminated, which could possibly cause disclosure of data stored in
the memory of a Python application using this function. (CVE-2007-2052)
Red Hat would like to thank David Remahl of the Apple Product Security team
for responsibly reporting the CVE-2008-2315 issue.
All Python users should upgrade to these updated packages, which contain
backported patches to correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Updated python packages that fix multiple security issues are now available\nfor Red Hat Enterprise Linux 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", title: "Topic", }, { category: "general", text: "Python is an interpreted, interactive, object-oriented programming\nlanguage.\n\nWhen the assert() system call was disabled, an input sanitization flaw was\nrevealed in the Python string object implementation that led to a buffer\noverflow. The missing check for negative size values meant the Python\nmemory allocator could allocate less memory than expected. This could\nresult in arbitrary code execution with the Python interpreter's\nprivileges. (CVE-2008-1887)\n\nMultiple buffer and integer overflow flaws were found in the Python Unicode\nstring processing and in the Python Unicode and string object\nimplementations. An attacker could use these flaws to cause a denial of\nservice (Python application crash). (CVE-2008-3142, CVE-2008-5031)\n\nMultiple integer overflow flaws were found in the Python imageop module. If\na Python application used the imageop module to process untrusted images,\nit could cause the application to disclose sensitive information, crash or,\npotentially, execute arbitrary code with the Python interpreter's\nprivileges. (CVE-2007-4965, CVE-2008-4864)\n\nMultiple integer underflow and overflow flaws were found in the Python\nsnprintf() wrapper implementation. An attacker could use these flaws to\ncause a denial of service (memory corruption). (CVE-2008-3144)\n\nMultiple integer overflow flaws were found in various Python modules. An\nattacker could use these flaws to cause a denial of service (Python\napplication crash). (CVE-2008-2315, CVE-2008-3143)\n\nAn integer signedness error, leading to a buffer overflow, was found\nin the Python zlib extension module. If a Python application requested\nthe negative byte count be flushed for a decompression stream, it could\ncause the application to crash or, potentially, execute arbitrary code\nwith the Python interpreter's privileges. (CVE-2008-1721)\n\nA flaw was discovered in the strxfrm() function of the Python locale\nmodule. Strings generated by this function were not properly\nNULL-terminated, which could possibly cause disclosure of data stored in\nthe memory of a Python application using this function. (CVE-2007-2052)\n\nRed Hat would like to thank David Remahl of the Apple Product Security team\nfor responsibly reporting the CVE-2008-2315 issue.\n\nAll Python users should upgrade to these updated packages, which contain\nbackported patches to correct these issues.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2009:1176", url: "https://access.redhat.com/errata/RHSA-2009:1176", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "235093", url: "https://bugzilla.redhat.com/show_bug.cgi?id=235093", }, { category: "external", summary: "295971", url: "https://bugzilla.redhat.com/show_bug.cgi?id=295971", }, { category: "external", summary: "442005", url: "https://bugzilla.redhat.com/show_bug.cgi?id=442005", }, { category: "external", summary: "443810", url: "https://bugzilla.redhat.com/show_bug.cgi?id=443810", }, { category: "external", summary: "454990", url: "https://bugzilla.redhat.com/show_bug.cgi?id=454990", }, { category: "external", summary: "455008", url: "https://bugzilla.redhat.com/show_bug.cgi?id=455008", }, { category: "external", summary: "455013", url: "https://bugzilla.redhat.com/show_bug.cgi?id=455013", }, { category: "external", summary: "455018", url: "https://bugzilla.redhat.com/show_bug.cgi?id=455018", }, { category: "external", summary: "469656", url: "https://bugzilla.redhat.com/show_bug.cgi?id=469656", }, { category: "external", summary: "470915", url: "https://bugzilla.redhat.com/show_bug.cgi?id=470915", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1176.json", }, ], title: "Red Hat Security Advisory: python security update", tracking: { current_release_date: "2024-11-22T02:31:38+00:00", generator: { date: "2024-11-22T02:31:38+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2009:1176", initial_release_date: "2009-07-27T09:22:00+00:00", revision_history: [ { date: "2009-07-27T09:22:00+00:00", number: "1", summary: "Initial version", }, { date: "2009-07-27T05:22:50+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T02:31:38+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux Desktop (v. 5 client)", product: { name: "Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:5::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product: { name: "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:5::client_workstation", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux (v. 5 server)", product: { name: "Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:5::server", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", product: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", product_id: "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.4.3-24.el5_3.6?arch=x86_64", }, }, }, { category: "product_version", name: "python-devel-0:2.4.3-24.el5_3.6.x86_64", product: { name: "python-devel-0:2.4.3-24.el5_3.6.x86_64", product_id: "python-devel-0:2.4.3-24.el5_3.6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.4.3-24.el5_3.6?arch=x86_64", }, }, }, { category: "product_version", name: "tkinter-0:2.4.3-24.el5_3.6.x86_64", product: { name: "tkinter-0:2.4.3-24.el5_3.6.x86_64", product_id: "tkinter-0:2.4.3-24.el5_3.6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.4.3-24.el5_3.6?arch=x86_64", }, }, }, { category: "product_version", name: "python-0:2.4.3-24.el5_3.6.x86_64", product: { name: "python-0:2.4.3-24.el5_3.6.x86_64", product_id: "python-0:2.4.3-24.el5_3.6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.4.3-24.el5_3.6?arch=x86_64", }, }, }, { category: "product_version", name: "python-tools-0:2.4.3-24.el5_3.6.x86_64", product: { name: "python-tools-0:2.4.3-24.el5_3.6.x86_64", product_id: "python-tools-0:2.4.3-24.el5_3.6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.4.3-24.el5_3.6?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "python-debuginfo-0:2.4.3-24.el5_3.6.i386", product: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.i386", product_id: "python-debuginfo-0:2.4.3-24.el5_3.6.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.4.3-24.el5_3.6?arch=i386", }, }, }, { category: "product_version", name: "python-devel-0:2.4.3-24.el5_3.6.i386", product: { name: "python-devel-0:2.4.3-24.el5_3.6.i386", product_id: "python-devel-0:2.4.3-24.el5_3.6.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.4.3-24.el5_3.6?arch=i386", }, }, }, { category: "product_version", name: "tkinter-0:2.4.3-24.el5_3.6.i386", product: { name: "tkinter-0:2.4.3-24.el5_3.6.i386", product_id: "tkinter-0:2.4.3-24.el5_3.6.i386", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.4.3-24.el5_3.6?arch=i386", }, }, }, { category: "product_version", name: "python-0:2.4.3-24.el5_3.6.i386", product: { name: "python-0:2.4.3-24.el5_3.6.i386", product_id: "python-0:2.4.3-24.el5_3.6.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.4.3-24.el5_3.6?arch=i386", }, }, }, { category: "product_version", name: "python-tools-0:2.4.3-24.el5_3.6.i386", product: { name: "python-tools-0:2.4.3-24.el5_3.6.i386", product_id: "python-tools-0:2.4.3-24.el5_3.6.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.4.3-24.el5_3.6?arch=i386", }, }, }, ], category: "architecture", name: "i386", }, { branches: [ { category: "product_version", name: "python-0:2.4.3-24.el5_3.6.src", product: { name: "python-0:2.4.3-24.el5_3.6.src", product_id: "python-0:2.4.3-24.el5_3.6.src", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.4.3-24.el5_3.6?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "python-debuginfo-0:2.4.3-24.el5_3.6.ia64", product: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.ia64", product_id: "python-debuginfo-0:2.4.3-24.el5_3.6.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.4.3-24.el5_3.6?arch=ia64", }, }, }, { category: "product_version", name: "tkinter-0:2.4.3-24.el5_3.6.ia64", product: { name: "tkinter-0:2.4.3-24.el5_3.6.ia64", product_id: "tkinter-0:2.4.3-24.el5_3.6.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.4.3-24.el5_3.6?arch=ia64", }, }, }, { category: "product_version", name: "python-0:2.4.3-24.el5_3.6.ia64", product: { name: "python-0:2.4.3-24.el5_3.6.ia64", product_id: "python-0:2.4.3-24.el5_3.6.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.4.3-24.el5_3.6?arch=ia64", }, }, }, { category: "product_version", name: "python-devel-0:2.4.3-24.el5_3.6.ia64", product: { name: "python-devel-0:2.4.3-24.el5_3.6.ia64", product_id: "python-devel-0:2.4.3-24.el5_3.6.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.4.3-24.el5_3.6?arch=ia64", }, }, }, { category: "product_version", name: "python-tools-0:2.4.3-24.el5_3.6.ia64", product: { name: "python-tools-0:2.4.3-24.el5_3.6.ia64", product_id: "python-tools-0:2.4.3-24.el5_3.6.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.4.3-24.el5_3.6?arch=ia64", }, }, }, ], category: "architecture", name: "ia64", }, { branches: [ { category: "product_version", name: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", product: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", product_id: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.4.3-24.el5_3.6?arch=ppc64", }, }, }, { category: "product_version", name: "python-devel-0:2.4.3-24.el5_3.6.ppc64", product: { name: "python-devel-0:2.4.3-24.el5_3.6.ppc64", product_id: "python-devel-0:2.4.3-24.el5_3.6.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.4.3-24.el5_3.6?arch=ppc64", }, }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc", product: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc", product_id: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.4.3-24.el5_3.6?arch=ppc", }, }, }, { category: "product_version", name: "tkinter-0:2.4.3-24.el5_3.6.ppc", product: { name: "tkinter-0:2.4.3-24.el5_3.6.ppc", product_id: "tkinter-0:2.4.3-24.el5_3.6.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.4.3-24.el5_3.6?arch=ppc", }, }, }, { category: "product_version", name: "python-0:2.4.3-24.el5_3.6.ppc", product: { name: "python-0:2.4.3-24.el5_3.6.ppc", product_id: "python-0:2.4.3-24.el5_3.6.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.4.3-24.el5_3.6?arch=ppc", }, }, }, { category: "product_version", name: "python-devel-0:2.4.3-24.el5_3.6.ppc", product: { name: "python-devel-0:2.4.3-24.el5_3.6.ppc", product_id: "python-devel-0:2.4.3-24.el5_3.6.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.4.3-24.el5_3.6?arch=ppc", }, }, }, { category: "product_version", name: "python-tools-0:2.4.3-24.el5_3.6.ppc", product: { name: "python-tools-0:2.4.3-24.el5_3.6.ppc", product_id: "python-tools-0:2.4.3-24.el5_3.6.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.4.3-24.el5_3.6?arch=ppc", }, }, }, ], category: "architecture", name: "ppc", }, { branches: [ { category: "product_version", name: "python-debuginfo-0:2.4.3-24.el5_3.6.s390x", product: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.s390x", product_id: "python-debuginfo-0:2.4.3-24.el5_3.6.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.4.3-24.el5_3.6?arch=s390x", }, }, }, { category: "product_version", name: "tkinter-0:2.4.3-24.el5_3.6.s390x", product: { name: "tkinter-0:2.4.3-24.el5_3.6.s390x", product_id: "tkinter-0:2.4.3-24.el5_3.6.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.4.3-24.el5_3.6?arch=s390x", }, }, }, { category: "product_version", name: "python-0:2.4.3-24.el5_3.6.s390x", product: { name: "python-0:2.4.3-24.el5_3.6.s390x", product_id: "python-0:2.4.3-24.el5_3.6.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.4.3-24.el5_3.6?arch=s390x", }, }, }, { category: "product_version", name: "python-devel-0:2.4.3-24.el5_3.6.s390x", product: { name: "python-devel-0:2.4.3-24.el5_3.6.s390x", product_id: "python-devel-0:2.4.3-24.el5_3.6.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.4.3-24.el5_3.6?arch=s390x", }, }, }, { category: "product_version", name: "python-tools-0:2.4.3-24.el5_3.6.s390x", product: { name: "python-tools-0:2.4.3-24.el5_3.6.s390x", product_id: "python-tools-0:2.4.3-24.el5_3.6.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.4.3-24.el5_3.6?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "python-debuginfo-0:2.4.3-24.el5_3.6.s390", product: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.s390", product_id: "python-debuginfo-0:2.4.3-24.el5_3.6.s390", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.4.3-24.el5_3.6?arch=s390", }, }, }, { category: "product_version", name: "python-devel-0:2.4.3-24.el5_3.6.s390", product: { name: "python-devel-0:2.4.3-24.el5_3.6.s390", product_id: "python-devel-0:2.4.3-24.el5_3.6.s390", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.4.3-24.el5_3.6?arch=s390", }, }, }, ], category: "architecture", name: "s390", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", }, product_reference: "python-0:2.4.3-24.el5_3.6.i386", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", }, product_reference: "python-0:2.4.3-24.el5_3.6.ia64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", }, product_reference: "python-0:2.4.3-24.el5_3.6.ppc", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", }, product_reference: "python-0:2.4.3-24.el5_3.6.s390x", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", }, product_reference: "python-0:2.4.3-24.el5_3.6.src", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", }, product_reference: "python-0:2.4.3-24.el5_3.6.x86_64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.i386", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.ia64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.s390", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.s390x", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.i386", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.ia64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.ppc", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.ppc64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.s390", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.s390x", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.x86_64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", }, product_reference: "python-tools-0:2.4.3-24.el5_3.6.i386", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", }, product_reference: "python-tools-0:2.4.3-24.el5_3.6.ia64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", }, product_reference: "python-tools-0:2.4.3-24.el5_3.6.ppc", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", }, product_reference: "python-tools-0:2.4.3-24.el5_3.6.s390x", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", }, product_reference: "python-tools-0:2.4.3-24.el5_3.6.x86_64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", }, product_reference: "tkinter-0:2.4.3-24.el5_3.6.i386", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", }, product_reference: "tkinter-0:2.4.3-24.el5_3.6.ia64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", }, product_reference: "tkinter-0:2.4.3-24.el5_3.6.ppc", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", }, product_reference: "tkinter-0:2.4.3-24.el5_3.6.s390x", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", }, product_reference: "tkinter-0:2.4.3-24.el5_3.6.x86_64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-0:2.4.3-24.el5_3.6.i386", }, product_reference: "python-0:2.4.3-24.el5_3.6.i386", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-0:2.4.3-24.el5_3.6.ia64", }, product_reference: "python-0:2.4.3-24.el5_3.6.ia64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-0:2.4.3-24.el5_3.6.ppc", }, product_reference: "python-0:2.4.3-24.el5_3.6.ppc", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-0:2.4.3-24.el5_3.6.s390x", }, product_reference: "python-0:2.4.3-24.el5_3.6.s390x", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-0:2.4.3-24.el5_3.6.src", }, product_reference: "python-0:2.4.3-24.el5_3.6.src", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-0:2.4.3-24.el5_3.6.x86_64", }, product_reference: "python-0:2.4.3-24.el5_3.6.x86_64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.i386", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.ia64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.s390", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.s390x", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.i386", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.ia64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.ppc", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.ppc64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.s390", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.s390x", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.x86_64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", }, product_reference: "python-tools-0:2.4.3-24.el5_3.6.i386", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", }, product_reference: "python-tools-0:2.4.3-24.el5_3.6.ia64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", }, product_reference: "python-tools-0:2.4.3-24.el5_3.6.ppc", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", }, product_reference: "python-tools-0:2.4.3-24.el5_3.6.s390x", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", }, product_reference: "python-tools-0:2.4.3-24.el5_3.6.x86_64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", }, product_reference: "tkinter-0:2.4.3-24.el5_3.6.i386", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", }, product_reference: "tkinter-0:2.4.3-24.el5_3.6.ia64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", }, product_reference: "tkinter-0:2.4.3-24.el5_3.6.ppc", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", }, product_reference: "tkinter-0:2.4.3-24.el5_3.6.s390x", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", }, product_reference: "tkinter-0:2.4.3-24.el5_3.6.x86_64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-0:2.4.3-24.el5_3.6.i386", }, product_reference: "python-0:2.4.3-24.el5_3.6.i386", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-0:2.4.3-24.el5_3.6.ia64", }, product_reference: "python-0:2.4.3-24.el5_3.6.ia64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-0:2.4.3-24.el5_3.6.ppc", }, product_reference: "python-0:2.4.3-24.el5_3.6.ppc", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-0:2.4.3-24.el5_3.6.s390x", }, product_reference: "python-0:2.4.3-24.el5_3.6.s390x", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.src as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-0:2.4.3-24.el5_3.6.src", }, product_reference: "python-0:2.4.3-24.el5_3.6.src", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-0:2.4.3-24.el5_3.6.x86_64", }, product_reference: "python-0:2.4.3-24.el5_3.6.x86_64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.i386", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.ia64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.s390", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.s390x", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.i386", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.ia64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.ppc", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.ppc64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.s390", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.s390x", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.x86_64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", }, product_reference: "python-tools-0:2.4.3-24.el5_3.6.i386", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", }, product_reference: "python-tools-0:2.4.3-24.el5_3.6.ia64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", }, product_reference: "python-tools-0:2.4.3-24.el5_3.6.ppc", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", }, product_reference: "python-tools-0:2.4.3-24.el5_3.6.s390x", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", }, product_reference: "python-tools-0:2.4.3-24.el5_3.6.x86_64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", }, product_reference: "tkinter-0:2.4.3-24.el5_3.6.i386", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", }, product_reference: "tkinter-0:2.4.3-24.el5_3.6.ia64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", }, product_reference: "tkinter-0:2.4.3-24.el5_3.6.ppc", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", }, product_reference: "tkinter-0:2.4.3-24.el5_3.6.s390x", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", }, product_reference: "tkinter-0:2.4.3-24.el5_3.6.x86_64", relates_to_product_reference: "5Server", }, ], }, vulnerabilities: [ { cve: "CVE-2007-2052", cwe: { id: "CWE-193", name: "Off-by-one Error", }, discovery_date: "2007-04-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "235093", }, ], notes: [ { category: "description", text: "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", title: "Vulnerability description", }, { category: "summary", text: "python off-by-one locale.strxfrm() (possible memory disclosure)", title: "Vulnerability summary", }, { category: "other", text: "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/", title: "Statement", }, ], product_status: { fixed: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2007-2052", }, { category: "external", summary: "RHBZ#235093", url: "https://bugzilla.redhat.com/show_bug.cgi?id=235093", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2007-2052", url: "https://www.cve.org/CVERecord?id=CVE-2007-2052", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", url: "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", }, ], release_date: "2007-04-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2009-07-27T09:22:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", product_ids: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2009:1176", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python off-by-one locale.strxfrm() (possible memory disclosure)", }, { cve: "CVE-2007-4965", discovery_date: "2007-09-18T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "295971", }, ], notes: [ { category: "description", text: "Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.", title: "Vulnerability description", }, { category: "summary", text: "python imageop module heap corruption", title: "Vulnerability summary", }, { category: "other", text: "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=295971\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/", title: "Statement", }, ], product_status: { fixed: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2007-4965", }, { category: "external", summary: "RHBZ#295971", url: "https://bugzilla.redhat.com/show_bug.cgi?id=295971", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2007-4965", url: "https://www.cve.org/CVERecord?id=CVE-2007-4965", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", url: "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", }, ], release_date: "2007-09-16T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2009-07-27T09:22:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", product_ids: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2009:1176", }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "python imageop module heap corruption", }, { cve: "CVE-2008-1721", discovery_date: "2008-04-09T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "442005", }, ], notes: [ { category: "description", text: "Integer signedness error in the zlib extension module in Python 2.5.2 and earlier allows remote attackers to execute arbitrary code via a negative signed integer, which triggers insufficient memory allocation and a buffer overflow.", title: "Vulnerability description", }, { category: "summary", text: "python: integer signedness error in the zlib extension module", title: "Vulnerability summary", }, { category: "other", text: "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=442005\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/", title: "Statement", }, ], product_status: { fixed: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2008-1721", }, { category: "external", summary: "RHBZ#442005", url: "https://bugzilla.redhat.com/show_bug.cgi?id=442005", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2008-1721", url: "https://www.cve.org/CVERecord?id=CVE-2008-1721", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2008-1721", url: "https://nvd.nist.gov/vuln/detail/CVE-2008-1721", }, ], release_date: "2008-04-09T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2009-07-27T09:22:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", product_ids: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2009:1176", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python: integer signedness error in the zlib extension module", }, { cve: "CVE-2008-1887", discovery_date: "2008-04-18T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "443810", }, ], notes: [ { category: "description", text: "Python 2.5.2 and earlier allows context-dependent attackers to execute arbitrary code via multiple vectors that cause a negative size value to be provided to the PyString_FromStringAndSize function, which allocates less memory than expected when assert() is disabled and triggers a buffer overflow.", title: "Vulnerability description", }, { category: "summary", text: "python: PyString_FromStringAndSize does not check for negative size values", title: "Vulnerability summary", }, ], product_status: { fixed: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2008-1887", }, { category: "external", summary: "RHBZ#443810", url: "https://bugzilla.redhat.com/show_bug.cgi?id=443810", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2008-1887", url: "https://www.cve.org/CVERecord?id=CVE-2008-1887", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2008-1887", url: "https://nvd.nist.gov/vuln/detail/CVE-2008-1887", }, ], release_date: "2008-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2009-07-27T09:22:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", product_ids: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2009:1176", }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "python: PyString_FromStringAndSize does not check for negative size values", }, { acknowledgments: [ { names: [ "David Remahl", ], organization: "Apple Product Security team", }, ], cve: "CVE-2008-2315", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2008-07-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "455008", }, ], notes: [ { category: "description", text: "Multiple integer overflows in Python 2.5.2 and earlier allow context-dependent attackers to have an unknown impact via vectors related to the (1) stringobject, (2) unicodeobject, (3) bufferobject, (4) longobject, (5) tupleobject, (6) stropmodule, (7) gcmodule, and (8) mmapmodule modules. NOTE: The expandtabs integer overflows in stringobject and unicodeobject in 2.5.2 are covered by CVE-2008-5031.", title: "Vulnerability description", }, { category: "summary", text: "python: Multiple integer overflows in python core", title: "Vulnerability summary", }, ], product_status: { fixed: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2008-2315", }, { category: "external", summary: "RHBZ#455008", url: "https://bugzilla.redhat.com/show_bug.cgi?id=455008", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2008-2315", url: "https://www.cve.org/CVERecord?id=CVE-2008-2315", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2008-2315", url: "https://nvd.nist.gov/vuln/detail/CVE-2008-2315", }, ], release_date: "2008-07-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2009-07-27T09:22:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", product_ids: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2009:1176", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python: Multiple integer overflows in python core", }, { cve: "CVE-2008-3142", discovery_date: "2008-07-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "454990", }, ], notes: [ { category: "description", text: "Multiple buffer overflows in Python 2.5.2 and earlier on 32bit platforms allow context-dependent attackers to cause a denial of service (crash) or have unspecified other impact via a long string that leads to incorrect memory allocation during Unicode string processing, related to the unicode_resize function and the PyMem_RESIZE macro.", title: "Vulnerability description", }, { category: "summary", text: "python: Multiple buffer overflows in unicode processing", title: "Vulnerability summary", }, ], product_status: { fixed: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2008-3142", }, { category: "external", summary: "RHBZ#454990", url: "https://bugzilla.redhat.com/show_bug.cgi?id=454990", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2008-3142", url: "https://www.cve.org/CVERecord?id=CVE-2008-3142", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2008-3142", url: "https://nvd.nist.gov/vuln/detail/CVE-2008-3142", }, ], release_date: "2008-04-11T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2009-07-27T09:22:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", product_ids: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2009:1176", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python: Multiple buffer overflows in unicode processing", }, { cve: "CVE-2008-3143", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2008-07-03T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "455013", }, ], notes: [ { category: "description", text: "Multiple integer overflows in Python before 2.5.2 might allow context-dependent attackers to have an unknown impact via vectors related to (1) Include/pymem.h; (2) _csv.c, (3) _struct.c, (4) arraymodule.c, (5) audioop.c, (6) binascii.c, (7) cPickle.c, (8) cStringIO.c, (9) cjkcodecs/multibytecodec.c, (10) datetimemodule.c, (11) md5.c, (12) rgbimgmodule.c, and (13) stropmodule.c in Modules/; (14) bufferobject.c, (15) listobject.c, and (16) obmalloc.c in Objects/; (17) Parser/node.c; and (18) asdl.c, (19) ast.c, (20) bltinmodule.c, and (21) compile.c in Python/, as addressed by \"checks for integer overflows, contributed by Google.\"", title: "Vulnerability description", }, { category: "summary", text: "python: Multiple integer overflows discovered by Google", title: "Vulnerability summary", }, ], product_status: { fixed: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2008-3143", }, { category: "external", summary: "RHBZ#455013", url: "https://bugzilla.redhat.com/show_bug.cgi?id=455013", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2008-3143", url: "https://www.cve.org/CVERecord?id=CVE-2008-3143", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2008-3143", url: "https://nvd.nist.gov/vuln/detail/CVE-2008-3143", }, ], release_date: "2008-02-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2009-07-27T09:22:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", product_ids: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2009:1176", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python: Multiple integer overflows discovered by Google", }, { cve: "CVE-2008-3144", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2008-07-03T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "455018", }, ], notes: [ { category: "description", text: "Multiple integer overflows in the PyOS_vsnprintf function in Python/mysnprintf.c in Python 2.5.2 and earlier allow context-dependent attackers to cause a denial of service (memory corruption) or have unspecified other impact via crafted input to string formatting operations. NOTE: the handling of certain integer values is also affected by related integer underflows and an off-by-one error.", title: "Vulnerability description", }, { category: "summary", text: "python: Potential integer underflow and overflow in the PyOS_vsnprintf C API function", title: "Vulnerability summary", }, ], product_status: { fixed: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2008-3144", }, { category: "external", summary: "RHBZ#455018", url: "https://bugzilla.redhat.com/show_bug.cgi?id=455018", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2008-3144", url: "https://www.cve.org/CVERecord?id=CVE-2008-3144", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2008-3144", url: "https://nvd.nist.gov/vuln/detail/CVE-2008-3144", }, ], release_date: "2008-06-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2009-07-27T09:22:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", product_ids: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2009:1176", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python: Potential integer underflow and overflow in the PyOS_vsnprintf C API function", }, { cve: "CVE-2008-4864", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2008-10-19T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "469656", }, ], notes: [ { category: "description", text: "Multiple integer overflows in imageop.c in the imageop module in Python 1.5.2 through 2.5.1 allow context-dependent attackers to break out of the Python VM and execute arbitrary code via large integer values in certain arguments to the crop function, leading to a buffer overflow, a different vulnerability than CVE-2007-4965 and CVE-2008-1679.", title: "Vulnerability description", }, { category: "summary", text: "python: imageop module multiple integer overflows", title: "Vulnerability summary", }, ], product_status: { fixed: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2008-4864", }, { category: "external", summary: "RHBZ#469656", url: "https://bugzilla.redhat.com/show_bug.cgi?id=469656", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2008-4864", url: "https://www.cve.org/CVERecord?id=CVE-2008-4864", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2008-4864", url: "https://nvd.nist.gov/vuln/detail/CVE-2008-4864", }, ], release_date: "2008-10-19T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2009-07-27T09:22:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", product_ids: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2009:1176", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python: imageop module multiple integer overflows", }, { cve: "CVE-2008-5031", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2008-10-19T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "470915", }, ], notes: [ { category: "description", text: "Multiple integer overflows in Python 2.2.3 through 2.5.1, and 2.6, allow context-dependent attackers to have an unknown impact via a large integer value in the tabsize argument to the expandtabs method, as implemented by (1) the string_expandtabs function in Objects/stringobject.c and (2) the unicode_expandtabs function in Objects/unicodeobject.c. NOTE: this vulnerability reportedly exists because of an incomplete fix for CVE-2008-2315.", title: "Vulnerability description", }, { category: "summary", text: "python: stringobject, unicodeobject integer overflows", title: "Vulnerability summary", }, ], product_status: { fixed: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2008-5031", }, { category: "external", summary: "RHBZ#470915", url: "https://bugzilla.redhat.com/show_bug.cgi?id=470915", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2008-5031", url: "https://www.cve.org/CVERecord?id=CVE-2008-5031", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2008-5031", url: "https://nvd.nist.gov/vuln/detail/CVE-2008-5031", }, ], release_date: "2008-10-19T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2009-07-27T09:22:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", product_ids: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2009:1176", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python: stringobject, unicodeobject integer overflows", }, ], }
rhsa-2008_0629
Vulnerability from csaf_redhat
Published
2008-08-13 14:16
Modified
2024-11-22 01:58
Summary
Red Hat Security Advisory: Red Hat Network Satellite Server Solaris client security update
Notes
Topic
Red Hat Network Satellite Server version 5.1.1 is now available. This
update includes fixes for a number of security issues in Red Hat Network
Satellite Server Solaris client components.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
This release corrects several security vulnerabilities in components
shipped as part of the Red Hat Network Satellite Server Solaris client. In
a typical operating environment, these components are not used by the
Satellite Server in a vulnerable manner. These security updates will reduce
risk should these components be used by other applications.
Several flaws in Zlib were discovered. An attacker could create a
carefully-crafted compressed stream that would cause an application to
crash if the stream was opened by a user. (CVE-2005-2096, CVE-2005-1849)
A buffer overflow was discovered in the OpenSSL SSL_get_shared_ciphers()
utility function. An attacker could send a list of ciphers to an
application that used this function and overrun a buffer (CVE-2006-3738).
A flaw in the SSLv2 client code was discovered. If a client application
used OpenSSL to create an SSLv2 connection to a malicious server, that
server could cause the client to crash. (CVE-2006-4343)
An attack on OpenSSL PKCS #1 v1.5 signatures was discovered. Where an RSA
key with exponent 3 was used an attacker could, potentially, forge a PKCS
#1 v1.5 signature that would be incorrectly verified by implementations
that do not check for excess data in the RSA exponentiation result of the
signature. This issue affected applications that use OpenSSL to verify
X.509 certificates as well as other uses of PKCS #1 v1.5. (CVE-2006-4339)
OpenSSL contained a software work-around for a bug in SSL handling in
Microsoft Internet Explorer version 3.0.2. It is enabled in most servers
that use OpenSSL to provide support for SSL and TLS. This work-around was
vulnerable to a man-in-the-middle attack which allowed a remote user to
force an SSL connection to use SSL 2.0, rather than a stronger protocol,
such as SSL 3.0 or TLS 1.0. (CVE-2005-2969)
During OpenSSL parsing of certain invalid ASN.1 structures, an error
condition was mishandled. This could result in an infinite loop which
consumed system memory (CVE-2006-2937).
Certain public key types could take disproportionate amounts of time to
process in OpenSSL, leading to a denial of service. (CVE-2006-2940)
A flaw was discovered in the Python repr() function's handling of
UTF-32/UCS-4 strings. If an application used the repr() function on
untrusted data, this could lead to a denial of service or, possibly, allow
the execution of arbitrary code with the privileges of the application
using the flawed function. (CVE-2006-4980)
A flaw was discovered in the strxfrm() function of Python's locale module.
Strings generated by this function were not properly NULL-terminated. This
could, potentially, cause disclosure of data stored in the memory of an
application using this function. (CVE-2007-2052)
Multiple integer overflow flaws were discovered in Python's imageop module.
If an application used the imageop module to process untrusted images, it
could cause the application to crash, enter an infinite loop, or, possibly,
execute arbitrary code with the privileges of the Python interpreter.
(CVE-2007-4965)
A stack-based buffer overflow was discovered in the Python interpreter,
which could allow a local user to gain privileges by running a script with
a long name from the current working directory. (CVE-2006-1542)
Users of Red Hat Network Satellite Server should upgrade to these updated
packages, which contain backported patches to correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Red Hat Network Satellite Server version 5.1.1 is now available. This\nupdate includes fixes for a number of security issues in Red Hat Network\nSatellite Server Solaris client components.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", title: "Topic", }, { category: "general", text: "This release corrects several security vulnerabilities in components\nshipped as part of the Red Hat Network Satellite Server Solaris client. In\na typical operating environment, these components are not used by the\nSatellite Server in a vulnerable manner. These security updates will reduce\nrisk should these components be used by other applications.\n\nSeveral flaws in Zlib were discovered. An attacker could create a\ncarefully-crafted compressed stream that would cause an application to\ncrash if the stream was opened by a user. (CVE-2005-2096, CVE-2005-1849)\n\nA buffer overflow was discovered in the OpenSSL SSL_get_shared_ciphers()\nutility function. An attacker could send a list of ciphers to an\napplication that used this function and overrun a buffer (CVE-2006-3738).\n\nA flaw in the SSLv2 client code was discovered. If a client application\nused OpenSSL to create an SSLv2 connection to a malicious server, that\nserver could cause the client to crash. (CVE-2006-4343)\n\nAn attack on OpenSSL PKCS #1 v1.5 signatures was discovered. Where an RSA\nkey with exponent 3 was used an attacker could, potentially, forge a PKCS\n#1 v1.5 signature that would be incorrectly verified by implementations\nthat do not check for excess data in the RSA exponentiation result of the\nsignature. This issue affected applications that use OpenSSL to verify\nX.509 certificates as well as other uses of PKCS #1 v1.5. (CVE-2006-4339)\n\nOpenSSL contained a software work-around for a bug in SSL handling in\nMicrosoft Internet Explorer version 3.0.2. It is enabled in most servers\nthat use OpenSSL to provide support for SSL and TLS. This work-around was\nvulnerable to a man-in-the-middle attack which allowed a remote user to\nforce an SSL connection to use SSL 2.0, rather than a stronger protocol,\nsuch as SSL 3.0 or TLS 1.0. (CVE-2005-2969)\n\nDuring OpenSSL parsing of certain invalid ASN.1 structures, an error\ncondition was mishandled. This could result in an infinite loop which\nconsumed system memory (CVE-2006-2937).\n\nCertain public key types could take disproportionate amounts of time to\nprocess in OpenSSL, leading to a denial of service. (CVE-2006-2940)\n\nA flaw was discovered in the Python repr() function's handling of\nUTF-32/UCS-4 strings. If an application used the repr() function on\nuntrusted data, this could lead to a denial of service or, possibly, allow\nthe execution of arbitrary code with the privileges of the application\nusing the flawed function. (CVE-2006-4980)\n\nA flaw was discovered in the strxfrm() function of Python's locale module.\nStrings generated by this function were not properly NULL-terminated. This\ncould, potentially, cause disclosure of data stored in the memory of an\napplication using this function. (CVE-2007-2052)\n\nMultiple integer overflow flaws were discovered in Python's imageop module.\nIf an application used the imageop module to process untrusted images, it\ncould cause the application to crash, enter an infinite loop, or, possibly,\nexecute arbitrary code with the privileges of the Python interpreter.\n(CVE-2007-4965)\n\nA stack-based buffer overflow was discovered in the Python interpreter,\nwhich could allow a local user to gain privileges by running a script with\na long name from the current working directory. (CVE-2006-1542)\n\nUsers of Red Hat Network Satellite Server should upgrade to these updated\npackages, which contain backported patches to correct these issues.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2008:0629", url: "https://access.redhat.com/errata/RHSA-2008:0629", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "235093", url: "https://bugzilla.redhat.com/show_bug.cgi?id=235093", }, { category: "external", summary: "295971", url: "https://bugzilla.redhat.com/show_bug.cgi?id=295971", }, { category: "external", summary: "430640", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430640", }, { category: "external", summary: "430641", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430641", }, { category: "external", summary: "430649", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430649", }, { category: "external", summary: "430650", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430650", }, { category: "external", summary: "430651", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430651", }, { category: "external", summary: "430652", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430652", }, { category: "external", summary: "430654", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430654", }, { category: "external", summary: "430655", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430655", }, { category: "external", summary: "430659", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430659", }, { category: "external", summary: "430660", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430660", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0629.json", }, ], title: "Red Hat Security Advisory: Red Hat Network Satellite Server Solaris client security update", tracking: { current_release_date: "2024-11-22T01:58:01+00:00", generator: { date: "2024-11-22T01:58:01+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2008:0629", initial_release_date: "2008-08-13T14:16:00+00:00", revision_history: [ { date: "2008-08-13T14:16:00+00:00", number: "1", summary: "Initial version", }, { date: "2008-08-13T10:16:13+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T01:58:01+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Satellite 5.1 (RHEL v.4 AS)", product: { name: "Red Hat Satellite 5.1 (RHEL v.4 AS)", product_id: "4AS-RHNSAT5.1", product_identification_helper: { cpe: "cpe:/a:redhat:network_satellite:5.1::el4", }, }, }, ], category: "product_family", name: "Red Hat Satellite", }, { branches: [ { category: "product_version", name: "rhn-solaris-bootstrap-0:5.1.1-3.noarch", product: { name: "rhn-solaris-bootstrap-0:5.1.1-3.noarch", product_id: "rhn-solaris-bootstrap-0:5.1.1-3.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/rhn-solaris-bootstrap@5.1.1-3?arch=noarch", }, }, }, { category: "product_version", name: "rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", product: { name: "rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", product_id: "rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/rhn_solaris_bootstrap_5_1_1_3@1-0?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "rhn-solaris-bootstrap-0:5.1.1-3.noarch as a component of Red Hat Satellite 5.1 (RHEL v.4 AS)", product_id: "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", }, product_reference: "rhn-solaris-bootstrap-0:5.1.1-3.noarch", relates_to_product_reference: "4AS-RHNSAT5.1", }, { category: "default_component_of", full_product_name: { name: "rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch as a component of Red Hat Satellite 5.1 (RHEL v.4 AS)", product_id: "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", }, product_reference: "rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", relates_to_product_reference: "4AS-RHNSAT5.1", }, ], }, vulnerabilities: [ { cve: "CVE-2005-1849", discovery_date: "2006-07-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430649", }, ], notes: [ { category: "description", text: "inftrees.h in zlib 1.2.2 allows remote attackers to cause a denial of service (application crash) via an invalid file that causes a large dynamic tree to be produced.", title: "Vulnerability description", }, { category: "summary", text: "zlib DoS", title: "Vulnerability summary", }, ], product_status: { fixed: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2005-1849", }, { category: "external", summary: "RHBZ#430649", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430649", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2005-1849", url: "https://www.cve.org/CVERecord?id=CVE-2005-1849", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2005-1849", url: "https://nvd.nist.gov/vuln/detail/CVE-2005-1849", }, ], release_date: "2005-08-20T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-08-13T14:16:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0629", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "zlib DoS", }, { cve: "CVE-2005-2096", discovery_date: "2006-06-30T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430650", }, ], notes: [ { category: "description", text: "zlib 1.2 and later versions allows remote attackers to cause a denial of service (crash) via a crafted compressed stream with an incomplete code description of a length greater than 1, which leads to a buffer overflow, as demonstrated using a crafted PNG file.", title: "Vulnerability description", }, { category: "summary", text: "zlib DoS", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2005-2096", }, { category: "external", summary: "RHBZ#430650", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430650", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2005-2096", url: "https://www.cve.org/CVERecord?id=CVE-2005-2096", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2005-2096", url: "https://nvd.nist.gov/vuln/detail/CVE-2005-2096", }, ], release_date: "2005-07-06T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-08-13T14:16:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0629", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "zlib DoS", }, { cve: "CVE-2005-2969", discovery_date: "2005-10-04T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430660", }, ], notes: [ { category: "description", text: "The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.", title: "Vulnerability description", }, { category: "summary", text: "openssl mitm downgrade attack", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2005-2969", }, { category: "external", summary: "RHBZ#430660", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430660", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2005-2969", url: "https://www.cve.org/CVERecord?id=CVE-2005-2969", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2005-2969", url: "https://nvd.nist.gov/vuln/detail/CVE-2005-2969", }, ], release_date: "2005-10-11T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-08-13T14:16:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0629", }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "openssl mitm downgrade attack", }, { cve: "CVE-2006-1542", discovery_date: "2006-03-30T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430640", }, ], notes: [ { category: "description", text: "Stack-based buffer overflow in Python 2.4.2 and earlier, running on Linux 2.6.12.5 under gcc 4.0.3 with libc 2.3.5, allows local users to cause a \"stack overflow,\" and possibly gain privileges, by running a script from a current working directory that has a long name, related to the realpath function. NOTE: this might not be a vulnerability. However, the fact that it appears in a programming language interpreter could mean that some applications are affected, although attack scenarios might be limited because the attacker might already need to cross privilege boundaries to cause an exploitable program to be placed in a directory with a long name; or, depending on the method that Python uses to determine the current working directory, setuid applications might be affected.", title: "Vulnerability description", }, { category: "summary", text: "python buffer overflow", title: "Vulnerability summary", }, { category: "other", text: "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/\n\nRed Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-1542", }, { category: "external", summary: "RHBZ#430640", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430640", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-1542", url: "https://www.cve.org/CVERecord?id=CVE-2006-1542", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-1542", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-1542", }, ], release_date: "2005-09-22T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-08-13T14:16:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0629", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python buffer overflow", }, { cve: "CVE-2006-2937", discovery_date: "2006-07-03T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430655", }, ], notes: [ { category: "description", text: "OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition.", title: "Vulnerability description", }, { category: "summary", text: "openssl ASN.1 DoS", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-2937", }, { category: "external", summary: "RHBZ#430655", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430655", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-2937", url: "https://www.cve.org/CVERecord?id=CVE-2006-2937", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-2937", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-2937", }, ], release_date: "2006-09-28T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-08-13T14:16:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0629", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "openssl ASN.1 DoS", }, { cve: "CVE-2006-2940", discovery_date: "2006-07-03T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430654", }, ], notes: [ { category: "description", text: "OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) \"public exponent\" or (2) \"public modulus\" values in X.509 certificates that require extra time to process when using RSA signature verification.", title: "Vulnerability description", }, { category: "summary", text: "openssl public key DoS", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-2940", }, { category: "external", summary: "RHBZ#430654", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430654", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-2940", url: "https://www.cve.org/CVERecord?id=CVE-2006-2940", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-2940", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-2940", }, ], release_date: "2006-09-28T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-08-13T14:16:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0629", }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "openssl public key DoS", }, { cve: "CVE-2006-3738", discovery_date: "2006-08-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430652", }, ], notes: [ { category: "description", text: "Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.", title: "Vulnerability description", }, { category: "summary", text: "openssl get_shared_ciphers overflow", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-3738", }, { category: "external", summary: "RHBZ#430652", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430652", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-3738", url: "https://www.cve.org/CVERecord?id=CVE-2006-3738", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-3738", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-3738", }, ], release_date: "2006-09-28T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-08-13T14:16:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0629", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "openssl get_shared_ciphers overflow", }, { cve: "CVE-2006-4339", discovery_date: "2006-09-05T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430659", }, ], notes: [ { category: "description", text: "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.", title: "Vulnerability description", }, { category: "summary", text: "openssl signature forgery", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-4339", }, { category: "external", summary: "RHBZ#430659", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430659", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-4339", url: "https://www.cve.org/CVERecord?id=CVE-2006-4339", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-4339", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-4339", }, ], release_date: "2006-09-05T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-08-13T14:16:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0629", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "openssl signature forgery", }, { cve: "CVE-2006-4343", discovery_date: "2006-08-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430651", }, ], notes: [ { category: "description", text: "The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.", title: "Vulnerability description", }, { category: "summary", text: "openssl sslv2 client code", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-4343", }, { category: "external", summary: "RHBZ#430651", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430651", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-4343", url: "https://www.cve.org/CVERecord?id=CVE-2006-4343", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-4343", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-4343", }, ], release_date: "2006-09-28T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-08-13T14:16:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0629", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "openssl sslv2 client code", }, { cve: "CVE-2006-4980", discovery_date: "2006-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430641", }, ], notes: [ { category: "description", text: "Buffer overflow in the repr function in Python 2.3 through 2.6 before 20060822 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via crafted wide character UTF-32/UCS-4 strings to certain scripts.", title: "Vulnerability description", }, { category: "summary", text: "python repr unicode buffer overflow", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-4980", }, { category: "external", summary: "RHBZ#430641", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430641", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-4980", url: "https://www.cve.org/CVERecord?id=CVE-2006-4980", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-4980", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-4980", }, ], release_date: "2006-08-16T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-08-13T14:16:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0629", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "python repr unicode buffer overflow", }, { cve: "CVE-2007-2052", cwe: { id: "CWE-193", name: "Off-by-one Error", }, discovery_date: "2007-04-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "235093", }, ], notes: [ { category: "description", text: "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", title: "Vulnerability description", }, { category: "summary", text: "python off-by-one locale.strxfrm() (possible memory disclosure)", title: "Vulnerability summary", }, { category: "other", text: "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2007-2052", }, { category: "external", summary: "RHBZ#235093", url: "https://bugzilla.redhat.com/show_bug.cgi?id=235093", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2007-2052", url: "https://www.cve.org/CVERecord?id=CVE-2007-2052", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", url: "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", }, ], release_date: "2007-04-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-08-13T14:16:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0629", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python off-by-one locale.strxfrm() (possible memory disclosure)", }, { cve: "CVE-2007-4965", discovery_date: "2007-09-18T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "295971", }, ], notes: [ { category: "description", text: "Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.", title: "Vulnerability description", }, { category: "summary", text: "python imageop module heap corruption", title: "Vulnerability summary", }, { category: "other", text: "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=295971\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2007-4965", }, { category: "external", summary: "RHBZ#295971", url: "https://bugzilla.redhat.com/show_bug.cgi?id=295971", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2007-4965", url: "https://www.cve.org/CVERecord?id=CVE-2007-4965", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", url: "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", }, ], release_date: "2007-09-16T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-08-13T14:16:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0629", }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "python imageop module heap corruption", }, ], }
rhsa-2008:0629
Vulnerability from csaf_redhat
Published
2008-08-13 14:16
Modified
2024-11-22 01:58
Summary
Red Hat Security Advisory: Red Hat Network Satellite Server Solaris client security update
Notes
Topic
Red Hat Network Satellite Server version 5.1.1 is now available. This
update includes fixes for a number of security issues in Red Hat Network
Satellite Server Solaris client components.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
This release corrects several security vulnerabilities in components
shipped as part of the Red Hat Network Satellite Server Solaris client. In
a typical operating environment, these components are not used by the
Satellite Server in a vulnerable manner. These security updates will reduce
risk should these components be used by other applications.
Several flaws in Zlib were discovered. An attacker could create a
carefully-crafted compressed stream that would cause an application to
crash if the stream was opened by a user. (CVE-2005-2096, CVE-2005-1849)
A buffer overflow was discovered in the OpenSSL SSL_get_shared_ciphers()
utility function. An attacker could send a list of ciphers to an
application that used this function and overrun a buffer (CVE-2006-3738).
A flaw in the SSLv2 client code was discovered. If a client application
used OpenSSL to create an SSLv2 connection to a malicious server, that
server could cause the client to crash. (CVE-2006-4343)
An attack on OpenSSL PKCS #1 v1.5 signatures was discovered. Where an RSA
key with exponent 3 was used an attacker could, potentially, forge a PKCS
#1 v1.5 signature that would be incorrectly verified by implementations
that do not check for excess data in the RSA exponentiation result of the
signature. This issue affected applications that use OpenSSL to verify
X.509 certificates as well as other uses of PKCS #1 v1.5. (CVE-2006-4339)
OpenSSL contained a software work-around for a bug in SSL handling in
Microsoft Internet Explorer version 3.0.2. It is enabled in most servers
that use OpenSSL to provide support for SSL and TLS. This work-around was
vulnerable to a man-in-the-middle attack which allowed a remote user to
force an SSL connection to use SSL 2.0, rather than a stronger protocol,
such as SSL 3.0 or TLS 1.0. (CVE-2005-2969)
During OpenSSL parsing of certain invalid ASN.1 structures, an error
condition was mishandled. This could result in an infinite loop which
consumed system memory (CVE-2006-2937).
Certain public key types could take disproportionate amounts of time to
process in OpenSSL, leading to a denial of service. (CVE-2006-2940)
A flaw was discovered in the Python repr() function's handling of
UTF-32/UCS-4 strings. If an application used the repr() function on
untrusted data, this could lead to a denial of service or, possibly, allow
the execution of arbitrary code with the privileges of the application
using the flawed function. (CVE-2006-4980)
A flaw was discovered in the strxfrm() function of Python's locale module.
Strings generated by this function were not properly NULL-terminated. This
could, potentially, cause disclosure of data stored in the memory of an
application using this function. (CVE-2007-2052)
Multiple integer overflow flaws were discovered in Python's imageop module.
If an application used the imageop module to process untrusted images, it
could cause the application to crash, enter an infinite loop, or, possibly,
execute arbitrary code with the privileges of the Python interpreter.
(CVE-2007-4965)
A stack-based buffer overflow was discovered in the Python interpreter,
which could allow a local user to gain privileges by running a script with
a long name from the current working directory. (CVE-2006-1542)
Users of Red Hat Network Satellite Server should upgrade to these updated
packages, which contain backported patches to correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Red Hat Network Satellite Server version 5.1.1 is now available. This\nupdate includes fixes for a number of security issues in Red Hat Network\nSatellite Server Solaris client components.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", title: "Topic", }, { category: "general", text: "This release corrects several security vulnerabilities in components\nshipped as part of the Red Hat Network Satellite Server Solaris client. In\na typical operating environment, these components are not used by the\nSatellite Server in a vulnerable manner. These security updates will reduce\nrisk should these components be used by other applications.\n\nSeveral flaws in Zlib were discovered. An attacker could create a\ncarefully-crafted compressed stream that would cause an application to\ncrash if the stream was opened by a user. (CVE-2005-2096, CVE-2005-1849)\n\nA buffer overflow was discovered in the OpenSSL SSL_get_shared_ciphers()\nutility function. An attacker could send a list of ciphers to an\napplication that used this function and overrun a buffer (CVE-2006-3738).\n\nA flaw in the SSLv2 client code was discovered. If a client application\nused OpenSSL to create an SSLv2 connection to a malicious server, that\nserver could cause the client to crash. (CVE-2006-4343)\n\nAn attack on OpenSSL PKCS #1 v1.5 signatures was discovered. Where an RSA\nkey with exponent 3 was used an attacker could, potentially, forge a PKCS\n#1 v1.5 signature that would be incorrectly verified by implementations\nthat do not check for excess data in the RSA exponentiation result of the\nsignature. This issue affected applications that use OpenSSL to verify\nX.509 certificates as well as other uses of PKCS #1 v1.5. (CVE-2006-4339)\n\nOpenSSL contained a software work-around for a bug in SSL handling in\nMicrosoft Internet Explorer version 3.0.2. It is enabled in most servers\nthat use OpenSSL to provide support for SSL and TLS. This work-around was\nvulnerable to a man-in-the-middle attack which allowed a remote user to\nforce an SSL connection to use SSL 2.0, rather than a stronger protocol,\nsuch as SSL 3.0 or TLS 1.0. (CVE-2005-2969)\n\nDuring OpenSSL parsing of certain invalid ASN.1 structures, an error\ncondition was mishandled. This could result in an infinite loop which\nconsumed system memory (CVE-2006-2937).\n\nCertain public key types could take disproportionate amounts of time to\nprocess in OpenSSL, leading to a denial of service. (CVE-2006-2940)\n\nA flaw was discovered in the Python repr() function's handling of\nUTF-32/UCS-4 strings. If an application used the repr() function on\nuntrusted data, this could lead to a denial of service or, possibly, allow\nthe execution of arbitrary code with the privileges of the application\nusing the flawed function. (CVE-2006-4980)\n\nA flaw was discovered in the strxfrm() function of Python's locale module.\nStrings generated by this function were not properly NULL-terminated. This\ncould, potentially, cause disclosure of data stored in the memory of an\napplication using this function. (CVE-2007-2052)\n\nMultiple integer overflow flaws were discovered in Python's imageop module.\nIf an application used the imageop module to process untrusted images, it\ncould cause the application to crash, enter an infinite loop, or, possibly,\nexecute arbitrary code with the privileges of the Python interpreter.\n(CVE-2007-4965)\n\nA stack-based buffer overflow was discovered in the Python interpreter,\nwhich could allow a local user to gain privileges by running a script with\na long name from the current working directory. (CVE-2006-1542)\n\nUsers of Red Hat Network Satellite Server should upgrade to these updated\npackages, which contain backported patches to correct these issues.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2008:0629", url: "https://access.redhat.com/errata/RHSA-2008:0629", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "235093", url: "https://bugzilla.redhat.com/show_bug.cgi?id=235093", }, { category: "external", summary: "295971", url: "https://bugzilla.redhat.com/show_bug.cgi?id=295971", }, { category: "external", summary: "430640", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430640", }, { category: "external", summary: "430641", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430641", }, { category: "external", summary: "430649", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430649", }, { category: "external", summary: "430650", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430650", }, { category: "external", summary: "430651", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430651", }, { category: "external", summary: "430652", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430652", }, { category: "external", summary: "430654", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430654", }, { category: "external", summary: "430655", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430655", }, { category: "external", summary: "430659", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430659", }, { category: "external", summary: "430660", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430660", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0629.json", }, ], title: "Red Hat Security Advisory: Red Hat Network Satellite Server Solaris client security update", tracking: { current_release_date: "2024-11-22T01:58:01+00:00", generator: { date: "2024-11-22T01:58:01+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2008:0629", initial_release_date: "2008-08-13T14:16:00+00:00", revision_history: [ { date: "2008-08-13T14:16:00+00:00", number: "1", summary: "Initial version", }, { date: "2008-08-13T10:16:13+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T01:58:01+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Satellite 5.1 (RHEL v.4 AS)", product: { name: "Red Hat Satellite 5.1 (RHEL v.4 AS)", product_id: "4AS-RHNSAT5.1", product_identification_helper: { cpe: "cpe:/a:redhat:network_satellite:5.1::el4", }, }, }, ], category: "product_family", name: "Red Hat Satellite", }, { branches: [ { category: "product_version", name: "rhn-solaris-bootstrap-0:5.1.1-3.noarch", product: { name: "rhn-solaris-bootstrap-0:5.1.1-3.noarch", product_id: "rhn-solaris-bootstrap-0:5.1.1-3.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/rhn-solaris-bootstrap@5.1.1-3?arch=noarch", }, }, }, { category: "product_version", name: "rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", product: { name: "rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", product_id: "rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/rhn_solaris_bootstrap_5_1_1_3@1-0?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "rhn-solaris-bootstrap-0:5.1.1-3.noarch as a component of Red Hat Satellite 5.1 (RHEL v.4 AS)", product_id: "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", }, product_reference: "rhn-solaris-bootstrap-0:5.1.1-3.noarch", relates_to_product_reference: "4AS-RHNSAT5.1", }, { category: "default_component_of", full_product_name: { name: "rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch as a component of Red Hat Satellite 5.1 (RHEL v.4 AS)", product_id: "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", }, product_reference: "rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", relates_to_product_reference: "4AS-RHNSAT5.1", }, ], }, vulnerabilities: [ { cve: "CVE-2005-1849", discovery_date: "2006-07-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430649", }, ], notes: [ { category: "description", text: "inftrees.h in zlib 1.2.2 allows remote attackers to cause a denial of service (application crash) via an invalid file that causes a large dynamic tree to be produced.", title: "Vulnerability description", }, { category: "summary", text: "zlib DoS", title: "Vulnerability summary", }, ], product_status: { fixed: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2005-1849", }, { category: "external", summary: "RHBZ#430649", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430649", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2005-1849", url: "https://www.cve.org/CVERecord?id=CVE-2005-1849", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2005-1849", url: "https://nvd.nist.gov/vuln/detail/CVE-2005-1849", }, ], release_date: "2005-08-20T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-08-13T14:16:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0629", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "zlib DoS", }, { cve: "CVE-2005-2096", discovery_date: "2006-06-30T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430650", }, ], notes: [ { category: "description", text: "zlib 1.2 and later versions allows remote attackers to cause a denial of service (crash) via a crafted compressed stream with an incomplete code description of a length greater than 1, which leads to a buffer overflow, as demonstrated using a crafted PNG file.", title: "Vulnerability description", }, { category: "summary", text: "zlib DoS", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2005-2096", }, { category: "external", summary: "RHBZ#430650", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430650", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2005-2096", url: "https://www.cve.org/CVERecord?id=CVE-2005-2096", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2005-2096", url: "https://nvd.nist.gov/vuln/detail/CVE-2005-2096", }, ], release_date: "2005-07-06T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-08-13T14:16:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0629", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "zlib DoS", }, { cve: "CVE-2005-2969", discovery_date: "2005-10-04T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430660", }, ], notes: [ { category: "description", text: "The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.", title: "Vulnerability description", }, { category: "summary", text: "openssl mitm downgrade attack", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2005-2969", }, { category: "external", summary: "RHBZ#430660", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430660", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2005-2969", url: "https://www.cve.org/CVERecord?id=CVE-2005-2969", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2005-2969", url: "https://nvd.nist.gov/vuln/detail/CVE-2005-2969", }, ], release_date: "2005-10-11T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-08-13T14:16:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0629", }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "openssl mitm downgrade attack", }, { cve: "CVE-2006-1542", discovery_date: "2006-03-30T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430640", }, ], notes: [ { category: "description", text: "Stack-based buffer overflow in Python 2.4.2 and earlier, running on Linux 2.6.12.5 under gcc 4.0.3 with libc 2.3.5, allows local users to cause a \"stack overflow,\" and possibly gain privileges, by running a script from a current working directory that has a long name, related to the realpath function. NOTE: this might not be a vulnerability. However, the fact that it appears in a programming language interpreter could mean that some applications are affected, although attack scenarios might be limited because the attacker might already need to cross privilege boundaries to cause an exploitable program to be placed in a directory with a long name; or, depending on the method that Python uses to determine the current working directory, setuid applications might be affected.", title: "Vulnerability description", }, { category: "summary", text: "python buffer overflow", title: "Vulnerability summary", }, { category: "other", text: "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/\n\nRed Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-1542", }, { category: "external", summary: "RHBZ#430640", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430640", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-1542", url: "https://www.cve.org/CVERecord?id=CVE-2006-1542", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-1542", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-1542", }, ], release_date: "2005-09-22T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-08-13T14:16:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0629", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python buffer overflow", }, { cve: "CVE-2006-2937", discovery_date: "2006-07-03T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430655", }, ], notes: [ { category: "description", text: "OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition.", title: "Vulnerability description", }, { category: "summary", text: "openssl ASN.1 DoS", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-2937", }, { category: "external", summary: "RHBZ#430655", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430655", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-2937", url: "https://www.cve.org/CVERecord?id=CVE-2006-2937", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-2937", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-2937", }, ], release_date: "2006-09-28T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-08-13T14:16:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0629", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "openssl ASN.1 DoS", }, { cve: "CVE-2006-2940", discovery_date: "2006-07-03T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430654", }, ], notes: [ { category: "description", text: "OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) \"public exponent\" or (2) \"public modulus\" values in X.509 certificates that require extra time to process when using RSA signature verification.", title: "Vulnerability description", }, { category: "summary", text: "openssl public key DoS", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-2940", }, { category: "external", summary: "RHBZ#430654", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430654", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-2940", url: "https://www.cve.org/CVERecord?id=CVE-2006-2940", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-2940", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-2940", }, ], release_date: "2006-09-28T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-08-13T14:16:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0629", }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "openssl public key DoS", }, { cve: "CVE-2006-3738", discovery_date: "2006-08-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430652", }, ], notes: [ { category: "description", text: "Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.", title: "Vulnerability description", }, { category: "summary", text: "openssl get_shared_ciphers overflow", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-3738", }, { category: "external", summary: "RHBZ#430652", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430652", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-3738", url: "https://www.cve.org/CVERecord?id=CVE-2006-3738", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-3738", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-3738", }, ], release_date: "2006-09-28T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-08-13T14:16:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0629", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "openssl get_shared_ciphers overflow", }, { cve: "CVE-2006-4339", discovery_date: "2006-09-05T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430659", }, ], notes: [ { category: "description", text: "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.", title: "Vulnerability description", }, { category: "summary", text: "openssl signature forgery", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-4339", }, { category: "external", summary: "RHBZ#430659", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430659", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-4339", url: "https://www.cve.org/CVERecord?id=CVE-2006-4339", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-4339", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-4339", }, ], release_date: "2006-09-05T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-08-13T14:16:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0629", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "openssl signature forgery", }, { cve: "CVE-2006-4343", discovery_date: "2006-08-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430651", }, ], notes: [ { category: "description", text: "The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.", title: "Vulnerability description", }, { category: "summary", text: "openssl sslv2 client code", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-4343", }, { category: "external", summary: "RHBZ#430651", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430651", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-4343", url: "https://www.cve.org/CVERecord?id=CVE-2006-4343", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-4343", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-4343", }, ], release_date: "2006-09-28T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-08-13T14:16:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0629", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "openssl sslv2 client code", }, { cve: "CVE-2006-4980", discovery_date: "2006-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430641", }, ], notes: [ { category: "description", text: "Buffer overflow in the repr function in Python 2.3 through 2.6 before 20060822 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via crafted wide character UTF-32/UCS-4 strings to certain scripts.", title: "Vulnerability description", }, { category: "summary", text: "python repr unicode buffer overflow", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-4980", }, { category: "external", summary: "RHBZ#430641", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430641", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-4980", url: "https://www.cve.org/CVERecord?id=CVE-2006-4980", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-4980", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-4980", }, ], release_date: "2006-08-16T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-08-13T14:16:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0629", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "python repr unicode buffer overflow", }, { cve: "CVE-2007-2052", cwe: { id: "CWE-193", name: "Off-by-one Error", }, discovery_date: "2007-04-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "235093", }, ], notes: [ { category: "description", text: "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", title: "Vulnerability description", }, { category: "summary", text: "python off-by-one locale.strxfrm() (possible memory disclosure)", title: "Vulnerability summary", }, { category: "other", text: "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2007-2052", }, { category: "external", summary: "RHBZ#235093", url: "https://bugzilla.redhat.com/show_bug.cgi?id=235093", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2007-2052", url: "https://www.cve.org/CVERecord?id=CVE-2007-2052", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", url: "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", }, ], release_date: "2007-04-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-08-13T14:16:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0629", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python off-by-one locale.strxfrm() (possible memory disclosure)", }, { cve: "CVE-2007-4965", discovery_date: "2007-09-18T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "295971", }, ], notes: [ { category: "description", text: "Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.", title: "Vulnerability description", }, { category: "summary", text: "python imageop module heap corruption", title: "Vulnerability summary", }, { category: "other", text: "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=295971\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2007-4965", }, { category: "external", summary: "RHBZ#295971", url: "https://bugzilla.redhat.com/show_bug.cgi?id=295971", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2007-4965", url: "https://www.cve.org/CVERecord?id=CVE-2007-4965", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", url: "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", }, ], release_date: "2007-09-16T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-08-13T14:16:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0629", }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "python imageop module heap corruption", }, ], }
RHSA-2007:1076
Vulnerability from csaf_redhat
Published
2007-12-10 18:20
Modified
2024-11-22 02:05
Summary
Red Hat Security Advisory: python security update
Notes
Topic
Updated python packages that fix several security issues are now available
for Red Hat Enterprise Linux 3 and 4.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
Python is an interpreted, interactive, object-oriented programming
language.
An integer overflow flaw was discovered in the way Python's pcre module
handled certain regular expressions. If a Python application used the pcre
module to compile and execute untrusted regular expressions, it may be
possible to cause the application to crash, or allow arbitrary code
execution with the privileges of the Python interpreter. (CVE-2006-7228)
A flaw was discovered in the strxfrm() function of Python's locale module.
Strings generated by this function were not properly NULL-terminated. This
may possibly cause disclosure of data stored in the memory of a Python
application using this function. (CVE-2007-2052)
Multiple integer overflow flaws were discovered in Python's imageop module.
If an application written in Python used the imageop module to process
untrusted images, it could cause the application to crash, enter an
infinite loop, or possibly execute arbitrary code with the privileges of
the Python interpreter. (CVE-2007-4965)
Users of Python are advised to upgrade to these updated packages, which
contain backported patches to resolve these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Updated python packages that fix several security issues are now available\nfor Red Hat Enterprise Linux 3 and 4.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", title: "Topic", }, { category: "general", text: "Python is an interpreted, interactive, object-oriented programming\nlanguage.\n\nAn integer overflow flaw was discovered in the way Python's pcre module\nhandled certain regular expressions. If a Python application used the pcre\nmodule to compile and execute untrusted regular expressions, it may be\npossible to cause the application to crash, or allow arbitrary code\nexecution with the privileges of the Python interpreter. (CVE-2006-7228)\n\nA flaw was discovered in the strxfrm() function of Python's locale module.\nStrings generated by this function were not properly NULL-terminated. This\nmay possibly cause disclosure of data stored in the memory of a Python\napplication using this function. (CVE-2007-2052)\n\nMultiple integer overflow flaws were discovered in Python's imageop module.\nIf an application written in Python used the imageop module to process\nuntrusted images, it could cause the application to crash, enter an\ninfinite loop, or possibly execute arbitrary code with the privileges of\nthe Python interpreter. (CVE-2007-4965)\n\nUsers of Python are advised to upgrade to these updated packages, which\ncontain backported patches to resolve these issues.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2007:1076", url: "https://access.redhat.com/errata/RHSA-2007:1076", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "235093", url: "https://bugzilla.redhat.com/show_bug.cgi?id=235093", }, { category: "external", summary: "295971", url: "https://bugzilla.redhat.com/show_bug.cgi?id=295971", }, { category: "external", summary: "383371", url: "https://bugzilla.redhat.com/show_bug.cgi?id=383371", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_1076.json", }, ], title: "Red Hat Security Advisory: python security update", tracking: { current_release_date: "2024-11-22T02:05:15+00:00", generator: { date: "2024-11-22T02:05:15+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2007:1076", initial_release_date: "2007-12-10T18:20:00+00:00", revision_history: [ { date: "2007-12-10T18:20:00+00:00", number: "1", summary: "Initial version", }, { date: "2007-12-10T13:41:24+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T02:05:15+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AS version 3", product: { name: "Red Hat Enterprise Linux AS version 3", product_id: "3AS", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:3::as", }, }, }, { category: "product_name", name: "Red Hat Desktop version 3", product: { name: "Red Hat Desktop version 3", product_id: "3Desktop", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:3::desktop", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ES version 3", product: { name: "Red Hat Enterprise Linux ES version 3", product_id: "3ES", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:3::es", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux WS version 3", product: { name: "Red Hat Enterprise Linux WS version 3", product_id: "3WS", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:3::ws", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux AS version 4", product: { name: "Red Hat Enterprise Linux AS version 4", product_id: "4AS", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:4::as", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Desktop version 4", product: { name: "Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:4::desktop", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ES version 4", product: { name: "Red Hat Enterprise Linux ES version 4", product_id: "4ES", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:4::es", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux WS version 4", product: { name: "Red Hat Enterprise Linux WS version 4", product_id: "4WS", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:4::ws", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "python-devel-0:2.2.3-6.8.ia64", product: { name: "python-devel-0:2.2.3-6.8.ia64", product_id: "python-devel-0:2.2.3-6.8.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.2.3-6.8?arch=ia64", }, }, }, { category: "product_version", name: "python-tools-0:2.2.3-6.8.ia64", product: { name: "python-tools-0:2.2.3-6.8.ia64", product_id: "python-tools-0:2.2.3-6.8.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.2.3-6.8?arch=ia64", }, }, }, { category: "product_version", name: "tkinter-0:2.2.3-6.8.ia64", product: { name: "tkinter-0:2.2.3-6.8.ia64", product_id: "tkinter-0:2.2.3-6.8.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.2.3-6.8?arch=ia64", }, }, }, { category: "product_version", name: "python-0:2.2.3-6.8.ia64", product: { name: "python-0:2.2.3-6.8.ia64", product_id: "python-0:2.2.3-6.8.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.2.3-6.8?arch=ia64", }, }, }, { category: "product_version", name: "python-debuginfo-0:2.2.3-6.8.ia64", product: { name: "python-debuginfo-0:2.2.3-6.8.ia64", product_id: "python-debuginfo-0:2.2.3-6.8.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.2.3-6.8?arch=ia64", }, }, }, { category: "product_version", name: "python-docs-0:2.3.4-14.4.el4_6.1.ia64", product: { name: "python-docs-0:2.3.4-14.4.el4_6.1.ia64", product_id: "python-docs-0:2.3.4-14.4.el4_6.1.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python-docs@2.3.4-14.4.el4_6.1?arch=ia64", }, }, }, { category: "product_version", name: "python-devel-0:2.3.4-14.4.el4_6.1.ia64", product: { name: "python-devel-0:2.3.4-14.4.el4_6.1.ia64", product_id: "python-devel-0:2.3.4-14.4.el4_6.1.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.3.4-14.4.el4_6.1?arch=ia64", }, }, }, { category: "product_version", name: "python-tools-0:2.3.4-14.4.el4_6.1.ia64", product: { name: "python-tools-0:2.3.4-14.4.el4_6.1.ia64", product_id: "python-tools-0:2.3.4-14.4.el4_6.1.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.3.4-14.4.el4_6.1?arch=ia64", }, }, }, { category: "product_version", name: "python-0:2.3.4-14.4.el4_6.1.ia64", product: { name: "python-0:2.3.4-14.4.el4_6.1.ia64", product_id: "python-0:2.3.4-14.4.el4_6.1.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.3.4-14.4.el4_6.1?arch=ia64", }, }, }, { category: "product_version", name: "tkinter-0:2.3.4-14.4.el4_6.1.ia64", product: { name: "tkinter-0:2.3.4-14.4.el4_6.1.ia64", product_id: "tkinter-0:2.3.4-14.4.el4_6.1.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.3.4-14.4.el4_6.1?arch=ia64", }, }, }, { category: "product_version", name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", product: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", product_id: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.3.4-14.4.el4_6.1?arch=ia64", }, }, }, ], category: "architecture", name: "ia64", }, { branches: [ { category: "product_version", name: "python-devel-0:2.2.3-6.8.x86_64", product: { name: "python-devel-0:2.2.3-6.8.x86_64", product_id: "python-devel-0:2.2.3-6.8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.2.3-6.8?arch=x86_64", }, }, }, { category: "product_version", name: "python-tools-0:2.2.3-6.8.x86_64", product: { name: "python-tools-0:2.2.3-6.8.x86_64", product_id: "python-tools-0:2.2.3-6.8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.2.3-6.8?arch=x86_64", }, }, }, { category: "product_version", name: "tkinter-0:2.2.3-6.8.x86_64", product: { name: "tkinter-0:2.2.3-6.8.x86_64", product_id: "tkinter-0:2.2.3-6.8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.2.3-6.8?arch=x86_64", }, }, }, { category: "product_version", name: "python-0:2.2.3-6.8.x86_64", product: { name: "python-0:2.2.3-6.8.x86_64", product_id: "python-0:2.2.3-6.8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.2.3-6.8?arch=x86_64", }, }, }, { category: "product_version", name: "python-debuginfo-0:2.2.3-6.8.x86_64", product: { name: "python-debuginfo-0:2.2.3-6.8.x86_64", product_id: "python-debuginfo-0:2.2.3-6.8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.2.3-6.8?arch=x86_64", }, }, }, { category: "product_version", name: "python-docs-0:2.3.4-14.4.el4_6.1.x86_64", product: { name: "python-docs-0:2.3.4-14.4.el4_6.1.x86_64", product_id: "python-docs-0:2.3.4-14.4.el4_6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/python-docs@2.3.4-14.4.el4_6.1?arch=x86_64", }, }, }, { category: "product_version", name: "python-devel-0:2.3.4-14.4.el4_6.1.x86_64", product: { name: "python-devel-0:2.3.4-14.4.el4_6.1.x86_64", product_id: "python-devel-0:2.3.4-14.4.el4_6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.3.4-14.4.el4_6.1?arch=x86_64", }, }, }, { category: "product_version", name: "python-tools-0:2.3.4-14.4.el4_6.1.x86_64", product: { name: "python-tools-0:2.3.4-14.4.el4_6.1.x86_64", product_id: "python-tools-0:2.3.4-14.4.el4_6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.3.4-14.4.el4_6.1?arch=x86_64", }, }, }, { category: "product_version", name: "python-0:2.3.4-14.4.el4_6.1.x86_64", product: { name: "python-0:2.3.4-14.4.el4_6.1.x86_64", product_id: "python-0:2.3.4-14.4.el4_6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.3.4-14.4.el4_6.1?arch=x86_64", }, }, }, { category: "product_version", name: "tkinter-0:2.3.4-14.4.el4_6.1.x86_64", product: { name: "tkinter-0:2.3.4-14.4.el4_6.1.x86_64", product_id: "tkinter-0:2.3.4-14.4.el4_6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.3.4-14.4.el4_6.1?arch=x86_64", }, }, }, { category: "product_version", name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", product: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", product_id: "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.3.4-14.4.el4_6.1?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "python-devel-0:2.2.3-6.8.i386", product: { name: "python-devel-0:2.2.3-6.8.i386", product_id: "python-devel-0:2.2.3-6.8.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.2.3-6.8?arch=i386", }, }, }, { category: "product_version", name: "python-tools-0:2.2.3-6.8.i386", product: { name: "python-tools-0:2.2.3-6.8.i386", product_id: "python-tools-0:2.2.3-6.8.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.2.3-6.8?arch=i386", }, }, }, { category: "product_version", name: "tkinter-0:2.2.3-6.8.i386", product: { name: "tkinter-0:2.2.3-6.8.i386", product_id: "tkinter-0:2.2.3-6.8.i386", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.2.3-6.8?arch=i386", }, }, }, { category: "product_version", name: "python-0:2.2.3-6.8.i386", product: { name: "python-0:2.2.3-6.8.i386", product_id: "python-0:2.2.3-6.8.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.2.3-6.8?arch=i386", }, }, }, { category: "product_version", name: "python-debuginfo-0:2.2.3-6.8.i386", product: { name: "python-debuginfo-0:2.2.3-6.8.i386", product_id: "python-debuginfo-0:2.2.3-6.8.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.2.3-6.8?arch=i386", }, }, }, { category: "product_version", name: "python-docs-0:2.3.4-14.4.el4_6.1.i386", product: { name: "python-docs-0:2.3.4-14.4.el4_6.1.i386", product_id: "python-docs-0:2.3.4-14.4.el4_6.1.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python-docs@2.3.4-14.4.el4_6.1?arch=i386", }, }, }, { category: "product_version", name: "python-devel-0:2.3.4-14.4.el4_6.1.i386", product: { name: "python-devel-0:2.3.4-14.4.el4_6.1.i386", product_id: "python-devel-0:2.3.4-14.4.el4_6.1.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.3.4-14.4.el4_6.1?arch=i386", }, }, }, { category: "product_version", name: "python-tools-0:2.3.4-14.4.el4_6.1.i386", product: { name: "python-tools-0:2.3.4-14.4.el4_6.1.i386", product_id: "python-tools-0:2.3.4-14.4.el4_6.1.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.3.4-14.4.el4_6.1?arch=i386", }, }, }, { category: "product_version", name: "python-0:2.3.4-14.4.el4_6.1.i386", product: { name: "python-0:2.3.4-14.4.el4_6.1.i386", product_id: "python-0:2.3.4-14.4.el4_6.1.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.3.4-14.4.el4_6.1?arch=i386", }, }, }, { category: "product_version", name: "tkinter-0:2.3.4-14.4.el4_6.1.i386", product: { name: "tkinter-0:2.3.4-14.4.el4_6.1.i386", product_id: "tkinter-0:2.3.4-14.4.el4_6.1.i386", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.3.4-14.4.el4_6.1?arch=i386", }, }, }, { category: "product_version", name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", product: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", product_id: "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.3.4-14.4.el4_6.1?arch=i386", }, }, }, ], category: "architecture", name: "i386", }, { branches: [ { category: "product_version", name: "python-0:2.2.3-6.8.src", product: { name: "python-0:2.2.3-6.8.src", product_id: "python-0:2.2.3-6.8.src", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.2.3-6.8?arch=src", }, }, }, { category: "product_version", name: "python-0:2.3.4-14.4.el4_6.1.src", product: { name: "python-0:2.3.4-14.4.el4_6.1.src", product_id: "python-0:2.3.4-14.4.el4_6.1.src", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.3.4-14.4.el4_6.1?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "python-devel-0:2.2.3-6.8.ppc", product: { name: "python-devel-0:2.2.3-6.8.ppc", product_id: "python-devel-0:2.2.3-6.8.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.2.3-6.8?arch=ppc", }, }, }, { category: "product_version", name: "python-tools-0:2.2.3-6.8.ppc", product: { name: "python-tools-0:2.2.3-6.8.ppc", product_id: "python-tools-0:2.2.3-6.8.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.2.3-6.8?arch=ppc", }, }, }, { category: "product_version", name: "tkinter-0:2.2.3-6.8.ppc", product: { name: "tkinter-0:2.2.3-6.8.ppc", product_id: "tkinter-0:2.2.3-6.8.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.2.3-6.8?arch=ppc", }, }, }, { category: "product_version", name: "python-0:2.2.3-6.8.ppc", product: { name: "python-0:2.2.3-6.8.ppc", product_id: "python-0:2.2.3-6.8.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.2.3-6.8?arch=ppc", }, }, }, { category: "product_version", name: "python-debuginfo-0:2.2.3-6.8.ppc", product: { name: "python-debuginfo-0:2.2.3-6.8.ppc", product_id: "python-debuginfo-0:2.2.3-6.8.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.2.3-6.8?arch=ppc", }, }, }, { category: "product_version", name: "python-docs-0:2.3.4-14.4.el4_6.1.ppc", product: { name: "python-docs-0:2.3.4-14.4.el4_6.1.ppc", product_id: "python-docs-0:2.3.4-14.4.el4_6.1.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/python-docs@2.3.4-14.4.el4_6.1?arch=ppc", }, }, }, { category: "product_version", name: "python-devel-0:2.3.4-14.4.el4_6.1.ppc", product: { name: "python-devel-0:2.3.4-14.4.el4_6.1.ppc", product_id: "python-devel-0:2.3.4-14.4.el4_6.1.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.3.4-14.4.el4_6.1?arch=ppc", }, }, }, { category: "product_version", name: "python-tools-0:2.3.4-14.4.el4_6.1.ppc", product: { name: "python-tools-0:2.3.4-14.4.el4_6.1.ppc", product_id: "python-tools-0:2.3.4-14.4.el4_6.1.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.3.4-14.4.el4_6.1?arch=ppc", }, }, }, { category: "product_version", name: "python-0:2.3.4-14.4.el4_6.1.ppc", product: { name: "python-0:2.3.4-14.4.el4_6.1.ppc", product_id: "python-0:2.3.4-14.4.el4_6.1.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.3.4-14.4.el4_6.1?arch=ppc", }, }, }, { category: "product_version", name: "tkinter-0:2.3.4-14.4.el4_6.1.ppc", product: { name: "tkinter-0:2.3.4-14.4.el4_6.1.ppc", product_id: "tkinter-0:2.3.4-14.4.el4_6.1.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.3.4-14.4.el4_6.1?arch=ppc", }, }, }, { category: "product_version", name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", product: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", product_id: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.3.4-14.4.el4_6.1?arch=ppc", }, }, }, ], category: "architecture", name: "ppc", }, { branches: [ { category: "product_version", name: "python-devel-0:2.2.3-6.8.s390x", product: { name: "python-devel-0:2.2.3-6.8.s390x", product_id: "python-devel-0:2.2.3-6.8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.2.3-6.8?arch=s390x", }, }, }, { category: "product_version", name: "python-tools-0:2.2.3-6.8.s390x", product: { name: "python-tools-0:2.2.3-6.8.s390x", product_id: "python-tools-0:2.2.3-6.8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.2.3-6.8?arch=s390x", }, }, }, { category: "product_version", name: "tkinter-0:2.2.3-6.8.s390x", product: { name: "tkinter-0:2.2.3-6.8.s390x", product_id: "tkinter-0:2.2.3-6.8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.2.3-6.8?arch=s390x", }, }, }, { category: "product_version", name: "python-0:2.2.3-6.8.s390x", product: { name: "python-0:2.2.3-6.8.s390x", product_id: "python-0:2.2.3-6.8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.2.3-6.8?arch=s390x", }, }, }, { category: "product_version", name: "python-debuginfo-0:2.2.3-6.8.s390x", product: { name: "python-debuginfo-0:2.2.3-6.8.s390x", product_id: "python-debuginfo-0:2.2.3-6.8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.2.3-6.8?arch=s390x", }, }, }, { category: "product_version", name: "python-docs-0:2.3.4-14.4.el4_6.1.s390x", product: { name: "python-docs-0:2.3.4-14.4.el4_6.1.s390x", product_id: "python-docs-0:2.3.4-14.4.el4_6.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/python-docs@2.3.4-14.4.el4_6.1?arch=s390x", }, }, }, { category: "product_version", name: "python-devel-0:2.3.4-14.4.el4_6.1.s390x", product: { name: "python-devel-0:2.3.4-14.4.el4_6.1.s390x", product_id: "python-devel-0:2.3.4-14.4.el4_6.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.3.4-14.4.el4_6.1?arch=s390x", }, }, }, { category: "product_version", name: "python-tools-0:2.3.4-14.4.el4_6.1.s390x", product: { name: "python-tools-0:2.3.4-14.4.el4_6.1.s390x", product_id: "python-tools-0:2.3.4-14.4.el4_6.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.3.4-14.4.el4_6.1?arch=s390x", }, }, }, { category: "product_version", name: "python-0:2.3.4-14.4.el4_6.1.s390x", product: { name: "python-0:2.3.4-14.4.el4_6.1.s390x", product_id: "python-0:2.3.4-14.4.el4_6.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.3.4-14.4.el4_6.1?arch=s390x", }, }, }, { category: "product_version", name: "tkinter-0:2.3.4-14.4.el4_6.1.s390x", product: { name: "tkinter-0:2.3.4-14.4.el4_6.1.s390x", product_id: "tkinter-0:2.3.4-14.4.el4_6.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.3.4-14.4.el4_6.1?arch=s390x", }, }, }, { category: "product_version", name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", product: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", product_id: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.3.4-14.4.el4_6.1?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "python-devel-0:2.2.3-6.8.s390", product: { name: "python-devel-0:2.2.3-6.8.s390", product_id: "python-devel-0:2.2.3-6.8.s390", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.2.3-6.8?arch=s390", }, }, }, { category: "product_version", name: "python-tools-0:2.2.3-6.8.s390", product: { name: "python-tools-0:2.2.3-6.8.s390", product_id: "python-tools-0:2.2.3-6.8.s390", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.2.3-6.8?arch=s390", }, }, }, { category: "product_version", name: "tkinter-0:2.2.3-6.8.s390", product: { name: "tkinter-0:2.2.3-6.8.s390", product_id: "tkinter-0:2.2.3-6.8.s390", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.2.3-6.8?arch=s390", }, }, }, { category: "product_version", name: "python-0:2.2.3-6.8.s390", product: { name: "python-0:2.2.3-6.8.s390", product_id: "python-0:2.2.3-6.8.s390", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.2.3-6.8?arch=s390", }, }, }, { category: "product_version", name: "python-debuginfo-0:2.2.3-6.8.s390", product: { name: "python-debuginfo-0:2.2.3-6.8.s390", product_id: "python-debuginfo-0:2.2.3-6.8.s390", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.2.3-6.8?arch=s390", }, }, }, { category: "product_version", name: "python-docs-0:2.3.4-14.4.el4_6.1.s390", product: { name: "python-docs-0:2.3.4-14.4.el4_6.1.s390", product_id: "python-docs-0:2.3.4-14.4.el4_6.1.s390", product_identification_helper: { purl: "pkg:rpm/redhat/python-docs@2.3.4-14.4.el4_6.1?arch=s390", }, }, }, { category: "product_version", name: "python-devel-0:2.3.4-14.4.el4_6.1.s390", product: { name: "python-devel-0:2.3.4-14.4.el4_6.1.s390", product_id: "python-devel-0:2.3.4-14.4.el4_6.1.s390", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.3.4-14.4.el4_6.1?arch=s390", }, }, }, { category: "product_version", name: "python-tools-0:2.3.4-14.4.el4_6.1.s390", product: { name: "python-tools-0:2.3.4-14.4.el4_6.1.s390", product_id: "python-tools-0:2.3.4-14.4.el4_6.1.s390", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.3.4-14.4.el4_6.1?arch=s390", }, }, }, { category: "product_version", name: "python-0:2.3.4-14.4.el4_6.1.s390", product: { name: "python-0:2.3.4-14.4.el4_6.1.s390", product_id: "python-0:2.3.4-14.4.el4_6.1.s390", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.3.4-14.4.el4_6.1?arch=s390", }, }, }, { category: "product_version", name: "tkinter-0:2.3.4-14.4.el4_6.1.s390", product: { name: "tkinter-0:2.3.4-14.4.el4_6.1.s390", product_id: "tkinter-0:2.3.4-14.4.el4_6.1.s390", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.3.4-14.4.el4_6.1?arch=s390", }, }, }, { category: "product_version", name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", product: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", product_id: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.3.4-14.4.el4_6.1?arch=s390", }, }, }, ], category: "architecture", name: "s390", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-0:2.2.3-6.8.i386", }, product_reference: "python-0:2.2.3-6.8.i386", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-0:2.2.3-6.8.ia64", }, product_reference: "python-0:2.2.3-6.8.ia64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-0:2.2.3-6.8.ppc", }, product_reference: "python-0:2.2.3-6.8.ppc", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-0:2.2.3-6.8.s390", }, product_reference: "python-0:2.2.3-6.8.s390", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-0:2.2.3-6.8.s390x", }, product_reference: "python-0:2.2.3-6.8.s390x", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.src as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-0:2.2.3-6.8.src", }, product_reference: "python-0:2.2.3-6.8.src", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-0:2.2.3-6.8.x86_64", }, product_reference: "python-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-debuginfo-0:2.2.3-6.8.i386", }, product_reference: "python-debuginfo-0:2.2.3-6.8.i386", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-debuginfo-0:2.2.3-6.8.ia64", }, product_reference: "python-debuginfo-0:2.2.3-6.8.ia64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-debuginfo-0:2.2.3-6.8.ppc", }, product_reference: "python-debuginfo-0:2.2.3-6.8.ppc", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-debuginfo-0:2.2.3-6.8.s390", }, product_reference: "python-debuginfo-0:2.2.3-6.8.s390", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-debuginfo-0:2.2.3-6.8.s390x", }, product_reference: "python-debuginfo-0:2.2.3-6.8.s390x", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-debuginfo-0:2.2.3-6.8.x86_64", }, product_reference: "python-debuginfo-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-devel-0:2.2.3-6.8.i386", }, product_reference: "python-devel-0:2.2.3-6.8.i386", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-devel-0:2.2.3-6.8.ia64", }, product_reference: "python-devel-0:2.2.3-6.8.ia64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-devel-0:2.2.3-6.8.ppc", }, product_reference: "python-devel-0:2.2.3-6.8.ppc", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-devel-0:2.2.3-6.8.s390", }, product_reference: "python-devel-0:2.2.3-6.8.s390", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-devel-0:2.2.3-6.8.s390x", }, product_reference: "python-devel-0:2.2.3-6.8.s390x", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-devel-0:2.2.3-6.8.x86_64", }, product_reference: "python-devel-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-tools-0:2.2.3-6.8.i386", }, product_reference: "python-tools-0:2.2.3-6.8.i386", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-tools-0:2.2.3-6.8.ia64", }, product_reference: "python-tools-0:2.2.3-6.8.ia64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-tools-0:2.2.3-6.8.ppc", }, product_reference: "python-tools-0:2.2.3-6.8.ppc", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-tools-0:2.2.3-6.8.s390", }, product_reference: "python-tools-0:2.2.3-6.8.s390", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-tools-0:2.2.3-6.8.s390x", }, product_reference: "python-tools-0:2.2.3-6.8.s390x", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-tools-0:2.2.3-6.8.x86_64", }, product_reference: "python-tools-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:tkinter-0:2.2.3-6.8.i386", }, product_reference: "tkinter-0:2.2.3-6.8.i386", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:tkinter-0:2.2.3-6.8.ia64", }, product_reference: "tkinter-0:2.2.3-6.8.ia64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:tkinter-0:2.2.3-6.8.ppc", }, product_reference: "tkinter-0:2.2.3-6.8.ppc", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:tkinter-0:2.2.3-6.8.s390", }, product_reference: "tkinter-0:2.2.3-6.8.s390", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:tkinter-0:2.2.3-6.8.s390x", }, product_reference: "tkinter-0:2.2.3-6.8.s390x", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:tkinter-0:2.2.3-6.8.x86_64", }, product_reference: "tkinter-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.i386 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-0:2.2.3-6.8.i386", }, product_reference: "python-0:2.2.3-6.8.i386", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.ia64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-0:2.2.3-6.8.ia64", }, product_reference: "python-0:2.2.3-6.8.ia64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.ppc as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-0:2.2.3-6.8.ppc", }, product_reference: "python-0:2.2.3-6.8.ppc", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.s390 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-0:2.2.3-6.8.s390", }, product_reference: "python-0:2.2.3-6.8.s390", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.s390x as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-0:2.2.3-6.8.s390x", }, product_reference: "python-0:2.2.3-6.8.s390x", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.src as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-0:2.2.3-6.8.src", }, product_reference: "python-0:2.2.3-6.8.src", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.x86_64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-0:2.2.3-6.8.x86_64", }, product_reference: "python-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.i386 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-debuginfo-0:2.2.3-6.8.i386", }, product_reference: "python-debuginfo-0:2.2.3-6.8.i386", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.ia64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-debuginfo-0:2.2.3-6.8.ia64", }, product_reference: "python-debuginfo-0:2.2.3-6.8.ia64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.ppc as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-debuginfo-0:2.2.3-6.8.ppc", }, product_reference: "python-debuginfo-0:2.2.3-6.8.ppc", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.s390 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-debuginfo-0:2.2.3-6.8.s390", }, product_reference: "python-debuginfo-0:2.2.3-6.8.s390", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.s390x as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-debuginfo-0:2.2.3-6.8.s390x", }, product_reference: "python-debuginfo-0:2.2.3-6.8.s390x", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.x86_64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-debuginfo-0:2.2.3-6.8.x86_64", }, product_reference: "python-debuginfo-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.i386 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-devel-0:2.2.3-6.8.i386", }, product_reference: "python-devel-0:2.2.3-6.8.i386", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.ia64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-devel-0:2.2.3-6.8.ia64", }, product_reference: "python-devel-0:2.2.3-6.8.ia64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.ppc as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-devel-0:2.2.3-6.8.ppc", }, product_reference: "python-devel-0:2.2.3-6.8.ppc", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.s390 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-devel-0:2.2.3-6.8.s390", }, product_reference: "python-devel-0:2.2.3-6.8.s390", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.s390x as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-devel-0:2.2.3-6.8.s390x", }, product_reference: "python-devel-0:2.2.3-6.8.s390x", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.x86_64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-devel-0:2.2.3-6.8.x86_64", }, product_reference: "python-devel-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.i386 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-tools-0:2.2.3-6.8.i386", }, product_reference: "python-tools-0:2.2.3-6.8.i386", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.ia64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-tools-0:2.2.3-6.8.ia64", }, product_reference: "python-tools-0:2.2.3-6.8.ia64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.ppc as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-tools-0:2.2.3-6.8.ppc", }, product_reference: "python-tools-0:2.2.3-6.8.ppc", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.s390 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-tools-0:2.2.3-6.8.s390", }, product_reference: "python-tools-0:2.2.3-6.8.s390", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.s390x as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-tools-0:2.2.3-6.8.s390x", }, product_reference: "python-tools-0:2.2.3-6.8.s390x", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.x86_64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-tools-0:2.2.3-6.8.x86_64", }, product_reference: "python-tools-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.i386 as a component of Red Hat Desktop version 3", product_id: "3Desktop:tkinter-0:2.2.3-6.8.i386", }, product_reference: "tkinter-0:2.2.3-6.8.i386", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.ia64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:tkinter-0:2.2.3-6.8.ia64", }, product_reference: "tkinter-0:2.2.3-6.8.ia64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.ppc as a component of Red Hat Desktop version 3", product_id: "3Desktop:tkinter-0:2.2.3-6.8.ppc", }, product_reference: "tkinter-0:2.2.3-6.8.ppc", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.s390 as a component of Red Hat Desktop version 3", product_id: "3Desktop:tkinter-0:2.2.3-6.8.s390", }, product_reference: "tkinter-0:2.2.3-6.8.s390", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.s390x as a component of Red Hat Desktop version 3", product_id: "3Desktop:tkinter-0:2.2.3-6.8.s390x", }, product_reference: "tkinter-0:2.2.3-6.8.s390x", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.x86_64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:tkinter-0:2.2.3-6.8.x86_64", }, product_reference: "tkinter-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-0:2.2.3-6.8.i386", }, product_reference: "python-0:2.2.3-6.8.i386", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-0:2.2.3-6.8.ia64", }, product_reference: "python-0:2.2.3-6.8.ia64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-0:2.2.3-6.8.ppc", }, product_reference: "python-0:2.2.3-6.8.ppc", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-0:2.2.3-6.8.s390", }, product_reference: "python-0:2.2.3-6.8.s390", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-0:2.2.3-6.8.s390x", }, product_reference: "python-0:2.2.3-6.8.s390x", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.src as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-0:2.2.3-6.8.src", }, product_reference: "python-0:2.2.3-6.8.src", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-0:2.2.3-6.8.x86_64", }, product_reference: "python-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-debuginfo-0:2.2.3-6.8.i386", }, product_reference: "python-debuginfo-0:2.2.3-6.8.i386", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-debuginfo-0:2.2.3-6.8.ia64", }, product_reference: "python-debuginfo-0:2.2.3-6.8.ia64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-debuginfo-0:2.2.3-6.8.ppc", }, product_reference: "python-debuginfo-0:2.2.3-6.8.ppc", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-debuginfo-0:2.2.3-6.8.s390", }, product_reference: "python-debuginfo-0:2.2.3-6.8.s390", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-debuginfo-0:2.2.3-6.8.s390x", }, product_reference: "python-debuginfo-0:2.2.3-6.8.s390x", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-debuginfo-0:2.2.3-6.8.x86_64", }, product_reference: "python-debuginfo-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-devel-0:2.2.3-6.8.i386", }, product_reference: "python-devel-0:2.2.3-6.8.i386", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-devel-0:2.2.3-6.8.ia64", }, product_reference: "python-devel-0:2.2.3-6.8.ia64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-devel-0:2.2.3-6.8.ppc", }, product_reference: "python-devel-0:2.2.3-6.8.ppc", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-devel-0:2.2.3-6.8.s390", }, product_reference: "python-devel-0:2.2.3-6.8.s390", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-devel-0:2.2.3-6.8.s390x", }, product_reference: "python-devel-0:2.2.3-6.8.s390x", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-devel-0:2.2.3-6.8.x86_64", }, product_reference: "python-devel-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-tools-0:2.2.3-6.8.i386", }, product_reference: "python-tools-0:2.2.3-6.8.i386", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-tools-0:2.2.3-6.8.ia64", }, product_reference: "python-tools-0:2.2.3-6.8.ia64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-tools-0:2.2.3-6.8.ppc", }, product_reference: "python-tools-0:2.2.3-6.8.ppc", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-tools-0:2.2.3-6.8.s390", }, product_reference: "python-tools-0:2.2.3-6.8.s390", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-tools-0:2.2.3-6.8.s390x", }, product_reference: "python-tools-0:2.2.3-6.8.s390x", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-tools-0:2.2.3-6.8.x86_64", }, product_reference: "python-tools-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:tkinter-0:2.2.3-6.8.i386", }, product_reference: "tkinter-0:2.2.3-6.8.i386", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:tkinter-0:2.2.3-6.8.ia64", }, product_reference: "tkinter-0:2.2.3-6.8.ia64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:tkinter-0:2.2.3-6.8.ppc", }, product_reference: "tkinter-0:2.2.3-6.8.ppc", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:tkinter-0:2.2.3-6.8.s390", }, product_reference: "tkinter-0:2.2.3-6.8.s390", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:tkinter-0:2.2.3-6.8.s390x", }, product_reference: "tkinter-0:2.2.3-6.8.s390x", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:tkinter-0:2.2.3-6.8.x86_64", }, product_reference: "tkinter-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-0:2.2.3-6.8.i386", }, product_reference: "python-0:2.2.3-6.8.i386", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-0:2.2.3-6.8.ia64", }, product_reference: "python-0:2.2.3-6.8.ia64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-0:2.2.3-6.8.ppc", }, product_reference: "python-0:2.2.3-6.8.ppc", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-0:2.2.3-6.8.s390", }, product_reference: "python-0:2.2.3-6.8.s390", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-0:2.2.3-6.8.s390x", }, product_reference: "python-0:2.2.3-6.8.s390x", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.src as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-0:2.2.3-6.8.src", }, product_reference: "python-0:2.2.3-6.8.src", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-0:2.2.3-6.8.x86_64", }, product_reference: "python-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-debuginfo-0:2.2.3-6.8.i386", }, product_reference: "python-debuginfo-0:2.2.3-6.8.i386", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-debuginfo-0:2.2.3-6.8.ia64", }, product_reference: "python-debuginfo-0:2.2.3-6.8.ia64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-debuginfo-0:2.2.3-6.8.ppc", }, product_reference: "python-debuginfo-0:2.2.3-6.8.ppc", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-debuginfo-0:2.2.3-6.8.s390", }, product_reference: "python-debuginfo-0:2.2.3-6.8.s390", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-debuginfo-0:2.2.3-6.8.s390x", }, product_reference: "python-debuginfo-0:2.2.3-6.8.s390x", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-debuginfo-0:2.2.3-6.8.x86_64", }, product_reference: "python-debuginfo-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-devel-0:2.2.3-6.8.i386", }, product_reference: "python-devel-0:2.2.3-6.8.i386", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-devel-0:2.2.3-6.8.ia64", }, product_reference: "python-devel-0:2.2.3-6.8.ia64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-devel-0:2.2.3-6.8.ppc", }, product_reference: "python-devel-0:2.2.3-6.8.ppc", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-devel-0:2.2.3-6.8.s390", }, product_reference: "python-devel-0:2.2.3-6.8.s390", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-devel-0:2.2.3-6.8.s390x", }, product_reference: "python-devel-0:2.2.3-6.8.s390x", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-devel-0:2.2.3-6.8.x86_64", }, product_reference: "python-devel-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-tools-0:2.2.3-6.8.i386", }, product_reference: "python-tools-0:2.2.3-6.8.i386", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-tools-0:2.2.3-6.8.ia64", }, product_reference: "python-tools-0:2.2.3-6.8.ia64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-tools-0:2.2.3-6.8.ppc", }, product_reference: "python-tools-0:2.2.3-6.8.ppc", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-tools-0:2.2.3-6.8.s390", }, product_reference: "python-tools-0:2.2.3-6.8.s390", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-tools-0:2.2.3-6.8.s390x", }, product_reference: "python-tools-0:2.2.3-6.8.s390x", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-tools-0:2.2.3-6.8.x86_64", }, product_reference: "python-tools-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:tkinter-0:2.2.3-6.8.i386", }, product_reference: "tkinter-0:2.2.3-6.8.i386", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:tkinter-0:2.2.3-6.8.ia64", }, product_reference: "tkinter-0:2.2.3-6.8.ia64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:tkinter-0:2.2.3-6.8.ppc", }, product_reference: "tkinter-0:2.2.3-6.8.ppc", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:tkinter-0:2.2.3-6.8.s390", }, product_reference: "tkinter-0:2.2.3-6.8.s390", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:tkinter-0:2.2.3-6.8.s390x", }, product_reference: "tkinter-0:2.2.3-6.8.s390x", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:tkinter-0:2.2.3-6.8.x86_64", }, product_reference: "tkinter-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.src as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-0:2.3.4-14.4.el4_6.1.src", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.src", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-devel-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-docs-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-tools-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:tkinter-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.src as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-0:2.3.4-14.4.el4_6.1.src", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.src", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.src as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-0:2.3.4-14.4.el4_6.1.src", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.src", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-devel-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-docs-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-tools-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:tkinter-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.src as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-0:2.3.4-14.4.el4_6.1.src", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.src", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-devel-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-docs-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-tools-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:tkinter-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4WS", }, ], }, vulnerabilities: [ { cve: "CVE-2006-7228", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2007-11-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "383371", }, ], notes: [ { category: "description", text: "Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 might allow context-dependent attackers to execute arbitrary code via a regular expression that involves large (1) min, (2) max, or (3) duplength values that cause an incorrect length calculation and trigger a buffer overflow, a different vulnerability than CVE-2006-7227. NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split.", title: "Vulnerability description", }, { category: "summary", text: "pcre integer overflow", title: "Vulnerability summary", }, ], product_status: { fixed: [ "3AS:python-0:2.2.3-6.8.i386", "3AS:python-0:2.2.3-6.8.ia64", "3AS:python-0:2.2.3-6.8.ppc", "3AS:python-0:2.2.3-6.8.s390", "3AS:python-0:2.2.3-6.8.s390x", "3AS:python-0:2.2.3-6.8.src", "3AS:python-0:2.2.3-6.8.x86_64", "3AS:python-debuginfo-0:2.2.3-6.8.i386", "3AS:python-debuginfo-0:2.2.3-6.8.ia64", "3AS:python-debuginfo-0:2.2.3-6.8.ppc", "3AS:python-debuginfo-0:2.2.3-6.8.s390", "3AS:python-debuginfo-0:2.2.3-6.8.s390x", "3AS:python-debuginfo-0:2.2.3-6.8.x86_64", "3AS:python-devel-0:2.2.3-6.8.i386", "3AS:python-devel-0:2.2.3-6.8.ia64", "3AS:python-devel-0:2.2.3-6.8.ppc", "3AS:python-devel-0:2.2.3-6.8.s390", "3AS:python-devel-0:2.2.3-6.8.s390x", "3AS:python-devel-0:2.2.3-6.8.x86_64", "3AS:python-tools-0:2.2.3-6.8.i386", "3AS:python-tools-0:2.2.3-6.8.ia64", "3AS:python-tools-0:2.2.3-6.8.ppc", "3AS:python-tools-0:2.2.3-6.8.s390", "3AS:python-tools-0:2.2.3-6.8.s390x", "3AS:python-tools-0:2.2.3-6.8.x86_64", "3AS:tkinter-0:2.2.3-6.8.i386", "3AS:tkinter-0:2.2.3-6.8.ia64", "3AS:tkinter-0:2.2.3-6.8.ppc", "3AS:tkinter-0:2.2.3-6.8.s390", "3AS:tkinter-0:2.2.3-6.8.s390x", "3AS:tkinter-0:2.2.3-6.8.x86_64", "3Desktop:python-0:2.2.3-6.8.i386", "3Desktop:python-0:2.2.3-6.8.ia64", "3Desktop:python-0:2.2.3-6.8.ppc", "3Desktop:python-0:2.2.3-6.8.s390", "3Desktop:python-0:2.2.3-6.8.s390x", "3Desktop:python-0:2.2.3-6.8.src", "3Desktop:python-0:2.2.3-6.8.x86_64", "3Desktop:python-debuginfo-0:2.2.3-6.8.i386", "3Desktop:python-debuginfo-0:2.2.3-6.8.ia64", "3Desktop:python-debuginfo-0:2.2.3-6.8.ppc", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390x", "3Desktop:python-debuginfo-0:2.2.3-6.8.x86_64", "3Desktop:python-devel-0:2.2.3-6.8.i386", "3Desktop:python-devel-0:2.2.3-6.8.ia64", "3Desktop:python-devel-0:2.2.3-6.8.ppc", "3Desktop:python-devel-0:2.2.3-6.8.s390", "3Desktop:python-devel-0:2.2.3-6.8.s390x", "3Desktop:python-devel-0:2.2.3-6.8.x86_64", "3Desktop:python-tools-0:2.2.3-6.8.i386", "3Desktop:python-tools-0:2.2.3-6.8.ia64", "3Desktop:python-tools-0:2.2.3-6.8.ppc", "3Desktop:python-tools-0:2.2.3-6.8.s390", "3Desktop:python-tools-0:2.2.3-6.8.s390x", "3Desktop:python-tools-0:2.2.3-6.8.x86_64", "3Desktop:tkinter-0:2.2.3-6.8.i386", "3Desktop:tkinter-0:2.2.3-6.8.ia64", "3Desktop:tkinter-0:2.2.3-6.8.ppc", "3Desktop:tkinter-0:2.2.3-6.8.s390", "3Desktop:tkinter-0:2.2.3-6.8.s390x", "3Desktop:tkinter-0:2.2.3-6.8.x86_64", "3ES:python-0:2.2.3-6.8.i386", "3ES:python-0:2.2.3-6.8.ia64", "3ES:python-0:2.2.3-6.8.ppc", "3ES:python-0:2.2.3-6.8.s390", "3ES:python-0:2.2.3-6.8.s390x", "3ES:python-0:2.2.3-6.8.src", "3ES:python-0:2.2.3-6.8.x86_64", "3ES:python-debuginfo-0:2.2.3-6.8.i386", "3ES:python-debuginfo-0:2.2.3-6.8.ia64", "3ES:python-debuginfo-0:2.2.3-6.8.ppc", "3ES:python-debuginfo-0:2.2.3-6.8.s390", "3ES:python-debuginfo-0:2.2.3-6.8.s390x", "3ES:python-debuginfo-0:2.2.3-6.8.x86_64", "3ES:python-devel-0:2.2.3-6.8.i386", "3ES:python-devel-0:2.2.3-6.8.ia64", "3ES:python-devel-0:2.2.3-6.8.ppc", "3ES:python-devel-0:2.2.3-6.8.s390", "3ES:python-devel-0:2.2.3-6.8.s390x", "3ES:python-devel-0:2.2.3-6.8.x86_64", "3ES:python-tools-0:2.2.3-6.8.i386", "3ES:python-tools-0:2.2.3-6.8.ia64", "3ES:python-tools-0:2.2.3-6.8.ppc", "3ES:python-tools-0:2.2.3-6.8.s390", "3ES:python-tools-0:2.2.3-6.8.s390x", "3ES:python-tools-0:2.2.3-6.8.x86_64", "3ES:tkinter-0:2.2.3-6.8.i386", "3ES:tkinter-0:2.2.3-6.8.ia64", "3ES:tkinter-0:2.2.3-6.8.ppc", "3ES:tkinter-0:2.2.3-6.8.s390", "3ES:tkinter-0:2.2.3-6.8.s390x", "3ES:tkinter-0:2.2.3-6.8.x86_64", "3WS:python-0:2.2.3-6.8.i386", "3WS:python-0:2.2.3-6.8.ia64", "3WS:python-0:2.2.3-6.8.ppc", "3WS:python-0:2.2.3-6.8.s390", "3WS:python-0:2.2.3-6.8.s390x", "3WS:python-0:2.2.3-6.8.src", "3WS:python-0:2.2.3-6.8.x86_64", "3WS:python-debuginfo-0:2.2.3-6.8.i386", "3WS:python-debuginfo-0:2.2.3-6.8.ia64", "3WS:python-debuginfo-0:2.2.3-6.8.ppc", "3WS:python-debuginfo-0:2.2.3-6.8.s390", "3WS:python-debuginfo-0:2.2.3-6.8.s390x", "3WS:python-debuginfo-0:2.2.3-6.8.x86_64", "3WS:python-devel-0:2.2.3-6.8.i386", "3WS:python-devel-0:2.2.3-6.8.ia64", "3WS:python-devel-0:2.2.3-6.8.ppc", "3WS:python-devel-0:2.2.3-6.8.s390", "3WS:python-devel-0:2.2.3-6.8.s390x", "3WS:python-devel-0:2.2.3-6.8.x86_64", "3WS:python-tools-0:2.2.3-6.8.i386", "3WS:python-tools-0:2.2.3-6.8.ia64", "3WS:python-tools-0:2.2.3-6.8.ppc", "3WS:python-tools-0:2.2.3-6.8.s390", "3WS:python-tools-0:2.2.3-6.8.s390x", "3WS:python-tools-0:2.2.3-6.8.x86_64", "3WS:tkinter-0:2.2.3-6.8.i386", "3WS:tkinter-0:2.2.3-6.8.ia64", "3WS:tkinter-0:2.2.3-6.8.ppc", "3WS:tkinter-0:2.2.3-6.8.s390", "3WS:tkinter-0:2.2.3-6.8.s390x", "3WS:tkinter-0:2.2.3-6.8.x86_64", "4AS:python-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-0:2.3.4-14.4.el4_6.1.src", "4AS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-0:2.3.4-14.4.el4_6.1.src", "4Desktop:python-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-0:2.3.4-14.4.el4_6.1.src", "4ES:python-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-0:2.3.4-14.4.el4_6.1.src", "4WS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-7228", }, { category: "external", summary: "RHBZ#383371", url: "https://bugzilla.redhat.com/show_bug.cgi?id=383371", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-7228", url: "https://www.cve.org/CVERecord?id=CVE-2006-7228", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-7228", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-7228", }, ], release_date: "2007-11-07T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2007-12-10T18:20:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "3AS:python-0:2.2.3-6.8.i386", "3AS:python-0:2.2.3-6.8.ia64", "3AS:python-0:2.2.3-6.8.ppc", "3AS:python-0:2.2.3-6.8.s390", "3AS:python-0:2.2.3-6.8.s390x", "3AS:python-0:2.2.3-6.8.src", "3AS:python-0:2.2.3-6.8.x86_64", "3AS:python-debuginfo-0:2.2.3-6.8.i386", "3AS:python-debuginfo-0:2.2.3-6.8.ia64", "3AS:python-debuginfo-0:2.2.3-6.8.ppc", "3AS:python-debuginfo-0:2.2.3-6.8.s390", "3AS:python-debuginfo-0:2.2.3-6.8.s390x", "3AS:python-debuginfo-0:2.2.3-6.8.x86_64", "3AS:python-devel-0:2.2.3-6.8.i386", "3AS:python-devel-0:2.2.3-6.8.ia64", "3AS:python-devel-0:2.2.3-6.8.ppc", "3AS:python-devel-0:2.2.3-6.8.s390", "3AS:python-devel-0:2.2.3-6.8.s390x", "3AS:python-devel-0:2.2.3-6.8.x86_64", "3AS:python-tools-0:2.2.3-6.8.i386", "3AS:python-tools-0:2.2.3-6.8.ia64", "3AS:python-tools-0:2.2.3-6.8.ppc", "3AS:python-tools-0:2.2.3-6.8.s390", "3AS:python-tools-0:2.2.3-6.8.s390x", "3AS:python-tools-0:2.2.3-6.8.x86_64", "3AS:tkinter-0:2.2.3-6.8.i386", "3AS:tkinter-0:2.2.3-6.8.ia64", "3AS:tkinter-0:2.2.3-6.8.ppc", "3AS:tkinter-0:2.2.3-6.8.s390", "3AS:tkinter-0:2.2.3-6.8.s390x", "3AS:tkinter-0:2.2.3-6.8.x86_64", "3Desktop:python-0:2.2.3-6.8.i386", "3Desktop:python-0:2.2.3-6.8.ia64", "3Desktop:python-0:2.2.3-6.8.ppc", "3Desktop:python-0:2.2.3-6.8.s390", "3Desktop:python-0:2.2.3-6.8.s390x", "3Desktop:python-0:2.2.3-6.8.src", "3Desktop:python-0:2.2.3-6.8.x86_64", "3Desktop:python-debuginfo-0:2.2.3-6.8.i386", "3Desktop:python-debuginfo-0:2.2.3-6.8.ia64", "3Desktop:python-debuginfo-0:2.2.3-6.8.ppc", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390x", "3Desktop:python-debuginfo-0:2.2.3-6.8.x86_64", "3Desktop:python-devel-0:2.2.3-6.8.i386", "3Desktop:python-devel-0:2.2.3-6.8.ia64", "3Desktop:python-devel-0:2.2.3-6.8.ppc", "3Desktop:python-devel-0:2.2.3-6.8.s390", "3Desktop:python-devel-0:2.2.3-6.8.s390x", "3Desktop:python-devel-0:2.2.3-6.8.x86_64", "3Desktop:python-tools-0:2.2.3-6.8.i386", "3Desktop:python-tools-0:2.2.3-6.8.ia64", "3Desktop:python-tools-0:2.2.3-6.8.ppc", "3Desktop:python-tools-0:2.2.3-6.8.s390", "3Desktop:python-tools-0:2.2.3-6.8.s390x", "3Desktop:python-tools-0:2.2.3-6.8.x86_64", "3Desktop:tkinter-0:2.2.3-6.8.i386", "3Desktop:tkinter-0:2.2.3-6.8.ia64", "3Desktop:tkinter-0:2.2.3-6.8.ppc", "3Desktop:tkinter-0:2.2.3-6.8.s390", "3Desktop:tkinter-0:2.2.3-6.8.s390x", "3Desktop:tkinter-0:2.2.3-6.8.x86_64", "3ES:python-0:2.2.3-6.8.i386", "3ES:python-0:2.2.3-6.8.ia64", "3ES:python-0:2.2.3-6.8.ppc", "3ES:python-0:2.2.3-6.8.s390", "3ES:python-0:2.2.3-6.8.s390x", "3ES:python-0:2.2.3-6.8.src", "3ES:python-0:2.2.3-6.8.x86_64", "3ES:python-debuginfo-0:2.2.3-6.8.i386", "3ES:python-debuginfo-0:2.2.3-6.8.ia64", "3ES:python-debuginfo-0:2.2.3-6.8.ppc", "3ES:python-debuginfo-0:2.2.3-6.8.s390", "3ES:python-debuginfo-0:2.2.3-6.8.s390x", "3ES:python-debuginfo-0:2.2.3-6.8.x86_64", "3ES:python-devel-0:2.2.3-6.8.i386", "3ES:python-devel-0:2.2.3-6.8.ia64", "3ES:python-devel-0:2.2.3-6.8.ppc", "3ES:python-devel-0:2.2.3-6.8.s390", "3ES:python-devel-0:2.2.3-6.8.s390x", "3ES:python-devel-0:2.2.3-6.8.x86_64", "3ES:python-tools-0:2.2.3-6.8.i386", "3ES:python-tools-0:2.2.3-6.8.ia64", "3ES:python-tools-0:2.2.3-6.8.ppc", "3ES:python-tools-0:2.2.3-6.8.s390", "3ES:python-tools-0:2.2.3-6.8.s390x", "3ES:python-tools-0:2.2.3-6.8.x86_64", "3ES:tkinter-0:2.2.3-6.8.i386", "3ES:tkinter-0:2.2.3-6.8.ia64", "3ES:tkinter-0:2.2.3-6.8.ppc", "3ES:tkinter-0:2.2.3-6.8.s390", "3ES:tkinter-0:2.2.3-6.8.s390x", "3ES:tkinter-0:2.2.3-6.8.x86_64", "3WS:python-0:2.2.3-6.8.i386", "3WS:python-0:2.2.3-6.8.ia64", "3WS:python-0:2.2.3-6.8.ppc", "3WS:python-0:2.2.3-6.8.s390", "3WS:python-0:2.2.3-6.8.s390x", "3WS:python-0:2.2.3-6.8.src", "3WS:python-0:2.2.3-6.8.x86_64", "3WS:python-debuginfo-0:2.2.3-6.8.i386", "3WS:python-debuginfo-0:2.2.3-6.8.ia64", "3WS:python-debuginfo-0:2.2.3-6.8.ppc", "3WS:python-debuginfo-0:2.2.3-6.8.s390", "3WS:python-debuginfo-0:2.2.3-6.8.s390x", "3WS:python-debuginfo-0:2.2.3-6.8.x86_64", "3WS:python-devel-0:2.2.3-6.8.i386", "3WS:python-devel-0:2.2.3-6.8.ia64", "3WS:python-devel-0:2.2.3-6.8.ppc", "3WS:python-devel-0:2.2.3-6.8.s390", "3WS:python-devel-0:2.2.3-6.8.s390x", "3WS:python-devel-0:2.2.3-6.8.x86_64", "3WS:python-tools-0:2.2.3-6.8.i386", "3WS:python-tools-0:2.2.3-6.8.ia64", "3WS:python-tools-0:2.2.3-6.8.ppc", "3WS:python-tools-0:2.2.3-6.8.s390", "3WS:python-tools-0:2.2.3-6.8.s390x", "3WS:python-tools-0:2.2.3-6.8.x86_64", "3WS:tkinter-0:2.2.3-6.8.i386", "3WS:tkinter-0:2.2.3-6.8.ia64", "3WS:tkinter-0:2.2.3-6.8.ppc", "3WS:tkinter-0:2.2.3-6.8.s390", "3WS:tkinter-0:2.2.3-6.8.s390x", "3WS:tkinter-0:2.2.3-6.8.x86_64", "4AS:python-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-0:2.3.4-14.4.el4_6.1.src", "4AS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-0:2.3.4-14.4.el4_6.1.src", "4Desktop:python-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-0:2.3.4-14.4.el4_6.1.src", "4ES:python-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-0:2.3.4-14.4.el4_6.1.src", "4WS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2007:1076", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "pcre integer overflow", }, { cve: "CVE-2007-2052", cwe: { id: "CWE-193", name: "Off-by-one Error", }, discovery_date: "2007-04-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "235093", }, ], notes: [ { category: "description", text: "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", title: "Vulnerability description", }, { category: "summary", text: "python off-by-one locale.strxfrm() (possible memory disclosure)", title: "Vulnerability summary", }, { category: "other", text: "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/", title: "Statement", }, ], product_status: { fixed: [ "3AS:python-0:2.2.3-6.8.i386", "3AS:python-0:2.2.3-6.8.ia64", "3AS:python-0:2.2.3-6.8.ppc", "3AS:python-0:2.2.3-6.8.s390", "3AS:python-0:2.2.3-6.8.s390x", "3AS:python-0:2.2.3-6.8.src", "3AS:python-0:2.2.3-6.8.x86_64", "3AS:python-debuginfo-0:2.2.3-6.8.i386", "3AS:python-debuginfo-0:2.2.3-6.8.ia64", "3AS:python-debuginfo-0:2.2.3-6.8.ppc", "3AS:python-debuginfo-0:2.2.3-6.8.s390", "3AS:python-debuginfo-0:2.2.3-6.8.s390x", "3AS:python-debuginfo-0:2.2.3-6.8.x86_64", "3AS:python-devel-0:2.2.3-6.8.i386", "3AS:python-devel-0:2.2.3-6.8.ia64", "3AS:python-devel-0:2.2.3-6.8.ppc", "3AS:python-devel-0:2.2.3-6.8.s390", "3AS:python-devel-0:2.2.3-6.8.s390x", "3AS:python-devel-0:2.2.3-6.8.x86_64", "3AS:python-tools-0:2.2.3-6.8.i386", "3AS:python-tools-0:2.2.3-6.8.ia64", "3AS:python-tools-0:2.2.3-6.8.ppc", "3AS:python-tools-0:2.2.3-6.8.s390", "3AS:python-tools-0:2.2.3-6.8.s390x", "3AS:python-tools-0:2.2.3-6.8.x86_64", "3AS:tkinter-0:2.2.3-6.8.i386", "3AS:tkinter-0:2.2.3-6.8.ia64", "3AS:tkinter-0:2.2.3-6.8.ppc", "3AS:tkinter-0:2.2.3-6.8.s390", "3AS:tkinter-0:2.2.3-6.8.s390x", "3AS:tkinter-0:2.2.3-6.8.x86_64", "3Desktop:python-0:2.2.3-6.8.i386", "3Desktop:python-0:2.2.3-6.8.ia64", "3Desktop:python-0:2.2.3-6.8.ppc", "3Desktop:python-0:2.2.3-6.8.s390", "3Desktop:python-0:2.2.3-6.8.s390x", "3Desktop:python-0:2.2.3-6.8.src", "3Desktop:python-0:2.2.3-6.8.x86_64", "3Desktop:python-debuginfo-0:2.2.3-6.8.i386", "3Desktop:python-debuginfo-0:2.2.3-6.8.ia64", "3Desktop:python-debuginfo-0:2.2.3-6.8.ppc", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390x", "3Desktop:python-debuginfo-0:2.2.3-6.8.x86_64", "3Desktop:python-devel-0:2.2.3-6.8.i386", "3Desktop:python-devel-0:2.2.3-6.8.ia64", "3Desktop:python-devel-0:2.2.3-6.8.ppc", "3Desktop:python-devel-0:2.2.3-6.8.s390", "3Desktop:python-devel-0:2.2.3-6.8.s390x", "3Desktop:python-devel-0:2.2.3-6.8.x86_64", "3Desktop:python-tools-0:2.2.3-6.8.i386", "3Desktop:python-tools-0:2.2.3-6.8.ia64", "3Desktop:python-tools-0:2.2.3-6.8.ppc", "3Desktop:python-tools-0:2.2.3-6.8.s390", "3Desktop:python-tools-0:2.2.3-6.8.s390x", "3Desktop:python-tools-0:2.2.3-6.8.x86_64", "3Desktop:tkinter-0:2.2.3-6.8.i386", "3Desktop:tkinter-0:2.2.3-6.8.ia64", "3Desktop:tkinter-0:2.2.3-6.8.ppc", "3Desktop:tkinter-0:2.2.3-6.8.s390", "3Desktop:tkinter-0:2.2.3-6.8.s390x", "3Desktop:tkinter-0:2.2.3-6.8.x86_64", "3ES:python-0:2.2.3-6.8.i386", "3ES:python-0:2.2.3-6.8.ia64", "3ES:python-0:2.2.3-6.8.ppc", "3ES:python-0:2.2.3-6.8.s390", "3ES:python-0:2.2.3-6.8.s390x", "3ES:python-0:2.2.3-6.8.src", "3ES:python-0:2.2.3-6.8.x86_64", "3ES:python-debuginfo-0:2.2.3-6.8.i386", "3ES:python-debuginfo-0:2.2.3-6.8.ia64", "3ES:python-debuginfo-0:2.2.3-6.8.ppc", "3ES:python-debuginfo-0:2.2.3-6.8.s390", "3ES:python-debuginfo-0:2.2.3-6.8.s390x", "3ES:python-debuginfo-0:2.2.3-6.8.x86_64", "3ES:python-devel-0:2.2.3-6.8.i386", "3ES:python-devel-0:2.2.3-6.8.ia64", "3ES:python-devel-0:2.2.3-6.8.ppc", "3ES:python-devel-0:2.2.3-6.8.s390", "3ES:python-devel-0:2.2.3-6.8.s390x", "3ES:python-devel-0:2.2.3-6.8.x86_64", "3ES:python-tools-0:2.2.3-6.8.i386", "3ES:python-tools-0:2.2.3-6.8.ia64", "3ES:python-tools-0:2.2.3-6.8.ppc", "3ES:python-tools-0:2.2.3-6.8.s390", "3ES:python-tools-0:2.2.3-6.8.s390x", "3ES:python-tools-0:2.2.3-6.8.x86_64", "3ES:tkinter-0:2.2.3-6.8.i386", "3ES:tkinter-0:2.2.3-6.8.ia64", "3ES:tkinter-0:2.2.3-6.8.ppc", "3ES:tkinter-0:2.2.3-6.8.s390", "3ES:tkinter-0:2.2.3-6.8.s390x", "3ES:tkinter-0:2.2.3-6.8.x86_64", "3WS:python-0:2.2.3-6.8.i386", "3WS:python-0:2.2.3-6.8.ia64", "3WS:python-0:2.2.3-6.8.ppc", "3WS:python-0:2.2.3-6.8.s390", "3WS:python-0:2.2.3-6.8.s390x", "3WS:python-0:2.2.3-6.8.src", "3WS:python-0:2.2.3-6.8.x86_64", "3WS:python-debuginfo-0:2.2.3-6.8.i386", "3WS:python-debuginfo-0:2.2.3-6.8.ia64", "3WS:python-debuginfo-0:2.2.3-6.8.ppc", "3WS:python-debuginfo-0:2.2.3-6.8.s390", "3WS:python-debuginfo-0:2.2.3-6.8.s390x", "3WS:python-debuginfo-0:2.2.3-6.8.x86_64", "3WS:python-devel-0:2.2.3-6.8.i386", "3WS:python-devel-0:2.2.3-6.8.ia64", "3WS:python-devel-0:2.2.3-6.8.ppc", "3WS:python-devel-0:2.2.3-6.8.s390", "3WS:python-devel-0:2.2.3-6.8.s390x", "3WS:python-devel-0:2.2.3-6.8.x86_64", "3WS:python-tools-0:2.2.3-6.8.i386", "3WS:python-tools-0:2.2.3-6.8.ia64", "3WS:python-tools-0:2.2.3-6.8.ppc", "3WS:python-tools-0:2.2.3-6.8.s390", "3WS:python-tools-0:2.2.3-6.8.s390x", "3WS:python-tools-0:2.2.3-6.8.x86_64", "3WS:tkinter-0:2.2.3-6.8.i386", "3WS:tkinter-0:2.2.3-6.8.ia64", "3WS:tkinter-0:2.2.3-6.8.ppc", "3WS:tkinter-0:2.2.3-6.8.s390", "3WS:tkinter-0:2.2.3-6.8.s390x", "3WS:tkinter-0:2.2.3-6.8.x86_64", "4AS:python-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-0:2.3.4-14.4.el4_6.1.src", "4AS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-0:2.3.4-14.4.el4_6.1.src", "4Desktop:python-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-0:2.3.4-14.4.el4_6.1.src", "4ES:python-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-0:2.3.4-14.4.el4_6.1.src", "4WS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2007-2052", }, { category: "external", summary: "RHBZ#235093", url: "https://bugzilla.redhat.com/show_bug.cgi?id=235093", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2007-2052", url: "https://www.cve.org/CVERecord?id=CVE-2007-2052", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", url: "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", }, ], release_date: "2007-04-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2007-12-10T18:20:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "3AS:python-0:2.2.3-6.8.i386", "3AS:python-0:2.2.3-6.8.ia64", "3AS:python-0:2.2.3-6.8.ppc", "3AS:python-0:2.2.3-6.8.s390", "3AS:python-0:2.2.3-6.8.s390x", "3AS:python-0:2.2.3-6.8.src", "3AS:python-0:2.2.3-6.8.x86_64", "3AS:python-debuginfo-0:2.2.3-6.8.i386", "3AS:python-debuginfo-0:2.2.3-6.8.ia64", "3AS:python-debuginfo-0:2.2.3-6.8.ppc", "3AS:python-debuginfo-0:2.2.3-6.8.s390", "3AS:python-debuginfo-0:2.2.3-6.8.s390x", "3AS:python-debuginfo-0:2.2.3-6.8.x86_64", "3AS:python-devel-0:2.2.3-6.8.i386", "3AS:python-devel-0:2.2.3-6.8.ia64", "3AS:python-devel-0:2.2.3-6.8.ppc", "3AS:python-devel-0:2.2.3-6.8.s390", "3AS:python-devel-0:2.2.3-6.8.s390x", "3AS:python-devel-0:2.2.3-6.8.x86_64", "3AS:python-tools-0:2.2.3-6.8.i386", "3AS:python-tools-0:2.2.3-6.8.ia64", "3AS:python-tools-0:2.2.3-6.8.ppc", "3AS:python-tools-0:2.2.3-6.8.s390", "3AS:python-tools-0:2.2.3-6.8.s390x", "3AS:python-tools-0:2.2.3-6.8.x86_64", "3AS:tkinter-0:2.2.3-6.8.i386", "3AS:tkinter-0:2.2.3-6.8.ia64", "3AS:tkinter-0:2.2.3-6.8.ppc", "3AS:tkinter-0:2.2.3-6.8.s390", "3AS:tkinter-0:2.2.3-6.8.s390x", "3AS:tkinter-0:2.2.3-6.8.x86_64", "3Desktop:python-0:2.2.3-6.8.i386", "3Desktop:python-0:2.2.3-6.8.ia64", "3Desktop:python-0:2.2.3-6.8.ppc", "3Desktop:python-0:2.2.3-6.8.s390", "3Desktop:python-0:2.2.3-6.8.s390x", "3Desktop:python-0:2.2.3-6.8.src", "3Desktop:python-0:2.2.3-6.8.x86_64", "3Desktop:python-debuginfo-0:2.2.3-6.8.i386", "3Desktop:python-debuginfo-0:2.2.3-6.8.ia64", "3Desktop:python-debuginfo-0:2.2.3-6.8.ppc", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390x", "3Desktop:python-debuginfo-0:2.2.3-6.8.x86_64", "3Desktop:python-devel-0:2.2.3-6.8.i386", "3Desktop:python-devel-0:2.2.3-6.8.ia64", "3Desktop:python-devel-0:2.2.3-6.8.ppc", "3Desktop:python-devel-0:2.2.3-6.8.s390", "3Desktop:python-devel-0:2.2.3-6.8.s390x", "3Desktop:python-devel-0:2.2.3-6.8.x86_64", "3Desktop:python-tools-0:2.2.3-6.8.i386", "3Desktop:python-tools-0:2.2.3-6.8.ia64", "3Desktop:python-tools-0:2.2.3-6.8.ppc", "3Desktop:python-tools-0:2.2.3-6.8.s390", "3Desktop:python-tools-0:2.2.3-6.8.s390x", "3Desktop:python-tools-0:2.2.3-6.8.x86_64", "3Desktop:tkinter-0:2.2.3-6.8.i386", "3Desktop:tkinter-0:2.2.3-6.8.ia64", "3Desktop:tkinter-0:2.2.3-6.8.ppc", "3Desktop:tkinter-0:2.2.3-6.8.s390", "3Desktop:tkinter-0:2.2.3-6.8.s390x", "3Desktop:tkinter-0:2.2.3-6.8.x86_64", "3ES:python-0:2.2.3-6.8.i386", "3ES:python-0:2.2.3-6.8.ia64", "3ES:python-0:2.2.3-6.8.ppc", "3ES:python-0:2.2.3-6.8.s390", "3ES:python-0:2.2.3-6.8.s390x", "3ES:python-0:2.2.3-6.8.src", "3ES:python-0:2.2.3-6.8.x86_64", "3ES:python-debuginfo-0:2.2.3-6.8.i386", "3ES:python-debuginfo-0:2.2.3-6.8.ia64", "3ES:python-debuginfo-0:2.2.3-6.8.ppc", "3ES:python-debuginfo-0:2.2.3-6.8.s390", "3ES:python-debuginfo-0:2.2.3-6.8.s390x", "3ES:python-debuginfo-0:2.2.3-6.8.x86_64", "3ES:python-devel-0:2.2.3-6.8.i386", "3ES:python-devel-0:2.2.3-6.8.ia64", "3ES:python-devel-0:2.2.3-6.8.ppc", "3ES:python-devel-0:2.2.3-6.8.s390", "3ES:python-devel-0:2.2.3-6.8.s390x", "3ES:python-devel-0:2.2.3-6.8.x86_64", "3ES:python-tools-0:2.2.3-6.8.i386", "3ES:python-tools-0:2.2.3-6.8.ia64", "3ES:python-tools-0:2.2.3-6.8.ppc", "3ES:python-tools-0:2.2.3-6.8.s390", "3ES:python-tools-0:2.2.3-6.8.s390x", "3ES:python-tools-0:2.2.3-6.8.x86_64", "3ES:tkinter-0:2.2.3-6.8.i386", "3ES:tkinter-0:2.2.3-6.8.ia64", "3ES:tkinter-0:2.2.3-6.8.ppc", "3ES:tkinter-0:2.2.3-6.8.s390", "3ES:tkinter-0:2.2.3-6.8.s390x", "3ES:tkinter-0:2.2.3-6.8.x86_64", "3WS:python-0:2.2.3-6.8.i386", "3WS:python-0:2.2.3-6.8.ia64", "3WS:python-0:2.2.3-6.8.ppc", "3WS:python-0:2.2.3-6.8.s390", "3WS:python-0:2.2.3-6.8.s390x", "3WS:python-0:2.2.3-6.8.src", "3WS:python-0:2.2.3-6.8.x86_64", "3WS:python-debuginfo-0:2.2.3-6.8.i386", "3WS:python-debuginfo-0:2.2.3-6.8.ia64", "3WS:python-debuginfo-0:2.2.3-6.8.ppc", "3WS:python-debuginfo-0:2.2.3-6.8.s390", "3WS:python-debuginfo-0:2.2.3-6.8.s390x", "3WS:python-debuginfo-0:2.2.3-6.8.x86_64", "3WS:python-devel-0:2.2.3-6.8.i386", "3WS:python-devel-0:2.2.3-6.8.ia64", "3WS:python-devel-0:2.2.3-6.8.ppc", "3WS:python-devel-0:2.2.3-6.8.s390", "3WS:python-devel-0:2.2.3-6.8.s390x", "3WS:python-devel-0:2.2.3-6.8.x86_64", "3WS:python-tools-0:2.2.3-6.8.i386", "3WS:python-tools-0:2.2.3-6.8.ia64", "3WS:python-tools-0:2.2.3-6.8.ppc", "3WS:python-tools-0:2.2.3-6.8.s390", "3WS:python-tools-0:2.2.3-6.8.s390x", "3WS:python-tools-0:2.2.3-6.8.x86_64", "3WS:tkinter-0:2.2.3-6.8.i386", "3WS:tkinter-0:2.2.3-6.8.ia64", "3WS:tkinter-0:2.2.3-6.8.ppc", "3WS:tkinter-0:2.2.3-6.8.s390", "3WS:tkinter-0:2.2.3-6.8.s390x", "3WS:tkinter-0:2.2.3-6.8.x86_64", "4AS:python-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-0:2.3.4-14.4.el4_6.1.src", "4AS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-0:2.3.4-14.4.el4_6.1.src", "4Desktop:python-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-0:2.3.4-14.4.el4_6.1.src", "4ES:python-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-0:2.3.4-14.4.el4_6.1.src", "4WS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2007:1076", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python off-by-one locale.strxfrm() (possible memory disclosure)", }, { cve: "CVE-2007-4965", discovery_date: "2007-09-18T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "295971", }, ], notes: [ { category: "description", text: "Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.", title: "Vulnerability description", }, { category: "summary", text: "python imageop module heap corruption", title: "Vulnerability summary", }, { category: "other", text: "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=295971\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/", title: "Statement", }, ], product_status: { fixed: [ "3AS:python-0:2.2.3-6.8.i386", "3AS:python-0:2.2.3-6.8.ia64", "3AS:python-0:2.2.3-6.8.ppc", "3AS:python-0:2.2.3-6.8.s390", "3AS:python-0:2.2.3-6.8.s390x", "3AS:python-0:2.2.3-6.8.src", "3AS:python-0:2.2.3-6.8.x86_64", "3AS:python-debuginfo-0:2.2.3-6.8.i386", "3AS:python-debuginfo-0:2.2.3-6.8.ia64", "3AS:python-debuginfo-0:2.2.3-6.8.ppc", "3AS:python-debuginfo-0:2.2.3-6.8.s390", "3AS:python-debuginfo-0:2.2.3-6.8.s390x", "3AS:python-debuginfo-0:2.2.3-6.8.x86_64", "3AS:python-devel-0:2.2.3-6.8.i386", "3AS:python-devel-0:2.2.3-6.8.ia64", "3AS:python-devel-0:2.2.3-6.8.ppc", "3AS:python-devel-0:2.2.3-6.8.s390", "3AS:python-devel-0:2.2.3-6.8.s390x", "3AS:python-devel-0:2.2.3-6.8.x86_64", "3AS:python-tools-0:2.2.3-6.8.i386", "3AS:python-tools-0:2.2.3-6.8.ia64", "3AS:python-tools-0:2.2.3-6.8.ppc", "3AS:python-tools-0:2.2.3-6.8.s390", "3AS:python-tools-0:2.2.3-6.8.s390x", "3AS:python-tools-0:2.2.3-6.8.x86_64", "3AS:tkinter-0:2.2.3-6.8.i386", "3AS:tkinter-0:2.2.3-6.8.ia64", "3AS:tkinter-0:2.2.3-6.8.ppc", "3AS:tkinter-0:2.2.3-6.8.s390", "3AS:tkinter-0:2.2.3-6.8.s390x", "3AS:tkinter-0:2.2.3-6.8.x86_64", "3Desktop:python-0:2.2.3-6.8.i386", "3Desktop:python-0:2.2.3-6.8.ia64", "3Desktop:python-0:2.2.3-6.8.ppc", "3Desktop:python-0:2.2.3-6.8.s390", "3Desktop:python-0:2.2.3-6.8.s390x", "3Desktop:python-0:2.2.3-6.8.src", "3Desktop:python-0:2.2.3-6.8.x86_64", "3Desktop:python-debuginfo-0:2.2.3-6.8.i386", "3Desktop:python-debuginfo-0:2.2.3-6.8.ia64", "3Desktop:python-debuginfo-0:2.2.3-6.8.ppc", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390x", "3Desktop:python-debuginfo-0:2.2.3-6.8.x86_64", "3Desktop:python-devel-0:2.2.3-6.8.i386", "3Desktop:python-devel-0:2.2.3-6.8.ia64", "3Desktop:python-devel-0:2.2.3-6.8.ppc", "3Desktop:python-devel-0:2.2.3-6.8.s390", "3Desktop:python-devel-0:2.2.3-6.8.s390x", "3Desktop:python-devel-0:2.2.3-6.8.x86_64", "3Desktop:python-tools-0:2.2.3-6.8.i386", "3Desktop:python-tools-0:2.2.3-6.8.ia64", "3Desktop:python-tools-0:2.2.3-6.8.ppc", "3Desktop:python-tools-0:2.2.3-6.8.s390", "3Desktop:python-tools-0:2.2.3-6.8.s390x", "3Desktop:python-tools-0:2.2.3-6.8.x86_64", "3Desktop:tkinter-0:2.2.3-6.8.i386", "3Desktop:tkinter-0:2.2.3-6.8.ia64", "3Desktop:tkinter-0:2.2.3-6.8.ppc", "3Desktop:tkinter-0:2.2.3-6.8.s390", "3Desktop:tkinter-0:2.2.3-6.8.s390x", "3Desktop:tkinter-0:2.2.3-6.8.x86_64", "3ES:python-0:2.2.3-6.8.i386", "3ES:python-0:2.2.3-6.8.ia64", "3ES:python-0:2.2.3-6.8.ppc", "3ES:python-0:2.2.3-6.8.s390", "3ES:python-0:2.2.3-6.8.s390x", "3ES:python-0:2.2.3-6.8.src", "3ES:python-0:2.2.3-6.8.x86_64", "3ES:python-debuginfo-0:2.2.3-6.8.i386", "3ES:python-debuginfo-0:2.2.3-6.8.ia64", "3ES:python-debuginfo-0:2.2.3-6.8.ppc", "3ES:python-debuginfo-0:2.2.3-6.8.s390", "3ES:python-debuginfo-0:2.2.3-6.8.s390x", "3ES:python-debuginfo-0:2.2.3-6.8.x86_64", "3ES:python-devel-0:2.2.3-6.8.i386", "3ES:python-devel-0:2.2.3-6.8.ia64", "3ES:python-devel-0:2.2.3-6.8.ppc", "3ES:python-devel-0:2.2.3-6.8.s390", "3ES:python-devel-0:2.2.3-6.8.s390x", "3ES:python-devel-0:2.2.3-6.8.x86_64", "3ES:python-tools-0:2.2.3-6.8.i386", "3ES:python-tools-0:2.2.3-6.8.ia64", "3ES:python-tools-0:2.2.3-6.8.ppc", "3ES:python-tools-0:2.2.3-6.8.s390", "3ES:python-tools-0:2.2.3-6.8.s390x", "3ES:python-tools-0:2.2.3-6.8.x86_64", "3ES:tkinter-0:2.2.3-6.8.i386", "3ES:tkinter-0:2.2.3-6.8.ia64", "3ES:tkinter-0:2.2.3-6.8.ppc", "3ES:tkinter-0:2.2.3-6.8.s390", "3ES:tkinter-0:2.2.3-6.8.s390x", "3ES:tkinter-0:2.2.3-6.8.x86_64", "3WS:python-0:2.2.3-6.8.i386", "3WS:python-0:2.2.3-6.8.ia64", "3WS:python-0:2.2.3-6.8.ppc", "3WS:python-0:2.2.3-6.8.s390", "3WS:python-0:2.2.3-6.8.s390x", "3WS:python-0:2.2.3-6.8.src", "3WS:python-0:2.2.3-6.8.x86_64", "3WS:python-debuginfo-0:2.2.3-6.8.i386", "3WS:python-debuginfo-0:2.2.3-6.8.ia64", "3WS:python-debuginfo-0:2.2.3-6.8.ppc", "3WS:python-debuginfo-0:2.2.3-6.8.s390", "3WS:python-debuginfo-0:2.2.3-6.8.s390x", "3WS:python-debuginfo-0:2.2.3-6.8.x86_64", "3WS:python-devel-0:2.2.3-6.8.i386", "3WS:python-devel-0:2.2.3-6.8.ia64", "3WS:python-devel-0:2.2.3-6.8.ppc", "3WS:python-devel-0:2.2.3-6.8.s390", "3WS:python-devel-0:2.2.3-6.8.s390x", "3WS:python-devel-0:2.2.3-6.8.x86_64", "3WS:python-tools-0:2.2.3-6.8.i386", "3WS:python-tools-0:2.2.3-6.8.ia64", "3WS:python-tools-0:2.2.3-6.8.ppc", "3WS:python-tools-0:2.2.3-6.8.s390", "3WS:python-tools-0:2.2.3-6.8.s390x", "3WS:python-tools-0:2.2.3-6.8.x86_64", "3WS:tkinter-0:2.2.3-6.8.i386", "3WS:tkinter-0:2.2.3-6.8.ia64", "3WS:tkinter-0:2.2.3-6.8.ppc", "3WS:tkinter-0:2.2.3-6.8.s390", "3WS:tkinter-0:2.2.3-6.8.s390x", "3WS:tkinter-0:2.2.3-6.8.x86_64", "4AS:python-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-0:2.3.4-14.4.el4_6.1.src", "4AS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-0:2.3.4-14.4.el4_6.1.src", "4Desktop:python-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-0:2.3.4-14.4.el4_6.1.src", "4ES:python-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-0:2.3.4-14.4.el4_6.1.src", "4WS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2007-4965", }, { category: "external", summary: "RHBZ#295971", url: "https://bugzilla.redhat.com/show_bug.cgi?id=295971", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2007-4965", url: "https://www.cve.org/CVERecord?id=CVE-2007-4965", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", url: "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", }, ], release_date: "2007-09-16T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2007-12-10T18:20:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "3AS:python-0:2.2.3-6.8.i386", "3AS:python-0:2.2.3-6.8.ia64", "3AS:python-0:2.2.3-6.8.ppc", "3AS:python-0:2.2.3-6.8.s390", "3AS:python-0:2.2.3-6.8.s390x", "3AS:python-0:2.2.3-6.8.src", "3AS:python-0:2.2.3-6.8.x86_64", "3AS:python-debuginfo-0:2.2.3-6.8.i386", "3AS:python-debuginfo-0:2.2.3-6.8.ia64", "3AS:python-debuginfo-0:2.2.3-6.8.ppc", "3AS:python-debuginfo-0:2.2.3-6.8.s390", "3AS:python-debuginfo-0:2.2.3-6.8.s390x", "3AS:python-debuginfo-0:2.2.3-6.8.x86_64", "3AS:python-devel-0:2.2.3-6.8.i386", "3AS:python-devel-0:2.2.3-6.8.ia64", "3AS:python-devel-0:2.2.3-6.8.ppc", "3AS:python-devel-0:2.2.3-6.8.s390", "3AS:python-devel-0:2.2.3-6.8.s390x", "3AS:python-devel-0:2.2.3-6.8.x86_64", "3AS:python-tools-0:2.2.3-6.8.i386", "3AS:python-tools-0:2.2.3-6.8.ia64", "3AS:python-tools-0:2.2.3-6.8.ppc", "3AS:python-tools-0:2.2.3-6.8.s390", "3AS:python-tools-0:2.2.3-6.8.s390x", "3AS:python-tools-0:2.2.3-6.8.x86_64", "3AS:tkinter-0:2.2.3-6.8.i386", "3AS:tkinter-0:2.2.3-6.8.ia64", "3AS:tkinter-0:2.2.3-6.8.ppc", "3AS:tkinter-0:2.2.3-6.8.s390", "3AS:tkinter-0:2.2.3-6.8.s390x", "3AS:tkinter-0:2.2.3-6.8.x86_64", "3Desktop:python-0:2.2.3-6.8.i386", "3Desktop:python-0:2.2.3-6.8.ia64", "3Desktop:python-0:2.2.3-6.8.ppc", "3Desktop:python-0:2.2.3-6.8.s390", "3Desktop:python-0:2.2.3-6.8.s390x", "3Desktop:python-0:2.2.3-6.8.src", "3Desktop:python-0:2.2.3-6.8.x86_64", "3Desktop:python-debuginfo-0:2.2.3-6.8.i386", "3Desktop:python-debuginfo-0:2.2.3-6.8.ia64", "3Desktop:python-debuginfo-0:2.2.3-6.8.ppc", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390x", "3Desktop:python-debuginfo-0:2.2.3-6.8.x86_64", "3Desktop:python-devel-0:2.2.3-6.8.i386", "3Desktop:python-devel-0:2.2.3-6.8.ia64", "3Desktop:python-devel-0:2.2.3-6.8.ppc", "3Desktop:python-devel-0:2.2.3-6.8.s390", "3Desktop:python-devel-0:2.2.3-6.8.s390x", "3Desktop:python-devel-0:2.2.3-6.8.x86_64", "3Desktop:python-tools-0:2.2.3-6.8.i386", "3Desktop:python-tools-0:2.2.3-6.8.ia64", "3Desktop:python-tools-0:2.2.3-6.8.ppc", "3Desktop:python-tools-0:2.2.3-6.8.s390", "3Desktop:python-tools-0:2.2.3-6.8.s390x", "3Desktop:python-tools-0:2.2.3-6.8.x86_64", "3Desktop:tkinter-0:2.2.3-6.8.i386", "3Desktop:tkinter-0:2.2.3-6.8.ia64", "3Desktop:tkinter-0:2.2.3-6.8.ppc", "3Desktop:tkinter-0:2.2.3-6.8.s390", "3Desktop:tkinter-0:2.2.3-6.8.s390x", "3Desktop:tkinter-0:2.2.3-6.8.x86_64", "3ES:python-0:2.2.3-6.8.i386", "3ES:python-0:2.2.3-6.8.ia64", "3ES:python-0:2.2.3-6.8.ppc", "3ES:python-0:2.2.3-6.8.s390", "3ES:python-0:2.2.3-6.8.s390x", "3ES:python-0:2.2.3-6.8.src", "3ES:python-0:2.2.3-6.8.x86_64", "3ES:python-debuginfo-0:2.2.3-6.8.i386", "3ES:python-debuginfo-0:2.2.3-6.8.ia64", "3ES:python-debuginfo-0:2.2.3-6.8.ppc", "3ES:python-debuginfo-0:2.2.3-6.8.s390", "3ES:python-debuginfo-0:2.2.3-6.8.s390x", "3ES:python-debuginfo-0:2.2.3-6.8.x86_64", "3ES:python-devel-0:2.2.3-6.8.i386", "3ES:python-devel-0:2.2.3-6.8.ia64", "3ES:python-devel-0:2.2.3-6.8.ppc", "3ES:python-devel-0:2.2.3-6.8.s390", "3ES:python-devel-0:2.2.3-6.8.s390x", "3ES:python-devel-0:2.2.3-6.8.x86_64", "3ES:python-tools-0:2.2.3-6.8.i386", "3ES:python-tools-0:2.2.3-6.8.ia64", "3ES:python-tools-0:2.2.3-6.8.ppc", "3ES:python-tools-0:2.2.3-6.8.s390", "3ES:python-tools-0:2.2.3-6.8.s390x", "3ES:python-tools-0:2.2.3-6.8.x86_64", "3ES:tkinter-0:2.2.3-6.8.i386", "3ES:tkinter-0:2.2.3-6.8.ia64", "3ES:tkinter-0:2.2.3-6.8.ppc", "3ES:tkinter-0:2.2.3-6.8.s390", "3ES:tkinter-0:2.2.3-6.8.s390x", "3ES:tkinter-0:2.2.3-6.8.x86_64", "3WS:python-0:2.2.3-6.8.i386", "3WS:python-0:2.2.3-6.8.ia64", "3WS:python-0:2.2.3-6.8.ppc", "3WS:python-0:2.2.3-6.8.s390", "3WS:python-0:2.2.3-6.8.s390x", "3WS:python-0:2.2.3-6.8.src", "3WS:python-0:2.2.3-6.8.x86_64", "3WS:python-debuginfo-0:2.2.3-6.8.i386", "3WS:python-debuginfo-0:2.2.3-6.8.ia64", "3WS:python-debuginfo-0:2.2.3-6.8.ppc", "3WS:python-debuginfo-0:2.2.3-6.8.s390", "3WS:python-debuginfo-0:2.2.3-6.8.s390x", "3WS:python-debuginfo-0:2.2.3-6.8.x86_64", "3WS:python-devel-0:2.2.3-6.8.i386", "3WS:python-devel-0:2.2.3-6.8.ia64", "3WS:python-devel-0:2.2.3-6.8.ppc", "3WS:python-devel-0:2.2.3-6.8.s390", "3WS:python-devel-0:2.2.3-6.8.s390x", "3WS:python-devel-0:2.2.3-6.8.x86_64", "3WS:python-tools-0:2.2.3-6.8.i386", "3WS:python-tools-0:2.2.3-6.8.ia64", "3WS:python-tools-0:2.2.3-6.8.ppc", "3WS:python-tools-0:2.2.3-6.8.s390", "3WS:python-tools-0:2.2.3-6.8.s390x", "3WS:python-tools-0:2.2.3-6.8.x86_64", "3WS:tkinter-0:2.2.3-6.8.i386", "3WS:tkinter-0:2.2.3-6.8.ia64", "3WS:tkinter-0:2.2.3-6.8.ppc", "3WS:tkinter-0:2.2.3-6.8.s390", "3WS:tkinter-0:2.2.3-6.8.s390x", "3WS:tkinter-0:2.2.3-6.8.x86_64", "4AS:python-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-0:2.3.4-14.4.el4_6.1.src", "4AS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-0:2.3.4-14.4.el4_6.1.src", "4Desktop:python-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-0:2.3.4-14.4.el4_6.1.src", "4ES:python-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-0:2.3.4-14.4.el4_6.1.src", "4WS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2007:1076", }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "python imageop module heap corruption", }, ], }
rhsa-2008_0264
Vulnerability from csaf_redhat
Published
2008-05-20 14:15
Modified
2024-11-22 01:57
Summary
Red Hat Security Advisory: Red Hat Network Satellite Server Solaris client security update
Notes
Topic
Red Hat Network Satellite Server version 5.0.2 is now available. This
update includes fixes for a number of security issues in Red Hat Network
Satellite Server Solaris client components.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
This release corrects several security vulnerabilities in various
components shipped as part of the Red Hat Network Satellite Server Solaris
client. In a typical operating environment, these components are not used
by the Satellite Server in a vulnerable manner. These security updates will
reduce risk should these components be used by other applications.
Two denial-of-service flaws were fixed in ZLib. (CVE-2005-2096,
CVE-2005-1849)
Multiple flaws were fixed in OpenSSL. (CVE-2006-4343, CVE-2006-4339,
CVE-2006-3738, CVE-2006-2940, CVE-2006-2937, CVE-2005-2969)
Multiple flaws were fixed in Python. (CVE-2007-4965, CVE-2007-2052,
CVE-2006-4980, CVE-2006-1542)
Users of Red Hat Network Satellite Server 5.0.1 are advised to upgrade to
5.0.2, which resolves these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Red Hat Network Satellite Server version 5.0.2 is now available. This\nupdate includes fixes for a number of security issues in Red Hat Network\nSatellite Server Solaris client components.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", title: "Topic", }, { category: "general", text: "This release corrects several security vulnerabilities in various\ncomponents shipped as part of the Red Hat Network Satellite Server Solaris\nclient. In a typical operating environment, these components are not used\nby the Satellite Server in a vulnerable manner. These security updates will\nreduce risk should these components be used by other applications.\n\nTwo denial-of-service flaws were fixed in ZLib. (CVE-2005-2096,\nCVE-2005-1849)\n\nMultiple flaws were fixed in OpenSSL. (CVE-2006-4343, CVE-2006-4339,\nCVE-2006-3738, CVE-2006-2940, CVE-2006-2937, CVE-2005-2969)\n\nMultiple flaws were fixed in Python. (CVE-2007-4965, CVE-2007-2052,\nCVE-2006-4980, CVE-2006-1542)\n\nUsers of Red Hat Network Satellite Server 5.0.1 are advised to upgrade to\n5.0.2, which resolves these issues.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2008:0264", url: "https://access.redhat.com/errata/RHSA-2008:0264", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "235093", url: "https://bugzilla.redhat.com/show_bug.cgi?id=235093", }, { category: "external", summary: "295971", url: "https://bugzilla.redhat.com/show_bug.cgi?id=295971", }, { category: "external", summary: "430640", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430640", }, { category: "external", summary: "430641", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430641", }, { category: "external", summary: "430649", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430649", }, { category: "external", summary: "430651", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430651", }, { category: "external", summary: "430652", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430652", }, { category: "external", summary: "430654", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430654", }, { category: "external", summary: "430655", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430655", }, { category: "external", summary: "430659", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430659", }, { category: "external", summary: "430660", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430660", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0264.json", }, ], title: "Red Hat Security Advisory: Red Hat Network Satellite Server Solaris client security update", tracking: { current_release_date: "2024-11-22T01:57:54+00:00", generator: { date: "2024-11-22T01:57:54+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2008:0264", initial_release_date: "2008-05-20T14:15:00+00:00", revision_history: [ { date: "2008-05-20T14:15:00+00:00", number: "1", summary: "Initial version", }, { date: "2008-05-20T10:16:00+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T01:57:54+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Satellite 5.0 (RHEL v.4 AS)", product: { name: "Red Hat Satellite 5.0 (RHEL v.4 AS)", product_id: "4AS-RHNSAT5", product_identification_helper: { cpe: "cpe:/a:redhat:network_satellite:5.0:el4", }, }, }, ], category: "product_family", name: "Red Hat Satellite", }, { branches: [ { category: "product_version", name: "rhn-solaris-bootstrap-0:5.0.2-3.noarch", product: { name: "rhn-solaris-bootstrap-0:5.0.2-3.noarch", product_id: "rhn-solaris-bootstrap-0:5.0.2-3.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/rhn-solaris-bootstrap@5.0.2-3?arch=noarch", }, }, }, { category: "product_version", name: "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", product: { name: "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", product_id: "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/rhn_solaris_bootstrap_5_0_2_3@1-0?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "rhn-solaris-bootstrap-0:5.0.2-3.noarch as a component of Red Hat Satellite 5.0 (RHEL v.4 AS)", product_id: "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", }, product_reference: "rhn-solaris-bootstrap-0:5.0.2-3.noarch", relates_to_product_reference: "4AS-RHNSAT5", }, { category: "default_component_of", full_product_name: { name: "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch as a component of Red Hat Satellite 5.0 (RHEL v.4 AS)", product_id: "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", }, product_reference: "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", relates_to_product_reference: "4AS-RHNSAT5", }, ], }, vulnerabilities: [ { cve: "CVE-2005-1849", discovery_date: "2006-07-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430649", }, ], notes: [ { category: "description", text: "inftrees.h in zlib 1.2.2 allows remote attackers to cause a denial of service (application crash) via an invalid file that causes a large dynamic tree to be produced.", title: "Vulnerability description", }, { category: "summary", text: "zlib DoS", title: "Vulnerability summary", }, ], product_status: { fixed: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2005-1849", }, { category: "external", summary: "RHBZ#430649", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430649", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2005-1849", url: "https://www.cve.org/CVERecord?id=CVE-2005-1849", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2005-1849", url: "https://nvd.nist.gov/vuln/detail/CVE-2005-1849", }, ], release_date: "2005-08-20T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-05-20T14:15:00+00:00", details: "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", product_ids: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0264", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "zlib DoS", }, { cve: "CVE-2005-2096", discovery_date: "2006-06-30T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430650", }, ], notes: [ { category: "description", text: "zlib 1.2 and later versions allows remote attackers to cause a denial of service (crash) via a crafted compressed stream with an incomplete code description of a length greater than 1, which leads to a buffer overflow, as demonstrated using a crafted PNG file.", title: "Vulnerability description", }, { category: "summary", text: "zlib DoS", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2005-2096", }, { category: "external", summary: "RHBZ#430650", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430650", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2005-2096", url: "https://www.cve.org/CVERecord?id=CVE-2005-2096", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2005-2096", url: "https://nvd.nist.gov/vuln/detail/CVE-2005-2096", }, ], release_date: "2005-07-06T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-05-20T14:15:00+00:00", details: "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", product_ids: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0264", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "zlib DoS", }, { cve: "CVE-2005-2969", discovery_date: "2005-10-04T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430660", }, ], notes: [ { category: "description", text: "The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.", title: "Vulnerability description", }, { category: "summary", text: "openssl mitm downgrade attack", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2005-2969", }, { category: "external", summary: "RHBZ#430660", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430660", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2005-2969", url: "https://www.cve.org/CVERecord?id=CVE-2005-2969", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2005-2969", url: "https://nvd.nist.gov/vuln/detail/CVE-2005-2969", }, ], release_date: "2005-10-11T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-05-20T14:15:00+00:00", details: "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", product_ids: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0264", }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "openssl mitm downgrade attack", }, { cve: "CVE-2006-1542", discovery_date: "2006-03-30T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430640", }, ], notes: [ { category: "description", text: "Stack-based buffer overflow in Python 2.4.2 and earlier, running on Linux 2.6.12.5 under gcc 4.0.3 with libc 2.3.5, allows local users to cause a \"stack overflow,\" and possibly gain privileges, by running a script from a current working directory that has a long name, related to the realpath function. NOTE: this might not be a vulnerability. However, the fact that it appears in a programming language interpreter could mean that some applications are affected, although attack scenarios might be limited because the attacker might already need to cross privilege boundaries to cause an exploitable program to be placed in a directory with a long name; or, depending on the method that Python uses to determine the current working directory, setuid applications might be affected.", title: "Vulnerability description", }, { category: "summary", text: "python buffer overflow", title: "Vulnerability summary", }, { category: "other", text: "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/\n\nRed Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-1542", }, { category: "external", summary: "RHBZ#430640", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430640", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-1542", url: "https://www.cve.org/CVERecord?id=CVE-2006-1542", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-1542", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-1542", }, ], release_date: "2005-09-22T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-05-20T14:15:00+00:00", details: "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", product_ids: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0264", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python buffer overflow", }, { cve: "CVE-2006-2937", discovery_date: "2006-07-03T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430655", }, ], notes: [ { category: "description", text: "OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition.", title: "Vulnerability description", }, { category: "summary", text: "openssl ASN.1 DoS", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-2937", }, { category: "external", summary: "RHBZ#430655", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430655", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-2937", url: "https://www.cve.org/CVERecord?id=CVE-2006-2937", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-2937", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-2937", }, ], release_date: "2006-09-28T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-05-20T14:15:00+00:00", details: "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", product_ids: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0264", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "openssl ASN.1 DoS", }, { cve: "CVE-2006-2940", discovery_date: "2006-07-03T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430654", }, ], notes: [ { category: "description", text: "OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) \"public exponent\" or (2) \"public modulus\" values in X.509 certificates that require extra time to process when using RSA signature verification.", title: "Vulnerability description", }, { category: "summary", text: "openssl public key DoS", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-2940", }, { category: "external", summary: "RHBZ#430654", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430654", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-2940", url: "https://www.cve.org/CVERecord?id=CVE-2006-2940", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-2940", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-2940", }, ], release_date: "2006-09-28T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-05-20T14:15:00+00:00", details: "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", product_ids: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0264", }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "openssl public key DoS", }, { cve: "CVE-2006-3738", discovery_date: "2006-08-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430652", }, ], notes: [ { category: "description", text: "Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.", title: "Vulnerability description", }, { category: "summary", text: "openssl get_shared_ciphers overflow", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-3738", }, { category: "external", summary: "RHBZ#430652", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430652", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-3738", url: "https://www.cve.org/CVERecord?id=CVE-2006-3738", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-3738", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-3738", }, ], release_date: "2006-09-28T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-05-20T14:15:00+00:00", details: "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", product_ids: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0264", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "openssl get_shared_ciphers overflow", }, { cve: "CVE-2006-4339", discovery_date: "2006-09-05T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430659", }, ], notes: [ { category: "description", text: "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.", title: "Vulnerability description", }, { category: "summary", text: "openssl signature forgery", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-4339", }, { category: "external", summary: "RHBZ#430659", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430659", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-4339", url: "https://www.cve.org/CVERecord?id=CVE-2006-4339", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-4339", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-4339", }, ], release_date: "2006-09-05T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-05-20T14:15:00+00:00", details: "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", product_ids: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0264", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "openssl signature forgery", }, { cve: "CVE-2006-4343", discovery_date: "2006-08-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430651", }, ], notes: [ { category: "description", text: "The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.", title: "Vulnerability description", }, { category: "summary", text: "openssl sslv2 client code", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-4343", }, { category: "external", summary: "RHBZ#430651", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430651", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-4343", url: "https://www.cve.org/CVERecord?id=CVE-2006-4343", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-4343", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-4343", }, ], release_date: "2006-09-28T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-05-20T14:15:00+00:00", details: "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", product_ids: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0264", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "openssl sslv2 client code", }, { cve: "CVE-2006-4980", discovery_date: "2006-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430641", }, ], notes: [ { category: "description", text: "Buffer overflow in the repr function in Python 2.3 through 2.6 before 20060822 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via crafted wide character UTF-32/UCS-4 strings to certain scripts.", title: "Vulnerability description", }, { category: "summary", text: "python repr unicode buffer overflow", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-4980", }, { category: "external", summary: "RHBZ#430641", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430641", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-4980", url: "https://www.cve.org/CVERecord?id=CVE-2006-4980", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-4980", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-4980", }, ], release_date: "2006-08-16T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-05-20T14:15:00+00:00", details: "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", product_ids: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0264", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "python repr unicode buffer overflow", }, { cve: "CVE-2007-2052", cwe: { id: "CWE-193", name: "Off-by-one Error", }, discovery_date: "2007-04-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "235093", }, ], notes: [ { category: "description", text: "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", title: "Vulnerability description", }, { category: "summary", text: "python off-by-one locale.strxfrm() (possible memory disclosure)", title: "Vulnerability summary", }, { category: "other", text: "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2007-2052", }, { category: "external", summary: "RHBZ#235093", url: "https://bugzilla.redhat.com/show_bug.cgi?id=235093", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2007-2052", url: "https://www.cve.org/CVERecord?id=CVE-2007-2052", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", url: "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", }, ], release_date: "2007-04-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-05-20T14:15:00+00:00", details: "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", product_ids: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0264", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python off-by-one locale.strxfrm() (possible memory disclosure)", }, { cve: "CVE-2007-4965", discovery_date: "2007-09-18T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "295971", }, ], notes: [ { category: "description", text: "Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.", title: "Vulnerability description", }, { category: "summary", text: "python imageop module heap corruption", title: "Vulnerability summary", }, { category: "other", text: "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=295971\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2007-4965", }, { category: "external", summary: "RHBZ#295971", url: "https://bugzilla.redhat.com/show_bug.cgi?id=295971", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2007-4965", url: "https://www.cve.org/CVERecord?id=CVE-2007-4965", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", url: "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", }, ], release_date: "2007-09-16T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-05-20T14:15:00+00:00", details: "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", product_ids: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0264", }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "python imageop module heap corruption", }, ], }
rhsa-2009_1176
Vulnerability from csaf_redhat
Published
2009-07-27 09:22
Modified
2024-11-22 02:31
Summary
Red Hat Security Advisory: python security update
Notes
Topic
Updated python packages that fix multiple security issues are now available
for Red Hat Enterprise Linux 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
Python is an interpreted, interactive, object-oriented programming
language.
When the assert() system call was disabled, an input sanitization flaw was
revealed in the Python string object implementation that led to a buffer
overflow. The missing check for negative size values meant the Python
memory allocator could allocate less memory than expected. This could
result in arbitrary code execution with the Python interpreter's
privileges. (CVE-2008-1887)
Multiple buffer and integer overflow flaws were found in the Python Unicode
string processing and in the Python Unicode and string object
implementations. An attacker could use these flaws to cause a denial of
service (Python application crash). (CVE-2008-3142, CVE-2008-5031)
Multiple integer overflow flaws were found in the Python imageop module. If
a Python application used the imageop module to process untrusted images,
it could cause the application to disclose sensitive information, crash or,
potentially, execute arbitrary code with the Python interpreter's
privileges. (CVE-2007-4965, CVE-2008-4864)
Multiple integer underflow and overflow flaws were found in the Python
snprintf() wrapper implementation. An attacker could use these flaws to
cause a denial of service (memory corruption). (CVE-2008-3144)
Multiple integer overflow flaws were found in various Python modules. An
attacker could use these flaws to cause a denial of service (Python
application crash). (CVE-2008-2315, CVE-2008-3143)
An integer signedness error, leading to a buffer overflow, was found
in the Python zlib extension module. If a Python application requested
the negative byte count be flushed for a decompression stream, it could
cause the application to crash or, potentially, execute arbitrary code
with the Python interpreter's privileges. (CVE-2008-1721)
A flaw was discovered in the strxfrm() function of the Python locale
module. Strings generated by this function were not properly
NULL-terminated, which could possibly cause disclosure of data stored in
the memory of a Python application using this function. (CVE-2007-2052)
Red Hat would like to thank David Remahl of the Apple Product Security team
for responsibly reporting the CVE-2008-2315 issue.
All Python users should upgrade to these updated packages, which contain
backported patches to correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Updated python packages that fix multiple security issues are now available\nfor Red Hat Enterprise Linux 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", title: "Topic", }, { category: "general", text: "Python is an interpreted, interactive, object-oriented programming\nlanguage.\n\nWhen the assert() system call was disabled, an input sanitization flaw was\nrevealed in the Python string object implementation that led to a buffer\noverflow. The missing check for negative size values meant the Python\nmemory allocator could allocate less memory than expected. This could\nresult in arbitrary code execution with the Python interpreter's\nprivileges. (CVE-2008-1887)\n\nMultiple buffer and integer overflow flaws were found in the Python Unicode\nstring processing and in the Python Unicode and string object\nimplementations. An attacker could use these flaws to cause a denial of\nservice (Python application crash). (CVE-2008-3142, CVE-2008-5031)\n\nMultiple integer overflow flaws were found in the Python imageop module. If\na Python application used the imageop module to process untrusted images,\nit could cause the application to disclose sensitive information, crash or,\npotentially, execute arbitrary code with the Python interpreter's\nprivileges. (CVE-2007-4965, CVE-2008-4864)\n\nMultiple integer underflow and overflow flaws were found in the Python\nsnprintf() wrapper implementation. An attacker could use these flaws to\ncause a denial of service (memory corruption). (CVE-2008-3144)\n\nMultiple integer overflow flaws were found in various Python modules. An\nattacker could use these flaws to cause a denial of service (Python\napplication crash). (CVE-2008-2315, CVE-2008-3143)\n\nAn integer signedness error, leading to a buffer overflow, was found\nin the Python zlib extension module. If a Python application requested\nthe negative byte count be flushed for a decompression stream, it could\ncause the application to crash or, potentially, execute arbitrary code\nwith the Python interpreter's privileges. (CVE-2008-1721)\n\nA flaw was discovered in the strxfrm() function of the Python locale\nmodule. Strings generated by this function were not properly\nNULL-terminated, which could possibly cause disclosure of data stored in\nthe memory of a Python application using this function. (CVE-2007-2052)\n\nRed Hat would like to thank David Remahl of the Apple Product Security team\nfor responsibly reporting the CVE-2008-2315 issue.\n\nAll Python users should upgrade to these updated packages, which contain\nbackported patches to correct these issues.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2009:1176", url: "https://access.redhat.com/errata/RHSA-2009:1176", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "235093", url: "https://bugzilla.redhat.com/show_bug.cgi?id=235093", }, { category: "external", summary: "295971", url: "https://bugzilla.redhat.com/show_bug.cgi?id=295971", }, { category: "external", summary: "442005", url: "https://bugzilla.redhat.com/show_bug.cgi?id=442005", }, { category: "external", summary: "443810", url: "https://bugzilla.redhat.com/show_bug.cgi?id=443810", }, { category: "external", summary: "454990", url: "https://bugzilla.redhat.com/show_bug.cgi?id=454990", }, { category: "external", summary: "455008", url: "https://bugzilla.redhat.com/show_bug.cgi?id=455008", }, { category: "external", summary: "455013", url: "https://bugzilla.redhat.com/show_bug.cgi?id=455013", }, { category: "external", summary: "455018", url: "https://bugzilla.redhat.com/show_bug.cgi?id=455018", }, { category: "external", summary: "469656", url: "https://bugzilla.redhat.com/show_bug.cgi?id=469656", }, { category: "external", summary: "470915", url: "https://bugzilla.redhat.com/show_bug.cgi?id=470915", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1176.json", }, ], title: "Red Hat Security Advisory: python security update", tracking: { current_release_date: "2024-11-22T02:31:38+00:00", generator: { date: "2024-11-22T02:31:38+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2009:1176", initial_release_date: "2009-07-27T09:22:00+00:00", revision_history: [ { date: "2009-07-27T09:22:00+00:00", number: "1", summary: "Initial version", }, { date: "2009-07-27T05:22:50+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T02:31:38+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux Desktop (v. 5 client)", product: { name: "Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:5::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product: { name: "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:5::client_workstation", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux (v. 5 server)", product: { name: "Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:5::server", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", product: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", product_id: "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.4.3-24.el5_3.6?arch=x86_64", }, }, }, { category: "product_version", name: "python-devel-0:2.4.3-24.el5_3.6.x86_64", product: { name: "python-devel-0:2.4.3-24.el5_3.6.x86_64", product_id: "python-devel-0:2.4.3-24.el5_3.6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.4.3-24.el5_3.6?arch=x86_64", }, }, }, { category: "product_version", name: "tkinter-0:2.4.3-24.el5_3.6.x86_64", product: { name: "tkinter-0:2.4.3-24.el5_3.6.x86_64", product_id: "tkinter-0:2.4.3-24.el5_3.6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.4.3-24.el5_3.6?arch=x86_64", }, }, }, { category: "product_version", name: "python-0:2.4.3-24.el5_3.6.x86_64", product: { name: "python-0:2.4.3-24.el5_3.6.x86_64", product_id: "python-0:2.4.3-24.el5_3.6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.4.3-24.el5_3.6?arch=x86_64", }, }, }, { category: "product_version", name: "python-tools-0:2.4.3-24.el5_3.6.x86_64", product: { name: "python-tools-0:2.4.3-24.el5_3.6.x86_64", product_id: "python-tools-0:2.4.3-24.el5_3.6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.4.3-24.el5_3.6?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "python-debuginfo-0:2.4.3-24.el5_3.6.i386", product: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.i386", product_id: "python-debuginfo-0:2.4.3-24.el5_3.6.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.4.3-24.el5_3.6?arch=i386", }, }, }, { category: "product_version", name: "python-devel-0:2.4.3-24.el5_3.6.i386", product: { name: "python-devel-0:2.4.3-24.el5_3.6.i386", product_id: "python-devel-0:2.4.3-24.el5_3.6.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.4.3-24.el5_3.6?arch=i386", }, }, }, { category: "product_version", name: "tkinter-0:2.4.3-24.el5_3.6.i386", product: { name: "tkinter-0:2.4.3-24.el5_3.6.i386", product_id: "tkinter-0:2.4.3-24.el5_3.6.i386", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.4.3-24.el5_3.6?arch=i386", }, }, }, { category: "product_version", name: "python-0:2.4.3-24.el5_3.6.i386", product: { name: "python-0:2.4.3-24.el5_3.6.i386", product_id: "python-0:2.4.3-24.el5_3.6.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.4.3-24.el5_3.6?arch=i386", }, }, }, { category: "product_version", name: "python-tools-0:2.4.3-24.el5_3.6.i386", product: { name: "python-tools-0:2.4.3-24.el5_3.6.i386", product_id: "python-tools-0:2.4.3-24.el5_3.6.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.4.3-24.el5_3.6?arch=i386", }, }, }, ], category: "architecture", name: "i386", }, { branches: [ { category: "product_version", name: "python-0:2.4.3-24.el5_3.6.src", product: { name: "python-0:2.4.3-24.el5_3.6.src", product_id: "python-0:2.4.3-24.el5_3.6.src", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.4.3-24.el5_3.6?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "python-debuginfo-0:2.4.3-24.el5_3.6.ia64", product: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.ia64", product_id: "python-debuginfo-0:2.4.3-24.el5_3.6.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.4.3-24.el5_3.6?arch=ia64", }, }, }, { category: "product_version", name: "tkinter-0:2.4.3-24.el5_3.6.ia64", product: { name: "tkinter-0:2.4.3-24.el5_3.6.ia64", product_id: "tkinter-0:2.4.3-24.el5_3.6.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.4.3-24.el5_3.6?arch=ia64", }, }, }, { category: "product_version", name: "python-0:2.4.3-24.el5_3.6.ia64", product: { name: "python-0:2.4.3-24.el5_3.6.ia64", product_id: "python-0:2.4.3-24.el5_3.6.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.4.3-24.el5_3.6?arch=ia64", }, }, }, { category: "product_version", name: "python-devel-0:2.4.3-24.el5_3.6.ia64", product: { name: "python-devel-0:2.4.3-24.el5_3.6.ia64", product_id: "python-devel-0:2.4.3-24.el5_3.6.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.4.3-24.el5_3.6?arch=ia64", }, }, }, { category: "product_version", name: "python-tools-0:2.4.3-24.el5_3.6.ia64", product: { name: "python-tools-0:2.4.3-24.el5_3.6.ia64", product_id: "python-tools-0:2.4.3-24.el5_3.6.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.4.3-24.el5_3.6?arch=ia64", }, }, }, ], category: "architecture", name: "ia64", }, { branches: [ { category: "product_version", name: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", product: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", product_id: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.4.3-24.el5_3.6?arch=ppc64", }, }, }, { category: "product_version", name: "python-devel-0:2.4.3-24.el5_3.6.ppc64", product: { name: "python-devel-0:2.4.3-24.el5_3.6.ppc64", product_id: "python-devel-0:2.4.3-24.el5_3.6.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.4.3-24.el5_3.6?arch=ppc64", }, }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc", product: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc", product_id: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.4.3-24.el5_3.6?arch=ppc", }, }, }, { category: "product_version", name: "tkinter-0:2.4.3-24.el5_3.6.ppc", product: { name: "tkinter-0:2.4.3-24.el5_3.6.ppc", product_id: "tkinter-0:2.4.3-24.el5_3.6.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.4.3-24.el5_3.6?arch=ppc", }, }, }, { category: "product_version", name: "python-0:2.4.3-24.el5_3.6.ppc", product: { name: "python-0:2.4.3-24.el5_3.6.ppc", product_id: "python-0:2.4.3-24.el5_3.6.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.4.3-24.el5_3.6?arch=ppc", }, }, }, { category: "product_version", name: "python-devel-0:2.4.3-24.el5_3.6.ppc", product: { name: "python-devel-0:2.4.3-24.el5_3.6.ppc", product_id: "python-devel-0:2.4.3-24.el5_3.6.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.4.3-24.el5_3.6?arch=ppc", }, }, }, { category: "product_version", name: "python-tools-0:2.4.3-24.el5_3.6.ppc", product: { name: "python-tools-0:2.4.3-24.el5_3.6.ppc", product_id: "python-tools-0:2.4.3-24.el5_3.6.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.4.3-24.el5_3.6?arch=ppc", }, }, }, ], category: "architecture", name: "ppc", }, { branches: [ { category: "product_version", name: "python-debuginfo-0:2.4.3-24.el5_3.6.s390x", product: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.s390x", product_id: "python-debuginfo-0:2.4.3-24.el5_3.6.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.4.3-24.el5_3.6?arch=s390x", }, }, }, { category: "product_version", name: "tkinter-0:2.4.3-24.el5_3.6.s390x", product: { name: "tkinter-0:2.4.3-24.el5_3.6.s390x", product_id: "tkinter-0:2.4.3-24.el5_3.6.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.4.3-24.el5_3.6?arch=s390x", }, }, }, { category: "product_version", name: "python-0:2.4.3-24.el5_3.6.s390x", product: { name: "python-0:2.4.3-24.el5_3.6.s390x", product_id: "python-0:2.4.3-24.el5_3.6.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.4.3-24.el5_3.6?arch=s390x", }, }, }, { category: "product_version", name: "python-devel-0:2.4.3-24.el5_3.6.s390x", product: { name: "python-devel-0:2.4.3-24.el5_3.6.s390x", product_id: "python-devel-0:2.4.3-24.el5_3.6.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.4.3-24.el5_3.6?arch=s390x", }, }, }, { category: "product_version", name: "python-tools-0:2.4.3-24.el5_3.6.s390x", product: { name: "python-tools-0:2.4.3-24.el5_3.6.s390x", product_id: "python-tools-0:2.4.3-24.el5_3.6.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.4.3-24.el5_3.6?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "python-debuginfo-0:2.4.3-24.el5_3.6.s390", product: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.s390", product_id: "python-debuginfo-0:2.4.3-24.el5_3.6.s390", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.4.3-24.el5_3.6?arch=s390", }, }, }, { category: "product_version", name: "python-devel-0:2.4.3-24.el5_3.6.s390", product: { name: "python-devel-0:2.4.3-24.el5_3.6.s390", product_id: "python-devel-0:2.4.3-24.el5_3.6.s390", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.4.3-24.el5_3.6?arch=s390", }, }, }, ], category: "architecture", name: "s390", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", }, product_reference: "python-0:2.4.3-24.el5_3.6.i386", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", }, product_reference: "python-0:2.4.3-24.el5_3.6.ia64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", }, product_reference: "python-0:2.4.3-24.el5_3.6.ppc", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", }, product_reference: "python-0:2.4.3-24.el5_3.6.s390x", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", }, product_reference: "python-0:2.4.3-24.el5_3.6.src", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", }, product_reference: "python-0:2.4.3-24.el5_3.6.x86_64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.i386", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.ia64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.s390", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.s390x", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.i386", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.ia64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.ppc", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.ppc64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.s390", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.s390x", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.x86_64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", }, product_reference: "python-tools-0:2.4.3-24.el5_3.6.i386", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", }, product_reference: "python-tools-0:2.4.3-24.el5_3.6.ia64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", }, product_reference: "python-tools-0:2.4.3-24.el5_3.6.ppc", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", }, product_reference: "python-tools-0:2.4.3-24.el5_3.6.s390x", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", }, product_reference: "python-tools-0:2.4.3-24.el5_3.6.x86_64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", }, product_reference: "tkinter-0:2.4.3-24.el5_3.6.i386", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", }, product_reference: "tkinter-0:2.4.3-24.el5_3.6.ia64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", }, product_reference: "tkinter-0:2.4.3-24.el5_3.6.ppc", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", }, product_reference: "tkinter-0:2.4.3-24.el5_3.6.s390x", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", }, product_reference: "tkinter-0:2.4.3-24.el5_3.6.x86_64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-0:2.4.3-24.el5_3.6.i386", }, product_reference: "python-0:2.4.3-24.el5_3.6.i386", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-0:2.4.3-24.el5_3.6.ia64", }, product_reference: "python-0:2.4.3-24.el5_3.6.ia64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-0:2.4.3-24.el5_3.6.ppc", }, product_reference: "python-0:2.4.3-24.el5_3.6.ppc", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-0:2.4.3-24.el5_3.6.s390x", }, product_reference: "python-0:2.4.3-24.el5_3.6.s390x", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-0:2.4.3-24.el5_3.6.src", }, product_reference: "python-0:2.4.3-24.el5_3.6.src", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-0:2.4.3-24.el5_3.6.x86_64", }, product_reference: "python-0:2.4.3-24.el5_3.6.x86_64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.i386", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.ia64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.s390", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.s390x", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.i386", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.ia64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.ppc", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.ppc64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.s390", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.s390x", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.x86_64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", }, product_reference: "python-tools-0:2.4.3-24.el5_3.6.i386", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", }, product_reference: "python-tools-0:2.4.3-24.el5_3.6.ia64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", }, product_reference: "python-tools-0:2.4.3-24.el5_3.6.ppc", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", }, product_reference: "python-tools-0:2.4.3-24.el5_3.6.s390x", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", }, product_reference: "python-tools-0:2.4.3-24.el5_3.6.x86_64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", }, product_reference: "tkinter-0:2.4.3-24.el5_3.6.i386", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", }, product_reference: "tkinter-0:2.4.3-24.el5_3.6.ia64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", }, product_reference: "tkinter-0:2.4.3-24.el5_3.6.ppc", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", }, product_reference: "tkinter-0:2.4.3-24.el5_3.6.s390x", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", }, product_reference: "tkinter-0:2.4.3-24.el5_3.6.x86_64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-0:2.4.3-24.el5_3.6.i386", }, product_reference: "python-0:2.4.3-24.el5_3.6.i386", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-0:2.4.3-24.el5_3.6.ia64", }, product_reference: "python-0:2.4.3-24.el5_3.6.ia64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-0:2.4.3-24.el5_3.6.ppc", }, product_reference: "python-0:2.4.3-24.el5_3.6.ppc", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-0:2.4.3-24.el5_3.6.s390x", }, product_reference: "python-0:2.4.3-24.el5_3.6.s390x", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.src as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-0:2.4.3-24.el5_3.6.src", }, product_reference: "python-0:2.4.3-24.el5_3.6.src", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-0:2.4.3-24.el5_3.6.x86_64", }, product_reference: "python-0:2.4.3-24.el5_3.6.x86_64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.i386", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.ia64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.s390", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.s390x", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.i386", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.ia64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.ppc", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.ppc64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.s390", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.s390x", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.x86_64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", }, product_reference: "python-tools-0:2.4.3-24.el5_3.6.i386", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", }, product_reference: "python-tools-0:2.4.3-24.el5_3.6.ia64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", }, product_reference: "python-tools-0:2.4.3-24.el5_3.6.ppc", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", }, product_reference: "python-tools-0:2.4.3-24.el5_3.6.s390x", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", }, product_reference: "python-tools-0:2.4.3-24.el5_3.6.x86_64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", }, product_reference: "tkinter-0:2.4.3-24.el5_3.6.i386", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", }, product_reference: "tkinter-0:2.4.3-24.el5_3.6.ia64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", }, product_reference: "tkinter-0:2.4.3-24.el5_3.6.ppc", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", }, product_reference: "tkinter-0:2.4.3-24.el5_3.6.s390x", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", }, product_reference: "tkinter-0:2.4.3-24.el5_3.6.x86_64", relates_to_product_reference: "5Server", }, ], }, vulnerabilities: [ { cve: "CVE-2007-2052", cwe: { id: "CWE-193", name: "Off-by-one Error", }, discovery_date: "2007-04-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "235093", }, ], notes: [ { category: "description", text: "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", title: "Vulnerability description", }, { category: "summary", text: "python off-by-one locale.strxfrm() (possible memory disclosure)", title: "Vulnerability summary", }, { category: "other", text: "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/", title: "Statement", }, ], product_status: { fixed: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2007-2052", }, { category: "external", summary: "RHBZ#235093", url: "https://bugzilla.redhat.com/show_bug.cgi?id=235093", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2007-2052", url: "https://www.cve.org/CVERecord?id=CVE-2007-2052", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", url: "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", }, ], release_date: "2007-04-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2009-07-27T09:22:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", product_ids: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2009:1176", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python off-by-one locale.strxfrm() (possible memory disclosure)", }, { cve: "CVE-2007-4965", discovery_date: "2007-09-18T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "295971", }, ], notes: [ { category: "description", text: "Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.", title: "Vulnerability description", }, { category: "summary", text: "python imageop module heap corruption", title: "Vulnerability summary", }, { category: "other", text: "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=295971\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/", title: "Statement", }, ], product_status: { fixed: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2007-4965", }, { category: "external", summary: "RHBZ#295971", url: "https://bugzilla.redhat.com/show_bug.cgi?id=295971", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2007-4965", url: "https://www.cve.org/CVERecord?id=CVE-2007-4965", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", url: "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", }, ], release_date: "2007-09-16T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2009-07-27T09:22:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", product_ids: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2009:1176", }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "python imageop module heap corruption", }, { cve: "CVE-2008-1721", discovery_date: "2008-04-09T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "442005", }, ], notes: [ { category: "description", text: "Integer signedness error in the zlib extension module in Python 2.5.2 and earlier allows remote attackers to execute arbitrary code via a negative signed integer, which triggers insufficient memory allocation and a buffer overflow.", title: "Vulnerability description", }, { category: "summary", text: "python: integer signedness error in the zlib extension module", title: "Vulnerability summary", }, { category: "other", text: "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=442005\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/", title: "Statement", }, ], product_status: { fixed: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2008-1721", }, { category: "external", summary: "RHBZ#442005", url: "https://bugzilla.redhat.com/show_bug.cgi?id=442005", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2008-1721", url: "https://www.cve.org/CVERecord?id=CVE-2008-1721", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2008-1721", url: "https://nvd.nist.gov/vuln/detail/CVE-2008-1721", }, ], release_date: "2008-04-09T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2009-07-27T09:22:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", product_ids: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2009:1176", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python: integer signedness error in the zlib extension module", }, { cve: "CVE-2008-1887", discovery_date: "2008-04-18T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "443810", }, ], notes: [ { category: "description", text: "Python 2.5.2 and earlier allows context-dependent attackers to execute arbitrary code via multiple vectors that cause a negative size value to be provided to the PyString_FromStringAndSize function, which allocates less memory than expected when assert() is disabled and triggers a buffer overflow.", title: "Vulnerability description", }, { category: "summary", text: "python: PyString_FromStringAndSize does not check for negative size values", title: "Vulnerability summary", }, ], product_status: { fixed: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2008-1887", }, { category: "external", summary: "RHBZ#443810", url: "https://bugzilla.redhat.com/show_bug.cgi?id=443810", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2008-1887", url: "https://www.cve.org/CVERecord?id=CVE-2008-1887", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2008-1887", url: "https://nvd.nist.gov/vuln/detail/CVE-2008-1887", }, ], release_date: "2008-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2009-07-27T09:22:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", product_ids: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2009:1176", }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "python: PyString_FromStringAndSize does not check for negative size values", }, { acknowledgments: [ { names: [ "David Remahl", ], organization: "Apple Product Security team", }, ], cve: "CVE-2008-2315", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2008-07-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "455008", }, ], notes: [ { category: "description", text: "Multiple integer overflows in Python 2.5.2 and earlier allow context-dependent attackers to have an unknown impact via vectors related to the (1) stringobject, (2) unicodeobject, (3) bufferobject, (4) longobject, (5) tupleobject, (6) stropmodule, (7) gcmodule, and (8) mmapmodule modules. NOTE: The expandtabs integer overflows in stringobject and unicodeobject in 2.5.2 are covered by CVE-2008-5031.", title: "Vulnerability description", }, { category: "summary", text: "python: Multiple integer overflows in python core", title: "Vulnerability summary", }, ], product_status: { fixed: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2008-2315", }, { category: "external", summary: "RHBZ#455008", url: "https://bugzilla.redhat.com/show_bug.cgi?id=455008", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2008-2315", url: "https://www.cve.org/CVERecord?id=CVE-2008-2315", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2008-2315", url: "https://nvd.nist.gov/vuln/detail/CVE-2008-2315", }, ], release_date: "2008-07-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2009-07-27T09:22:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", product_ids: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2009:1176", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python: Multiple integer overflows in python core", }, { cve: "CVE-2008-3142", discovery_date: "2008-07-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "454990", }, ], notes: [ { category: "description", text: "Multiple buffer overflows in Python 2.5.2 and earlier on 32bit platforms allow context-dependent attackers to cause a denial of service (crash) or have unspecified other impact via a long string that leads to incorrect memory allocation during Unicode string processing, related to the unicode_resize function and the PyMem_RESIZE macro.", title: "Vulnerability description", }, { category: "summary", text: "python: Multiple buffer overflows in unicode processing", title: "Vulnerability summary", }, ], product_status: { fixed: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2008-3142", }, { category: "external", summary: "RHBZ#454990", url: "https://bugzilla.redhat.com/show_bug.cgi?id=454990", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2008-3142", url: "https://www.cve.org/CVERecord?id=CVE-2008-3142", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2008-3142", url: "https://nvd.nist.gov/vuln/detail/CVE-2008-3142", }, ], release_date: "2008-04-11T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2009-07-27T09:22:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", product_ids: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2009:1176", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python: Multiple buffer overflows in unicode processing", }, { cve: "CVE-2008-3143", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2008-07-03T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "455013", }, ], notes: [ { category: "description", text: "Multiple integer overflows in Python before 2.5.2 might allow context-dependent attackers to have an unknown impact via vectors related to (1) Include/pymem.h; (2) _csv.c, (3) _struct.c, (4) arraymodule.c, (5) audioop.c, (6) binascii.c, (7) cPickle.c, (8) cStringIO.c, (9) cjkcodecs/multibytecodec.c, (10) datetimemodule.c, (11) md5.c, (12) rgbimgmodule.c, and (13) stropmodule.c in Modules/; (14) bufferobject.c, (15) listobject.c, and (16) obmalloc.c in Objects/; (17) Parser/node.c; and (18) asdl.c, (19) ast.c, (20) bltinmodule.c, and (21) compile.c in Python/, as addressed by \"checks for integer overflows, contributed by Google.\"", title: "Vulnerability description", }, { category: "summary", text: "python: Multiple integer overflows discovered by Google", title: "Vulnerability summary", }, ], product_status: { fixed: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2008-3143", }, { category: "external", summary: "RHBZ#455013", url: "https://bugzilla.redhat.com/show_bug.cgi?id=455013", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2008-3143", url: "https://www.cve.org/CVERecord?id=CVE-2008-3143", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2008-3143", url: "https://nvd.nist.gov/vuln/detail/CVE-2008-3143", }, ], release_date: "2008-02-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2009-07-27T09:22:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", product_ids: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2009:1176", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python: Multiple integer overflows discovered by Google", }, { cve: "CVE-2008-3144", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2008-07-03T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "455018", }, ], notes: [ { category: "description", text: "Multiple integer overflows in the PyOS_vsnprintf function in Python/mysnprintf.c in Python 2.5.2 and earlier allow context-dependent attackers to cause a denial of service (memory corruption) or have unspecified other impact via crafted input to string formatting operations. NOTE: the handling of certain integer values is also affected by related integer underflows and an off-by-one error.", title: "Vulnerability description", }, { category: "summary", text: "python: Potential integer underflow and overflow in the PyOS_vsnprintf C API function", title: "Vulnerability summary", }, ], product_status: { fixed: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2008-3144", }, { category: "external", summary: "RHBZ#455018", url: "https://bugzilla.redhat.com/show_bug.cgi?id=455018", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2008-3144", url: "https://www.cve.org/CVERecord?id=CVE-2008-3144", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2008-3144", url: "https://nvd.nist.gov/vuln/detail/CVE-2008-3144", }, ], release_date: "2008-06-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2009-07-27T09:22:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", product_ids: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2009:1176", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python: Potential integer underflow and overflow in the PyOS_vsnprintf C API function", }, { cve: "CVE-2008-4864", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2008-10-19T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "469656", }, ], notes: [ { category: "description", text: "Multiple integer overflows in imageop.c in the imageop module in Python 1.5.2 through 2.5.1 allow context-dependent attackers to break out of the Python VM and execute arbitrary code via large integer values in certain arguments to the crop function, leading to a buffer overflow, a different vulnerability than CVE-2007-4965 and CVE-2008-1679.", title: "Vulnerability description", }, { category: "summary", text: "python: imageop module multiple integer overflows", title: "Vulnerability summary", }, ], product_status: { fixed: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2008-4864", }, { category: "external", summary: "RHBZ#469656", url: "https://bugzilla.redhat.com/show_bug.cgi?id=469656", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2008-4864", url: "https://www.cve.org/CVERecord?id=CVE-2008-4864", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2008-4864", url: "https://nvd.nist.gov/vuln/detail/CVE-2008-4864", }, ], release_date: "2008-10-19T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2009-07-27T09:22:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", product_ids: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2009:1176", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python: imageop module multiple integer overflows", }, { cve: "CVE-2008-5031", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2008-10-19T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "470915", }, ], notes: [ { category: "description", text: "Multiple integer overflows in Python 2.2.3 through 2.5.1, and 2.6, allow context-dependent attackers to have an unknown impact via a large integer value in the tabsize argument to the expandtabs method, as implemented by (1) the string_expandtabs function in Objects/stringobject.c and (2) the unicode_expandtabs function in Objects/unicodeobject.c. NOTE: this vulnerability reportedly exists because of an incomplete fix for CVE-2008-2315.", title: "Vulnerability description", }, { category: "summary", text: "python: stringobject, unicodeobject integer overflows", title: "Vulnerability summary", }, ], product_status: { fixed: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2008-5031", }, { category: "external", summary: "RHBZ#470915", url: "https://bugzilla.redhat.com/show_bug.cgi?id=470915", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2008-5031", url: "https://www.cve.org/CVERecord?id=CVE-2008-5031", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2008-5031", url: "https://nvd.nist.gov/vuln/detail/CVE-2008-5031", }, ], release_date: "2008-10-19T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2009-07-27T09:22:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", product_ids: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2009:1176", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python: stringobject, unicodeobject integer overflows", }, ], }
rhsa-2008:0525
Vulnerability from csaf_redhat
Published
2008-06-30 15:36
Modified
2024-11-22 01:57
Summary
Red Hat Security Advisory: Red Hat Network Satellite Server Solaris client security update
Notes
Topic
Red Hat Network Satellite Server version 4.2.3 is now available. This
update includes fixes for a number of security issues in Red Hat Network
Satellite Server Solaris client components.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
This release corrects several security vulnerabilities in various
components shipped as part of the Red Hat Network Satellite Server Solaris
client. In a typical operating environment, these components are not used
by the Satellite Server in a vulnerable manner. These security updates will
reduce risk should these components be used by other applications.
Several flaws in Zlib was discovered. An attacker could create a
carefully-crafted compressed stream that would cause an application to
crash if the stream is opened by a user. (CVE-2005-2096). An attacker
could create a carefully crafted compressed stream that would cause an
application to crash if the stream is opened by a user. (CVE-2005-1849)
A buffer overflow was discovered in the OpenSSL SSL_get_shared_ciphers()
utility function. An attacker could send a list of ciphers to an
application that used this function and overrun a buffer (CVE-2006-3738).
A flaw in the SSLv2 client code was discovered. If a client application
used OpenSSL to create an SSLv2 connection to a malicious server, that
server could cause the client to crash. (CVE-2006-4343)
An attack on OpenSSL PKCS #1 v1.5 signatures was discovered. Where an RSA
key with exponent 3 is used it may be possible for an attacker to forge a
PKCS #1 v1.5 signature that would be incorrectly verified by
implementations that do not check for excess data in the RSA exponentiation
result of the signature. This issue affected applications that use OpenSSL
to verify X.509 certificates as well as other uses of PKCS #1 v1.5.
(CVE-2006-4339)
OpenSSL contained a software work-around for a bug in SSL handling in
Microsoft Internet Explorer version 3.0.2. It is enabled in most servers
that use OpenSSL to provide support for SSL and TLS. This work-around could
allow an attacker, acting as a "man in the middle" to force an SSL
connection to use SSL 2.0 rather than a stronger protocol, such as SSL 3.0
or TLS 1.0. (CVE-2005-2969)
During OpenSSL parsing of certain invalid ASN.1 structures an error
condition was mishandled. This can result in an infinite loop which
consumed system memory (CVE-2006-2937).
Certain public key types can take disproportionate amounts of time to
process in OpenSSL, leading to a denial of service. (CVE-2006-2940)
A flaw was discovered in the way that the Python repr() function handled
UTF-32/UCS-4 strings. If an application written in Python used the repr()
function on untrusted data, this could lead to a denial of service or
possibly allow the execution of arbitrary code with the privileges of the
Python application. (CVE-2006-4980)
A flaw was discovered in the strxfrm() function of Python's locale module.
Strings generated by this function were not properly NULL-terminated. This
may possibly cause disclosure of data stored in the memory of a Python
application using this function. (CVE-2007-2052)
Multiple integer overflow flaws were discovered in Python's imageop module.
If an application written in Python used the imageop module to process
untrusted images, it could cause the application to crash, enter an
infinite loop, or possibly execute arbitrary code with the privileges of
the Python interpreter. (CVE-2007-4965)
A stack-based buffer overflow was discovered in the Python interpreter,
which could allow a local user to gain privileges by running a script with
a long name from the current working directory. (CVE-2006-1542)
Users of Red Hat Network Satellite Server should upgrade to these updated
packages, which contain backported patches to correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Red Hat Network Satellite Server version 4.2.3 is now available. This\nupdate includes fixes for a number of security issues in Red Hat Network\nSatellite Server Solaris client components.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", title: "Topic", }, { category: "general", text: "This release corrects several security vulnerabilities in various\ncomponents shipped as part of the Red Hat Network Satellite Server Solaris\nclient. In a typical operating environment, these components are not used\nby the Satellite Server in a vulnerable manner. These security updates will\nreduce risk should these components be used by other applications.\n\nSeveral flaws in Zlib was discovered. An attacker could create a\ncarefully-crafted compressed stream that would cause an application to\ncrash if the stream is opened by a user. (CVE-2005-2096). An attacker\ncould create a carefully crafted compressed stream that would cause an\napplication to crash if the stream is opened by a user. (CVE-2005-1849)\n\nA buffer overflow was discovered in the OpenSSL SSL_get_shared_ciphers()\nutility function. An attacker could send a list of ciphers to an\napplication that used this function and overrun a buffer (CVE-2006-3738).\n\nA flaw in the SSLv2 client code was discovered. If a client application\nused OpenSSL to create an SSLv2 connection to a malicious server, that\nserver could cause the client to crash. (CVE-2006-4343)\n\nAn attack on OpenSSL PKCS #1 v1.5 signatures was discovered. Where an RSA\nkey with exponent 3 is used it may be possible for an attacker to forge a\nPKCS #1 v1.5 signature that would be incorrectly verified by\nimplementations that do not check for excess data in the RSA exponentiation\nresult of the signature. This issue affected applications that use OpenSSL\nto verify X.509 certificates as well as other uses of PKCS #1 v1.5.\n(CVE-2006-4339)\n\nOpenSSL contained a software work-around for a bug in SSL handling in\nMicrosoft Internet Explorer version 3.0.2. It is enabled in most servers\nthat use OpenSSL to provide support for SSL and TLS. This work-around could\nallow an attacker, acting as a \"man in the middle\" to force an SSL\nconnection to use SSL 2.0 rather than a stronger protocol, such as SSL 3.0\nor TLS 1.0. (CVE-2005-2969)\n\nDuring OpenSSL parsing of certain invalid ASN.1 structures an error\ncondition was mishandled. This can result in an infinite loop which\nconsumed system memory (CVE-2006-2937). \n\nCertain public key types can take disproportionate amounts of time to\nprocess in OpenSSL, leading to a denial of service. (CVE-2006-2940)\n\nA flaw was discovered in the way that the Python repr() function handled\nUTF-32/UCS-4 strings. If an application written in Python used the repr()\nfunction on untrusted data, this could lead to a denial of service or\npossibly allow the execution of arbitrary code with the privileges of the\nPython application. (CVE-2006-4980)\n\nA flaw was discovered in the strxfrm() function of Python's locale module.\nStrings generated by this function were not properly NULL-terminated. This\nmay possibly cause disclosure of data stored in the memory of a Python\napplication using this function. (CVE-2007-2052)\n\nMultiple integer overflow flaws were discovered in Python's imageop module.\nIf an application written in Python used the imageop module to process\nuntrusted images, it could cause the application to crash, enter an\ninfinite loop, or possibly execute arbitrary code with the privileges of\nthe Python interpreter. (CVE-2007-4965)\n\nA stack-based buffer overflow was discovered in the Python interpreter,\nwhich could allow a local user to gain privileges by running a script with\na long name from the current working directory. (CVE-2006-1542)\n\nUsers of Red Hat Network Satellite Server should upgrade to these updated\npackages, which contain backported patches to correct these issues.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2008:0525", url: "https://access.redhat.com/errata/RHSA-2008:0525", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "235093", url: "https://bugzilla.redhat.com/show_bug.cgi?id=235093", }, { category: "external", summary: "295971", url: "https://bugzilla.redhat.com/show_bug.cgi?id=295971", }, { category: "external", summary: "430640", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430640", }, { category: "external", summary: "430641", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430641", }, { category: "external", summary: "430649", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430649", }, { category: "external", summary: "430650", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430650", }, { category: "external", summary: "430651", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430651", }, { category: "external", summary: "430652", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430652", }, { category: "external", summary: "430654", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430654", }, { category: "external", summary: "430655", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430655", }, { category: "external", summary: "430659", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430659", }, { category: "external", summary: "430660", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430660", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0525.json", }, ], title: "Red Hat Security Advisory: Red Hat Network Satellite Server Solaris client security update", tracking: { current_release_date: "2024-11-22T01:57:58+00:00", generator: { date: "2024-11-22T01:57:58+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2008:0525", initial_release_date: "2008-06-30T15:36:00+00:00", revision_history: [ { date: "2008-06-30T15:36:00+00:00", number: "1", summary: "Initial version", }, { date: "2008-06-30T11:36:03+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T01:57:58+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Satellite v 4.2 (RHEL v.3 AS)", product: { name: "Red Hat Satellite v 4.2 (RHEL v.3 AS)", product_id: "3AS-RHNSAT4.2", product_identification_helper: { cpe: "cpe:/a:redhat:network_satellite:4.2::el3", }, }, }, { category: "product_name", name: "Red Hat Satellite v 4.2 (RHEL v.4 AS)", product: { name: "Red Hat Satellite v 4.2 (RHEL v.4 AS)", product_id: "4AS-RHNSAT4.2", product_identification_helper: { cpe: "cpe:/a:redhat:network_satellite:4.2::el4", }, }, }, ], category: "product_family", name: "Red Hat Satellite", }, { branches: [ { category: "product_version", name: "rhn-solaris-bootstrap-0:5.0.2-3.noarch", product: { name: "rhn-solaris-bootstrap-0:5.0.2-3.noarch", product_id: "rhn-solaris-bootstrap-0:5.0.2-3.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/rhn-solaris-bootstrap@5.0.2-3?arch=noarch", }, }, }, { category: "product_version", name: "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", product: { name: "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", product_id: "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/rhn_solaris_bootstrap_5_0_2_3@1-0?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "rhn-solaris-bootstrap-0:5.0.2-3.noarch as a component of Red Hat Satellite v 4.2 (RHEL v.3 AS)", product_id: "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", }, product_reference: "rhn-solaris-bootstrap-0:5.0.2-3.noarch", relates_to_product_reference: "3AS-RHNSAT4.2", }, { category: "default_component_of", full_product_name: { name: "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch as a component of Red Hat Satellite v 4.2 (RHEL v.3 AS)", product_id: "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", }, product_reference: "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", relates_to_product_reference: "3AS-RHNSAT4.2", }, { category: "default_component_of", full_product_name: { name: "rhn-solaris-bootstrap-0:5.0.2-3.noarch as a component of Red Hat Satellite v 4.2 (RHEL v.4 AS)", product_id: "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", }, product_reference: "rhn-solaris-bootstrap-0:5.0.2-3.noarch", relates_to_product_reference: "4AS-RHNSAT4.2", }, { category: "default_component_of", full_product_name: { name: "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch as a component of Red Hat Satellite v 4.2 (RHEL v.4 AS)", product_id: "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", }, product_reference: "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", relates_to_product_reference: "4AS-RHNSAT4.2", }, ], }, vulnerabilities: [ { cve: "CVE-2005-1849", discovery_date: "2006-07-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430649", }, ], notes: [ { category: "description", text: "inftrees.h in zlib 1.2.2 allows remote attackers to cause a denial of service (application crash) via an invalid file that causes a large dynamic tree to be produced.", title: "Vulnerability description", }, { category: "summary", text: "zlib DoS", title: "Vulnerability summary", }, ], product_status: { fixed: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2005-1849", }, { category: "external", summary: "RHBZ#430649", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430649", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2005-1849", url: "https://www.cve.org/CVERecord?id=CVE-2005-1849", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2005-1849", url: "https://nvd.nist.gov/vuln/detail/CVE-2005-1849", }, ], release_date: "2005-08-20T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-06-30T15:36:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0525", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "zlib DoS", }, { cve: "CVE-2005-2096", discovery_date: "2006-06-30T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430650", }, ], notes: [ { category: "description", text: "zlib 1.2 and later versions allows remote attackers to cause a denial of service (crash) via a crafted compressed stream with an incomplete code description of a length greater than 1, which leads to a buffer overflow, as demonstrated using a crafted PNG file.", title: "Vulnerability description", }, { category: "summary", text: "zlib DoS", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2005-2096", }, { category: "external", summary: "RHBZ#430650", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430650", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2005-2096", url: "https://www.cve.org/CVERecord?id=CVE-2005-2096", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2005-2096", url: "https://nvd.nist.gov/vuln/detail/CVE-2005-2096", }, ], release_date: "2005-07-06T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-06-30T15:36:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0525", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "zlib DoS", }, { cve: "CVE-2005-2969", discovery_date: "2005-10-04T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430660", }, ], notes: [ { category: "description", text: "The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.", title: "Vulnerability description", }, { category: "summary", text: "openssl mitm downgrade attack", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2005-2969", }, { category: "external", summary: "RHBZ#430660", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430660", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2005-2969", url: "https://www.cve.org/CVERecord?id=CVE-2005-2969", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2005-2969", url: "https://nvd.nist.gov/vuln/detail/CVE-2005-2969", }, ], release_date: "2005-10-11T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-06-30T15:36:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0525", }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "openssl mitm downgrade attack", }, { cve: "CVE-2006-1542", discovery_date: "2006-03-30T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430640", }, ], notes: [ { category: "description", text: "Stack-based buffer overflow in Python 2.4.2 and earlier, running on Linux 2.6.12.5 under gcc 4.0.3 with libc 2.3.5, allows local users to cause a \"stack overflow,\" and possibly gain privileges, by running a script from a current working directory that has a long name, related to the realpath function. NOTE: this might not be a vulnerability. However, the fact that it appears in a programming language interpreter could mean that some applications are affected, although attack scenarios might be limited because the attacker might already need to cross privilege boundaries to cause an exploitable program to be placed in a directory with a long name; or, depending on the method that Python uses to determine the current working directory, setuid applications might be affected.", title: "Vulnerability description", }, { category: "summary", text: "python buffer overflow", title: "Vulnerability summary", }, { category: "other", text: "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/\n\nRed Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-1542", }, { category: "external", summary: "RHBZ#430640", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430640", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-1542", url: "https://www.cve.org/CVERecord?id=CVE-2006-1542", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-1542", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-1542", }, ], release_date: "2005-09-22T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-06-30T15:36:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0525", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python buffer overflow", }, { cve: "CVE-2006-2937", discovery_date: "2006-07-03T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430655", }, ], notes: [ { category: "description", text: "OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition.", title: "Vulnerability description", }, { category: "summary", text: "openssl ASN.1 DoS", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-2937", }, { category: "external", summary: "RHBZ#430655", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430655", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-2937", url: "https://www.cve.org/CVERecord?id=CVE-2006-2937", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-2937", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-2937", }, ], release_date: "2006-09-28T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-06-30T15:36:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0525", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "openssl ASN.1 DoS", }, { cve: "CVE-2006-2940", discovery_date: "2006-07-03T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430654", }, ], notes: [ { category: "description", text: "OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) \"public exponent\" or (2) \"public modulus\" values in X.509 certificates that require extra time to process when using RSA signature verification.", title: "Vulnerability description", }, { category: "summary", text: "openssl public key DoS", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-2940", }, { category: "external", summary: "RHBZ#430654", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430654", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-2940", url: "https://www.cve.org/CVERecord?id=CVE-2006-2940", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-2940", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-2940", }, ], release_date: "2006-09-28T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-06-30T15:36:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0525", }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "openssl public key DoS", }, { cve: "CVE-2006-3738", discovery_date: "2006-08-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430652", }, ], notes: [ { category: "description", text: "Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.", title: "Vulnerability description", }, { category: "summary", text: "openssl get_shared_ciphers overflow", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-3738", }, { category: "external", summary: "RHBZ#430652", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430652", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-3738", url: "https://www.cve.org/CVERecord?id=CVE-2006-3738", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-3738", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-3738", }, ], release_date: "2006-09-28T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-06-30T15:36:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0525", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "openssl get_shared_ciphers overflow", }, { cve: "CVE-2006-4339", discovery_date: "2006-09-05T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430659", }, ], notes: [ { category: "description", text: "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.", title: "Vulnerability description", }, { category: "summary", text: "openssl signature forgery", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-4339", }, { category: "external", summary: "RHBZ#430659", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430659", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-4339", url: "https://www.cve.org/CVERecord?id=CVE-2006-4339", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-4339", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-4339", }, ], release_date: "2006-09-05T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-06-30T15:36:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0525", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "openssl signature forgery", }, { cve: "CVE-2006-4343", discovery_date: "2006-08-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430651", }, ], notes: [ { category: "description", text: "The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.", title: "Vulnerability description", }, { category: "summary", text: "openssl sslv2 client code", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-4343", }, { category: "external", summary: "RHBZ#430651", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430651", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-4343", url: "https://www.cve.org/CVERecord?id=CVE-2006-4343", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-4343", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-4343", }, ], release_date: "2006-09-28T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-06-30T15:36:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0525", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "openssl sslv2 client code", }, { cve: "CVE-2006-4980", discovery_date: "2006-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430641", }, ], notes: [ { category: "description", text: "Buffer overflow in the repr function in Python 2.3 through 2.6 before 20060822 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via crafted wide character UTF-32/UCS-4 strings to certain scripts.", title: "Vulnerability description", }, { category: "summary", text: "python repr unicode buffer overflow", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-4980", }, { category: "external", summary: "RHBZ#430641", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430641", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-4980", url: "https://www.cve.org/CVERecord?id=CVE-2006-4980", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-4980", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-4980", }, ], release_date: "2006-08-16T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-06-30T15:36:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0525", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "python repr unicode buffer overflow", }, { cve: "CVE-2007-2052", cwe: { id: "CWE-193", name: "Off-by-one Error", }, discovery_date: "2007-04-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "235093", }, ], notes: [ { category: "description", text: "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", title: "Vulnerability description", }, { category: "summary", text: "python off-by-one locale.strxfrm() (possible memory disclosure)", title: "Vulnerability summary", }, { category: "other", text: "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/", title: "Statement", }, ], product_status: { fixed: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2007-2052", }, { category: "external", summary: "RHBZ#235093", url: "https://bugzilla.redhat.com/show_bug.cgi?id=235093", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2007-2052", url: "https://www.cve.org/CVERecord?id=CVE-2007-2052", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", url: "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", }, ], release_date: "2007-04-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-06-30T15:36:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0525", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python off-by-one locale.strxfrm() (possible memory disclosure)", }, { cve: "CVE-2007-4965", discovery_date: "2007-09-18T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "295971", }, ], notes: [ { category: "description", text: "Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.", title: "Vulnerability description", }, { category: "summary", text: "python imageop module heap corruption", title: "Vulnerability summary", }, { category: "other", text: "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=295971\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/", title: "Statement", }, ], product_status: { fixed: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2007-4965", }, { category: "external", summary: "RHBZ#295971", url: "https://bugzilla.redhat.com/show_bug.cgi?id=295971", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2007-4965", url: "https://www.cve.org/CVERecord?id=CVE-2007-4965", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", url: "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", }, ], release_date: "2007-09-16T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-06-30T15:36:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0525", }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "python imageop module heap corruption", }, ], }
rhsa-2007:1076
Vulnerability from csaf_redhat
Published
2007-12-10 18:20
Modified
2024-11-22 02:05
Summary
Red Hat Security Advisory: python security update
Notes
Topic
Updated python packages that fix several security issues are now available
for Red Hat Enterprise Linux 3 and 4.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
Python is an interpreted, interactive, object-oriented programming
language.
An integer overflow flaw was discovered in the way Python's pcre module
handled certain regular expressions. If a Python application used the pcre
module to compile and execute untrusted regular expressions, it may be
possible to cause the application to crash, or allow arbitrary code
execution with the privileges of the Python interpreter. (CVE-2006-7228)
A flaw was discovered in the strxfrm() function of Python's locale module.
Strings generated by this function were not properly NULL-terminated. This
may possibly cause disclosure of data stored in the memory of a Python
application using this function. (CVE-2007-2052)
Multiple integer overflow flaws were discovered in Python's imageop module.
If an application written in Python used the imageop module to process
untrusted images, it could cause the application to crash, enter an
infinite loop, or possibly execute arbitrary code with the privileges of
the Python interpreter. (CVE-2007-4965)
Users of Python are advised to upgrade to these updated packages, which
contain backported patches to resolve these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Updated python packages that fix several security issues are now available\nfor Red Hat Enterprise Linux 3 and 4.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", title: "Topic", }, { category: "general", text: "Python is an interpreted, interactive, object-oriented programming\nlanguage.\n\nAn integer overflow flaw was discovered in the way Python's pcre module\nhandled certain regular expressions. If a Python application used the pcre\nmodule to compile and execute untrusted regular expressions, it may be\npossible to cause the application to crash, or allow arbitrary code\nexecution with the privileges of the Python interpreter. (CVE-2006-7228)\n\nA flaw was discovered in the strxfrm() function of Python's locale module.\nStrings generated by this function were not properly NULL-terminated. This\nmay possibly cause disclosure of data stored in the memory of a Python\napplication using this function. (CVE-2007-2052)\n\nMultiple integer overflow flaws were discovered in Python's imageop module.\nIf an application written in Python used the imageop module to process\nuntrusted images, it could cause the application to crash, enter an\ninfinite loop, or possibly execute arbitrary code with the privileges of\nthe Python interpreter. (CVE-2007-4965)\n\nUsers of Python are advised to upgrade to these updated packages, which\ncontain backported patches to resolve these issues.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2007:1076", url: "https://access.redhat.com/errata/RHSA-2007:1076", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "235093", url: "https://bugzilla.redhat.com/show_bug.cgi?id=235093", }, { category: "external", summary: "295971", url: "https://bugzilla.redhat.com/show_bug.cgi?id=295971", }, { category: "external", summary: "383371", url: "https://bugzilla.redhat.com/show_bug.cgi?id=383371", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_1076.json", }, ], title: "Red Hat Security Advisory: python security update", tracking: { current_release_date: "2024-11-22T02:05:15+00:00", generator: { date: "2024-11-22T02:05:15+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2007:1076", initial_release_date: "2007-12-10T18:20:00+00:00", revision_history: [ { date: "2007-12-10T18:20:00+00:00", number: "1", summary: "Initial version", }, { date: "2007-12-10T13:41:24+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T02:05:15+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AS version 3", product: { name: "Red Hat Enterprise Linux AS version 3", product_id: "3AS", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:3::as", }, }, }, { category: "product_name", name: "Red Hat Desktop version 3", product: { name: "Red Hat Desktop version 3", product_id: "3Desktop", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:3::desktop", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ES version 3", product: { name: "Red Hat Enterprise Linux ES version 3", product_id: "3ES", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:3::es", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux WS version 3", product: { name: "Red Hat Enterprise Linux WS version 3", product_id: "3WS", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:3::ws", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux AS version 4", product: { name: "Red Hat Enterprise Linux AS version 4", product_id: "4AS", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:4::as", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Desktop version 4", product: { name: "Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:4::desktop", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ES version 4", product: { name: "Red Hat Enterprise Linux ES version 4", product_id: "4ES", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:4::es", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux WS version 4", product: { name: "Red Hat Enterprise Linux WS version 4", product_id: "4WS", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:4::ws", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "python-devel-0:2.2.3-6.8.ia64", product: { name: "python-devel-0:2.2.3-6.8.ia64", product_id: "python-devel-0:2.2.3-6.8.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.2.3-6.8?arch=ia64", }, }, }, { category: "product_version", name: "python-tools-0:2.2.3-6.8.ia64", product: { name: "python-tools-0:2.2.3-6.8.ia64", product_id: "python-tools-0:2.2.3-6.8.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.2.3-6.8?arch=ia64", }, }, }, { category: "product_version", name: "tkinter-0:2.2.3-6.8.ia64", product: { name: "tkinter-0:2.2.3-6.8.ia64", product_id: "tkinter-0:2.2.3-6.8.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.2.3-6.8?arch=ia64", }, }, }, { category: "product_version", name: "python-0:2.2.3-6.8.ia64", product: { name: "python-0:2.2.3-6.8.ia64", product_id: "python-0:2.2.3-6.8.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.2.3-6.8?arch=ia64", }, }, }, { category: "product_version", name: "python-debuginfo-0:2.2.3-6.8.ia64", product: { name: "python-debuginfo-0:2.2.3-6.8.ia64", product_id: "python-debuginfo-0:2.2.3-6.8.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.2.3-6.8?arch=ia64", }, }, }, { category: "product_version", name: "python-docs-0:2.3.4-14.4.el4_6.1.ia64", product: { name: "python-docs-0:2.3.4-14.4.el4_6.1.ia64", product_id: "python-docs-0:2.3.4-14.4.el4_6.1.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python-docs@2.3.4-14.4.el4_6.1?arch=ia64", }, }, }, { category: "product_version", name: "python-devel-0:2.3.4-14.4.el4_6.1.ia64", product: { name: "python-devel-0:2.3.4-14.4.el4_6.1.ia64", product_id: "python-devel-0:2.3.4-14.4.el4_6.1.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.3.4-14.4.el4_6.1?arch=ia64", }, }, }, { category: "product_version", name: "python-tools-0:2.3.4-14.4.el4_6.1.ia64", product: { name: "python-tools-0:2.3.4-14.4.el4_6.1.ia64", product_id: "python-tools-0:2.3.4-14.4.el4_6.1.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.3.4-14.4.el4_6.1?arch=ia64", }, }, }, { category: "product_version", name: "python-0:2.3.4-14.4.el4_6.1.ia64", product: { name: "python-0:2.3.4-14.4.el4_6.1.ia64", product_id: "python-0:2.3.4-14.4.el4_6.1.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.3.4-14.4.el4_6.1?arch=ia64", }, }, }, { category: "product_version", name: "tkinter-0:2.3.4-14.4.el4_6.1.ia64", product: { name: "tkinter-0:2.3.4-14.4.el4_6.1.ia64", product_id: "tkinter-0:2.3.4-14.4.el4_6.1.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.3.4-14.4.el4_6.1?arch=ia64", }, }, }, { category: "product_version", name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", product: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", product_id: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.3.4-14.4.el4_6.1?arch=ia64", }, }, }, ], category: "architecture", name: "ia64", }, { branches: [ { category: "product_version", name: "python-devel-0:2.2.3-6.8.x86_64", product: { name: "python-devel-0:2.2.3-6.8.x86_64", product_id: "python-devel-0:2.2.3-6.8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.2.3-6.8?arch=x86_64", }, }, }, { category: "product_version", name: "python-tools-0:2.2.3-6.8.x86_64", product: { name: "python-tools-0:2.2.3-6.8.x86_64", product_id: "python-tools-0:2.2.3-6.8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.2.3-6.8?arch=x86_64", }, }, }, { category: "product_version", name: "tkinter-0:2.2.3-6.8.x86_64", product: { name: "tkinter-0:2.2.3-6.8.x86_64", product_id: "tkinter-0:2.2.3-6.8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.2.3-6.8?arch=x86_64", }, }, }, { category: "product_version", name: "python-0:2.2.3-6.8.x86_64", product: { name: "python-0:2.2.3-6.8.x86_64", product_id: "python-0:2.2.3-6.8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.2.3-6.8?arch=x86_64", }, }, }, { category: "product_version", name: "python-debuginfo-0:2.2.3-6.8.x86_64", product: { name: "python-debuginfo-0:2.2.3-6.8.x86_64", product_id: "python-debuginfo-0:2.2.3-6.8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.2.3-6.8?arch=x86_64", }, }, }, { category: "product_version", name: "python-docs-0:2.3.4-14.4.el4_6.1.x86_64", product: { name: "python-docs-0:2.3.4-14.4.el4_6.1.x86_64", product_id: "python-docs-0:2.3.4-14.4.el4_6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/python-docs@2.3.4-14.4.el4_6.1?arch=x86_64", }, }, }, { category: "product_version", name: "python-devel-0:2.3.4-14.4.el4_6.1.x86_64", product: { name: "python-devel-0:2.3.4-14.4.el4_6.1.x86_64", product_id: "python-devel-0:2.3.4-14.4.el4_6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.3.4-14.4.el4_6.1?arch=x86_64", }, }, }, { category: "product_version", name: "python-tools-0:2.3.4-14.4.el4_6.1.x86_64", product: { name: "python-tools-0:2.3.4-14.4.el4_6.1.x86_64", product_id: "python-tools-0:2.3.4-14.4.el4_6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.3.4-14.4.el4_6.1?arch=x86_64", }, }, }, { category: "product_version", name: "python-0:2.3.4-14.4.el4_6.1.x86_64", product: { name: "python-0:2.3.4-14.4.el4_6.1.x86_64", product_id: "python-0:2.3.4-14.4.el4_6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.3.4-14.4.el4_6.1?arch=x86_64", }, }, }, { category: "product_version", name: "tkinter-0:2.3.4-14.4.el4_6.1.x86_64", product: { name: "tkinter-0:2.3.4-14.4.el4_6.1.x86_64", product_id: "tkinter-0:2.3.4-14.4.el4_6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.3.4-14.4.el4_6.1?arch=x86_64", }, }, }, { category: "product_version", name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", product: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", product_id: "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.3.4-14.4.el4_6.1?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "python-devel-0:2.2.3-6.8.i386", product: { name: "python-devel-0:2.2.3-6.8.i386", product_id: "python-devel-0:2.2.3-6.8.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.2.3-6.8?arch=i386", }, }, }, { category: "product_version", name: "python-tools-0:2.2.3-6.8.i386", product: { name: "python-tools-0:2.2.3-6.8.i386", product_id: "python-tools-0:2.2.3-6.8.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.2.3-6.8?arch=i386", }, }, }, { category: "product_version", name: "tkinter-0:2.2.3-6.8.i386", product: { name: "tkinter-0:2.2.3-6.8.i386", product_id: "tkinter-0:2.2.3-6.8.i386", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.2.3-6.8?arch=i386", }, }, }, { category: "product_version", name: "python-0:2.2.3-6.8.i386", product: { name: "python-0:2.2.3-6.8.i386", product_id: "python-0:2.2.3-6.8.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.2.3-6.8?arch=i386", }, }, }, { category: "product_version", name: "python-debuginfo-0:2.2.3-6.8.i386", product: { name: "python-debuginfo-0:2.2.3-6.8.i386", product_id: "python-debuginfo-0:2.2.3-6.8.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.2.3-6.8?arch=i386", }, }, }, { category: "product_version", name: "python-docs-0:2.3.4-14.4.el4_6.1.i386", product: { name: "python-docs-0:2.3.4-14.4.el4_6.1.i386", product_id: "python-docs-0:2.3.4-14.4.el4_6.1.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python-docs@2.3.4-14.4.el4_6.1?arch=i386", }, }, }, { category: "product_version", name: "python-devel-0:2.3.4-14.4.el4_6.1.i386", product: { name: "python-devel-0:2.3.4-14.4.el4_6.1.i386", product_id: "python-devel-0:2.3.4-14.4.el4_6.1.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.3.4-14.4.el4_6.1?arch=i386", }, }, }, { category: "product_version", name: "python-tools-0:2.3.4-14.4.el4_6.1.i386", product: { name: "python-tools-0:2.3.4-14.4.el4_6.1.i386", product_id: "python-tools-0:2.3.4-14.4.el4_6.1.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.3.4-14.4.el4_6.1?arch=i386", }, }, }, { category: "product_version", name: "python-0:2.3.4-14.4.el4_6.1.i386", product: { name: "python-0:2.3.4-14.4.el4_6.1.i386", product_id: "python-0:2.3.4-14.4.el4_6.1.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.3.4-14.4.el4_6.1?arch=i386", }, }, }, { category: "product_version", name: "tkinter-0:2.3.4-14.4.el4_6.1.i386", product: { name: "tkinter-0:2.3.4-14.4.el4_6.1.i386", product_id: "tkinter-0:2.3.4-14.4.el4_6.1.i386", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.3.4-14.4.el4_6.1?arch=i386", }, }, }, { category: "product_version", name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", product: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", product_id: "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.3.4-14.4.el4_6.1?arch=i386", }, }, }, ], category: "architecture", name: "i386", }, { branches: [ { category: "product_version", name: "python-0:2.2.3-6.8.src", product: { name: "python-0:2.2.3-6.8.src", product_id: "python-0:2.2.3-6.8.src", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.2.3-6.8?arch=src", }, }, }, { category: "product_version", name: "python-0:2.3.4-14.4.el4_6.1.src", product: { name: "python-0:2.3.4-14.4.el4_6.1.src", product_id: "python-0:2.3.4-14.4.el4_6.1.src", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.3.4-14.4.el4_6.1?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "python-devel-0:2.2.3-6.8.ppc", product: { name: "python-devel-0:2.2.3-6.8.ppc", product_id: "python-devel-0:2.2.3-6.8.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.2.3-6.8?arch=ppc", }, }, }, { category: "product_version", name: "python-tools-0:2.2.3-6.8.ppc", product: { name: "python-tools-0:2.2.3-6.8.ppc", product_id: "python-tools-0:2.2.3-6.8.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.2.3-6.8?arch=ppc", }, }, }, { category: "product_version", name: "tkinter-0:2.2.3-6.8.ppc", product: { name: "tkinter-0:2.2.3-6.8.ppc", product_id: "tkinter-0:2.2.3-6.8.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.2.3-6.8?arch=ppc", }, }, }, { category: "product_version", name: "python-0:2.2.3-6.8.ppc", product: { name: "python-0:2.2.3-6.8.ppc", product_id: "python-0:2.2.3-6.8.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.2.3-6.8?arch=ppc", }, }, }, { category: "product_version", name: "python-debuginfo-0:2.2.3-6.8.ppc", product: { name: "python-debuginfo-0:2.2.3-6.8.ppc", product_id: "python-debuginfo-0:2.2.3-6.8.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.2.3-6.8?arch=ppc", }, }, }, { category: "product_version", name: "python-docs-0:2.3.4-14.4.el4_6.1.ppc", product: { name: "python-docs-0:2.3.4-14.4.el4_6.1.ppc", product_id: "python-docs-0:2.3.4-14.4.el4_6.1.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/python-docs@2.3.4-14.4.el4_6.1?arch=ppc", }, }, }, { category: "product_version", name: "python-devel-0:2.3.4-14.4.el4_6.1.ppc", product: { name: "python-devel-0:2.3.4-14.4.el4_6.1.ppc", product_id: "python-devel-0:2.3.4-14.4.el4_6.1.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.3.4-14.4.el4_6.1?arch=ppc", }, }, }, { category: "product_version", name: "python-tools-0:2.3.4-14.4.el4_6.1.ppc", product: { name: "python-tools-0:2.3.4-14.4.el4_6.1.ppc", product_id: "python-tools-0:2.3.4-14.4.el4_6.1.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.3.4-14.4.el4_6.1?arch=ppc", }, }, }, { category: "product_version", name: "python-0:2.3.4-14.4.el4_6.1.ppc", product: { name: "python-0:2.3.4-14.4.el4_6.1.ppc", product_id: "python-0:2.3.4-14.4.el4_6.1.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.3.4-14.4.el4_6.1?arch=ppc", }, }, }, { category: "product_version", name: "tkinter-0:2.3.4-14.4.el4_6.1.ppc", product: { name: "tkinter-0:2.3.4-14.4.el4_6.1.ppc", product_id: "tkinter-0:2.3.4-14.4.el4_6.1.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.3.4-14.4.el4_6.1?arch=ppc", }, }, }, { category: "product_version", name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", product: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", product_id: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.3.4-14.4.el4_6.1?arch=ppc", }, }, }, ], category: "architecture", name: "ppc", }, { branches: [ { category: "product_version", name: "python-devel-0:2.2.3-6.8.s390x", product: { name: "python-devel-0:2.2.3-6.8.s390x", product_id: "python-devel-0:2.2.3-6.8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.2.3-6.8?arch=s390x", }, }, }, { category: "product_version", name: "python-tools-0:2.2.3-6.8.s390x", product: { name: "python-tools-0:2.2.3-6.8.s390x", product_id: "python-tools-0:2.2.3-6.8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.2.3-6.8?arch=s390x", }, }, }, { category: "product_version", name: "tkinter-0:2.2.3-6.8.s390x", product: { name: "tkinter-0:2.2.3-6.8.s390x", product_id: "tkinter-0:2.2.3-6.8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.2.3-6.8?arch=s390x", }, }, }, { category: "product_version", name: "python-0:2.2.3-6.8.s390x", product: { name: "python-0:2.2.3-6.8.s390x", product_id: "python-0:2.2.3-6.8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.2.3-6.8?arch=s390x", }, }, }, { category: "product_version", name: "python-debuginfo-0:2.2.3-6.8.s390x", product: { name: "python-debuginfo-0:2.2.3-6.8.s390x", product_id: "python-debuginfo-0:2.2.3-6.8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.2.3-6.8?arch=s390x", }, }, }, { category: "product_version", name: "python-docs-0:2.3.4-14.4.el4_6.1.s390x", product: { name: "python-docs-0:2.3.4-14.4.el4_6.1.s390x", product_id: "python-docs-0:2.3.4-14.4.el4_6.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/python-docs@2.3.4-14.4.el4_6.1?arch=s390x", }, }, }, { category: "product_version", name: "python-devel-0:2.3.4-14.4.el4_6.1.s390x", product: { name: "python-devel-0:2.3.4-14.4.el4_6.1.s390x", product_id: "python-devel-0:2.3.4-14.4.el4_6.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.3.4-14.4.el4_6.1?arch=s390x", }, }, }, { category: "product_version", name: "python-tools-0:2.3.4-14.4.el4_6.1.s390x", product: { name: "python-tools-0:2.3.4-14.4.el4_6.1.s390x", product_id: "python-tools-0:2.3.4-14.4.el4_6.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.3.4-14.4.el4_6.1?arch=s390x", }, }, }, { category: "product_version", name: "python-0:2.3.4-14.4.el4_6.1.s390x", product: { name: "python-0:2.3.4-14.4.el4_6.1.s390x", product_id: "python-0:2.3.4-14.4.el4_6.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.3.4-14.4.el4_6.1?arch=s390x", }, }, }, { category: "product_version", name: "tkinter-0:2.3.4-14.4.el4_6.1.s390x", product: { name: "tkinter-0:2.3.4-14.4.el4_6.1.s390x", product_id: "tkinter-0:2.3.4-14.4.el4_6.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.3.4-14.4.el4_6.1?arch=s390x", }, }, }, { category: "product_version", name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", product: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", product_id: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.3.4-14.4.el4_6.1?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "python-devel-0:2.2.3-6.8.s390", product: { name: "python-devel-0:2.2.3-6.8.s390", product_id: "python-devel-0:2.2.3-6.8.s390", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.2.3-6.8?arch=s390", }, }, }, { category: "product_version", name: "python-tools-0:2.2.3-6.8.s390", product: { name: "python-tools-0:2.2.3-6.8.s390", product_id: "python-tools-0:2.2.3-6.8.s390", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.2.3-6.8?arch=s390", }, }, }, { category: "product_version", name: "tkinter-0:2.2.3-6.8.s390", product: { name: "tkinter-0:2.2.3-6.8.s390", product_id: "tkinter-0:2.2.3-6.8.s390", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.2.3-6.8?arch=s390", }, }, }, { category: "product_version", name: "python-0:2.2.3-6.8.s390", product: { name: "python-0:2.2.3-6.8.s390", product_id: "python-0:2.2.3-6.8.s390", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.2.3-6.8?arch=s390", }, }, }, { category: "product_version", name: "python-debuginfo-0:2.2.3-6.8.s390", product: { name: "python-debuginfo-0:2.2.3-6.8.s390", product_id: "python-debuginfo-0:2.2.3-6.8.s390", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.2.3-6.8?arch=s390", }, }, }, { category: "product_version", name: "python-docs-0:2.3.4-14.4.el4_6.1.s390", product: { name: "python-docs-0:2.3.4-14.4.el4_6.1.s390", product_id: "python-docs-0:2.3.4-14.4.el4_6.1.s390", product_identification_helper: { purl: "pkg:rpm/redhat/python-docs@2.3.4-14.4.el4_6.1?arch=s390", }, }, }, { category: "product_version", name: "python-devel-0:2.3.4-14.4.el4_6.1.s390", product: { name: "python-devel-0:2.3.4-14.4.el4_6.1.s390", product_id: "python-devel-0:2.3.4-14.4.el4_6.1.s390", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.3.4-14.4.el4_6.1?arch=s390", }, }, }, { category: "product_version", name: "python-tools-0:2.3.4-14.4.el4_6.1.s390", product: { name: "python-tools-0:2.3.4-14.4.el4_6.1.s390", product_id: "python-tools-0:2.3.4-14.4.el4_6.1.s390", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.3.4-14.4.el4_6.1?arch=s390", }, }, }, { category: "product_version", name: "python-0:2.3.4-14.4.el4_6.1.s390", product: { name: "python-0:2.3.4-14.4.el4_6.1.s390", product_id: "python-0:2.3.4-14.4.el4_6.1.s390", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.3.4-14.4.el4_6.1?arch=s390", }, }, }, { category: "product_version", name: "tkinter-0:2.3.4-14.4.el4_6.1.s390", product: { name: "tkinter-0:2.3.4-14.4.el4_6.1.s390", product_id: "tkinter-0:2.3.4-14.4.el4_6.1.s390", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.3.4-14.4.el4_6.1?arch=s390", }, }, }, { category: "product_version", name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", product: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", product_id: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.3.4-14.4.el4_6.1?arch=s390", }, }, }, ], category: "architecture", name: "s390", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-0:2.2.3-6.8.i386", }, product_reference: "python-0:2.2.3-6.8.i386", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-0:2.2.3-6.8.ia64", }, product_reference: "python-0:2.2.3-6.8.ia64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-0:2.2.3-6.8.ppc", }, product_reference: "python-0:2.2.3-6.8.ppc", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-0:2.2.3-6.8.s390", }, product_reference: "python-0:2.2.3-6.8.s390", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-0:2.2.3-6.8.s390x", }, product_reference: "python-0:2.2.3-6.8.s390x", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.src as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-0:2.2.3-6.8.src", }, product_reference: "python-0:2.2.3-6.8.src", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-0:2.2.3-6.8.x86_64", }, product_reference: "python-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-debuginfo-0:2.2.3-6.8.i386", }, product_reference: "python-debuginfo-0:2.2.3-6.8.i386", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-debuginfo-0:2.2.3-6.8.ia64", }, product_reference: "python-debuginfo-0:2.2.3-6.8.ia64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-debuginfo-0:2.2.3-6.8.ppc", }, product_reference: "python-debuginfo-0:2.2.3-6.8.ppc", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-debuginfo-0:2.2.3-6.8.s390", }, product_reference: "python-debuginfo-0:2.2.3-6.8.s390", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-debuginfo-0:2.2.3-6.8.s390x", }, product_reference: "python-debuginfo-0:2.2.3-6.8.s390x", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-debuginfo-0:2.2.3-6.8.x86_64", }, product_reference: "python-debuginfo-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-devel-0:2.2.3-6.8.i386", }, product_reference: "python-devel-0:2.2.3-6.8.i386", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-devel-0:2.2.3-6.8.ia64", }, product_reference: "python-devel-0:2.2.3-6.8.ia64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-devel-0:2.2.3-6.8.ppc", }, product_reference: "python-devel-0:2.2.3-6.8.ppc", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-devel-0:2.2.3-6.8.s390", }, product_reference: "python-devel-0:2.2.3-6.8.s390", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-devel-0:2.2.3-6.8.s390x", }, product_reference: "python-devel-0:2.2.3-6.8.s390x", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-devel-0:2.2.3-6.8.x86_64", }, product_reference: "python-devel-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-tools-0:2.2.3-6.8.i386", }, product_reference: "python-tools-0:2.2.3-6.8.i386", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-tools-0:2.2.3-6.8.ia64", }, product_reference: "python-tools-0:2.2.3-6.8.ia64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-tools-0:2.2.3-6.8.ppc", }, product_reference: "python-tools-0:2.2.3-6.8.ppc", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-tools-0:2.2.3-6.8.s390", }, product_reference: "python-tools-0:2.2.3-6.8.s390", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-tools-0:2.2.3-6.8.s390x", }, product_reference: "python-tools-0:2.2.3-6.8.s390x", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-tools-0:2.2.3-6.8.x86_64", }, product_reference: "python-tools-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:tkinter-0:2.2.3-6.8.i386", }, product_reference: "tkinter-0:2.2.3-6.8.i386", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:tkinter-0:2.2.3-6.8.ia64", }, product_reference: "tkinter-0:2.2.3-6.8.ia64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:tkinter-0:2.2.3-6.8.ppc", }, product_reference: "tkinter-0:2.2.3-6.8.ppc", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:tkinter-0:2.2.3-6.8.s390", }, product_reference: "tkinter-0:2.2.3-6.8.s390", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:tkinter-0:2.2.3-6.8.s390x", }, product_reference: "tkinter-0:2.2.3-6.8.s390x", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:tkinter-0:2.2.3-6.8.x86_64", }, product_reference: "tkinter-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.i386 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-0:2.2.3-6.8.i386", }, product_reference: "python-0:2.2.3-6.8.i386", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.ia64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-0:2.2.3-6.8.ia64", }, product_reference: "python-0:2.2.3-6.8.ia64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.ppc as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-0:2.2.3-6.8.ppc", }, product_reference: "python-0:2.2.3-6.8.ppc", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.s390 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-0:2.2.3-6.8.s390", }, product_reference: "python-0:2.2.3-6.8.s390", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.s390x as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-0:2.2.3-6.8.s390x", }, product_reference: "python-0:2.2.3-6.8.s390x", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.src as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-0:2.2.3-6.8.src", }, product_reference: "python-0:2.2.3-6.8.src", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.x86_64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-0:2.2.3-6.8.x86_64", }, product_reference: "python-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.i386 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-debuginfo-0:2.2.3-6.8.i386", }, product_reference: "python-debuginfo-0:2.2.3-6.8.i386", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.ia64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-debuginfo-0:2.2.3-6.8.ia64", }, product_reference: "python-debuginfo-0:2.2.3-6.8.ia64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.ppc as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-debuginfo-0:2.2.3-6.8.ppc", }, product_reference: "python-debuginfo-0:2.2.3-6.8.ppc", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.s390 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-debuginfo-0:2.2.3-6.8.s390", }, product_reference: "python-debuginfo-0:2.2.3-6.8.s390", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.s390x as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-debuginfo-0:2.2.3-6.8.s390x", }, product_reference: "python-debuginfo-0:2.2.3-6.8.s390x", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.x86_64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-debuginfo-0:2.2.3-6.8.x86_64", }, product_reference: "python-debuginfo-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.i386 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-devel-0:2.2.3-6.8.i386", }, product_reference: "python-devel-0:2.2.3-6.8.i386", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.ia64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-devel-0:2.2.3-6.8.ia64", }, product_reference: "python-devel-0:2.2.3-6.8.ia64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.ppc as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-devel-0:2.2.3-6.8.ppc", }, product_reference: "python-devel-0:2.2.3-6.8.ppc", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.s390 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-devel-0:2.2.3-6.8.s390", }, product_reference: "python-devel-0:2.2.3-6.8.s390", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.s390x as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-devel-0:2.2.3-6.8.s390x", }, product_reference: "python-devel-0:2.2.3-6.8.s390x", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.x86_64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-devel-0:2.2.3-6.8.x86_64", }, product_reference: "python-devel-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.i386 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-tools-0:2.2.3-6.8.i386", }, product_reference: "python-tools-0:2.2.3-6.8.i386", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.ia64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-tools-0:2.2.3-6.8.ia64", }, product_reference: "python-tools-0:2.2.3-6.8.ia64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.ppc as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-tools-0:2.2.3-6.8.ppc", }, product_reference: "python-tools-0:2.2.3-6.8.ppc", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.s390 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-tools-0:2.2.3-6.8.s390", }, product_reference: "python-tools-0:2.2.3-6.8.s390", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.s390x as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-tools-0:2.2.3-6.8.s390x", }, product_reference: "python-tools-0:2.2.3-6.8.s390x", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.x86_64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-tools-0:2.2.3-6.8.x86_64", }, product_reference: "python-tools-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.i386 as a component of Red Hat Desktop version 3", product_id: "3Desktop:tkinter-0:2.2.3-6.8.i386", }, product_reference: "tkinter-0:2.2.3-6.8.i386", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.ia64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:tkinter-0:2.2.3-6.8.ia64", }, product_reference: "tkinter-0:2.2.3-6.8.ia64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.ppc as a component of Red Hat Desktop version 3", product_id: "3Desktop:tkinter-0:2.2.3-6.8.ppc", }, product_reference: "tkinter-0:2.2.3-6.8.ppc", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.s390 as a component of Red Hat Desktop version 3", product_id: "3Desktop:tkinter-0:2.2.3-6.8.s390", }, product_reference: "tkinter-0:2.2.3-6.8.s390", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.s390x as a component of Red Hat Desktop version 3", product_id: "3Desktop:tkinter-0:2.2.3-6.8.s390x", }, product_reference: "tkinter-0:2.2.3-6.8.s390x", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.x86_64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:tkinter-0:2.2.3-6.8.x86_64", }, product_reference: "tkinter-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-0:2.2.3-6.8.i386", }, product_reference: "python-0:2.2.3-6.8.i386", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-0:2.2.3-6.8.ia64", }, product_reference: "python-0:2.2.3-6.8.ia64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-0:2.2.3-6.8.ppc", }, product_reference: "python-0:2.2.3-6.8.ppc", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-0:2.2.3-6.8.s390", }, product_reference: "python-0:2.2.3-6.8.s390", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-0:2.2.3-6.8.s390x", }, product_reference: "python-0:2.2.3-6.8.s390x", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.src as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-0:2.2.3-6.8.src", }, product_reference: "python-0:2.2.3-6.8.src", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-0:2.2.3-6.8.x86_64", }, product_reference: "python-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-debuginfo-0:2.2.3-6.8.i386", }, product_reference: "python-debuginfo-0:2.2.3-6.8.i386", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-debuginfo-0:2.2.3-6.8.ia64", }, product_reference: "python-debuginfo-0:2.2.3-6.8.ia64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-debuginfo-0:2.2.3-6.8.ppc", }, product_reference: "python-debuginfo-0:2.2.3-6.8.ppc", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-debuginfo-0:2.2.3-6.8.s390", }, product_reference: "python-debuginfo-0:2.2.3-6.8.s390", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-debuginfo-0:2.2.3-6.8.s390x", }, product_reference: "python-debuginfo-0:2.2.3-6.8.s390x", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-debuginfo-0:2.2.3-6.8.x86_64", }, product_reference: "python-debuginfo-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-devel-0:2.2.3-6.8.i386", }, product_reference: "python-devel-0:2.2.3-6.8.i386", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-devel-0:2.2.3-6.8.ia64", }, product_reference: "python-devel-0:2.2.3-6.8.ia64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-devel-0:2.2.3-6.8.ppc", }, product_reference: "python-devel-0:2.2.3-6.8.ppc", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-devel-0:2.2.3-6.8.s390", }, product_reference: "python-devel-0:2.2.3-6.8.s390", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-devel-0:2.2.3-6.8.s390x", }, product_reference: "python-devel-0:2.2.3-6.8.s390x", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-devel-0:2.2.3-6.8.x86_64", }, product_reference: "python-devel-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-tools-0:2.2.3-6.8.i386", }, product_reference: "python-tools-0:2.2.3-6.8.i386", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-tools-0:2.2.3-6.8.ia64", }, product_reference: "python-tools-0:2.2.3-6.8.ia64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-tools-0:2.2.3-6.8.ppc", }, product_reference: "python-tools-0:2.2.3-6.8.ppc", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-tools-0:2.2.3-6.8.s390", }, product_reference: "python-tools-0:2.2.3-6.8.s390", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-tools-0:2.2.3-6.8.s390x", }, product_reference: "python-tools-0:2.2.3-6.8.s390x", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-tools-0:2.2.3-6.8.x86_64", }, product_reference: "python-tools-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:tkinter-0:2.2.3-6.8.i386", }, product_reference: "tkinter-0:2.2.3-6.8.i386", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:tkinter-0:2.2.3-6.8.ia64", }, product_reference: "tkinter-0:2.2.3-6.8.ia64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:tkinter-0:2.2.3-6.8.ppc", }, product_reference: "tkinter-0:2.2.3-6.8.ppc", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:tkinter-0:2.2.3-6.8.s390", }, product_reference: "tkinter-0:2.2.3-6.8.s390", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:tkinter-0:2.2.3-6.8.s390x", }, product_reference: "tkinter-0:2.2.3-6.8.s390x", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:tkinter-0:2.2.3-6.8.x86_64", }, product_reference: "tkinter-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-0:2.2.3-6.8.i386", }, product_reference: "python-0:2.2.3-6.8.i386", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-0:2.2.3-6.8.ia64", }, product_reference: "python-0:2.2.3-6.8.ia64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-0:2.2.3-6.8.ppc", }, product_reference: "python-0:2.2.3-6.8.ppc", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-0:2.2.3-6.8.s390", }, product_reference: "python-0:2.2.3-6.8.s390", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-0:2.2.3-6.8.s390x", }, product_reference: "python-0:2.2.3-6.8.s390x", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.src as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-0:2.2.3-6.8.src", }, product_reference: "python-0:2.2.3-6.8.src", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-0:2.2.3-6.8.x86_64", }, product_reference: "python-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-debuginfo-0:2.2.3-6.8.i386", }, product_reference: "python-debuginfo-0:2.2.3-6.8.i386", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-debuginfo-0:2.2.3-6.8.ia64", }, product_reference: "python-debuginfo-0:2.2.3-6.8.ia64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-debuginfo-0:2.2.3-6.8.ppc", }, product_reference: "python-debuginfo-0:2.2.3-6.8.ppc", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-debuginfo-0:2.2.3-6.8.s390", }, product_reference: "python-debuginfo-0:2.2.3-6.8.s390", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-debuginfo-0:2.2.3-6.8.s390x", }, product_reference: "python-debuginfo-0:2.2.3-6.8.s390x", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-debuginfo-0:2.2.3-6.8.x86_64", }, product_reference: "python-debuginfo-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-devel-0:2.2.3-6.8.i386", }, product_reference: "python-devel-0:2.2.3-6.8.i386", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-devel-0:2.2.3-6.8.ia64", }, product_reference: "python-devel-0:2.2.3-6.8.ia64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-devel-0:2.2.3-6.8.ppc", }, product_reference: "python-devel-0:2.2.3-6.8.ppc", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-devel-0:2.2.3-6.8.s390", }, product_reference: "python-devel-0:2.2.3-6.8.s390", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-devel-0:2.2.3-6.8.s390x", }, product_reference: "python-devel-0:2.2.3-6.8.s390x", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-devel-0:2.2.3-6.8.x86_64", }, product_reference: "python-devel-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-tools-0:2.2.3-6.8.i386", }, product_reference: "python-tools-0:2.2.3-6.8.i386", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-tools-0:2.2.3-6.8.ia64", }, product_reference: "python-tools-0:2.2.3-6.8.ia64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-tools-0:2.2.3-6.8.ppc", }, product_reference: "python-tools-0:2.2.3-6.8.ppc", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-tools-0:2.2.3-6.8.s390", }, product_reference: "python-tools-0:2.2.3-6.8.s390", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-tools-0:2.2.3-6.8.s390x", }, product_reference: "python-tools-0:2.2.3-6.8.s390x", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-tools-0:2.2.3-6.8.x86_64", }, product_reference: "python-tools-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:tkinter-0:2.2.3-6.8.i386", }, product_reference: "tkinter-0:2.2.3-6.8.i386", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:tkinter-0:2.2.3-6.8.ia64", }, product_reference: "tkinter-0:2.2.3-6.8.ia64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:tkinter-0:2.2.3-6.8.ppc", }, product_reference: "tkinter-0:2.2.3-6.8.ppc", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:tkinter-0:2.2.3-6.8.s390", }, product_reference: "tkinter-0:2.2.3-6.8.s390", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:tkinter-0:2.2.3-6.8.s390x", }, product_reference: "tkinter-0:2.2.3-6.8.s390x", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:tkinter-0:2.2.3-6.8.x86_64", }, product_reference: "tkinter-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.src as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-0:2.3.4-14.4.el4_6.1.src", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.src", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-devel-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-docs-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-tools-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:tkinter-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.src as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-0:2.3.4-14.4.el4_6.1.src", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.src", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.src as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-0:2.3.4-14.4.el4_6.1.src", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.src", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-devel-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-docs-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-tools-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:tkinter-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.src as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-0:2.3.4-14.4.el4_6.1.src", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.src", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-devel-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-docs-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-tools-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:tkinter-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4WS", }, ], }, vulnerabilities: [ { cve: "CVE-2006-7228", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2007-11-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "383371", }, ], notes: [ { category: "description", text: "Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 might allow context-dependent attackers to execute arbitrary code via a regular expression that involves large (1) min, (2) max, or (3) duplength values that cause an incorrect length calculation and trigger a buffer overflow, a different vulnerability than CVE-2006-7227. NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split.", title: "Vulnerability description", }, { category: "summary", text: "pcre integer overflow", title: "Vulnerability summary", }, ], product_status: { fixed: [ "3AS:python-0:2.2.3-6.8.i386", "3AS:python-0:2.2.3-6.8.ia64", "3AS:python-0:2.2.3-6.8.ppc", "3AS:python-0:2.2.3-6.8.s390", "3AS:python-0:2.2.3-6.8.s390x", "3AS:python-0:2.2.3-6.8.src", "3AS:python-0:2.2.3-6.8.x86_64", "3AS:python-debuginfo-0:2.2.3-6.8.i386", "3AS:python-debuginfo-0:2.2.3-6.8.ia64", "3AS:python-debuginfo-0:2.2.3-6.8.ppc", "3AS:python-debuginfo-0:2.2.3-6.8.s390", "3AS:python-debuginfo-0:2.2.3-6.8.s390x", "3AS:python-debuginfo-0:2.2.3-6.8.x86_64", "3AS:python-devel-0:2.2.3-6.8.i386", "3AS:python-devel-0:2.2.3-6.8.ia64", "3AS:python-devel-0:2.2.3-6.8.ppc", "3AS:python-devel-0:2.2.3-6.8.s390", "3AS:python-devel-0:2.2.3-6.8.s390x", "3AS:python-devel-0:2.2.3-6.8.x86_64", "3AS:python-tools-0:2.2.3-6.8.i386", "3AS:python-tools-0:2.2.3-6.8.ia64", "3AS:python-tools-0:2.2.3-6.8.ppc", "3AS:python-tools-0:2.2.3-6.8.s390", "3AS:python-tools-0:2.2.3-6.8.s390x", "3AS:python-tools-0:2.2.3-6.8.x86_64", "3AS:tkinter-0:2.2.3-6.8.i386", "3AS:tkinter-0:2.2.3-6.8.ia64", "3AS:tkinter-0:2.2.3-6.8.ppc", "3AS:tkinter-0:2.2.3-6.8.s390", "3AS:tkinter-0:2.2.3-6.8.s390x", "3AS:tkinter-0:2.2.3-6.8.x86_64", "3Desktop:python-0:2.2.3-6.8.i386", "3Desktop:python-0:2.2.3-6.8.ia64", "3Desktop:python-0:2.2.3-6.8.ppc", "3Desktop:python-0:2.2.3-6.8.s390", "3Desktop:python-0:2.2.3-6.8.s390x", "3Desktop:python-0:2.2.3-6.8.src", "3Desktop:python-0:2.2.3-6.8.x86_64", "3Desktop:python-debuginfo-0:2.2.3-6.8.i386", "3Desktop:python-debuginfo-0:2.2.3-6.8.ia64", "3Desktop:python-debuginfo-0:2.2.3-6.8.ppc", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390x", "3Desktop:python-debuginfo-0:2.2.3-6.8.x86_64", "3Desktop:python-devel-0:2.2.3-6.8.i386", "3Desktop:python-devel-0:2.2.3-6.8.ia64", "3Desktop:python-devel-0:2.2.3-6.8.ppc", "3Desktop:python-devel-0:2.2.3-6.8.s390", "3Desktop:python-devel-0:2.2.3-6.8.s390x", "3Desktop:python-devel-0:2.2.3-6.8.x86_64", "3Desktop:python-tools-0:2.2.3-6.8.i386", "3Desktop:python-tools-0:2.2.3-6.8.ia64", "3Desktop:python-tools-0:2.2.3-6.8.ppc", "3Desktop:python-tools-0:2.2.3-6.8.s390", "3Desktop:python-tools-0:2.2.3-6.8.s390x", "3Desktop:python-tools-0:2.2.3-6.8.x86_64", "3Desktop:tkinter-0:2.2.3-6.8.i386", "3Desktop:tkinter-0:2.2.3-6.8.ia64", "3Desktop:tkinter-0:2.2.3-6.8.ppc", "3Desktop:tkinter-0:2.2.3-6.8.s390", "3Desktop:tkinter-0:2.2.3-6.8.s390x", "3Desktop:tkinter-0:2.2.3-6.8.x86_64", "3ES:python-0:2.2.3-6.8.i386", "3ES:python-0:2.2.3-6.8.ia64", "3ES:python-0:2.2.3-6.8.ppc", "3ES:python-0:2.2.3-6.8.s390", "3ES:python-0:2.2.3-6.8.s390x", "3ES:python-0:2.2.3-6.8.src", "3ES:python-0:2.2.3-6.8.x86_64", "3ES:python-debuginfo-0:2.2.3-6.8.i386", "3ES:python-debuginfo-0:2.2.3-6.8.ia64", "3ES:python-debuginfo-0:2.2.3-6.8.ppc", "3ES:python-debuginfo-0:2.2.3-6.8.s390", "3ES:python-debuginfo-0:2.2.3-6.8.s390x", "3ES:python-debuginfo-0:2.2.3-6.8.x86_64", "3ES:python-devel-0:2.2.3-6.8.i386", "3ES:python-devel-0:2.2.3-6.8.ia64", "3ES:python-devel-0:2.2.3-6.8.ppc", "3ES:python-devel-0:2.2.3-6.8.s390", "3ES:python-devel-0:2.2.3-6.8.s390x", "3ES:python-devel-0:2.2.3-6.8.x86_64", "3ES:python-tools-0:2.2.3-6.8.i386", "3ES:python-tools-0:2.2.3-6.8.ia64", "3ES:python-tools-0:2.2.3-6.8.ppc", "3ES:python-tools-0:2.2.3-6.8.s390", "3ES:python-tools-0:2.2.3-6.8.s390x", "3ES:python-tools-0:2.2.3-6.8.x86_64", "3ES:tkinter-0:2.2.3-6.8.i386", "3ES:tkinter-0:2.2.3-6.8.ia64", "3ES:tkinter-0:2.2.3-6.8.ppc", "3ES:tkinter-0:2.2.3-6.8.s390", "3ES:tkinter-0:2.2.3-6.8.s390x", "3ES:tkinter-0:2.2.3-6.8.x86_64", "3WS:python-0:2.2.3-6.8.i386", "3WS:python-0:2.2.3-6.8.ia64", "3WS:python-0:2.2.3-6.8.ppc", "3WS:python-0:2.2.3-6.8.s390", "3WS:python-0:2.2.3-6.8.s390x", "3WS:python-0:2.2.3-6.8.src", "3WS:python-0:2.2.3-6.8.x86_64", "3WS:python-debuginfo-0:2.2.3-6.8.i386", "3WS:python-debuginfo-0:2.2.3-6.8.ia64", "3WS:python-debuginfo-0:2.2.3-6.8.ppc", "3WS:python-debuginfo-0:2.2.3-6.8.s390", "3WS:python-debuginfo-0:2.2.3-6.8.s390x", "3WS:python-debuginfo-0:2.2.3-6.8.x86_64", "3WS:python-devel-0:2.2.3-6.8.i386", "3WS:python-devel-0:2.2.3-6.8.ia64", "3WS:python-devel-0:2.2.3-6.8.ppc", "3WS:python-devel-0:2.2.3-6.8.s390", "3WS:python-devel-0:2.2.3-6.8.s390x", "3WS:python-devel-0:2.2.3-6.8.x86_64", "3WS:python-tools-0:2.2.3-6.8.i386", "3WS:python-tools-0:2.2.3-6.8.ia64", "3WS:python-tools-0:2.2.3-6.8.ppc", "3WS:python-tools-0:2.2.3-6.8.s390", "3WS:python-tools-0:2.2.3-6.8.s390x", "3WS:python-tools-0:2.2.3-6.8.x86_64", "3WS:tkinter-0:2.2.3-6.8.i386", "3WS:tkinter-0:2.2.3-6.8.ia64", "3WS:tkinter-0:2.2.3-6.8.ppc", "3WS:tkinter-0:2.2.3-6.8.s390", "3WS:tkinter-0:2.2.3-6.8.s390x", "3WS:tkinter-0:2.2.3-6.8.x86_64", "4AS:python-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-0:2.3.4-14.4.el4_6.1.src", "4AS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-0:2.3.4-14.4.el4_6.1.src", "4Desktop:python-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-0:2.3.4-14.4.el4_6.1.src", "4ES:python-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-0:2.3.4-14.4.el4_6.1.src", "4WS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-7228", }, { category: "external", summary: "RHBZ#383371", url: "https://bugzilla.redhat.com/show_bug.cgi?id=383371", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-7228", url: "https://www.cve.org/CVERecord?id=CVE-2006-7228", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-7228", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-7228", }, ], release_date: "2007-11-07T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2007-12-10T18:20:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "3AS:python-0:2.2.3-6.8.i386", "3AS:python-0:2.2.3-6.8.ia64", "3AS:python-0:2.2.3-6.8.ppc", "3AS:python-0:2.2.3-6.8.s390", "3AS:python-0:2.2.3-6.8.s390x", "3AS:python-0:2.2.3-6.8.src", "3AS:python-0:2.2.3-6.8.x86_64", "3AS:python-debuginfo-0:2.2.3-6.8.i386", "3AS:python-debuginfo-0:2.2.3-6.8.ia64", "3AS:python-debuginfo-0:2.2.3-6.8.ppc", "3AS:python-debuginfo-0:2.2.3-6.8.s390", "3AS:python-debuginfo-0:2.2.3-6.8.s390x", "3AS:python-debuginfo-0:2.2.3-6.8.x86_64", "3AS:python-devel-0:2.2.3-6.8.i386", "3AS:python-devel-0:2.2.3-6.8.ia64", "3AS:python-devel-0:2.2.3-6.8.ppc", "3AS:python-devel-0:2.2.3-6.8.s390", "3AS:python-devel-0:2.2.3-6.8.s390x", "3AS:python-devel-0:2.2.3-6.8.x86_64", "3AS:python-tools-0:2.2.3-6.8.i386", "3AS:python-tools-0:2.2.3-6.8.ia64", "3AS:python-tools-0:2.2.3-6.8.ppc", "3AS:python-tools-0:2.2.3-6.8.s390", "3AS:python-tools-0:2.2.3-6.8.s390x", "3AS:python-tools-0:2.2.3-6.8.x86_64", "3AS:tkinter-0:2.2.3-6.8.i386", "3AS:tkinter-0:2.2.3-6.8.ia64", "3AS:tkinter-0:2.2.3-6.8.ppc", "3AS:tkinter-0:2.2.3-6.8.s390", "3AS:tkinter-0:2.2.3-6.8.s390x", "3AS:tkinter-0:2.2.3-6.8.x86_64", "3Desktop:python-0:2.2.3-6.8.i386", "3Desktop:python-0:2.2.3-6.8.ia64", "3Desktop:python-0:2.2.3-6.8.ppc", "3Desktop:python-0:2.2.3-6.8.s390", "3Desktop:python-0:2.2.3-6.8.s390x", "3Desktop:python-0:2.2.3-6.8.src", "3Desktop:python-0:2.2.3-6.8.x86_64", "3Desktop:python-debuginfo-0:2.2.3-6.8.i386", "3Desktop:python-debuginfo-0:2.2.3-6.8.ia64", "3Desktop:python-debuginfo-0:2.2.3-6.8.ppc", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390x", "3Desktop:python-debuginfo-0:2.2.3-6.8.x86_64", "3Desktop:python-devel-0:2.2.3-6.8.i386", "3Desktop:python-devel-0:2.2.3-6.8.ia64", "3Desktop:python-devel-0:2.2.3-6.8.ppc", "3Desktop:python-devel-0:2.2.3-6.8.s390", "3Desktop:python-devel-0:2.2.3-6.8.s390x", "3Desktop:python-devel-0:2.2.3-6.8.x86_64", "3Desktop:python-tools-0:2.2.3-6.8.i386", "3Desktop:python-tools-0:2.2.3-6.8.ia64", "3Desktop:python-tools-0:2.2.3-6.8.ppc", "3Desktop:python-tools-0:2.2.3-6.8.s390", "3Desktop:python-tools-0:2.2.3-6.8.s390x", "3Desktop:python-tools-0:2.2.3-6.8.x86_64", "3Desktop:tkinter-0:2.2.3-6.8.i386", "3Desktop:tkinter-0:2.2.3-6.8.ia64", "3Desktop:tkinter-0:2.2.3-6.8.ppc", "3Desktop:tkinter-0:2.2.3-6.8.s390", "3Desktop:tkinter-0:2.2.3-6.8.s390x", "3Desktop:tkinter-0:2.2.3-6.8.x86_64", "3ES:python-0:2.2.3-6.8.i386", "3ES:python-0:2.2.3-6.8.ia64", "3ES:python-0:2.2.3-6.8.ppc", "3ES:python-0:2.2.3-6.8.s390", "3ES:python-0:2.2.3-6.8.s390x", "3ES:python-0:2.2.3-6.8.src", "3ES:python-0:2.2.3-6.8.x86_64", "3ES:python-debuginfo-0:2.2.3-6.8.i386", "3ES:python-debuginfo-0:2.2.3-6.8.ia64", "3ES:python-debuginfo-0:2.2.3-6.8.ppc", "3ES:python-debuginfo-0:2.2.3-6.8.s390", "3ES:python-debuginfo-0:2.2.3-6.8.s390x", "3ES:python-debuginfo-0:2.2.3-6.8.x86_64", "3ES:python-devel-0:2.2.3-6.8.i386", "3ES:python-devel-0:2.2.3-6.8.ia64", "3ES:python-devel-0:2.2.3-6.8.ppc", "3ES:python-devel-0:2.2.3-6.8.s390", "3ES:python-devel-0:2.2.3-6.8.s390x", "3ES:python-devel-0:2.2.3-6.8.x86_64", "3ES:python-tools-0:2.2.3-6.8.i386", "3ES:python-tools-0:2.2.3-6.8.ia64", "3ES:python-tools-0:2.2.3-6.8.ppc", "3ES:python-tools-0:2.2.3-6.8.s390", "3ES:python-tools-0:2.2.3-6.8.s390x", "3ES:python-tools-0:2.2.3-6.8.x86_64", "3ES:tkinter-0:2.2.3-6.8.i386", "3ES:tkinter-0:2.2.3-6.8.ia64", "3ES:tkinter-0:2.2.3-6.8.ppc", "3ES:tkinter-0:2.2.3-6.8.s390", "3ES:tkinter-0:2.2.3-6.8.s390x", "3ES:tkinter-0:2.2.3-6.8.x86_64", "3WS:python-0:2.2.3-6.8.i386", "3WS:python-0:2.2.3-6.8.ia64", "3WS:python-0:2.2.3-6.8.ppc", "3WS:python-0:2.2.3-6.8.s390", "3WS:python-0:2.2.3-6.8.s390x", "3WS:python-0:2.2.3-6.8.src", "3WS:python-0:2.2.3-6.8.x86_64", "3WS:python-debuginfo-0:2.2.3-6.8.i386", "3WS:python-debuginfo-0:2.2.3-6.8.ia64", "3WS:python-debuginfo-0:2.2.3-6.8.ppc", "3WS:python-debuginfo-0:2.2.3-6.8.s390", "3WS:python-debuginfo-0:2.2.3-6.8.s390x", "3WS:python-debuginfo-0:2.2.3-6.8.x86_64", "3WS:python-devel-0:2.2.3-6.8.i386", "3WS:python-devel-0:2.2.3-6.8.ia64", "3WS:python-devel-0:2.2.3-6.8.ppc", "3WS:python-devel-0:2.2.3-6.8.s390", "3WS:python-devel-0:2.2.3-6.8.s390x", "3WS:python-devel-0:2.2.3-6.8.x86_64", "3WS:python-tools-0:2.2.3-6.8.i386", "3WS:python-tools-0:2.2.3-6.8.ia64", "3WS:python-tools-0:2.2.3-6.8.ppc", "3WS:python-tools-0:2.2.3-6.8.s390", "3WS:python-tools-0:2.2.3-6.8.s390x", "3WS:python-tools-0:2.2.3-6.8.x86_64", "3WS:tkinter-0:2.2.3-6.8.i386", "3WS:tkinter-0:2.2.3-6.8.ia64", "3WS:tkinter-0:2.2.3-6.8.ppc", "3WS:tkinter-0:2.2.3-6.8.s390", "3WS:tkinter-0:2.2.3-6.8.s390x", "3WS:tkinter-0:2.2.3-6.8.x86_64", "4AS:python-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-0:2.3.4-14.4.el4_6.1.src", "4AS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-0:2.3.4-14.4.el4_6.1.src", "4Desktop:python-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-0:2.3.4-14.4.el4_6.1.src", "4ES:python-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-0:2.3.4-14.4.el4_6.1.src", "4WS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2007:1076", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "pcre integer overflow", }, { cve: "CVE-2007-2052", cwe: { id: "CWE-193", name: "Off-by-one Error", }, discovery_date: "2007-04-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "235093", }, ], notes: [ { category: "description", text: "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", title: "Vulnerability description", }, { category: "summary", text: "python off-by-one locale.strxfrm() (possible memory disclosure)", title: "Vulnerability summary", }, { category: "other", text: "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/", title: "Statement", }, ], product_status: { fixed: [ "3AS:python-0:2.2.3-6.8.i386", "3AS:python-0:2.2.3-6.8.ia64", "3AS:python-0:2.2.3-6.8.ppc", "3AS:python-0:2.2.3-6.8.s390", "3AS:python-0:2.2.3-6.8.s390x", "3AS:python-0:2.2.3-6.8.src", "3AS:python-0:2.2.3-6.8.x86_64", "3AS:python-debuginfo-0:2.2.3-6.8.i386", "3AS:python-debuginfo-0:2.2.3-6.8.ia64", "3AS:python-debuginfo-0:2.2.3-6.8.ppc", "3AS:python-debuginfo-0:2.2.3-6.8.s390", "3AS:python-debuginfo-0:2.2.3-6.8.s390x", "3AS:python-debuginfo-0:2.2.3-6.8.x86_64", "3AS:python-devel-0:2.2.3-6.8.i386", "3AS:python-devel-0:2.2.3-6.8.ia64", "3AS:python-devel-0:2.2.3-6.8.ppc", "3AS:python-devel-0:2.2.3-6.8.s390", "3AS:python-devel-0:2.2.3-6.8.s390x", "3AS:python-devel-0:2.2.3-6.8.x86_64", "3AS:python-tools-0:2.2.3-6.8.i386", "3AS:python-tools-0:2.2.3-6.8.ia64", "3AS:python-tools-0:2.2.3-6.8.ppc", "3AS:python-tools-0:2.2.3-6.8.s390", "3AS:python-tools-0:2.2.3-6.8.s390x", "3AS:python-tools-0:2.2.3-6.8.x86_64", "3AS:tkinter-0:2.2.3-6.8.i386", "3AS:tkinter-0:2.2.3-6.8.ia64", "3AS:tkinter-0:2.2.3-6.8.ppc", "3AS:tkinter-0:2.2.3-6.8.s390", "3AS:tkinter-0:2.2.3-6.8.s390x", "3AS:tkinter-0:2.2.3-6.8.x86_64", "3Desktop:python-0:2.2.3-6.8.i386", "3Desktop:python-0:2.2.3-6.8.ia64", "3Desktop:python-0:2.2.3-6.8.ppc", "3Desktop:python-0:2.2.3-6.8.s390", "3Desktop:python-0:2.2.3-6.8.s390x", "3Desktop:python-0:2.2.3-6.8.src", "3Desktop:python-0:2.2.3-6.8.x86_64", "3Desktop:python-debuginfo-0:2.2.3-6.8.i386", "3Desktop:python-debuginfo-0:2.2.3-6.8.ia64", "3Desktop:python-debuginfo-0:2.2.3-6.8.ppc", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390x", "3Desktop:python-debuginfo-0:2.2.3-6.8.x86_64", "3Desktop:python-devel-0:2.2.3-6.8.i386", "3Desktop:python-devel-0:2.2.3-6.8.ia64", "3Desktop:python-devel-0:2.2.3-6.8.ppc", "3Desktop:python-devel-0:2.2.3-6.8.s390", "3Desktop:python-devel-0:2.2.3-6.8.s390x", "3Desktop:python-devel-0:2.2.3-6.8.x86_64", "3Desktop:python-tools-0:2.2.3-6.8.i386", "3Desktop:python-tools-0:2.2.3-6.8.ia64", "3Desktop:python-tools-0:2.2.3-6.8.ppc", "3Desktop:python-tools-0:2.2.3-6.8.s390", "3Desktop:python-tools-0:2.2.3-6.8.s390x", "3Desktop:python-tools-0:2.2.3-6.8.x86_64", "3Desktop:tkinter-0:2.2.3-6.8.i386", "3Desktop:tkinter-0:2.2.3-6.8.ia64", "3Desktop:tkinter-0:2.2.3-6.8.ppc", "3Desktop:tkinter-0:2.2.3-6.8.s390", "3Desktop:tkinter-0:2.2.3-6.8.s390x", "3Desktop:tkinter-0:2.2.3-6.8.x86_64", "3ES:python-0:2.2.3-6.8.i386", "3ES:python-0:2.2.3-6.8.ia64", "3ES:python-0:2.2.3-6.8.ppc", "3ES:python-0:2.2.3-6.8.s390", "3ES:python-0:2.2.3-6.8.s390x", "3ES:python-0:2.2.3-6.8.src", "3ES:python-0:2.2.3-6.8.x86_64", "3ES:python-debuginfo-0:2.2.3-6.8.i386", "3ES:python-debuginfo-0:2.2.3-6.8.ia64", "3ES:python-debuginfo-0:2.2.3-6.8.ppc", "3ES:python-debuginfo-0:2.2.3-6.8.s390", "3ES:python-debuginfo-0:2.2.3-6.8.s390x", "3ES:python-debuginfo-0:2.2.3-6.8.x86_64", "3ES:python-devel-0:2.2.3-6.8.i386", "3ES:python-devel-0:2.2.3-6.8.ia64", "3ES:python-devel-0:2.2.3-6.8.ppc", "3ES:python-devel-0:2.2.3-6.8.s390", "3ES:python-devel-0:2.2.3-6.8.s390x", "3ES:python-devel-0:2.2.3-6.8.x86_64", "3ES:python-tools-0:2.2.3-6.8.i386", "3ES:python-tools-0:2.2.3-6.8.ia64", "3ES:python-tools-0:2.2.3-6.8.ppc", "3ES:python-tools-0:2.2.3-6.8.s390", "3ES:python-tools-0:2.2.3-6.8.s390x", "3ES:python-tools-0:2.2.3-6.8.x86_64", "3ES:tkinter-0:2.2.3-6.8.i386", "3ES:tkinter-0:2.2.3-6.8.ia64", "3ES:tkinter-0:2.2.3-6.8.ppc", "3ES:tkinter-0:2.2.3-6.8.s390", "3ES:tkinter-0:2.2.3-6.8.s390x", "3ES:tkinter-0:2.2.3-6.8.x86_64", "3WS:python-0:2.2.3-6.8.i386", "3WS:python-0:2.2.3-6.8.ia64", "3WS:python-0:2.2.3-6.8.ppc", "3WS:python-0:2.2.3-6.8.s390", "3WS:python-0:2.2.3-6.8.s390x", "3WS:python-0:2.2.3-6.8.src", "3WS:python-0:2.2.3-6.8.x86_64", "3WS:python-debuginfo-0:2.2.3-6.8.i386", "3WS:python-debuginfo-0:2.2.3-6.8.ia64", "3WS:python-debuginfo-0:2.2.3-6.8.ppc", "3WS:python-debuginfo-0:2.2.3-6.8.s390", "3WS:python-debuginfo-0:2.2.3-6.8.s390x", "3WS:python-debuginfo-0:2.2.3-6.8.x86_64", "3WS:python-devel-0:2.2.3-6.8.i386", "3WS:python-devel-0:2.2.3-6.8.ia64", "3WS:python-devel-0:2.2.3-6.8.ppc", "3WS:python-devel-0:2.2.3-6.8.s390", "3WS:python-devel-0:2.2.3-6.8.s390x", "3WS:python-devel-0:2.2.3-6.8.x86_64", "3WS:python-tools-0:2.2.3-6.8.i386", "3WS:python-tools-0:2.2.3-6.8.ia64", "3WS:python-tools-0:2.2.3-6.8.ppc", "3WS:python-tools-0:2.2.3-6.8.s390", "3WS:python-tools-0:2.2.3-6.8.s390x", "3WS:python-tools-0:2.2.3-6.8.x86_64", "3WS:tkinter-0:2.2.3-6.8.i386", "3WS:tkinter-0:2.2.3-6.8.ia64", "3WS:tkinter-0:2.2.3-6.8.ppc", "3WS:tkinter-0:2.2.3-6.8.s390", "3WS:tkinter-0:2.2.3-6.8.s390x", "3WS:tkinter-0:2.2.3-6.8.x86_64", "4AS:python-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-0:2.3.4-14.4.el4_6.1.src", "4AS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-0:2.3.4-14.4.el4_6.1.src", "4Desktop:python-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-0:2.3.4-14.4.el4_6.1.src", "4ES:python-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-0:2.3.4-14.4.el4_6.1.src", "4WS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2007-2052", }, { category: "external", summary: "RHBZ#235093", url: "https://bugzilla.redhat.com/show_bug.cgi?id=235093", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2007-2052", url: "https://www.cve.org/CVERecord?id=CVE-2007-2052", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", url: "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", }, ], release_date: "2007-04-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2007-12-10T18:20:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "3AS:python-0:2.2.3-6.8.i386", "3AS:python-0:2.2.3-6.8.ia64", "3AS:python-0:2.2.3-6.8.ppc", "3AS:python-0:2.2.3-6.8.s390", "3AS:python-0:2.2.3-6.8.s390x", "3AS:python-0:2.2.3-6.8.src", "3AS:python-0:2.2.3-6.8.x86_64", "3AS:python-debuginfo-0:2.2.3-6.8.i386", "3AS:python-debuginfo-0:2.2.3-6.8.ia64", "3AS:python-debuginfo-0:2.2.3-6.8.ppc", "3AS:python-debuginfo-0:2.2.3-6.8.s390", "3AS:python-debuginfo-0:2.2.3-6.8.s390x", "3AS:python-debuginfo-0:2.2.3-6.8.x86_64", "3AS:python-devel-0:2.2.3-6.8.i386", "3AS:python-devel-0:2.2.3-6.8.ia64", "3AS:python-devel-0:2.2.3-6.8.ppc", "3AS:python-devel-0:2.2.3-6.8.s390", "3AS:python-devel-0:2.2.3-6.8.s390x", "3AS:python-devel-0:2.2.3-6.8.x86_64", "3AS:python-tools-0:2.2.3-6.8.i386", "3AS:python-tools-0:2.2.3-6.8.ia64", "3AS:python-tools-0:2.2.3-6.8.ppc", "3AS:python-tools-0:2.2.3-6.8.s390", "3AS:python-tools-0:2.2.3-6.8.s390x", "3AS:python-tools-0:2.2.3-6.8.x86_64", "3AS:tkinter-0:2.2.3-6.8.i386", "3AS:tkinter-0:2.2.3-6.8.ia64", "3AS:tkinter-0:2.2.3-6.8.ppc", "3AS:tkinter-0:2.2.3-6.8.s390", "3AS:tkinter-0:2.2.3-6.8.s390x", "3AS:tkinter-0:2.2.3-6.8.x86_64", "3Desktop:python-0:2.2.3-6.8.i386", "3Desktop:python-0:2.2.3-6.8.ia64", "3Desktop:python-0:2.2.3-6.8.ppc", "3Desktop:python-0:2.2.3-6.8.s390", "3Desktop:python-0:2.2.3-6.8.s390x", "3Desktop:python-0:2.2.3-6.8.src", "3Desktop:python-0:2.2.3-6.8.x86_64", "3Desktop:python-debuginfo-0:2.2.3-6.8.i386", "3Desktop:python-debuginfo-0:2.2.3-6.8.ia64", "3Desktop:python-debuginfo-0:2.2.3-6.8.ppc", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390x", "3Desktop:python-debuginfo-0:2.2.3-6.8.x86_64", "3Desktop:python-devel-0:2.2.3-6.8.i386", "3Desktop:python-devel-0:2.2.3-6.8.ia64", "3Desktop:python-devel-0:2.2.3-6.8.ppc", "3Desktop:python-devel-0:2.2.3-6.8.s390", "3Desktop:python-devel-0:2.2.3-6.8.s390x", "3Desktop:python-devel-0:2.2.3-6.8.x86_64", "3Desktop:python-tools-0:2.2.3-6.8.i386", "3Desktop:python-tools-0:2.2.3-6.8.ia64", "3Desktop:python-tools-0:2.2.3-6.8.ppc", "3Desktop:python-tools-0:2.2.3-6.8.s390", "3Desktop:python-tools-0:2.2.3-6.8.s390x", "3Desktop:python-tools-0:2.2.3-6.8.x86_64", "3Desktop:tkinter-0:2.2.3-6.8.i386", "3Desktop:tkinter-0:2.2.3-6.8.ia64", "3Desktop:tkinter-0:2.2.3-6.8.ppc", "3Desktop:tkinter-0:2.2.3-6.8.s390", "3Desktop:tkinter-0:2.2.3-6.8.s390x", "3Desktop:tkinter-0:2.2.3-6.8.x86_64", "3ES:python-0:2.2.3-6.8.i386", "3ES:python-0:2.2.3-6.8.ia64", "3ES:python-0:2.2.3-6.8.ppc", "3ES:python-0:2.2.3-6.8.s390", "3ES:python-0:2.2.3-6.8.s390x", "3ES:python-0:2.2.3-6.8.src", "3ES:python-0:2.2.3-6.8.x86_64", "3ES:python-debuginfo-0:2.2.3-6.8.i386", "3ES:python-debuginfo-0:2.2.3-6.8.ia64", "3ES:python-debuginfo-0:2.2.3-6.8.ppc", "3ES:python-debuginfo-0:2.2.3-6.8.s390", "3ES:python-debuginfo-0:2.2.3-6.8.s390x", "3ES:python-debuginfo-0:2.2.3-6.8.x86_64", "3ES:python-devel-0:2.2.3-6.8.i386", "3ES:python-devel-0:2.2.3-6.8.ia64", "3ES:python-devel-0:2.2.3-6.8.ppc", "3ES:python-devel-0:2.2.3-6.8.s390", "3ES:python-devel-0:2.2.3-6.8.s390x", "3ES:python-devel-0:2.2.3-6.8.x86_64", "3ES:python-tools-0:2.2.3-6.8.i386", "3ES:python-tools-0:2.2.3-6.8.ia64", "3ES:python-tools-0:2.2.3-6.8.ppc", "3ES:python-tools-0:2.2.3-6.8.s390", "3ES:python-tools-0:2.2.3-6.8.s390x", "3ES:python-tools-0:2.2.3-6.8.x86_64", "3ES:tkinter-0:2.2.3-6.8.i386", "3ES:tkinter-0:2.2.3-6.8.ia64", "3ES:tkinter-0:2.2.3-6.8.ppc", "3ES:tkinter-0:2.2.3-6.8.s390", "3ES:tkinter-0:2.2.3-6.8.s390x", "3ES:tkinter-0:2.2.3-6.8.x86_64", "3WS:python-0:2.2.3-6.8.i386", "3WS:python-0:2.2.3-6.8.ia64", "3WS:python-0:2.2.3-6.8.ppc", "3WS:python-0:2.2.3-6.8.s390", "3WS:python-0:2.2.3-6.8.s390x", "3WS:python-0:2.2.3-6.8.src", "3WS:python-0:2.2.3-6.8.x86_64", "3WS:python-debuginfo-0:2.2.3-6.8.i386", "3WS:python-debuginfo-0:2.2.3-6.8.ia64", "3WS:python-debuginfo-0:2.2.3-6.8.ppc", "3WS:python-debuginfo-0:2.2.3-6.8.s390", "3WS:python-debuginfo-0:2.2.3-6.8.s390x", "3WS:python-debuginfo-0:2.2.3-6.8.x86_64", "3WS:python-devel-0:2.2.3-6.8.i386", "3WS:python-devel-0:2.2.3-6.8.ia64", "3WS:python-devel-0:2.2.3-6.8.ppc", "3WS:python-devel-0:2.2.3-6.8.s390", "3WS:python-devel-0:2.2.3-6.8.s390x", "3WS:python-devel-0:2.2.3-6.8.x86_64", "3WS:python-tools-0:2.2.3-6.8.i386", "3WS:python-tools-0:2.2.3-6.8.ia64", "3WS:python-tools-0:2.2.3-6.8.ppc", "3WS:python-tools-0:2.2.3-6.8.s390", "3WS:python-tools-0:2.2.3-6.8.s390x", "3WS:python-tools-0:2.2.3-6.8.x86_64", "3WS:tkinter-0:2.2.3-6.8.i386", "3WS:tkinter-0:2.2.3-6.8.ia64", "3WS:tkinter-0:2.2.3-6.8.ppc", "3WS:tkinter-0:2.2.3-6.8.s390", "3WS:tkinter-0:2.2.3-6.8.s390x", "3WS:tkinter-0:2.2.3-6.8.x86_64", "4AS:python-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-0:2.3.4-14.4.el4_6.1.src", "4AS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-0:2.3.4-14.4.el4_6.1.src", "4Desktop:python-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-0:2.3.4-14.4.el4_6.1.src", "4ES:python-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-0:2.3.4-14.4.el4_6.1.src", "4WS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2007:1076", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python off-by-one locale.strxfrm() (possible memory disclosure)", }, { cve: "CVE-2007-4965", discovery_date: "2007-09-18T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "295971", }, ], notes: [ { category: "description", text: "Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.", title: "Vulnerability description", }, { category: "summary", text: "python imageop module heap corruption", title: "Vulnerability summary", }, { category: "other", text: "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=295971\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/", title: "Statement", }, ], product_status: { fixed: [ "3AS:python-0:2.2.3-6.8.i386", "3AS:python-0:2.2.3-6.8.ia64", "3AS:python-0:2.2.3-6.8.ppc", "3AS:python-0:2.2.3-6.8.s390", "3AS:python-0:2.2.3-6.8.s390x", "3AS:python-0:2.2.3-6.8.src", "3AS:python-0:2.2.3-6.8.x86_64", "3AS:python-debuginfo-0:2.2.3-6.8.i386", "3AS:python-debuginfo-0:2.2.3-6.8.ia64", "3AS:python-debuginfo-0:2.2.3-6.8.ppc", "3AS:python-debuginfo-0:2.2.3-6.8.s390", "3AS:python-debuginfo-0:2.2.3-6.8.s390x", "3AS:python-debuginfo-0:2.2.3-6.8.x86_64", "3AS:python-devel-0:2.2.3-6.8.i386", "3AS:python-devel-0:2.2.3-6.8.ia64", "3AS:python-devel-0:2.2.3-6.8.ppc", "3AS:python-devel-0:2.2.3-6.8.s390", "3AS:python-devel-0:2.2.3-6.8.s390x", "3AS:python-devel-0:2.2.3-6.8.x86_64", "3AS:python-tools-0:2.2.3-6.8.i386", "3AS:python-tools-0:2.2.3-6.8.ia64", "3AS:python-tools-0:2.2.3-6.8.ppc", "3AS:python-tools-0:2.2.3-6.8.s390", "3AS:python-tools-0:2.2.3-6.8.s390x", "3AS:python-tools-0:2.2.3-6.8.x86_64", "3AS:tkinter-0:2.2.3-6.8.i386", "3AS:tkinter-0:2.2.3-6.8.ia64", "3AS:tkinter-0:2.2.3-6.8.ppc", "3AS:tkinter-0:2.2.3-6.8.s390", "3AS:tkinter-0:2.2.3-6.8.s390x", "3AS:tkinter-0:2.2.3-6.8.x86_64", "3Desktop:python-0:2.2.3-6.8.i386", "3Desktop:python-0:2.2.3-6.8.ia64", "3Desktop:python-0:2.2.3-6.8.ppc", "3Desktop:python-0:2.2.3-6.8.s390", "3Desktop:python-0:2.2.3-6.8.s390x", "3Desktop:python-0:2.2.3-6.8.src", "3Desktop:python-0:2.2.3-6.8.x86_64", "3Desktop:python-debuginfo-0:2.2.3-6.8.i386", "3Desktop:python-debuginfo-0:2.2.3-6.8.ia64", "3Desktop:python-debuginfo-0:2.2.3-6.8.ppc", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390x", "3Desktop:python-debuginfo-0:2.2.3-6.8.x86_64", "3Desktop:python-devel-0:2.2.3-6.8.i386", "3Desktop:python-devel-0:2.2.3-6.8.ia64", "3Desktop:python-devel-0:2.2.3-6.8.ppc", "3Desktop:python-devel-0:2.2.3-6.8.s390", "3Desktop:python-devel-0:2.2.3-6.8.s390x", "3Desktop:python-devel-0:2.2.3-6.8.x86_64", "3Desktop:python-tools-0:2.2.3-6.8.i386", "3Desktop:python-tools-0:2.2.3-6.8.ia64", "3Desktop:python-tools-0:2.2.3-6.8.ppc", "3Desktop:python-tools-0:2.2.3-6.8.s390", "3Desktop:python-tools-0:2.2.3-6.8.s390x", "3Desktop:python-tools-0:2.2.3-6.8.x86_64", "3Desktop:tkinter-0:2.2.3-6.8.i386", "3Desktop:tkinter-0:2.2.3-6.8.ia64", "3Desktop:tkinter-0:2.2.3-6.8.ppc", "3Desktop:tkinter-0:2.2.3-6.8.s390", "3Desktop:tkinter-0:2.2.3-6.8.s390x", "3Desktop:tkinter-0:2.2.3-6.8.x86_64", "3ES:python-0:2.2.3-6.8.i386", "3ES:python-0:2.2.3-6.8.ia64", "3ES:python-0:2.2.3-6.8.ppc", "3ES:python-0:2.2.3-6.8.s390", "3ES:python-0:2.2.3-6.8.s390x", "3ES:python-0:2.2.3-6.8.src", "3ES:python-0:2.2.3-6.8.x86_64", "3ES:python-debuginfo-0:2.2.3-6.8.i386", "3ES:python-debuginfo-0:2.2.3-6.8.ia64", "3ES:python-debuginfo-0:2.2.3-6.8.ppc", "3ES:python-debuginfo-0:2.2.3-6.8.s390", "3ES:python-debuginfo-0:2.2.3-6.8.s390x", "3ES:python-debuginfo-0:2.2.3-6.8.x86_64", "3ES:python-devel-0:2.2.3-6.8.i386", "3ES:python-devel-0:2.2.3-6.8.ia64", "3ES:python-devel-0:2.2.3-6.8.ppc", "3ES:python-devel-0:2.2.3-6.8.s390", "3ES:python-devel-0:2.2.3-6.8.s390x", "3ES:python-devel-0:2.2.3-6.8.x86_64", "3ES:python-tools-0:2.2.3-6.8.i386", "3ES:python-tools-0:2.2.3-6.8.ia64", "3ES:python-tools-0:2.2.3-6.8.ppc", "3ES:python-tools-0:2.2.3-6.8.s390", "3ES:python-tools-0:2.2.3-6.8.s390x", "3ES:python-tools-0:2.2.3-6.8.x86_64", "3ES:tkinter-0:2.2.3-6.8.i386", "3ES:tkinter-0:2.2.3-6.8.ia64", "3ES:tkinter-0:2.2.3-6.8.ppc", "3ES:tkinter-0:2.2.3-6.8.s390", "3ES:tkinter-0:2.2.3-6.8.s390x", "3ES:tkinter-0:2.2.3-6.8.x86_64", "3WS:python-0:2.2.3-6.8.i386", "3WS:python-0:2.2.3-6.8.ia64", "3WS:python-0:2.2.3-6.8.ppc", "3WS:python-0:2.2.3-6.8.s390", "3WS:python-0:2.2.3-6.8.s390x", "3WS:python-0:2.2.3-6.8.src", "3WS:python-0:2.2.3-6.8.x86_64", "3WS:python-debuginfo-0:2.2.3-6.8.i386", "3WS:python-debuginfo-0:2.2.3-6.8.ia64", "3WS:python-debuginfo-0:2.2.3-6.8.ppc", "3WS:python-debuginfo-0:2.2.3-6.8.s390", "3WS:python-debuginfo-0:2.2.3-6.8.s390x", "3WS:python-debuginfo-0:2.2.3-6.8.x86_64", "3WS:python-devel-0:2.2.3-6.8.i386", "3WS:python-devel-0:2.2.3-6.8.ia64", "3WS:python-devel-0:2.2.3-6.8.ppc", "3WS:python-devel-0:2.2.3-6.8.s390", "3WS:python-devel-0:2.2.3-6.8.s390x", "3WS:python-devel-0:2.2.3-6.8.x86_64", "3WS:python-tools-0:2.2.3-6.8.i386", "3WS:python-tools-0:2.2.3-6.8.ia64", "3WS:python-tools-0:2.2.3-6.8.ppc", "3WS:python-tools-0:2.2.3-6.8.s390", "3WS:python-tools-0:2.2.3-6.8.s390x", "3WS:python-tools-0:2.2.3-6.8.x86_64", "3WS:tkinter-0:2.2.3-6.8.i386", "3WS:tkinter-0:2.2.3-6.8.ia64", "3WS:tkinter-0:2.2.3-6.8.ppc", "3WS:tkinter-0:2.2.3-6.8.s390", "3WS:tkinter-0:2.2.3-6.8.s390x", "3WS:tkinter-0:2.2.3-6.8.x86_64", "4AS:python-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-0:2.3.4-14.4.el4_6.1.src", "4AS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-0:2.3.4-14.4.el4_6.1.src", "4Desktop:python-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-0:2.3.4-14.4.el4_6.1.src", "4ES:python-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-0:2.3.4-14.4.el4_6.1.src", "4WS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2007-4965", }, { category: "external", summary: "RHBZ#295971", url: "https://bugzilla.redhat.com/show_bug.cgi?id=295971", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2007-4965", url: "https://www.cve.org/CVERecord?id=CVE-2007-4965", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", url: "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", }, ], release_date: "2007-09-16T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2007-12-10T18:20:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "3AS:python-0:2.2.3-6.8.i386", "3AS:python-0:2.2.3-6.8.ia64", "3AS:python-0:2.2.3-6.8.ppc", "3AS:python-0:2.2.3-6.8.s390", "3AS:python-0:2.2.3-6.8.s390x", "3AS:python-0:2.2.3-6.8.src", "3AS:python-0:2.2.3-6.8.x86_64", "3AS:python-debuginfo-0:2.2.3-6.8.i386", "3AS:python-debuginfo-0:2.2.3-6.8.ia64", "3AS:python-debuginfo-0:2.2.3-6.8.ppc", "3AS:python-debuginfo-0:2.2.3-6.8.s390", "3AS:python-debuginfo-0:2.2.3-6.8.s390x", "3AS:python-debuginfo-0:2.2.3-6.8.x86_64", "3AS:python-devel-0:2.2.3-6.8.i386", "3AS:python-devel-0:2.2.3-6.8.ia64", "3AS:python-devel-0:2.2.3-6.8.ppc", "3AS:python-devel-0:2.2.3-6.8.s390", "3AS:python-devel-0:2.2.3-6.8.s390x", "3AS:python-devel-0:2.2.3-6.8.x86_64", "3AS:python-tools-0:2.2.3-6.8.i386", "3AS:python-tools-0:2.2.3-6.8.ia64", "3AS:python-tools-0:2.2.3-6.8.ppc", "3AS:python-tools-0:2.2.3-6.8.s390", "3AS:python-tools-0:2.2.3-6.8.s390x", "3AS:python-tools-0:2.2.3-6.8.x86_64", "3AS:tkinter-0:2.2.3-6.8.i386", "3AS:tkinter-0:2.2.3-6.8.ia64", "3AS:tkinter-0:2.2.3-6.8.ppc", "3AS:tkinter-0:2.2.3-6.8.s390", "3AS:tkinter-0:2.2.3-6.8.s390x", "3AS:tkinter-0:2.2.3-6.8.x86_64", "3Desktop:python-0:2.2.3-6.8.i386", "3Desktop:python-0:2.2.3-6.8.ia64", "3Desktop:python-0:2.2.3-6.8.ppc", "3Desktop:python-0:2.2.3-6.8.s390", "3Desktop:python-0:2.2.3-6.8.s390x", "3Desktop:python-0:2.2.3-6.8.src", "3Desktop:python-0:2.2.3-6.8.x86_64", "3Desktop:python-debuginfo-0:2.2.3-6.8.i386", "3Desktop:python-debuginfo-0:2.2.3-6.8.ia64", "3Desktop:python-debuginfo-0:2.2.3-6.8.ppc", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390x", "3Desktop:python-debuginfo-0:2.2.3-6.8.x86_64", "3Desktop:python-devel-0:2.2.3-6.8.i386", "3Desktop:python-devel-0:2.2.3-6.8.ia64", "3Desktop:python-devel-0:2.2.3-6.8.ppc", "3Desktop:python-devel-0:2.2.3-6.8.s390", "3Desktop:python-devel-0:2.2.3-6.8.s390x", "3Desktop:python-devel-0:2.2.3-6.8.x86_64", "3Desktop:python-tools-0:2.2.3-6.8.i386", "3Desktop:python-tools-0:2.2.3-6.8.ia64", "3Desktop:python-tools-0:2.2.3-6.8.ppc", "3Desktop:python-tools-0:2.2.3-6.8.s390", "3Desktop:python-tools-0:2.2.3-6.8.s390x", "3Desktop:python-tools-0:2.2.3-6.8.x86_64", "3Desktop:tkinter-0:2.2.3-6.8.i386", "3Desktop:tkinter-0:2.2.3-6.8.ia64", "3Desktop:tkinter-0:2.2.3-6.8.ppc", "3Desktop:tkinter-0:2.2.3-6.8.s390", "3Desktop:tkinter-0:2.2.3-6.8.s390x", "3Desktop:tkinter-0:2.2.3-6.8.x86_64", "3ES:python-0:2.2.3-6.8.i386", "3ES:python-0:2.2.3-6.8.ia64", "3ES:python-0:2.2.3-6.8.ppc", "3ES:python-0:2.2.3-6.8.s390", "3ES:python-0:2.2.3-6.8.s390x", "3ES:python-0:2.2.3-6.8.src", "3ES:python-0:2.2.3-6.8.x86_64", "3ES:python-debuginfo-0:2.2.3-6.8.i386", "3ES:python-debuginfo-0:2.2.3-6.8.ia64", "3ES:python-debuginfo-0:2.2.3-6.8.ppc", "3ES:python-debuginfo-0:2.2.3-6.8.s390", "3ES:python-debuginfo-0:2.2.3-6.8.s390x", "3ES:python-debuginfo-0:2.2.3-6.8.x86_64", "3ES:python-devel-0:2.2.3-6.8.i386", "3ES:python-devel-0:2.2.3-6.8.ia64", "3ES:python-devel-0:2.2.3-6.8.ppc", "3ES:python-devel-0:2.2.3-6.8.s390", "3ES:python-devel-0:2.2.3-6.8.s390x", "3ES:python-devel-0:2.2.3-6.8.x86_64", "3ES:python-tools-0:2.2.3-6.8.i386", "3ES:python-tools-0:2.2.3-6.8.ia64", "3ES:python-tools-0:2.2.3-6.8.ppc", "3ES:python-tools-0:2.2.3-6.8.s390", "3ES:python-tools-0:2.2.3-6.8.s390x", "3ES:python-tools-0:2.2.3-6.8.x86_64", "3ES:tkinter-0:2.2.3-6.8.i386", "3ES:tkinter-0:2.2.3-6.8.ia64", "3ES:tkinter-0:2.2.3-6.8.ppc", "3ES:tkinter-0:2.2.3-6.8.s390", "3ES:tkinter-0:2.2.3-6.8.s390x", "3ES:tkinter-0:2.2.3-6.8.x86_64", "3WS:python-0:2.2.3-6.8.i386", "3WS:python-0:2.2.3-6.8.ia64", "3WS:python-0:2.2.3-6.8.ppc", "3WS:python-0:2.2.3-6.8.s390", "3WS:python-0:2.2.3-6.8.s390x", "3WS:python-0:2.2.3-6.8.src", "3WS:python-0:2.2.3-6.8.x86_64", "3WS:python-debuginfo-0:2.2.3-6.8.i386", "3WS:python-debuginfo-0:2.2.3-6.8.ia64", "3WS:python-debuginfo-0:2.2.3-6.8.ppc", "3WS:python-debuginfo-0:2.2.3-6.8.s390", "3WS:python-debuginfo-0:2.2.3-6.8.s390x", "3WS:python-debuginfo-0:2.2.3-6.8.x86_64", "3WS:python-devel-0:2.2.3-6.8.i386", "3WS:python-devel-0:2.2.3-6.8.ia64", "3WS:python-devel-0:2.2.3-6.8.ppc", "3WS:python-devel-0:2.2.3-6.8.s390", "3WS:python-devel-0:2.2.3-6.8.s390x", "3WS:python-devel-0:2.2.3-6.8.x86_64", "3WS:python-tools-0:2.2.3-6.8.i386", "3WS:python-tools-0:2.2.3-6.8.ia64", "3WS:python-tools-0:2.2.3-6.8.ppc", "3WS:python-tools-0:2.2.3-6.8.s390", "3WS:python-tools-0:2.2.3-6.8.s390x", "3WS:python-tools-0:2.2.3-6.8.x86_64", "3WS:tkinter-0:2.2.3-6.8.i386", "3WS:tkinter-0:2.2.3-6.8.ia64", "3WS:tkinter-0:2.2.3-6.8.ppc", "3WS:tkinter-0:2.2.3-6.8.s390", "3WS:tkinter-0:2.2.3-6.8.s390x", "3WS:tkinter-0:2.2.3-6.8.x86_64", "4AS:python-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-0:2.3.4-14.4.el4_6.1.src", "4AS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-0:2.3.4-14.4.el4_6.1.src", "4Desktop:python-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-0:2.3.4-14.4.el4_6.1.src", "4ES:python-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-0:2.3.4-14.4.el4_6.1.src", "4WS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2007:1076", }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "python imageop module heap corruption", }, ], }
RHSA-2008:0525
Vulnerability from csaf_redhat
Published
2008-06-30 15:36
Modified
2024-11-22 01:57
Summary
Red Hat Security Advisory: Red Hat Network Satellite Server Solaris client security update
Notes
Topic
Red Hat Network Satellite Server version 4.2.3 is now available. This
update includes fixes for a number of security issues in Red Hat Network
Satellite Server Solaris client components.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
This release corrects several security vulnerabilities in various
components shipped as part of the Red Hat Network Satellite Server Solaris
client. In a typical operating environment, these components are not used
by the Satellite Server in a vulnerable manner. These security updates will
reduce risk should these components be used by other applications.
Several flaws in Zlib was discovered. An attacker could create a
carefully-crafted compressed stream that would cause an application to
crash if the stream is opened by a user. (CVE-2005-2096). An attacker
could create a carefully crafted compressed stream that would cause an
application to crash if the stream is opened by a user. (CVE-2005-1849)
A buffer overflow was discovered in the OpenSSL SSL_get_shared_ciphers()
utility function. An attacker could send a list of ciphers to an
application that used this function and overrun a buffer (CVE-2006-3738).
A flaw in the SSLv2 client code was discovered. If a client application
used OpenSSL to create an SSLv2 connection to a malicious server, that
server could cause the client to crash. (CVE-2006-4343)
An attack on OpenSSL PKCS #1 v1.5 signatures was discovered. Where an RSA
key with exponent 3 is used it may be possible for an attacker to forge a
PKCS #1 v1.5 signature that would be incorrectly verified by
implementations that do not check for excess data in the RSA exponentiation
result of the signature. This issue affected applications that use OpenSSL
to verify X.509 certificates as well as other uses of PKCS #1 v1.5.
(CVE-2006-4339)
OpenSSL contained a software work-around for a bug in SSL handling in
Microsoft Internet Explorer version 3.0.2. It is enabled in most servers
that use OpenSSL to provide support for SSL and TLS. This work-around could
allow an attacker, acting as a "man in the middle" to force an SSL
connection to use SSL 2.0 rather than a stronger protocol, such as SSL 3.0
or TLS 1.0. (CVE-2005-2969)
During OpenSSL parsing of certain invalid ASN.1 structures an error
condition was mishandled. This can result in an infinite loop which
consumed system memory (CVE-2006-2937).
Certain public key types can take disproportionate amounts of time to
process in OpenSSL, leading to a denial of service. (CVE-2006-2940)
A flaw was discovered in the way that the Python repr() function handled
UTF-32/UCS-4 strings. If an application written in Python used the repr()
function on untrusted data, this could lead to a denial of service or
possibly allow the execution of arbitrary code with the privileges of the
Python application. (CVE-2006-4980)
A flaw was discovered in the strxfrm() function of Python's locale module.
Strings generated by this function were not properly NULL-terminated. This
may possibly cause disclosure of data stored in the memory of a Python
application using this function. (CVE-2007-2052)
Multiple integer overflow flaws were discovered in Python's imageop module.
If an application written in Python used the imageop module to process
untrusted images, it could cause the application to crash, enter an
infinite loop, or possibly execute arbitrary code with the privileges of
the Python interpreter. (CVE-2007-4965)
A stack-based buffer overflow was discovered in the Python interpreter,
which could allow a local user to gain privileges by running a script with
a long name from the current working directory. (CVE-2006-1542)
Users of Red Hat Network Satellite Server should upgrade to these updated
packages, which contain backported patches to correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Red Hat Network Satellite Server version 4.2.3 is now available. This\nupdate includes fixes for a number of security issues in Red Hat Network\nSatellite Server Solaris client components.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", title: "Topic", }, { category: "general", text: "This release corrects several security vulnerabilities in various\ncomponents shipped as part of the Red Hat Network Satellite Server Solaris\nclient. In a typical operating environment, these components are not used\nby the Satellite Server in a vulnerable manner. These security updates will\nreduce risk should these components be used by other applications.\n\nSeveral flaws in Zlib was discovered. An attacker could create a\ncarefully-crafted compressed stream that would cause an application to\ncrash if the stream is opened by a user. (CVE-2005-2096). An attacker\ncould create a carefully crafted compressed stream that would cause an\napplication to crash if the stream is opened by a user. (CVE-2005-1849)\n\nA buffer overflow was discovered in the OpenSSL SSL_get_shared_ciphers()\nutility function. An attacker could send a list of ciphers to an\napplication that used this function and overrun a buffer (CVE-2006-3738).\n\nA flaw in the SSLv2 client code was discovered. If a client application\nused OpenSSL to create an SSLv2 connection to a malicious server, that\nserver could cause the client to crash. (CVE-2006-4343)\n\nAn attack on OpenSSL PKCS #1 v1.5 signatures was discovered. Where an RSA\nkey with exponent 3 is used it may be possible for an attacker to forge a\nPKCS #1 v1.5 signature that would be incorrectly verified by\nimplementations that do not check for excess data in the RSA exponentiation\nresult of the signature. This issue affected applications that use OpenSSL\nto verify X.509 certificates as well as other uses of PKCS #1 v1.5.\n(CVE-2006-4339)\n\nOpenSSL contained a software work-around for a bug in SSL handling in\nMicrosoft Internet Explorer version 3.0.2. It is enabled in most servers\nthat use OpenSSL to provide support for SSL and TLS. This work-around could\nallow an attacker, acting as a \"man in the middle\" to force an SSL\nconnection to use SSL 2.0 rather than a stronger protocol, such as SSL 3.0\nor TLS 1.0. (CVE-2005-2969)\n\nDuring OpenSSL parsing of certain invalid ASN.1 structures an error\ncondition was mishandled. This can result in an infinite loop which\nconsumed system memory (CVE-2006-2937). \n\nCertain public key types can take disproportionate amounts of time to\nprocess in OpenSSL, leading to a denial of service. (CVE-2006-2940)\n\nA flaw was discovered in the way that the Python repr() function handled\nUTF-32/UCS-4 strings. If an application written in Python used the repr()\nfunction on untrusted data, this could lead to a denial of service or\npossibly allow the execution of arbitrary code with the privileges of the\nPython application. (CVE-2006-4980)\n\nA flaw was discovered in the strxfrm() function of Python's locale module.\nStrings generated by this function were not properly NULL-terminated. This\nmay possibly cause disclosure of data stored in the memory of a Python\napplication using this function. (CVE-2007-2052)\n\nMultiple integer overflow flaws were discovered in Python's imageop module.\nIf an application written in Python used the imageop module to process\nuntrusted images, it could cause the application to crash, enter an\ninfinite loop, or possibly execute arbitrary code with the privileges of\nthe Python interpreter. (CVE-2007-4965)\n\nA stack-based buffer overflow was discovered in the Python interpreter,\nwhich could allow a local user to gain privileges by running a script with\na long name from the current working directory. (CVE-2006-1542)\n\nUsers of Red Hat Network Satellite Server should upgrade to these updated\npackages, which contain backported patches to correct these issues.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2008:0525", url: "https://access.redhat.com/errata/RHSA-2008:0525", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "235093", url: "https://bugzilla.redhat.com/show_bug.cgi?id=235093", }, { category: "external", summary: "295971", url: "https://bugzilla.redhat.com/show_bug.cgi?id=295971", }, { category: "external", summary: "430640", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430640", }, { category: "external", summary: "430641", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430641", }, { category: "external", summary: "430649", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430649", }, { category: "external", summary: "430650", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430650", }, { category: "external", summary: "430651", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430651", }, { category: "external", summary: "430652", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430652", }, { category: "external", summary: "430654", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430654", }, { category: "external", summary: "430655", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430655", }, { category: "external", summary: "430659", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430659", }, { category: "external", summary: "430660", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430660", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0525.json", }, ], title: "Red Hat Security Advisory: Red Hat Network Satellite Server Solaris client security update", tracking: { current_release_date: "2024-11-22T01:57:58+00:00", generator: { date: "2024-11-22T01:57:58+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2008:0525", initial_release_date: "2008-06-30T15:36:00+00:00", revision_history: [ { date: "2008-06-30T15:36:00+00:00", number: "1", summary: "Initial version", }, { date: "2008-06-30T11:36:03+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T01:57:58+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Satellite v 4.2 (RHEL v.3 AS)", product: { name: "Red Hat Satellite v 4.2 (RHEL v.3 AS)", product_id: "3AS-RHNSAT4.2", product_identification_helper: { cpe: "cpe:/a:redhat:network_satellite:4.2::el3", }, }, }, { category: "product_name", name: "Red Hat Satellite v 4.2 (RHEL v.4 AS)", product: { name: "Red Hat Satellite v 4.2 (RHEL v.4 AS)", product_id: "4AS-RHNSAT4.2", product_identification_helper: { cpe: "cpe:/a:redhat:network_satellite:4.2::el4", }, }, }, ], category: "product_family", name: "Red Hat Satellite", }, { branches: [ { category: "product_version", name: "rhn-solaris-bootstrap-0:5.0.2-3.noarch", product: { name: "rhn-solaris-bootstrap-0:5.0.2-3.noarch", product_id: "rhn-solaris-bootstrap-0:5.0.2-3.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/rhn-solaris-bootstrap@5.0.2-3?arch=noarch", }, }, }, { category: "product_version", name: "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", product: { name: "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", product_id: "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/rhn_solaris_bootstrap_5_0_2_3@1-0?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "rhn-solaris-bootstrap-0:5.0.2-3.noarch as a component of Red Hat Satellite v 4.2 (RHEL v.3 AS)", product_id: "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", }, product_reference: "rhn-solaris-bootstrap-0:5.0.2-3.noarch", relates_to_product_reference: "3AS-RHNSAT4.2", }, { category: "default_component_of", full_product_name: { name: "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch as a component of Red Hat Satellite v 4.2 (RHEL v.3 AS)", product_id: "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", }, product_reference: "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", relates_to_product_reference: "3AS-RHNSAT4.2", }, { category: "default_component_of", full_product_name: { name: "rhn-solaris-bootstrap-0:5.0.2-3.noarch as a component of Red Hat Satellite v 4.2 (RHEL v.4 AS)", product_id: "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", }, product_reference: "rhn-solaris-bootstrap-0:5.0.2-3.noarch", relates_to_product_reference: "4AS-RHNSAT4.2", }, { category: "default_component_of", full_product_name: { name: "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch as a component of Red Hat Satellite v 4.2 (RHEL v.4 AS)", product_id: "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", }, product_reference: "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", relates_to_product_reference: "4AS-RHNSAT4.2", }, ], }, vulnerabilities: [ { cve: "CVE-2005-1849", discovery_date: "2006-07-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430649", }, ], notes: [ { category: "description", text: "inftrees.h in zlib 1.2.2 allows remote attackers to cause a denial of service (application crash) via an invalid file that causes a large dynamic tree to be produced.", title: "Vulnerability description", }, { category: "summary", text: "zlib DoS", title: "Vulnerability summary", }, ], product_status: { fixed: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2005-1849", }, { category: "external", summary: "RHBZ#430649", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430649", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2005-1849", url: "https://www.cve.org/CVERecord?id=CVE-2005-1849", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2005-1849", url: "https://nvd.nist.gov/vuln/detail/CVE-2005-1849", }, ], release_date: "2005-08-20T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-06-30T15:36:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0525", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "zlib DoS", }, { cve: "CVE-2005-2096", discovery_date: "2006-06-30T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430650", }, ], notes: [ { category: "description", text: "zlib 1.2 and later versions allows remote attackers to cause a denial of service (crash) via a crafted compressed stream with an incomplete code description of a length greater than 1, which leads to a buffer overflow, as demonstrated using a crafted PNG file.", title: "Vulnerability description", }, { category: "summary", text: "zlib DoS", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2005-2096", }, { category: "external", summary: "RHBZ#430650", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430650", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2005-2096", url: "https://www.cve.org/CVERecord?id=CVE-2005-2096", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2005-2096", url: "https://nvd.nist.gov/vuln/detail/CVE-2005-2096", }, ], release_date: "2005-07-06T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-06-30T15:36:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0525", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "zlib DoS", }, { cve: "CVE-2005-2969", discovery_date: "2005-10-04T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430660", }, ], notes: [ { category: "description", text: "The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.", title: "Vulnerability description", }, { category: "summary", text: "openssl mitm downgrade attack", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2005-2969", }, { category: "external", summary: "RHBZ#430660", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430660", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2005-2969", url: "https://www.cve.org/CVERecord?id=CVE-2005-2969", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2005-2969", url: "https://nvd.nist.gov/vuln/detail/CVE-2005-2969", }, ], release_date: "2005-10-11T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-06-30T15:36:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0525", }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "openssl mitm downgrade attack", }, { cve: "CVE-2006-1542", discovery_date: "2006-03-30T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430640", }, ], notes: [ { category: "description", text: "Stack-based buffer overflow in Python 2.4.2 and earlier, running on Linux 2.6.12.5 under gcc 4.0.3 with libc 2.3.5, allows local users to cause a \"stack overflow,\" and possibly gain privileges, by running a script from a current working directory that has a long name, related to the realpath function. NOTE: this might not be a vulnerability. However, the fact that it appears in a programming language interpreter could mean that some applications are affected, although attack scenarios might be limited because the attacker might already need to cross privilege boundaries to cause an exploitable program to be placed in a directory with a long name; or, depending on the method that Python uses to determine the current working directory, setuid applications might be affected.", title: "Vulnerability description", }, { category: "summary", text: "python buffer overflow", title: "Vulnerability summary", }, { category: "other", text: "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/\n\nRed Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-1542", }, { category: "external", summary: "RHBZ#430640", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430640", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-1542", url: "https://www.cve.org/CVERecord?id=CVE-2006-1542", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-1542", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-1542", }, ], release_date: "2005-09-22T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-06-30T15:36:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0525", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python buffer overflow", }, { cve: "CVE-2006-2937", discovery_date: "2006-07-03T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430655", }, ], notes: [ { category: "description", text: "OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition.", title: "Vulnerability description", }, { category: "summary", text: "openssl ASN.1 DoS", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-2937", }, { category: "external", summary: "RHBZ#430655", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430655", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-2937", url: "https://www.cve.org/CVERecord?id=CVE-2006-2937", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-2937", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-2937", }, ], release_date: "2006-09-28T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-06-30T15:36:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0525", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "openssl ASN.1 DoS", }, { cve: "CVE-2006-2940", discovery_date: "2006-07-03T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430654", }, ], notes: [ { category: "description", text: "OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) \"public exponent\" or (2) \"public modulus\" values in X.509 certificates that require extra time to process when using RSA signature verification.", title: "Vulnerability description", }, { category: "summary", text: "openssl public key DoS", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-2940", }, { category: "external", summary: "RHBZ#430654", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430654", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-2940", url: "https://www.cve.org/CVERecord?id=CVE-2006-2940", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-2940", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-2940", }, ], release_date: "2006-09-28T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-06-30T15:36:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0525", }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "openssl public key DoS", }, { cve: "CVE-2006-3738", discovery_date: "2006-08-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430652", }, ], notes: [ { category: "description", text: "Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.", title: "Vulnerability description", }, { category: "summary", text: "openssl get_shared_ciphers overflow", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-3738", }, { category: "external", summary: "RHBZ#430652", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430652", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-3738", url: "https://www.cve.org/CVERecord?id=CVE-2006-3738", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-3738", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-3738", }, ], release_date: "2006-09-28T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-06-30T15:36:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0525", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "openssl get_shared_ciphers overflow", }, { cve: "CVE-2006-4339", discovery_date: "2006-09-05T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430659", }, ], notes: [ { category: "description", text: "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.", title: "Vulnerability description", }, { category: "summary", text: "openssl signature forgery", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-4339", }, { category: "external", summary: "RHBZ#430659", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430659", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-4339", url: "https://www.cve.org/CVERecord?id=CVE-2006-4339", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-4339", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-4339", }, ], release_date: "2006-09-05T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-06-30T15:36:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0525", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "openssl signature forgery", }, { cve: "CVE-2006-4343", discovery_date: "2006-08-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430651", }, ], notes: [ { category: "description", text: "The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.", title: "Vulnerability description", }, { category: "summary", text: "openssl sslv2 client code", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-4343", }, { category: "external", summary: "RHBZ#430651", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430651", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-4343", url: "https://www.cve.org/CVERecord?id=CVE-2006-4343", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-4343", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-4343", }, ], release_date: "2006-09-28T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-06-30T15:36:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0525", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "openssl sslv2 client code", }, { cve: "CVE-2006-4980", discovery_date: "2006-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430641", }, ], notes: [ { category: "description", text: "Buffer overflow in the repr function in Python 2.3 through 2.6 before 20060822 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via crafted wide character UTF-32/UCS-4 strings to certain scripts.", title: "Vulnerability description", }, { category: "summary", text: "python repr unicode buffer overflow", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-4980", }, { category: "external", summary: "RHBZ#430641", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430641", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-4980", url: "https://www.cve.org/CVERecord?id=CVE-2006-4980", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-4980", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-4980", }, ], release_date: "2006-08-16T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-06-30T15:36:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0525", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "python repr unicode buffer overflow", }, { cve: "CVE-2007-2052", cwe: { id: "CWE-193", name: "Off-by-one Error", }, discovery_date: "2007-04-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "235093", }, ], notes: [ { category: "description", text: "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", title: "Vulnerability description", }, { category: "summary", text: "python off-by-one locale.strxfrm() (possible memory disclosure)", title: "Vulnerability summary", }, { category: "other", text: "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/", title: "Statement", }, ], product_status: { fixed: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2007-2052", }, { category: "external", summary: "RHBZ#235093", url: "https://bugzilla.redhat.com/show_bug.cgi?id=235093", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2007-2052", url: "https://www.cve.org/CVERecord?id=CVE-2007-2052", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", url: "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", }, ], release_date: "2007-04-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-06-30T15:36:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0525", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python off-by-one locale.strxfrm() (possible memory disclosure)", }, { cve: "CVE-2007-4965", discovery_date: "2007-09-18T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "295971", }, ], notes: [ { category: "description", text: "Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.", title: "Vulnerability description", }, { category: "summary", text: "python imageop module heap corruption", title: "Vulnerability summary", }, { category: "other", text: "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=295971\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/", title: "Statement", }, ], product_status: { fixed: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2007-4965", }, { category: "external", summary: "RHBZ#295971", url: "https://bugzilla.redhat.com/show_bug.cgi?id=295971", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2007-4965", url: "https://www.cve.org/CVERecord?id=CVE-2007-4965", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", url: "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", }, ], release_date: "2007-09-16T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-06-30T15:36:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0525", }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "python imageop module heap corruption", }, ], }
RHSA-2008:0629
Vulnerability from csaf_redhat
Published
2008-08-13 14:16
Modified
2024-11-22 01:58
Summary
Red Hat Security Advisory: Red Hat Network Satellite Server Solaris client security update
Notes
Topic
Red Hat Network Satellite Server version 5.1.1 is now available. This
update includes fixes for a number of security issues in Red Hat Network
Satellite Server Solaris client components.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
This release corrects several security vulnerabilities in components
shipped as part of the Red Hat Network Satellite Server Solaris client. In
a typical operating environment, these components are not used by the
Satellite Server in a vulnerable manner. These security updates will reduce
risk should these components be used by other applications.
Several flaws in Zlib were discovered. An attacker could create a
carefully-crafted compressed stream that would cause an application to
crash if the stream was opened by a user. (CVE-2005-2096, CVE-2005-1849)
A buffer overflow was discovered in the OpenSSL SSL_get_shared_ciphers()
utility function. An attacker could send a list of ciphers to an
application that used this function and overrun a buffer (CVE-2006-3738).
A flaw in the SSLv2 client code was discovered. If a client application
used OpenSSL to create an SSLv2 connection to a malicious server, that
server could cause the client to crash. (CVE-2006-4343)
An attack on OpenSSL PKCS #1 v1.5 signatures was discovered. Where an RSA
key with exponent 3 was used an attacker could, potentially, forge a PKCS
#1 v1.5 signature that would be incorrectly verified by implementations
that do not check for excess data in the RSA exponentiation result of the
signature. This issue affected applications that use OpenSSL to verify
X.509 certificates as well as other uses of PKCS #1 v1.5. (CVE-2006-4339)
OpenSSL contained a software work-around for a bug in SSL handling in
Microsoft Internet Explorer version 3.0.2. It is enabled in most servers
that use OpenSSL to provide support for SSL and TLS. This work-around was
vulnerable to a man-in-the-middle attack which allowed a remote user to
force an SSL connection to use SSL 2.0, rather than a stronger protocol,
such as SSL 3.0 or TLS 1.0. (CVE-2005-2969)
During OpenSSL parsing of certain invalid ASN.1 structures, an error
condition was mishandled. This could result in an infinite loop which
consumed system memory (CVE-2006-2937).
Certain public key types could take disproportionate amounts of time to
process in OpenSSL, leading to a denial of service. (CVE-2006-2940)
A flaw was discovered in the Python repr() function's handling of
UTF-32/UCS-4 strings. If an application used the repr() function on
untrusted data, this could lead to a denial of service or, possibly, allow
the execution of arbitrary code with the privileges of the application
using the flawed function. (CVE-2006-4980)
A flaw was discovered in the strxfrm() function of Python's locale module.
Strings generated by this function were not properly NULL-terminated. This
could, potentially, cause disclosure of data stored in the memory of an
application using this function. (CVE-2007-2052)
Multiple integer overflow flaws were discovered in Python's imageop module.
If an application used the imageop module to process untrusted images, it
could cause the application to crash, enter an infinite loop, or, possibly,
execute arbitrary code with the privileges of the Python interpreter.
(CVE-2007-4965)
A stack-based buffer overflow was discovered in the Python interpreter,
which could allow a local user to gain privileges by running a script with
a long name from the current working directory. (CVE-2006-1542)
Users of Red Hat Network Satellite Server should upgrade to these updated
packages, which contain backported patches to correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Red Hat Network Satellite Server version 5.1.1 is now available. This\nupdate includes fixes for a number of security issues in Red Hat Network\nSatellite Server Solaris client components.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", title: "Topic", }, { category: "general", text: "This release corrects several security vulnerabilities in components\nshipped as part of the Red Hat Network Satellite Server Solaris client. In\na typical operating environment, these components are not used by the\nSatellite Server in a vulnerable manner. These security updates will reduce\nrisk should these components be used by other applications.\n\nSeveral flaws in Zlib were discovered. An attacker could create a\ncarefully-crafted compressed stream that would cause an application to\ncrash if the stream was opened by a user. (CVE-2005-2096, CVE-2005-1849)\n\nA buffer overflow was discovered in the OpenSSL SSL_get_shared_ciphers()\nutility function. An attacker could send a list of ciphers to an\napplication that used this function and overrun a buffer (CVE-2006-3738).\n\nA flaw in the SSLv2 client code was discovered. If a client application\nused OpenSSL to create an SSLv2 connection to a malicious server, that\nserver could cause the client to crash. (CVE-2006-4343)\n\nAn attack on OpenSSL PKCS #1 v1.5 signatures was discovered. Where an RSA\nkey with exponent 3 was used an attacker could, potentially, forge a PKCS\n#1 v1.5 signature that would be incorrectly verified by implementations\nthat do not check for excess data in the RSA exponentiation result of the\nsignature. This issue affected applications that use OpenSSL to verify\nX.509 certificates as well as other uses of PKCS #1 v1.5. (CVE-2006-4339)\n\nOpenSSL contained a software work-around for a bug in SSL handling in\nMicrosoft Internet Explorer version 3.0.2. It is enabled in most servers\nthat use OpenSSL to provide support for SSL and TLS. This work-around was\nvulnerable to a man-in-the-middle attack which allowed a remote user to\nforce an SSL connection to use SSL 2.0, rather than a stronger protocol,\nsuch as SSL 3.0 or TLS 1.0. (CVE-2005-2969)\n\nDuring OpenSSL parsing of certain invalid ASN.1 structures, an error\ncondition was mishandled. This could result in an infinite loop which\nconsumed system memory (CVE-2006-2937).\n\nCertain public key types could take disproportionate amounts of time to\nprocess in OpenSSL, leading to a denial of service. (CVE-2006-2940)\n\nA flaw was discovered in the Python repr() function's handling of\nUTF-32/UCS-4 strings. If an application used the repr() function on\nuntrusted data, this could lead to a denial of service or, possibly, allow\nthe execution of arbitrary code with the privileges of the application\nusing the flawed function. (CVE-2006-4980)\n\nA flaw was discovered in the strxfrm() function of Python's locale module.\nStrings generated by this function were not properly NULL-terminated. This\ncould, potentially, cause disclosure of data stored in the memory of an\napplication using this function. (CVE-2007-2052)\n\nMultiple integer overflow flaws were discovered in Python's imageop module.\nIf an application used the imageop module to process untrusted images, it\ncould cause the application to crash, enter an infinite loop, or, possibly,\nexecute arbitrary code with the privileges of the Python interpreter.\n(CVE-2007-4965)\n\nA stack-based buffer overflow was discovered in the Python interpreter,\nwhich could allow a local user to gain privileges by running a script with\na long name from the current working directory. (CVE-2006-1542)\n\nUsers of Red Hat Network Satellite Server should upgrade to these updated\npackages, which contain backported patches to correct these issues.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2008:0629", url: "https://access.redhat.com/errata/RHSA-2008:0629", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "235093", url: "https://bugzilla.redhat.com/show_bug.cgi?id=235093", }, { category: "external", summary: "295971", url: "https://bugzilla.redhat.com/show_bug.cgi?id=295971", }, { category: "external", summary: "430640", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430640", }, { category: "external", summary: "430641", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430641", }, { category: "external", summary: "430649", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430649", }, { category: "external", summary: "430650", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430650", }, { category: "external", summary: "430651", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430651", }, { category: "external", summary: "430652", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430652", }, { category: "external", summary: "430654", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430654", }, { category: "external", summary: "430655", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430655", }, { category: "external", summary: "430659", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430659", }, { category: "external", summary: "430660", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430660", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0629.json", }, ], title: "Red Hat Security Advisory: Red Hat Network Satellite Server Solaris client security update", tracking: { current_release_date: "2024-11-22T01:58:01+00:00", generator: { date: "2024-11-22T01:58:01+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2008:0629", initial_release_date: "2008-08-13T14:16:00+00:00", revision_history: [ { date: "2008-08-13T14:16:00+00:00", number: "1", summary: "Initial version", }, { date: "2008-08-13T10:16:13+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T01:58:01+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Satellite 5.1 (RHEL v.4 AS)", product: { name: "Red Hat Satellite 5.1 (RHEL v.4 AS)", product_id: "4AS-RHNSAT5.1", product_identification_helper: { cpe: "cpe:/a:redhat:network_satellite:5.1::el4", }, }, }, ], category: "product_family", name: "Red Hat Satellite", }, { branches: [ { category: "product_version", name: "rhn-solaris-bootstrap-0:5.1.1-3.noarch", product: { name: "rhn-solaris-bootstrap-0:5.1.1-3.noarch", product_id: "rhn-solaris-bootstrap-0:5.1.1-3.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/rhn-solaris-bootstrap@5.1.1-3?arch=noarch", }, }, }, { category: "product_version", name: "rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", product: { name: "rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", product_id: "rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/rhn_solaris_bootstrap_5_1_1_3@1-0?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "rhn-solaris-bootstrap-0:5.1.1-3.noarch as a component of Red Hat Satellite 5.1 (RHEL v.4 AS)", product_id: "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", }, product_reference: "rhn-solaris-bootstrap-0:5.1.1-3.noarch", relates_to_product_reference: "4AS-RHNSAT5.1", }, { category: "default_component_of", full_product_name: { name: "rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch as a component of Red Hat Satellite 5.1 (RHEL v.4 AS)", product_id: "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", }, product_reference: "rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", relates_to_product_reference: "4AS-RHNSAT5.1", }, ], }, vulnerabilities: [ { cve: "CVE-2005-1849", discovery_date: "2006-07-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430649", }, ], notes: [ { category: "description", text: "inftrees.h in zlib 1.2.2 allows remote attackers to cause a denial of service (application crash) via an invalid file that causes a large dynamic tree to be produced.", title: "Vulnerability description", }, { category: "summary", text: "zlib DoS", title: "Vulnerability summary", }, ], product_status: { fixed: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2005-1849", }, { category: "external", summary: "RHBZ#430649", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430649", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2005-1849", url: "https://www.cve.org/CVERecord?id=CVE-2005-1849", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2005-1849", url: "https://nvd.nist.gov/vuln/detail/CVE-2005-1849", }, ], release_date: "2005-08-20T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-08-13T14:16:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0629", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "zlib DoS", }, { cve: "CVE-2005-2096", discovery_date: "2006-06-30T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430650", }, ], notes: [ { category: "description", text: "zlib 1.2 and later versions allows remote attackers to cause a denial of service (crash) via a crafted compressed stream with an incomplete code description of a length greater than 1, which leads to a buffer overflow, as demonstrated using a crafted PNG file.", title: "Vulnerability description", }, { category: "summary", text: "zlib DoS", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2005-2096", }, { category: "external", summary: "RHBZ#430650", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430650", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2005-2096", url: "https://www.cve.org/CVERecord?id=CVE-2005-2096", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2005-2096", url: "https://nvd.nist.gov/vuln/detail/CVE-2005-2096", }, ], release_date: "2005-07-06T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-08-13T14:16:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0629", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "zlib DoS", }, { cve: "CVE-2005-2969", discovery_date: "2005-10-04T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430660", }, ], notes: [ { category: "description", text: "The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.", title: "Vulnerability description", }, { category: "summary", text: "openssl mitm downgrade attack", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2005-2969", }, { category: "external", summary: "RHBZ#430660", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430660", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2005-2969", url: "https://www.cve.org/CVERecord?id=CVE-2005-2969", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2005-2969", url: "https://nvd.nist.gov/vuln/detail/CVE-2005-2969", }, ], release_date: "2005-10-11T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-08-13T14:16:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0629", }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "openssl mitm downgrade attack", }, { cve: "CVE-2006-1542", discovery_date: "2006-03-30T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430640", }, ], notes: [ { category: "description", text: "Stack-based buffer overflow in Python 2.4.2 and earlier, running on Linux 2.6.12.5 under gcc 4.0.3 with libc 2.3.5, allows local users to cause a \"stack overflow,\" and possibly gain privileges, by running a script from a current working directory that has a long name, related to the realpath function. NOTE: this might not be a vulnerability. However, the fact that it appears in a programming language interpreter could mean that some applications are affected, although attack scenarios might be limited because the attacker might already need to cross privilege boundaries to cause an exploitable program to be placed in a directory with a long name; or, depending on the method that Python uses to determine the current working directory, setuid applications might be affected.", title: "Vulnerability description", }, { category: "summary", text: "python buffer overflow", title: "Vulnerability summary", }, { category: "other", text: "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/\n\nRed Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-1542", }, { category: "external", summary: "RHBZ#430640", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430640", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-1542", url: "https://www.cve.org/CVERecord?id=CVE-2006-1542", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-1542", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-1542", }, ], release_date: "2005-09-22T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-08-13T14:16:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0629", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python buffer overflow", }, { cve: "CVE-2006-2937", discovery_date: "2006-07-03T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430655", }, ], notes: [ { category: "description", text: "OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition.", title: "Vulnerability description", }, { category: "summary", text: "openssl ASN.1 DoS", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-2937", }, { category: "external", summary: "RHBZ#430655", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430655", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-2937", url: "https://www.cve.org/CVERecord?id=CVE-2006-2937", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-2937", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-2937", }, ], release_date: "2006-09-28T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-08-13T14:16:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0629", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "openssl ASN.1 DoS", }, { cve: "CVE-2006-2940", discovery_date: "2006-07-03T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430654", }, ], notes: [ { category: "description", text: "OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) \"public exponent\" or (2) \"public modulus\" values in X.509 certificates that require extra time to process when using RSA signature verification.", title: "Vulnerability description", }, { category: "summary", text: "openssl public key DoS", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-2940", }, { category: "external", summary: "RHBZ#430654", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430654", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-2940", url: "https://www.cve.org/CVERecord?id=CVE-2006-2940", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-2940", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-2940", }, ], release_date: "2006-09-28T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-08-13T14:16:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0629", }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "openssl public key DoS", }, { cve: "CVE-2006-3738", discovery_date: "2006-08-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430652", }, ], notes: [ { category: "description", text: "Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.", title: "Vulnerability description", }, { category: "summary", text: "openssl get_shared_ciphers overflow", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-3738", }, { category: "external", summary: "RHBZ#430652", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430652", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-3738", url: "https://www.cve.org/CVERecord?id=CVE-2006-3738", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-3738", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-3738", }, ], release_date: "2006-09-28T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-08-13T14:16:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0629", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "openssl get_shared_ciphers overflow", }, { cve: "CVE-2006-4339", discovery_date: "2006-09-05T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430659", }, ], notes: [ { category: "description", text: "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.", title: "Vulnerability description", }, { category: "summary", text: "openssl signature forgery", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-4339", }, { category: "external", summary: "RHBZ#430659", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430659", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-4339", url: "https://www.cve.org/CVERecord?id=CVE-2006-4339", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-4339", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-4339", }, ], release_date: "2006-09-05T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-08-13T14:16:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0629", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "openssl signature forgery", }, { cve: "CVE-2006-4343", discovery_date: "2006-08-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430651", }, ], notes: [ { category: "description", text: "The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.", title: "Vulnerability description", }, { category: "summary", text: "openssl sslv2 client code", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-4343", }, { category: "external", summary: "RHBZ#430651", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430651", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-4343", url: "https://www.cve.org/CVERecord?id=CVE-2006-4343", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-4343", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-4343", }, ], release_date: "2006-09-28T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-08-13T14:16:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0629", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "openssl sslv2 client code", }, { cve: "CVE-2006-4980", discovery_date: "2006-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430641", }, ], notes: [ { category: "description", text: "Buffer overflow in the repr function in Python 2.3 through 2.6 before 20060822 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via crafted wide character UTF-32/UCS-4 strings to certain scripts.", title: "Vulnerability description", }, { category: "summary", text: "python repr unicode buffer overflow", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-4980", }, { category: "external", summary: "RHBZ#430641", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430641", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-4980", url: "https://www.cve.org/CVERecord?id=CVE-2006-4980", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-4980", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-4980", }, ], release_date: "2006-08-16T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-08-13T14:16:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0629", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "python repr unicode buffer overflow", }, { cve: "CVE-2007-2052", cwe: { id: "CWE-193", name: "Off-by-one Error", }, discovery_date: "2007-04-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "235093", }, ], notes: [ { category: "description", text: "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", title: "Vulnerability description", }, { category: "summary", text: "python off-by-one locale.strxfrm() (possible memory disclosure)", title: "Vulnerability summary", }, { category: "other", text: "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2007-2052", }, { category: "external", summary: "RHBZ#235093", url: "https://bugzilla.redhat.com/show_bug.cgi?id=235093", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2007-2052", url: "https://www.cve.org/CVERecord?id=CVE-2007-2052", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", url: "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", }, ], release_date: "2007-04-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-08-13T14:16:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0629", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python off-by-one locale.strxfrm() (possible memory disclosure)", }, { cve: "CVE-2007-4965", discovery_date: "2007-09-18T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "295971", }, ], notes: [ { category: "description", text: "Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.", title: "Vulnerability description", }, { category: "summary", text: "python imageop module heap corruption", title: "Vulnerability summary", }, { category: "other", text: "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=295971\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2007-4965", }, { category: "external", summary: "RHBZ#295971", url: "https://bugzilla.redhat.com/show_bug.cgi?id=295971", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2007-4965", url: "https://www.cve.org/CVERecord?id=CVE-2007-4965", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", url: "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", }, ], release_date: "2007-09-16T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-08-13T14:16:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0629", }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "python imageop module heap corruption", }, ], }
rhsa-2007_1077
Vulnerability from csaf_redhat
Published
2007-12-10 17:57
Modified
2024-11-22 02:05
Summary
Red Hat Security Advisory: python security update
Notes
Topic
Updated python packages that fix several security issues are now available
for Red Hat Enterprise Linux 2.1.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
Python is an interpreted, interactive, object-oriented programming
language.
An integer overflow flaw was discovered in the way Python's pcre module
handled certain regular expressions. If a Python application used the pcre
module to compile and execute untrusted regular expressions, it may be
possible to cause the application to crash, or allow arbitrary code
execution with the privileges of the Python interpreter. (CVE-2006-7228)
A flaw was discovered in the strxfrm() function of Python's locale module.
Strings generated by this function were not properly NULL-terminated, which
could possibly cause disclosure of data stored in the memory of a Python
application using this function. (CVE-2007-2052)
Users of Python are advised to upgrade to these updated packages, which
contain backported patches to resolve these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Updated python packages that fix several security issues are now available\nfor Red Hat Enterprise Linux 2.1.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", title: "Topic", }, { category: "general", text: "Python is an interpreted, interactive, object-oriented programming\nlanguage.\n\nAn integer overflow flaw was discovered in the way Python's pcre module\nhandled certain regular expressions. If a Python application used the pcre\nmodule to compile and execute untrusted regular expressions, it may be\npossible to cause the application to crash, or allow arbitrary code\nexecution with the privileges of the Python interpreter. (CVE-2006-7228)\n\nA flaw was discovered in the strxfrm() function of Python's locale module.\nStrings generated by this function were not properly NULL-terminated, which\ncould possibly cause disclosure of data stored in the memory of a Python\napplication using this function. (CVE-2007-2052)\n\nUsers of Python are advised to upgrade to these updated packages, which\ncontain backported patches to resolve these issues.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2007:1077", url: "https://access.redhat.com/errata/RHSA-2007:1077", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "235093", url: "https://bugzilla.redhat.com/show_bug.cgi?id=235093", }, { category: "external", summary: "383371", url: "https://bugzilla.redhat.com/show_bug.cgi?id=383371", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_1077.json", }, ], title: "Red Hat Security Advisory: python security update", tracking: { current_release_date: "2024-11-22T02:05:21+00:00", generator: { date: "2024-11-22T02:05:21+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2007:1077", initial_release_date: "2007-12-10T17:57:00+00:00", revision_history: [ { date: "2007-12-10T17:57:00+00:00", number: "1", summary: "Initial version", }, { date: "2007-12-10T12:57:16+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T02:05:21+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product: { name: "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product_id: "2.1AS", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:2.1::as", }, }, }, { category: "product_name", name: "Red Hat Linux Advanced Workstation 2.1", product: { name: "Red Hat Linux Advanced Workstation 2.1", product_id: "2.1AW", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:2.1::aw", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ES version 2.1", product: { name: "Red Hat Enterprise Linux ES version 2.1", product_id: "2.1ES", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:2.1::es", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux WS version 2.1", product: { name: "Red Hat Enterprise Linux WS version 2.1", product_id: "2.1WS", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:2.1::ws", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "tkinter-0:1.5.2-43.72.2.ia64", product: { name: "tkinter-0:1.5.2-43.72.2.ia64", product_id: "tkinter-0:1.5.2-43.72.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@1.5.2-43.72.2?arch=ia64", }, }, }, { category: "product_version", name: "python-0:1.5.2-43.72.2.ia64", product: { name: "python-0:1.5.2-43.72.2.ia64", product_id: "python-0:1.5.2-43.72.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python@1.5.2-43.72.2?arch=ia64", }, }, }, { category: "product_version", name: "python-tools-0:1.5.2-43.72.2.ia64", product: { name: "python-tools-0:1.5.2-43.72.2.ia64", product_id: "python-tools-0:1.5.2-43.72.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@1.5.2-43.72.2?arch=ia64", }, }, }, { category: "product_version", name: "python-devel-0:1.5.2-43.72.2.ia64", product: { name: "python-devel-0:1.5.2-43.72.2.ia64", product_id: "python-devel-0:1.5.2-43.72.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@1.5.2-43.72.2?arch=ia64", }, }, }, { category: "product_version", name: "python-docs-0:1.5.2-43.72.2.ia64", product: { name: "python-docs-0:1.5.2-43.72.2.ia64", product_id: "python-docs-0:1.5.2-43.72.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python-docs@1.5.2-43.72.2?arch=ia64", }, }, }, ], category: "architecture", name: "ia64", }, { branches: [ { category: "product_version", name: "python-0:1.5.2-43.72.2.src", product: { name: "python-0:1.5.2-43.72.2.src", product_id: "python-0:1.5.2-43.72.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/python@1.5.2-43.72.2?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "tkinter-0:1.5.2-43.72.2.i386", product: { name: "tkinter-0:1.5.2-43.72.2.i386", product_id: "tkinter-0:1.5.2-43.72.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@1.5.2-43.72.2?arch=i386", }, }, }, { category: "product_version", name: "python-0:1.5.2-43.72.2.i386", product: { name: "python-0:1.5.2-43.72.2.i386", product_id: "python-0:1.5.2-43.72.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python@1.5.2-43.72.2?arch=i386", }, }, }, { category: "product_version", name: "python-tools-0:1.5.2-43.72.2.i386", product: { name: "python-tools-0:1.5.2-43.72.2.i386", product_id: "python-tools-0:1.5.2-43.72.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@1.5.2-43.72.2?arch=i386", }, }, }, { category: "product_version", name: "python-devel-0:1.5.2-43.72.2.i386", product: { name: "python-devel-0:1.5.2-43.72.2.i386", product_id: "python-devel-0:1.5.2-43.72.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@1.5.2-43.72.2?arch=i386", }, }, }, { category: "product_version", name: "python-docs-0:1.5.2-43.72.2.i386", product: { name: "python-docs-0:1.5.2-43.72.2.i386", product_id: "python-docs-0:1.5.2-43.72.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python-docs@1.5.2-43.72.2?arch=i386", }, }, }, ], category: "architecture", name: "i386", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "python-0:1.5.2-43.72.2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product_id: "2.1AS:python-0:1.5.2-43.72.2.i386", }, product_reference: "python-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1AS", }, { category: "default_component_of", full_product_name: { name: "python-0:1.5.2-43.72.2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product_id: "2.1AS:python-0:1.5.2-43.72.2.ia64", }, product_reference: "python-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1AS", }, { category: "default_component_of", full_product_name: { name: "python-0:1.5.2-43.72.2.src as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product_id: "2.1AS:python-0:1.5.2-43.72.2.src", }, product_reference: "python-0:1.5.2-43.72.2.src", relates_to_product_reference: "2.1AS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:1.5.2-43.72.2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product_id: "2.1AS:python-devel-0:1.5.2-43.72.2.i386", }, product_reference: "python-devel-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1AS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:1.5.2-43.72.2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product_id: "2.1AS:python-devel-0:1.5.2-43.72.2.ia64", }, product_reference: "python-devel-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1AS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:1.5.2-43.72.2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product_id: "2.1AS:python-docs-0:1.5.2-43.72.2.i386", }, product_reference: "python-docs-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1AS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:1.5.2-43.72.2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product_id: "2.1AS:python-docs-0:1.5.2-43.72.2.ia64", }, product_reference: "python-docs-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1AS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:1.5.2-43.72.2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product_id: "2.1AS:python-tools-0:1.5.2-43.72.2.i386", }, product_reference: "python-tools-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1AS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:1.5.2-43.72.2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product_id: "2.1AS:python-tools-0:1.5.2-43.72.2.ia64", }, product_reference: "python-tools-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1AS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:1.5.2-43.72.2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product_id: "2.1AS:tkinter-0:1.5.2-43.72.2.i386", }, product_reference: "tkinter-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1AS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:1.5.2-43.72.2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product_id: "2.1AS:tkinter-0:1.5.2-43.72.2.ia64", }, product_reference: "tkinter-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1AS", }, { category: "default_component_of", full_product_name: { name: "python-0:1.5.2-43.72.2.i386 as a component of Red Hat Linux Advanced Workstation 2.1", product_id: "2.1AW:python-0:1.5.2-43.72.2.i386", }, product_reference: "python-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1AW", }, { category: "default_component_of", full_product_name: { name: "python-0:1.5.2-43.72.2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", product_id: "2.1AW:python-0:1.5.2-43.72.2.ia64", }, product_reference: "python-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1AW", }, { category: "default_component_of", full_product_name: { name: "python-0:1.5.2-43.72.2.src as a component of Red Hat Linux Advanced Workstation 2.1", product_id: "2.1AW:python-0:1.5.2-43.72.2.src", }, product_reference: "python-0:1.5.2-43.72.2.src", relates_to_product_reference: "2.1AW", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:1.5.2-43.72.2.i386 as a component of Red Hat Linux Advanced Workstation 2.1", product_id: "2.1AW:python-devel-0:1.5.2-43.72.2.i386", }, product_reference: "python-devel-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1AW", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:1.5.2-43.72.2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", product_id: "2.1AW:python-devel-0:1.5.2-43.72.2.ia64", }, product_reference: "python-devel-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1AW", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:1.5.2-43.72.2.i386 as a component of Red Hat Linux Advanced Workstation 2.1", product_id: "2.1AW:python-docs-0:1.5.2-43.72.2.i386", }, product_reference: "python-docs-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1AW", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:1.5.2-43.72.2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", product_id: "2.1AW:python-docs-0:1.5.2-43.72.2.ia64", }, product_reference: "python-docs-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1AW", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:1.5.2-43.72.2.i386 as a component of Red Hat Linux Advanced Workstation 2.1", product_id: "2.1AW:python-tools-0:1.5.2-43.72.2.i386", }, product_reference: "python-tools-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1AW", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:1.5.2-43.72.2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", product_id: "2.1AW:python-tools-0:1.5.2-43.72.2.ia64", }, product_reference: "python-tools-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1AW", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:1.5.2-43.72.2.i386 as a component of Red Hat Linux Advanced Workstation 2.1", product_id: "2.1AW:tkinter-0:1.5.2-43.72.2.i386", }, product_reference: "tkinter-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1AW", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:1.5.2-43.72.2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", product_id: "2.1AW:tkinter-0:1.5.2-43.72.2.ia64", }, product_reference: "tkinter-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1AW", }, { category: "default_component_of", full_product_name: { name: "python-0:1.5.2-43.72.2.i386 as a component of Red Hat Enterprise Linux ES version 2.1", product_id: "2.1ES:python-0:1.5.2-43.72.2.i386", }, product_reference: "python-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1ES", }, { category: "default_component_of", full_product_name: { name: "python-0:1.5.2-43.72.2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", product_id: "2.1ES:python-0:1.5.2-43.72.2.ia64", }, product_reference: "python-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1ES", }, { category: "default_component_of", full_product_name: { name: "python-0:1.5.2-43.72.2.src as a component of Red Hat Enterprise Linux ES version 2.1", product_id: "2.1ES:python-0:1.5.2-43.72.2.src", }, product_reference: "python-0:1.5.2-43.72.2.src", relates_to_product_reference: "2.1ES", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:1.5.2-43.72.2.i386 as a component of Red Hat Enterprise Linux ES version 2.1", product_id: "2.1ES:python-devel-0:1.5.2-43.72.2.i386", }, product_reference: "python-devel-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1ES", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:1.5.2-43.72.2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", product_id: "2.1ES:python-devel-0:1.5.2-43.72.2.ia64", }, product_reference: "python-devel-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1ES", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:1.5.2-43.72.2.i386 as a component of Red Hat Enterprise Linux ES version 2.1", product_id: "2.1ES:python-docs-0:1.5.2-43.72.2.i386", }, product_reference: "python-docs-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1ES", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:1.5.2-43.72.2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", product_id: "2.1ES:python-docs-0:1.5.2-43.72.2.ia64", }, product_reference: "python-docs-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1ES", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:1.5.2-43.72.2.i386 as a component of Red Hat Enterprise Linux ES version 2.1", product_id: "2.1ES:python-tools-0:1.5.2-43.72.2.i386", }, product_reference: "python-tools-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1ES", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:1.5.2-43.72.2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", product_id: "2.1ES:python-tools-0:1.5.2-43.72.2.ia64", }, product_reference: "python-tools-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1ES", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:1.5.2-43.72.2.i386 as a component of Red Hat Enterprise Linux ES version 2.1", product_id: "2.1ES:tkinter-0:1.5.2-43.72.2.i386", }, product_reference: "tkinter-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1ES", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:1.5.2-43.72.2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", product_id: "2.1ES:tkinter-0:1.5.2-43.72.2.ia64", }, product_reference: "tkinter-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1ES", }, { category: "default_component_of", full_product_name: { name: "python-0:1.5.2-43.72.2.i386 as a component of Red Hat Enterprise Linux WS version 2.1", product_id: "2.1WS:python-0:1.5.2-43.72.2.i386", }, product_reference: "python-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1WS", }, { category: "default_component_of", full_product_name: { name: "python-0:1.5.2-43.72.2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", product_id: "2.1WS:python-0:1.5.2-43.72.2.ia64", }, product_reference: "python-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1WS", }, { category: "default_component_of", full_product_name: { name: "python-0:1.5.2-43.72.2.src as a component of Red Hat Enterprise Linux WS version 2.1", product_id: "2.1WS:python-0:1.5.2-43.72.2.src", }, product_reference: "python-0:1.5.2-43.72.2.src", relates_to_product_reference: "2.1WS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:1.5.2-43.72.2.i386 as a component of Red Hat Enterprise Linux WS version 2.1", product_id: "2.1WS:python-devel-0:1.5.2-43.72.2.i386", }, product_reference: "python-devel-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1WS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:1.5.2-43.72.2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", product_id: "2.1WS:python-devel-0:1.5.2-43.72.2.ia64", }, product_reference: "python-devel-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1WS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:1.5.2-43.72.2.i386 as a component of Red Hat Enterprise Linux WS version 2.1", product_id: "2.1WS:python-docs-0:1.5.2-43.72.2.i386", }, product_reference: "python-docs-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1WS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:1.5.2-43.72.2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", product_id: "2.1WS:python-docs-0:1.5.2-43.72.2.ia64", }, product_reference: "python-docs-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1WS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:1.5.2-43.72.2.i386 as a component of Red Hat Enterprise Linux WS version 2.1", product_id: "2.1WS:python-tools-0:1.5.2-43.72.2.i386", }, product_reference: "python-tools-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1WS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:1.5.2-43.72.2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", product_id: "2.1WS:python-tools-0:1.5.2-43.72.2.ia64", }, product_reference: "python-tools-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1WS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:1.5.2-43.72.2.i386 as a component of Red Hat Enterprise Linux WS version 2.1", product_id: "2.1WS:tkinter-0:1.5.2-43.72.2.i386", }, product_reference: "tkinter-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1WS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:1.5.2-43.72.2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", product_id: "2.1WS:tkinter-0:1.5.2-43.72.2.ia64", }, product_reference: "tkinter-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1WS", }, ], }, vulnerabilities: [ { cve: "CVE-2006-7228", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2007-11-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "383371", }, ], notes: [ { category: "description", text: "Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 might allow context-dependent attackers to execute arbitrary code via a regular expression that involves large (1) min, (2) max, or (3) duplength values that cause an incorrect length calculation and trigger a buffer overflow, a different vulnerability than CVE-2006-7227. NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split.", title: "Vulnerability description", }, { category: "summary", text: "pcre integer overflow", title: "Vulnerability summary", }, ], product_status: { fixed: [ "2.1AS:python-0:1.5.2-43.72.2.i386", "2.1AS:python-0:1.5.2-43.72.2.ia64", "2.1AS:python-0:1.5.2-43.72.2.src", "2.1AS:python-devel-0:1.5.2-43.72.2.i386", "2.1AS:python-devel-0:1.5.2-43.72.2.ia64", "2.1AS:python-docs-0:1.5.2-43.72.2.i386", "2.1AS:python-docs-0:1.5.2-43.72.2.ia64", "2.1AS:python-tools-0:1.5.2-43.72.2.i386", "2.1AS:python-tools-0:1.5.2-43.72.2.ia64", "2.1AS:tkinter-0:1.5.2-43.72.2.i386", "2.1AS:tkinter-0:1.5.2-43.72.2.ia64", "2.1AW:python-0:1.5.2-43.72.2.i386", "2.1AW:python-0:1.5.2-43.72.2.ia64", "2.1AW:python-0:1.5.2-43.72.2.src", "2.1AW:python-devel-0:1.5.2-43.72.2.i386", "2.1AW:python-devel-0:1.5.2-43.72.2.ia64", "2.1AW:python-docs-0:1.5.2-43.72.2.i386", "2.1AW:python-docs-0:1.5.2-43.72.2.ia64", "2.1AW:python-tools-0:1.5.2-43.72.2.i386", "2.1AW:python-tools-0:1.5.2-43.72.2.ia64", "2.1AW:tkinter-0:1.5.2-43.72.2.i386", "2.1AW:tkinter-0:1.5.2-43.72.2.ia64", "2.1ES:python-0:1.5.2-43.72.2.i386", "2.1ES:python-0:1.5.2-43.72.2.ia64", "2.1ES:python-0:1.5.2-43.72.2.src", "2.1ES:python-devel-0:1.5.2-43.72.2.i386", "2.1ES:python-devel-0:1.5.2-43.72.2.ia64", "2.1ES:python-docs-0:1.5.2-43.72.2.i386", "2.1ES:python-docs-0:1.5.2-43.72.2.ia64", "2.1ES:python-tools-0:1.5.2-43.72.2.i386", "2.1ES:python-tools-0:1.5.2-43.72.2.ia64", "2.1ES:tkinter-0:1.5.2-43.72.2.i386", "2.1ES:tkinter-0:1.5.2-43.72.2.ia64", "2.1WS:python-0:1.5.2-43.72.2.i386", "2.1WS:python-0:1.5.2-43.72.2.ia64", "2.1WS:python-0:1.5.2-43.72.2.src", "2.1WS:python-devel-0:1.5.2-43.72.2.i386", "2.1WS:python-devel-0:1.5.2-43.72.2.ia64", "2.1WS:python-docs-0:1.5.2-43.72.2.i386", "2.1WS:python-docs-0:1.5.2-43.72.2.ia64", "2.1WS:python-tools-0:1.5.2-43.72.2.i386", "2.1WS:python-tools-0:1.5.2-43.72.2.ia64", "2.1WS:tkinter-0:1.5.2-43.72.2.i386", "2.1WS:tkinter-0:1.5.2-43.72.2.ia64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-7228", }, { category: "external", summary: "RHBZ#383371", url: "https://bugzilla.redhat.com/show_bug.cgi?id=383371", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-7228", url: "https://www.cve.org/CVERecord?id=CVE-2006-7228", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-7228", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-7228", }, ], release_date: "2007-11-07T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2007-12-10T17:57:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "2.1AS:python-0:1.5.2-43.72.2.i386", "2.1AS:python-0:1.5.2-43.72.2.ia64", "2.1AS:python-0:1.5.2-43.72.2.src", "2.1AS:python-devel-0:1.5.2-43.72.2.i386", "2.1AS:python-devel-0:1.5.2-43.72.2.ia64", "2.1AS:python-docs-0:1.5.2-43.72.2.i386", "2.1AS:python-docs-0:1.5.2-43.72.2.ia64", "2.1AS:python-tools-0:1.5.2-43.72.2.i386", "2.1AS:python-tools-0:1.5.2-43.72.2.ia64", "2.1AS:tkinter-0:1.5.2-43.72.2.i386", "2.1AS:tkinter-0:1.5.2-43.72.2.ia64", "2.1AW:python-0:1.5.2-43.72.2.i386", "2.1AW:python-0:1.5.2-43.72.2.ia64", "2.1AW:python-0:1.5.2-43.72.2.src", "2.1AW:python-devel-0:1.5.2-43.72.2.i386", "2.1AW:python-devel-0:1.5.2-43.72.2.ia64", "2.1AW:python-docs-0:1.5.2-43.72.2.i386", "2.1AW:python-docs-0:1.5.2-43.72.2.ia64", "2.1AW:python-tools-0:1.5.2-43.72.2.i386", "2.1AW:python-tools-0:1.5.2-43.72.2.ia64", "2.1AW:tkinter-0:1.5.2-43.72.2.i386", "2.1AW:tkinter-0:1.5.2-43.72.2.ia64", "2.1ES:python-0:1.5.2-43.72.2.i386", "2.1ES:python-0:1.5.2-43.72.2.ia64", "2.1ES:python-0:1.5.2-43.72.2.src", "2.1ES:python-devel-0:1.5.2-43.72.2.i386", "2.1ES:python-devel-0:1.5.2-43.72.2.ia64", "2.1ES:python-docs-0:1.5.2-43.72.2.i386", "2.1ES:python-docs-0:1.5.2-43.72.2.ia64", "2.1ES:python-tools-0:1.5.2-43.72.2.i386", "2.1ES:python-tools-0:1.5.2-43.72.2.ia64", "2.1ES:tkinter-0:1.5.2-43.72.2.i386", "2.1ES:tkinter-0:1.5.2-43.72.2.ia64", "2.1WS:python-0:1.5.2-43.72.2.i386", "2.1WS:python-0:1.5.2-43.72.2.ia64", "2.1WS:python-0:1.5.2-43.72.2.src", "2.1WS:python-devel-0:1.5.2-43.72.2.i386", "2.1WS:python-devel-0:1.5.2-43.72.2.ia64", "2.1WS:python-docs-0:1.5.2-43.72.2.i386", "2.1WS:python-docs-0:1.5.2-43.72.2.ia64", "2.1WS:python-tools-0:1.5.2-43.72.2.i386", "2.1WS:python-tools-0:1.5.2-43.72.2.ia64", "2.1WS:tkinter-0:1.5.2-43.72.2.i386", "2.1WS:tkinter-0:1.5.2-43.72.2.ia64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2007:1077", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "pcre integer overflow", }, { cve: "CVE-2007-2052", cwe: { id: "CWE-193", name: "Off-by-one Error", }, discovery_date: "2007-04-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "235093", }, ], notes: [ { category: "description", text: "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", title: "Vulnerability description", }, { category: "summary", text: "python off-by-one locale.strxfrm() (possible memory disclosure)", title: "Vulnerability summary", }, { category: "other", text: "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/", title: "Statement", }, ], product_status: { fixed: [ "2.1AS:python-0:1.5.2-43.72.2.i386", "2.1AS:python-0:1.5.2-43.72.2.ia64", "2.1AS:python-0:1.5.2-43.72.2.src", "2.1AS:python-devel-0:1.5.2-43.72.2.i386", "2.1AS:python-devel-0:1.5.2-43.72.2.ia64", "2.1AS:python-docs-0:1.5.2-43.72.2.i386", "2.1AS:python-docs-0:1.5.2-43.72.2.ia64", "2.1AS:python-tools-0:1.5.2-43.72.2.i386", "2.1AS:python-tools-0:1.5.2-43.72.2.ia64", "2.1AS:tkinter-0:1.5.2-43.72.2.i386", "2.1AS:tkinter-0:1.5.2-43.72.2.ia64", "2.1AW:python-0:1.5.2-43.72.2.i386", "2.1AW:python-0:1.5.2-43.72.2.ia64", "2.1AW:python-0:1.5.2-43.72.2.src", "2.1AW:python-devel-0:1.5.2-43.72.2.i386", "2.1AW:python-devel-0:1.5.2-43.72.2.ia64", "2.1AW:python-docs-0:1.5.2-43.72.2.i386", "2.1AW:python-docs-0:1.5.2-43.72.2.ia64", "2.1AW:python-tools-0:1.5.2-43.72.2.i386", "2.1AW:python-tools-0:1.5.2-43.72.2.ia64", "2.1AW:tkinter-0:1.5.2-43.72.2.i386", "2.1AW:tkinter-0:1.5.2-43.72.2.ia64", "2.1ES:python-0:1.5.2-43.72.2.i386", "2.1ES:python-0:1.5.2-43.72.2.ia64", "2.1ES:python-0:1.5.2-43.72.2.src", "2.1ES:python-devel-0:1.5.2-43.72.2.i386", "2.1ES:python-devel-0:1.5.2-43.72.2.ia64", "2.1ES:python-docs-0:1.5.2-43.72.2.i386", "2.1ES:python-docs-0:1.5.2-43.72.2.ia64", "2.1ES:python-tools-0:1.5.2-43.72.2.i386", "2.1ES:python-tools-0:1.5.2-43.72.2.ia64", "2.1ES:tkinter-0:1.5.2-43.72.2.i386", "2.1ES:tkinter-0:1.5.2-43.72.2.ia64", "2.1WS:python-0:1.5.2-43.72.2.i386", "2.1WS:python-0:1.5.2-43.72.2.ia64", "2.1WS:python-0:1.5.2-43.72.2.src", "2.1WS:python-devel-0:1.5.2-43.72.2.i386", "2.1WS:python-devel-0:1.5.2-43.72.2.ia64", "2.1WS:python-docs-0:1.5.2-43.72.2.i386", "2.1WS:python-docs-0:1.5.2-43.72.2.ia64", "2.1WS:python-tools-0:1.5.2-43.72.2.i386", "2.1WS:python-tools-0:1.5.2-43.72.2.ia64", "2.1WS:tkinter-0:1.5.2-43.72.2.i386", "2.1WS:tkinter-0:1.5.2-43.72.2.ia64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2007-2052", }, { category: "external", summary: "RHBZ#235093", url: "https://bugzilla.redhat.com/show_bug.cgi?id=235093", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2007-2052", url: "https://www.cve.org/CVERecord?id=CVE-2007-2052", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", url: "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", }, ], release_date: "2007-04-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2007-12-10T17:57:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "2.1AS:python-0:1.5.2-43.72.2.i386", "2.1AS:python-0:1.5.2-43.72.2.ia64", "2.1AS:python-0:1.5.2-43.72.2.src", "2.1AS:python-devel-0:1.5.2-43.72.2.i386", "2.1AS:python-devel-0:1.5.2-43.72.2.ia64", "2.1AS:python-docs-0:1.5.2-43.72.2.i386", "2.1AS:python-docs-0:1.5.2-43.72.2.ia64", "2.1AS:python-tools-0:1.5.2-43.72.2.i386", "2.1AS:python-tools-0:1.5.2-43.72.2.ia64", "2.1AS:tkinter-0:1.5.2-43.72.2.i386", "2.1AS:tkinter-0:1.5.2-43.72.2.ia64", "2.1AW:python-0:1.5.2-43.72.2.i386", "2.1AW:python-0:1.5.2-43.72.2.ia64", "2.1AW:python-0:1.5.2-43.72.2.src", "2.1AW:python-devel-0:1.5.2-43.72.2.i386", "2.1AW:python-devel-0:1.5.2-43.72.2.ia64", "2.1AW:python-docs-0:1.5.2-43.72.2.i386", "2.1AW:python-docs-0:1.5.2-43.72.2.ia64", "2.1AW:python-tools-0:1.5.2-43.72.2.i386", "2.1AW:python-tools-0:1.5.2-43.72.2.ia64", "2.1AW:tkinter-0:1.5.2-43.72.2.i386", "2.1AW:tkinter-0:1.5.2-43.72.2.ia64", "2.1ES:python-0:1.5.2-43.72.2.i386", "2.1ES:python-0:1.5.2-43.72.2.ia64", "2.1ES:python-0:1.5.2-43.72.2.src", "2.1ES:python-devel-0:1.5.2-43.72.2.i386", "2.1ES:python-devel-0:1.5.2-43.72.2.ia64", "2.1ES:python-docs-0:1.5.2-43.72.2.i386", "2.1ES:python-docs-0:1.5.2-43.72.2.ia64", "2.1ES:python-tools-0:1.5.2-43.72.2.i386", "2.1ES:python-tools-0:1.5.2-43.72.2.ia64", "2.1ES:tkinter-0:1.5.2-43.72.2.i386", "2.1ES:tkinter-0:1.5.2-43.72.2.ia64", "2.1WS:python-0:1.5.2-43.72.2.i386", "2.1WS:python-0:1.5.2-43.72.2.ia64", "2.1WS:python-0:1.5.2-43.72.2.src", "2.1WS:python-devel-0:1.5.2-43.72.2.i386", "2.1WS:python-devel-0:1.5.2-43.72.2.ia64", "2.1WS:python-docs-0:1.5.2-43.72.2.i386", "2.1WS:python-docs-0:1.5.2-43.72.2.ia64", "2.1WS:python-tools-0:1.5.2-43.72.2.i386", "2.1WS:python-tools-0:1.5.2-43.72.2.ia64", "2.1WS:tkinter-0:1.5.2-43.72.2.i386", "2.1WS:tkinter-0:1.5.2-43.72.2.ia64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2007:1077", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python off-by-one locale.strxfrm() (possible memory disclosure)", }, ], }
rhsa-2007_1076
Vulnerability from csaf_redhat
Published
2007-12-10 18:20
Modified
2024-11-22 02:05
Summary
Red Hat Security Advisory: python security update
Notes
Topic
Updated python packages that fix several security issues are now available
for Red Hat Enterprise Linux 3 and 4.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
Python is an interpreted, interactive, object-oriented programming
language.
An integer overflow flaw was discovered in the way Python's pcre module
handled certain regular expressions. If a Python application used the pcre
module to compile and execute untrusted regular expressions, it may be
possible to cause the application to crash, or allow arbitrary code
execution with the privileges of the Python interpreter. (CVE-2006-7228)
A flaw was discovered in the strxfrm() function of Python's locale module.
Strings generated by this function were not properly NULL-terminated. This
may possibly cause disclosure of data stored in the memory of a Python
application using this function. (CVE-2007-2052)
Multiple integer overflow flaws were discovered in Python's imageop module.
If an application written in Python used the imageop module to process
untrusted images, it could cause the application to crash, enter an
infinite loop, or possibly execute arbitrary code with the privileges of
the Python interpreter. (CVE-2007-4965)
Users of Python are advised to upgrade to these updated packages, which
contain backported patches to resolve these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Updated python packages that fix several security issues are now available\nfor Red Hat Enterprise Linux 3 and 4.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", title: "Topic", }, { category: "general", text: "Python is an interpreted, interactive, object-oriented programming\nlanguage.\n\nAn integer overflow flaw was discovered in the way Python's pcre module\nhandled certain regular expressions. If a Python application used the pcre\nmodule to compile and execute untrusted regular expressions, it may be\npossible to cause the application to crash, or allow arbitrary code\nexecution with the privileges of the Python interpreter. (CVE-2006-7228)\n\nA flaw was discovered in the strxfrm() function of Python's locale module.\nStrings generated by this function were not properly NULL-terminated. This\nmay possibly cause disclosure of data stored in the memory of a Python\napplication using this function. (CVE-2007-2052)\n\nMultiple integer overflow flaws were discovered in Python's imageop module.\nIf an application written in Python used the imageop module to process\nuntrusted images, it could cause the application to crash, enter an\ninfinite loop, or possibly execute arbitrary code with the privileges of\nthe Python interpreter. (CVE-2007-4965)\n\nUsers of Python are advised to upgrade to these updated packages, which\ncontain backported patches to resolve these issues.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2007:1076", url: "https://access.redhat.com/errata/RHSA-2007:1076", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "235093", url: "https://bugzilla.redhat.com/show_bug.cgi?id=235093", }, { category: "external", summary: "295971", url: "https://bugzilla.redhat.com/show_bug.cgi?id=295971", }, { category: "external", summary: "383371", url: "https://bugzilla.redhat.com/show_bug.cgi?id=383371", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_1076.json", }, ], title: "Red Hat Security Advisory: python security update", tracking: { current_release_date: "2024-11-22T02:05:15+00:00", generator: { date: "2024-11-22T02:05:15+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2007:1076", initial_release_date: "2007-12-10T18:20:00+00:00", revision_history: [ { date: "2007-12-10T18:20:00+00:00", number: "1", summary: "Initial version", }, { date: "2007-12-10T13:41:24+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T02:05:15+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AS version 3", product: { name: "Red Hat Enterprise Linux AS version 3", product_id: "3AS", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:3::as", }, }, }, { category: "product_name", name: "Red Hat Desktop version 3", product: { name: "Red Hat Desktop version 3", product_id: "3Desktop", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:3::desktop", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ES version 3", product: { name: "Red Hat Enterprise Linux ES version 3", product_id: "3ES", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:3::es", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux WS version 3", product: { name: "Red Hat Enterprise Linux WS version 3", product_id: "3WS", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:3::ws", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux AS version 4", product: { name: "Red Hat Enterprise Linux AS version 4", product_id: "4AS", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:4::as", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Desktop version 4", product: { name: "Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:4::desktop", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ES version 4", product: { name: "Red Hat Enterprise Linux ES version 4", product_id: "4ES", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:4::es", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux WS version 4", product: { name: "Red Hat Enterprise Linux WS version 4", product_id: "4WS", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:4::ws", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "python-devel-0:2.2.3-6.8.ia64", product: { name: "python-devel-0:2.2.3-6.8.ia64", product_id: "python-devel-0:2.2.3-6.8.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.2.3-6.8?arch=ia64", }, }, }, { category: "product_version", name: "python-tools-0:2.2.3-6.8.ia64", product: { name: "python-tools-0:2.2.3-6.8.ia64", product_id: "python-tools-0:2.2.3-6.8.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.2.3-6.8?arch=ia64", }, }, }, { category: "product_version", name: "tkinter-0:2.2.3-6.8.ia64", product: { name: "tkinter-0:2.2.3-6.8.ia64", product_id: "tkinter-0:2.2.3-6.8.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.2.3-6.8?arch=ia64", }, }, }, { category: "product_version", name: "python-0:2.2.3-6.8.ia64", product: { name: "python-0:2.2.3-6.8.ia64", product_id: "python-0:2.2.3-6.8.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.2.3-6.8?arch=ia64", }, }, }, { category: "product_version", name: "python-debuginfo-0:2.2.3-6.8.ia64", product: { name: "python-debuginfo-0:2.2.3-6.8.ia64", product_id: "python-debuginfo-0:2.2.3-6.8.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.2.3-6.8?arch=ia64", }, }, }, { category: "product_version", name: "python-docs-0:2.3.4-14.4.el4_6.1.ia64", product: { name: "python-docs-0:2.3.4-14.4.el4_6.1.ia64", product_id: "python-docs-0:2.3.4-14.4.el4_6.1.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python-docs@2.3.4-14.4.el4_6.1?arch=ia64", }, }, }, { category: "product_version", name: "python-devel-0:2.3.4-14.4.el4_6.1.ia64", product: { name: "python-devel-0:2.3.4-14.4.el4_6.1.ia64", product_id: "python-devel-0:2.3.4-14.4.el4_6.1.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.3.4-14.4.el4_6.1?arch=ia64", }, }, }, { category: "product_version", name: "python-tools-0:2.3.4-14.4.el4_6.1.ia64", product: { name: "python-tools-0:2.3.4-14.4.el4_6.1.ia64", product_id: "python-tools-0:2.3.4-14.4.el4_6.1.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.3.4-14.4.el4_6.1?arch=ia64", }, }, }, { category: "product_version", name: "python-0:2.3.4-14.4.el4_6.1.ia64", product: { name: "python-0:2.3.4-14.4.el4_6.1.ia64", product_id: "python-0:2.3.4-14.4.el4_6.1.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.3.4-14.4.el4_6.1?arch=ia64", }, }, }, { category: "product_version", name: "tkinter-0:2.3.4-14.4.el4_6.1.ia64", product: { name: "tkinter-0:2.3.4-14.4.el4_6.1.ia64", product_id: "tkinter-0:2.3.4-14.4.el4_6.1.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.3.4-14.4.el4_6.1?arch=ia64", }, }, }, { category: "product_version", name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", product: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", product_id: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.3.4-14.4.el4_6.1?arch=ia64", }, }, }, ], category: "architecture", name: "ia64", }, { branches: [ { category: "product_version", name: "python-devel-0:2.2.3-6.8.x86_64", product: { name: "python-devel-0:2.2.3-6.8.x86_64", product_id: "python-devel-0:2.2.3-6.8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.2.3-6.8?arch=x86_64", }, }, }, { category: "product_version", name: "python-tools-0:2.2.3-6.8.x86_64", product: { name: "python-tools-0:2.2.3-6.8.x86_64", product_id: "python-tools-0:2.2.3-6.8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.2.3-6.8?arch=x86_64", }, }, }, { category: "product_version", name: "tkinter-0:2.2.3-6.8.x86_64", product: { name: "tkinter-0:2.2.3-6.8.x86_64", product_id: "tkinter-0:2.2.3-6.8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.2.3-6.8?arch=x86_64", }, }, }, { category: "product_version", name: "python-0:2.2.3-6.8.x86_64", product: { name: "python-0:2.2.3-6.8.x86_64", product_id: "python-0:2.2.3-6.8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.2.3-6.8?arch=x86_64", }, }, }, { category: "product_version", name: "python-debuginfo-0:2.2.3-6.8.x86_64", product: { name: "python-debuginfo-0:2.2.3-6.8.x86_64", product_id: "python-debuginfo-0:2.2.3-6.8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.2.3-6.8?arch=x86_64", }, }, }, { category: "product_version", name: "python-docs-0:2.3.4-14.4.el4_6.1.x86_64", product: { name: "python-docs-0:2.3.4-14.4.el4_6.1.x86_64", product_id: "python-docs-0:2.3.4-14.4.el4_6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/python-docs@2.3.4-14.4.el4_6.1?arch=x86_64", }, }, }, { category: "product_version", name: "python-devel-0:2.3.4-14.4.el4_6.1.x86_64", product: { name: "python-devel-0:2.3.4-14.4.el4_6.1.x86_64", product_id: "python-devel-0:2.3.4-14.4.el4_6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.3.4-14.4.el4_6.1?arch=x86_64", }, }, }, { category: "product_version", name: "python-tools-0:2.3.4-14.4.el4_6.1.x86_64", product: { name: "python-tools-0:2.3.4-14.4.el4_6.1.x86_64", product_id: "python-tools-0:2.3.4-14.4.el4_6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.3.4-14.4.el4_6.1?arch=x86_64", }, }, }, { category: "product_version", name: "python-0:2.3.4-14.4.el4_6.1.x86_64", product: { name: "python-0:2.3.4-14.4.el4_6.1.x86_64", product_id: "python-0:2.3.4-14.4.el4_6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.3.4-14.4.el4_6.1?arch=x86_64", }, }, }, { category: "product_version", name: "tkinter-0:2.3.4-14.4.el4_6.1.x86_64", product: { name: "tkinter-0:2.3.4-14.4.el4_6.1.x86_64", product_id: "tkinter-0:2.3.4-14.4.el4_6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.3.4-14.4.el4_6.1?arch=x86_64", }, }, }, { category: "product_version", name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", product: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", product_id: "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.3.4-14.4.el4_6.1?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "python-devel-0:2.2.3-6.8.i386", product: { name: "python-devel-0:2.2.3-6.8.i386", product_id: "python-devel-0:2.2.3-6.8.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.2.3-6.8?arch=i386", }, }, }, { category: "product_version", name: "python-tools-0:2.2.3-6.8.i386", product: { name: "python-tools-0:2.2.3-6.8.i386", product_id: "python-tools-0:2.2.3-6.8.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.2.3-6.8?arch=i386", }, }, }, { category: "product_version", name: "tkinter-0:2.2.3-6.8.i386", product: { name: "tkinter-0:2.2.3-6.8.i386", product_id: "tkinter-0:2.2.3-6.8.i386", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.2.3-6.8?arch=i386", }, }, }, { category: "product_version", name: "python-0:2.2.3-6.8.i386", product: { name: "python-0:2.2.3-6.8.i386", product_id: "python-0:2.2.3-6.8.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.2.3-6.8?arch=i386", }, }, }, { category: "product_version", name: "python-debuginfo-0:2.2.3-6.8.i386", product: { name: "python-debuginfo-0:2.2.3-6.8.i386", product_id: "python-debuginfo-0:2.2.3-6.8.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.2.3-6.8?arch=i386", }, }, }, { category: "product_version", name: "python-docs-0:2.3.4-14.4.el4_6.1.i386", product: { name: "python-docs-0:2.3.4-14.4.el4_6.1.i386", product_id: "python-docs-0:2.3.4-14.4.el4_6.1.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python-docs@2.3.4-14.4.el4_6.1?arch=i386", }, }, }, { category: "product_version", name: "python-devel-0:2.3.4-14.4.el4_6.1.i386", product: { name: "python-devel-0:2.3.4-14.4.el4_6.1.i386", product_id: "python-devel-0:2.3.4-14.4.el4_6.1.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.3.4-14.4.el4_6.1?arch=i386", }, }, }, { category: "product_version", name: "python-tools-0:2.3.4-14.4.el4_6.1.i386", product: { name: "python-tools-0:2.3.4-14.4.el4_6.1.i386", product_id: "python-tools-0:2.3.4-14.4.el4_6.1.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.3.4-14.4.el4_6.1?arch=i386", }, }, }, { category: "product_version", name: "python-0:2.3.4-14.4.el4_6.1.i386", product: { name: "python-0:2.3.4-14.4.el4_6.1.i386", product_id: "python-0:2.3.4-14.4.el4_6.1.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.3.4-14.4.el4_6.1?arch=i386", }, }, }, { category: "product_version", name: "tkinter-0:2.3.4-14.4.el4_6.1.i386", product: { name: "tkinter-0:2.3.4-14.4.el4_6.1.i386", product_id: "tkinter-0:2.3.4-14.4.el4_6.1.i386", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.3.4-14.4.el4_6.1?arch=i386", }, }, }, { category: "product_version", name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", product: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", product_id: "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.3.4-14.4.el4_6.1?arch=i386", }, }, }, ], category: "architecture", name: "i386", }, { branches: [ { category: "product_version", name: "python-0:2.2.3-6.8.src", product: { name: "python-0:2.2.3-6.8.src", product_id: "python-0:2.2.3-6.8.src", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.2.3-6.8?arch=src", }, }, }, { category: "product_version", name: "python-0:2.3.4-14.4.el4_6.1.src", product: { name: "python-0:2.3.4-14.4.el4_6.1.src", product_id: "python-0:2.3.4-14.4.el4_6.1.src", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.3.4-14.4.el4_6.1?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "python-devel-0:2.2.3-6.8.ppc", product: { name: "python-devel-0:2.2.3-6.8.ppc", product_id: "python-devel-0:2.2.3-6.8.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.2.3-6.8?arch=ppc", }, }, }, { category: "product_version", name: "python-tools-0:2.2.3-6.8.ppc", product: { name: "python-tools-0:2.2.3-6.8.ppc", product_id: "python-tools-0:2.2.3-6.8.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.2.3-6.8?arch=ppc", }, }, }, { category: "product_version", name: "tkinter-0:2.2.3-6.8.ppc", product: { name: "tkinter-0:2.2.3-6.8.ppc", product_id: "tkinter-0:2.2.3-6.8.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.2.3-6.8?arch=ppc", }, }, }, { category: "product_version", name: "python-0:2.2.3-6.8.ppc", product: { name: "python-0:2.2.3-6.8.ppc", product_id: "python-0:2.2.3-6.8.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.2.3-6.8?arch=ppc", }, }, }, { category: "product_version", name: "python-debuginfo-0:2.2.3-6.8.ppc", product: { name: "python-debuginfo-0:2.2.3-6.8.ppc", product_id: "python-debuginfo-0:2.2.3-6.8.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.2.3-6.8?arch=ppc", }, }, }, { category: "product_version", name: "python-docs-0:2.3.4-14.4.el4_6.1.ppc", product: { name: "python-docs-0:2.3.4-14.4.el4_6.1.ppc", product_id: "python-docs-0:2.3.4-14.4.el4_6.1.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/python-docs@2.3.4-14.4.el4_6.1?arch=ppc", }, }, }, { category: "product_version", name: "python-devel-0:2.3.4-14.4.el4_6.1.ppc", product: { name: "python-devel-0:2.3.4-14.4.el4_6.1.ppc", product_id: "python-devel-0:2.3.4-14.4.el4_6.1.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.3.4-14.4.el4_6.1?arch=ppc", }, }, }, { category: "product_version", name: "python-tools-0:2.3.4-14.4.el4_6.1.ppc", product: { name: "python-tools-0:2.3.4-14.4.el4_6.1.ppc", product_id: "python-tools-0:2.3.4-14.4.el4_6.1.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.3.4-14.4.el4_6.1?arch=ppc", }, }, }, { category: "product_version", name: "python-0:2.3.4-14.4.el4_6.1.ppc", product: { name: "python-0:2.3.4-14.4.el4_6.1.ppc", product_id: "python-0:2.3.4-14.4.el4_6.1.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.3.4-14.4.el4_6.1?arch=ppc", }, }, }, { category: "product_version", name: "tkinter-0:2.3.4-14.4.el4_6.1.ppc", product: { name: "tkinter-0:2.3.4-14.4.el4_6.1.ppc", product_id: "tkinter-0:2.3.4-14.4.el4_6.1.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.3.4-14.4.el4_6.1?arch=ppc", }, }, }, { category: "product_version", name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", product: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", product_id: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.3.4-14.4.el4_6.1?arch=ppc", }, }, }, ], category: "architecture", name: "ppc", }, { branches: [ { category: "product_version", name: "python-devel-0:2.2.3-6.8.s390x", product: { name: "python-devel-0:2.2.3-6.8.s390x", product_id: "python-devel-0:2.2.3-6.8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.2.3-6.8?arch=s390x", }, }, }, { category: "product_version", name: "python-tools-0:2.2.3-6.8.s390x", product: { name: "python-tools-0:2.2.3-6.8.s390x", product_id: "python-tools-0:2.2.3-6.8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.2.3-6.8?arch=s390x", }, }, }, { category: "product_version", name: "tkinter-0:2.2.3-6.8.s390x", product: { name: "tkinter-0:2.2.3-6.8.s390x", product_id: "tkinter-0:2.2.3-6.8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.2.3-6.8?arch=s390x", }, }, }, { category: "product_version", name: "python-0:2.2.3-6.8.s390x", product: { name: "python-0:2.2.3-6.8.s390x", product_id: "python-0:2.2.3-6.8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.2.3-6.8?arch=s390x", }, }, }, { category: "product_version", name: "python-debuginfo-0:2.2.3-6.8.s390x", product: { name: "python-debuginfo-0:2.2.3-6.8.s390x", product_id: "python-debuginfo-0:2.2.3-6.8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.2.3-6.8?arch=s390x", }, }, }, { category: "product_version", name: "python-docs-0:2.3.4-14.4.el4_6.1.s390x", product: { name: "python-docs-0:2.3.4-14.4.el4_6.1.s390x", product_id: "python-docs-0:2.3.4-14.4.el4_6.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/python-docs@2.3.4-14.4.el4_6.1?arch=s390x", }, }, }, { category: "product_version", name: "python-devel-0:2.3.4-14.4.el4_6.1.s390x", product: { name: "python-devel-0:2.3.4-14.4.el4_6.1.s390x", product_id: "python-devel-0:2.3.4-14.4.el4_6.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.3.4-14.4.el4_6.1?arch=s390x", }, }, }, { category: "product_version", name: "python-tools-0:2.3.4-14.4.el4_6.1.s390x", product: { name: "python-tools-0:2.3.4-14.4.el4_6.1.s390x", product_id: "python-tools-0:2.3.4-14.4.el4_6.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.3.4-14.4.el4_6.1?arch=s390x", }, }, }, { category: "product_version", name: "python-0:2.3.4-14.4.el4_6.1.s390x", product: { name: "python-0:2.3.4-14.4.el4_6.1.s390x", product_id: "python-0:2.3.4-14.4.el4_6.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.3.4-14.4.el4_6.1?arch=s390x", }, }, }, { category: "product_version", name: "tkinter-0:2.3.4-14.4.el4_6.1.s390x", product: { name: "tkinter-0:2.3.4-14.4.el4_6.1.s390x", product_id: "tkinter-0:2.3.4-14.4.el4_6.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.3.4-14.4.el4_6.1?arch=s390x", }, }, }, { category: "product_version", name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", product: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", product_id: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.3.4-14.4.el4_6.1?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "python-devel-0:2.2.3-6.8.s390", product: { name: "python-devel-0:2.2.3-6.8.s390", product_id: "python-devel-0:2.2.3-6.8.s390", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.2.3-6.8?arch=s390", }, }, }, { category: "product_version", name: "python-tools-0:2.2.3-6.8.s390", product: { name: "python-tools-0:2.2.3-6.8.s390", product_id: "python-tools-0:2.2.3-6.8.s390", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.2.3-6.8?arch=s390", }, }, }, { category: "product_version", name: "tkinter-0:2.2.3-6.8.s390", product: { name: "tkinter-0:2.2.3-6.8.s390", product_id: "tkinter-0:2.2.3-6.8.s390", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.2.3-6.8?arch=s390", }, }, }, { category: "product_version", name: "python-0:2.2.3-6.8.s390", product: { name: "python-0:2.2.3-6.8.s390", product_id: "python-0:2.2.3-6.8.s390", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.2.3-6.8?arch=s390", }, }, }, { category: "product_version", name: "python-debuginfo-0:2.2.3-6.8.s390", product: { name: "python-debuginfo-0:2.2.3-6.8.s390", product_id: "python-debuginfo-0:2.2.3-6.8.s390", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.2.3-6.8?arch=s390", }, }, }, { category: "product_version", name: "python-docs-0:2.3.4-14.4.el4_6.1.s390", product: { name: "python-docs-0:2.3.4-14.4.el4_6.1.s390", product_id: "python-docs-0:2.3.4-14.4.el4_6.1.s390", product_identification_helper: { purl: "pkg:rpm/redhat/python-docs@2.3.4-14.4.el4_6.1?arch=s390", }, }, }, { category: "product_version", name: "python-devel-0:2.3.4-14.4.el4_6.1.s390", product: { name: "python-devel-0:2.3.4-14.4.el4_6.1.s390", product_id: "python-devel-0:2.3.4-14.4.el4_6.1.s390", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.3.4-14.4.el4_6.1?arch=s390", }, }, }, { category: "product_version", name: "python-tools-0:2.3.4-14.4.el4_6.1.s390", product: { name: "python-tools-0:2.3.4-14.4.el4_6.1.s390", product_id: "python-tools-0:2.3.4-14.4.el4_6.1.s390", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.3.4-14.4.el4_6.1?arch=s390", }, }, }, { category: "product_version", name: "python-0:2.3.4-14.4.el4_6.1.s390", product: { name: "python-0:2.3.4-14.4.el4_6.1.s390", product_id: "python-0:2.3.4-14.4.el4_6.1.s390", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.3.4-14.4.el4_6.1?arch=s390", }, }, }, { category: "product_version", name: "tkinter-0:2.3.4-14.4.el4_6.1.s390", product: { name: "tkinter-0:2.3.4-14.4.el4_6.1.s390", product_id: "tkinter-0:2.3.4-14.4.el4_6.1.s390", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.3.4-14.4.el4_6.1?arch=s390", }, }, }, { category: "product_version", name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", product: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", product_id: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.3.4-14.4.el4_6.1?arch=s390", }, }, }, ], category: "architecture", name: "s390", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-0:2.2.3-6.8.i386", }, product_reference: "python-0:2.2.3-6.8.i386", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-0:2.2.3-6.8.ia64", }, product_reference: "python-0:2.2.3-6.8.ia64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-0:2.2.3-6.8.ppc", }, product_reference: "python-0:2.2.3-6.8.ppc", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-0:2.2.3-6.8.s390", }, product_reference: "python-0:2.2.3-6.8.s390", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-0:2.2.3-6.8.s390x", }, product_reference: "python-0:2.2.3-6.8.s390x", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.src as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-0:2.2.3-6.8.src", }, product_reference: "python-0:2.2.3-6.8.src", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-0:2.2.3-6.8.x86_64", }, product_reference: "python-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-debuginfo-0:2.2.3-6.8.i386", }, product_reference: "python-debuginfo-0:2.2.3-6.8.i386", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-debuginfo-0:2.2.3-6.8.ia64", }, product_reference: "python-debuginfo-0:2.2.3-6.8.ia64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-debuginfo-0:2.2.3-6.8.ppc", }, product_reference: "python-debuginfo-0:2.2.3-6.8.ppc", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-debuginfo-0:2.2.3-6.8.s390", }, product_reference: "python-debuginfo-0:2.2.3-6.8.s390", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-debuginfo-0:2.2.3-6.8.s390x", }, product_reference: "python-debuginfo-0:2.2.3-6.8.s390x", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-debuginfo-0:2.2.3-6.8.x86_64", }, product_reference: "python-debuginfo-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-devel-0:2.2.3-6.8.i386", }, product_reference: "python-devel-0:2.2.3-6.8.i386", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-devel-0:2.2.3-6.8.ia64", }, product_reference: "python-devel-0:2.2.3-6.8.ia64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-devel-0:2.2.3-6.8.ppc", }, product_reference: "python-devel-0:2.2.3-6.8.ppc", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-devel-0:2.2.3-6.8.s390", }, product_reference: "python-devel-0:2.2.3-6.8.s390", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-devel-0:2.2.3-6.8.s390x", }, product_reference: "python-devel-0:2.2.3-6.8.s390x", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-devel-0:2.2.3-6.8.x86_64", }, product_reference: "python-devel-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-tools-0:2.2.3-6.8.i386", }, product_reference: "python-tools-0:2.2.3-6.8.i386", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-tools-0:2.2.3-6.8.ia64", }, product_reference: "python-tools-0:2.2.3-6.8.ia64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-tools-0:2.2.3-6.8.ppc", }, product_reference: "python-tools-0:2.2.3-6.8.ppc", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-tools-0:2.2.3-6.8.s390", }, product_reference: "python-tools-0:2.2.3-6.8.s390", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-tools-0:2.2.3-6.8.s390x", }, product_reference: "python-tools-0:2.2.3-6.8.s390x", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:python-tools-0:2.2.3-6.8.x86_64", }, product_reference: "python-tools-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:tkinter-0:2.2.3-6.8.i386", }, product_reference: "tkinter-0:2.2.3-6.8.i386", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:tkinter-0:2.2.3-6.8.ia64", }, product_reference: "tkinter-0:2.2.3-6.8.ia64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:tkinter-0:2.2.3-6.8.ppc", }, product_reference: "tkinter-0:2.2.3-6.8.ppc", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:tkinter-0:2.2.3-6.8.s390", }, product_reference: "tkinter-0:2.2.3-6.8.s390", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:tkinter-0:2.2.3-6.8.s390x", }, product_reference: "tkinter-0:2.2.3-6.8.s390x", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:tkinter-0:2.2.3-6.8.x86_64", }, product_reference: "tkinter-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.i386 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-0:2.2.3-6.8.i386", }, product_reference: "python-0:2.2.3-6.8.i386", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.ia64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-0:2.2.3-6.8.ia64", }, product_reference: "python-0:2.2.3-6.8.ia64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.ppc as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-0:2.2.3-6.8.ppc", }, product_reference: "python-0:2.2.3-6.8.ppc", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.s390 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-0:2.2.3-6.8.s390", }, product_reference: "python-0:2.2.3-6.8.s390", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.s390x as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-0:2.2.3-6.8.s390x", }, product_reference: "python-0:2.2.3-6.8.s390x", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.src as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-0:2.2.3-6.8.src", }, product_reference: "python-0:2.2.3-6.8.src", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.x86_64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-0:2.2.3-6.8.x86_64", }, product_reference: "python-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.i386 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-debuginfo-0:2.2.3-6.8.i386", }, product_reference: "python-debuginfo-0:2.2.3-6.8.i386", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.ia64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-debuginfo-0:2.2.3-6.8.ia64", }, product_reference: "python-debuginfo-0:2.2.3-6.8.ia64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.ppc as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-debuginfo-0:2.2.3-6.8.ppc", }, product_reference: "python-debuginfo-0:2.2.3-6.8.ppc", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.s390 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-debuginfo-0:2.2.3-6.8.s390", }, product_reference: "python-debuginfo-0:2.2.3-6.8.s390", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.s390x as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-debuginfo-0:2.2.3-6.8.s390x", }, product_reference: "python-debuginfo-0:2.2.3-6.8.s390x", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.x86_64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-debuginfo-0:2.2.3-6.8.x86_64", }, product_reference: "python-debuginfo-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.i386 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-devel-0:2.2.3-6.8.i386", }, product_reference: "python-devel-0:2.2.3-6.8.i386", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.ia64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-devel-0:2.2.3-6.8.ia64", }, product_reference: "python-devel-0:2.2.3-6.8.ia64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.ppc as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-devel-0:2.2.3-6.8.ppc", }, product_reference: "python-devel-0:2.2.3-6.8.ppc", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.s390 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-devel-0:2.2.3-6.8.s390", }, product_reference: "python-devel-0:2.2.3-6.8.s390", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.s390x as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-devel-0:2.2.3-6.8.s390x", }, product_reference: "python-devel-0:2.2.3-6.8.s390x", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.x86_64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-devel-0:2.2.3-6.8.x86_64", }, product_reference: "python-devel-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.i386 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-tools-0:2.2.3-6.8.i386", }, product_reference: "python-tools-0:2.2.3-6.8.i386", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.ia64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-tools-0:2.2.3-6.8.ia64", }, product_reference: "python-tools-0:2.2.3-6.8.ia64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.ppc as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-tools-0:2.2.3-6.8.ppc", }, product_reference: "python-tools-0:2.2.3-6.8.ppc", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.s390 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-tools-0:2.2.3-6.8.s390", }, product_reference: "python-tools-0:2.2.3-6.8.s390", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.s390x as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-tools-0:2.2.3-6.8.s390x", }, product_reference: "python-tools-0:2.2.3-6.8.s390x", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.x86_64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:python-tools-0:2.2.3-6.8.x86_64", }, product_reference: "python-tools-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.i386 as a component of Red Hat Desktop version 3", product_id: "3Desktop:tkinter-0:2.2.3-6.8.i386", }, product_reference: "tkinter-0:2.2.3-6.8.i386", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.ia64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:tkinter-0:2.2.3-6.8.ia64", }, product_reference: "tkinter-0:2.2.3-6.8.ia64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.ppc as a component of Red Hat Desktop version 3", product_id: "3Desktop:tkinter-0:2.2.3-6.8.ppc", }, product_reference: "tkinter-0:2.2.3-6.8.ppc", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.s390 as a component of Red Hat Desktop version 3", product_id: "3Desktop:tkinter-0:2.2.3-6.8.s390", }, product_reference: "tkinter-0:2.2.3-6.8.s390", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.s390x as a component of Red Hat Desktop version 3", product_id: "3Desktop:tkinter-0:2.2.3-6.8.s390x", }, product_reference: "tkinter-0:2.2.3-6.8.s390x", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.x86_64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:tkinter-0:2.2.3-6.8.x86_64", }, product_reference: "tkinter-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-0:2.2.3-6.8.i386", }, product_reference: "python-0:2.2.3-6.8.i386", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-0:2.2.3-6.8.ia64", }, product_reference: "python-0:2.2.3-6.8.ia64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-0:2.2.3-6.8.ppc", }, product_reference: "python-0:2.2.3-6.8.ppc", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-0:2.2.3-6.8.s390", }, product_reference: "python-0:2.2.3-6.8.s390", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-0:2.2.3-6.8.s390x", }, product_reference: "python-0:2.2.3-6.8.s390x", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.src as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-0:2.2.3-6.8.src", }, product_reference: "python-0:2.2.3-6.8.src", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-0:2.2.3-6.8.x86_64", }, product_reference: "python-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-debuginfo-0:2.2.3-6.8.i386", }, product_reference: "python-debuginfo-0:2.2.3-6.8.i386", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-debuginfo-0:2.2.3-6.8.ia64", }, product_reference: "python-debuginfo-0:2.2.3-6.8.ia64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-debuginfo-0:2.2.3-6.8.ppc", }, product_reference: "python-debuginfo-0:2.2.3-6.8.ppc", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-debuginfo-0:2.2.3-6.8.s390", }, product_reference: "python-debuginfo-0:2.2.3-6.8.s390", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-debuginfo-0:2.2.3-6.8.s390x", }, product_reference: "python-debuginfo-0:2.2.3-6.8.s390x", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-debuginfo-0:2.2.3-6.8.x86_64", }, product_reference: "python-debuginfo-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-devel-0:2.2.3-6.8.i386", }, product_reference: "python-devel-0:2.2.3-6.8.i386", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-devel-0:2.2.3-6.8.ia64", }, product_reference: "python-devel-0:2.2.3-6.8.ia64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-devel-0:2.2.3-6.8.ppc", }, product_reference: "python-devel-0:2.2.3-6.8.ppc", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-devel-0:2.2.3-6.8.s390", }, product_reference: "python-devel-0:2.2.3-6.8.s390", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-devel-0:2.2.3-6.8.s390x", }, product_reference: "python-devel-0:2.2.3-6.8.s390x", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-devel-0:2.2.3-6.8.x86_64", }, product_reference: "python-devel-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-tools-0:2.2.3-6.8.i386", }, product_reference: "python-tools-0:2.2.3-6.8.i386", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-tools-0:2.2.3-6.8.ia64", }, product_reference: "python-tools-0:2.2.3-6.8.ia64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-tools-0:2.2.3-6.8.ppc", }, product_reference: "python-tools-0:2.2.3-6.8.ppc", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-tools-0:2.2.3-6.8.s390", }, product_reference: "python-tools-0:2.2.3-6.8.s390", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-tools-0:2.2.3-6.8.s390x", }, product_reference: "python-tools-0:2.2.3-6.8.s390x", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:python-tools-0:2.2.3-6.8.x86_64", }, product_reference: "python-tools-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:tkinter-0:2.2.3-6.8.i386", }, product_reference: "tkinter-0:2.2.3-6.8.i386", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:tkinter-0:2.2.3-6.8.ia64", }, product_reference: "tkinter-0:2.2.3-6.8.ia64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:tkinter-0:2.2.3-6.8.ppc", }, product_reference: "tkinter-0:2.2.3-6.8.ppc", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:tkinter-0:2.2.3-6.8.s390", }, product_reference: "tkinter-0:2.2.3-6.8.s390", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:tkinter-0:2.2.3-6.8.s390x", }, product_reference: "tkinter-0:2.2.3-6.8.s390x", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:tkinter-0:2.2.3-6.8.x86_64", }, product_reference: "tkinter-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-0:2.2.3-6.8.i386", }, product_reference: "python-0:2.2.3-6.8.i386", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-0:2.2.3-6.8.ia64", }, product_reference: "python-0:2.2.3-6.8.ia64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-0:2.2.3-6.8.ppc", }, product_reference: "python-0:2.2.3-6.8.ppc", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-0:2.2.3-6.8.s390", }, product_reference: "python-0:2.2.3-6.8.s390", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-0:2.2.3-6.8.s390x", }, product_reference: "python-0:2.2.3-6.8.s390x", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.src as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-0:2.2.3-6.8.src", }, product_reference: "python-0:2.2.3-6.8.src", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-0:2.2.3-6.8.x86_64", }, product_reference: "python-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-debuginfo-0:2.2.3-6.8.i386", }, product_reference: "python-debuginfo-0:2.2.3-6.8.i386", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-debuginfo-0:2.2.3-6.8.ia64", }, product_reference: "python-debuginfo-0:2.2.3-6.8.ia64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-debuginfo-0:2.2.3-6.8.ppc", }, product_reference: "python-debuginfo-0:2.2.3-6.8.ppc", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-debuginfo-0:2.2.3-6.8.s390", }, product_reference: "python-debuginfo-0:2.2.3-6.8.s390", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-debuginfo-0:2.2.3-6.8.s390x", }, product_reference: "python-debuginfo-0:2.2.3-6.8.s390x", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-debuginfo-0:2.2.3-6.8.x86_64", }, product_reference: "python-debuginfo-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-devel-0:2.2.3-6.8.i386", }, product_reference: "python-devel-0:2.2.3-6.8.i386", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-devel-0:2.2.3-6.8.ia64", }, product_reference: "python-devel-0:2.2.3-6.8.ia64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-devel-0:2.2.3-6.8.ppc", }, product_reference: "python-devel-0:2.2.3-6.8.ppc", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-devel-0:2.2.3-6.8.s390", }, product_reference: "python-devel-0:2.2.3-6.8.s390", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-devel-0:2.2.3-6.8.s390x", }, product_reference: "python-devel-0:2.2.3-6.8.s390x", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-devel-0:2.2.3-6.8.x86_64", }, product_reference: "python-devel-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-tools-0:2.2.3-6.8.i386", }, product_reference: "python-tools-0:2.2.3-6.8.i386", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-tools-0:2.2.3-6.8.ia64", }, product_reference: "python-tools-0:2.2.3-6.8.ia64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-tools-0:2.2.3-6.8.ppc", }, product_reference: "python-tools-0:2.2.3-6.8.ppc", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-tools-0:2.2.3-6.8.s390", }, product_reference: "python-tools-0:2.2.3-6.8.s390", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-tools-0:2.2.3-6.8.s390x", }, product_reference: "python-tools-0:2.2.3-6.8.s390x", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:python-tools-0:2.2.3-6.8.x86_64", }, product_reference: "python-tools-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:tkinter-0:2.2.3-6.8.i386", }, product_reference: "tkinter-0:2.2.3-6.8.i386", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:tkinter-0:2.2.3-6.8.ia64", }, product_reference: "tkinter-0:2.2.3-6.8.ia64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:tkinter-0:2.2.3-6.8.ppc", }, product_reference: "tkinter-0:2.2.3-6.8.ppc", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:tkinter-0:2.2.3-6.8.s390", }, product_reference: "tkinter-0:2.2.3-6.8.s390", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:tkinter-0:2.2.3-6.8.s390x", }, product_reference: "tkinter-0:2.2.3-6.8.s390x", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:tkinter-0:2.2.3-6.8.x86_64", }, product_reference: "tkinter-0:2.2.3-6.8.x86_64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.src as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-0:2.3.4-14.4.el4_6.1.src", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.src", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-devel-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-docs-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-tools-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:tkinter-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.src as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-0:2.3.4-14.4.el4_6.1.src", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.src", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.src as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-0:2.3.4-14.4.el4_6.1.src", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.src", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-devel-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-docs-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-tools-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:tkinter-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.src as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-0:2.3.4-14.4.el4_6.1.src", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.src", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-devel-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-devel-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-docs-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-docs-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-tools-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "python-tools-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:tkinter-0:2.3.4-14.4.el4_6.1.i386", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.i386", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.ia64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.ppc", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.s390", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.s390x", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", }, product_reference: "tkinter-0:2.3.4-14.4.el4_6.1.x86_64", relates_to_product_reference: "4WS", }, ], }, vulnerabilities: [ { cve: "CVE-2006-7228", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2007-11-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "383371", }, ], notes: [ { category: "description", text: "Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 might allow context-dependent attackers to execute arbitrary code via a regular expression that involves large (1) min, (2) max, or (3) duplength values that cause an incorrect length calculation and trigger a buffer overflow, a different vulnerability than CVE-2006-7227. NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split.", title: "Vulnerability description", }, { category: "summary", text: "pcre integer overflow", title: "Vulnerability summary", }, ], product_status: { fixed: [ "3AS:python-0:2.2.3-6.8.i386", "3AS:python-0:2.2.3-6.8.ia64", "3AS:python-0:2.2.3-6.8.ppc", "3AS:python-0:2.2.3-6.8.s390", "3AS:python-0:2.2.3-6.8.s390x", "3AS:python-0:2.2.3-6.8.src", "3AS:python-0:2.2.3-6.8.x86_64", "3AS:python-debuginfo-0:2.2.3-6.8.i386", "3AS:python-debuginfo-0:2.2.3-6.8.ia64", "3AS:python-debuginfo-0:2.2.3-6.8.ppc", "3AS:python-debuginfo-0:2.2.3-6.8.s390", "3AS:python-debuginfo-0:2.2.3-6.8.s390x", "3AS:python-debuginfo-0:2.2.3-6.8.x86_64", "3AS:python-devel-0:2.2.3-6.8.i386", "3AS:python-devel-0:2.2.3-6.8.ia64", "3AS:python-devel-0:2.2.3-6.8.ppc", "3AS:python-devel-0:2.2.3-6.8.s390", "3AS:python-devel-0:2.2.3-6.8.s390x", "3AS:python-devel-0:2.2.3-6.8.x86_64", "3AS:python-tools-0:2.2.3-6.8.i386", "3AS:python-tools-0:2.2.3-6.8.ia64", "3AS:python-tools-0:2.2.3-6.8.ppc", "3AS:python-tools-0:2.2.3-6.8.s390", "3AS:python-tools-0:2.2.3-6.8.s390x", "3AS:python-tools-0:2.2.3-6.8.x86_64", "3AS:tkinter-0:2.2.3-6.8.i386", "3AS:tkinter-0:2.2.3-6.8.ia64", "3AS:tkinter-0:2.2.3-6.8.ppc", "3AS:tkinter-0:2.2.3-6.8.s390", "3AS:tkinter-0:2.2.3-6.8.s390x", "3AS:tkinter-0:2.2.3-6.8.x86_64", "3Desktop:python-0:2.2.3-6.8.i386", "3Desktop:python-0:2.2.3-6.8.ia64", "3Desktop:python-0:2.2.3-6.8.ppc", "3Desktop:python-0:2.2.3-6.8.s390", "3Desktop:python-0:2.2.3-6.8.s390x", "3Desktop:python-0:2.2.3-6.8.src", "3Desktop:python-0:2.2.3-6.8.x86_64", "3Desktop:python-debuginfo-0:2.2.3-6.8.i386", "3Desktop:python-debuginfo-0:2.2.3-6.8.ia64", "3Desktop:python-debuginfo-0:2.2.3-6.8.ppc", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390x", "3Desktop:python-debuginfo-0:2.2.3-6.8.x86_64", "3Desktop:python-devel-0:2.2.3-6.8.i386", "3Desktop:python-devel-0:2.2.3-6.8.ia64", "3Desktop:python-devel-0:2.2.3-6.8.ppc", "3Desktop:python-devel-0:2.2.3-6.8.s390", "3Desktop:python-devel-0:2.2.3-6.8.s390x", "3Desktop:python-devel-0:2.2.3-6.8.x86_64", "3Desktop:python-tools-0:2.2.3-6.8.i386", "3Desktop:python-tools-0:2.2.3-6.8.ia64", "3Desktop:python-tools-0:2.2.3-6.8.ppc", "3Desktop:python-tools-0:2.2.3-6.8.s390", "3Desktop:python-tools-0:2.2.3-6.8.s390x", "3Desktop:python-tools-0:2.2.3-6.8.x86_64", "3Desktop:tkinter-0:2.2.3-6.8.i386", "3Desktop:tkinter-0:2.2.3-6.8.ia64", "3Desktop:tkinter-0:2.2.3-6.8.ppc", "3Desktop:tkinter-0:2.2.3-6.8.s390", "3Desktop:tkinter-0:2.2.3-6.8.s390x", "3Desktop:tkinter-0:2.2.3-6.8.x86_64", "3ES:python-0:2.2.3-6.8.i386", "3ES:python-0:2.2.3-6.8.ia64", "3ES:python-0:2.2.3-6.8.ppc", "3ES:python-0:2.2.3-6.8.s390", "3ES:python-0:2.2.3-6.8.s390x", "3ES:python-0:2.2.3-6.8.src", "3ES:python-0:2.2.3-6.8.x86_64", "3ES:python-debuginfo-0:2.2.3-6.8.i386", "3ES:python-debuginfo-0:2.2.3-6.8.ia64", "3ES:python-debuginfo-0:2.2.3-6.8.ppc", "3ES:python-debuginfo-0:2.2.3-6.8.s390", "3ES:python-debuginfo-0:2.2.3-6.8.s390x", "3ES:python-debuginfo-0:2.2.3-6.8.x86_64", "3ES:python-devel-0:2.2.3-6.8.i386", "3ES:python-devel-0:2.2.3-6.8.ia64", "3ES:python-devel-0:2.2.3-6.8.ppc", "3ES:python-devel-0:2.2.3-6.8.s390", "3ES:python-devel-0:2.2.3-6.8.s390x", "3ES:python-devel-0:2.2.3-6.8.x86_64", "3ES:python-tools-0:2.2.3-6.8.i386", "3ES:python-tools-0:2.2.3-6.8.ia64", "3ES:python-tools-0:2.2.3-6.8.ppc", "3ES:python-tools-0:2.2.3-6.8.s390", "3ES:python-tools-0:2.2.3-6.8.s390x", "3ES:python-tools-0:2.2.3-6.8.x86_64", "3ES:tkinter-0:2.2.3-6.8.i386", "3ES:tkinter-0:2.2.3-6.8.ia64", "3ES:tkinter-0:2.2.3-6.8.ppc", "3ES:tkinter-0:2.2.3-6.8.s390", "3ES:tkinter-0:2.2.3-6.8.s390x", "3ES:tkinter-0:2.2.3-6.8.x86_64", "3WS:python-0:2.2.3-6.8.i386", "3WS:python-0:2.2.3-6.8.ia64", "3WS:python-0:2.2.3-6.8.ppc", "3WS:python-0:2.2.3-6.8.s390", "3WS:python-0:2.2.3-6.8.s390x", "3WS:python-0:2.2.3-6.8.src", "3WS:python-0:2.2.3-6.8.x86_64", "3WS:python-debuginfo-0:2.2.3-6.8.i386", "3WS:python-debuginfo-0:2.2.3-6.8.ia64", "3WS:python-debuginfo-0:2.2.3-6.8.ppc", "3WS:python-debuginfo-0:2.2.3-6.8.s390", "3WS:python-debuginfo-0:2.2.3-6.8.s390x", "3WS:python-debuginfo-0:2.2.3-6.8.x86_64", "3WS:python-devel-0:2.2.3-6.8.i386", "3WS:python-devel-0:2.2.3-6.8.ia64", "3WS:python-devel-0:2.2.3-6.8.ppc", "3WS:python-devel-0:2.2.3-6.8.s390", "3WS:python-devel-0:2.2.3-6.8.s390x", "3WS:python-devel-0:2.2.3-6.8.x86_64", "3WS:python-tools-0:2.2.3-6.8.i386", "3WS:python-tools-0:2.2.3-6.8.ia64", "3WS:python-tools-0:2.2.3-6.8.ppc", "3WS:python-tools-0:2.2.3-6.8.s390", "3WS:python-tools-0:2.2.3-6.8.s390x", "3WS:python-tools-0:2.2.3-6.8.x86_64", "3WS:tkinter-0:2.2.3-6.8.i386", "3WS:tkinter-0:2.2.3-6.8.ia64", "3WS:tkinter-0:2.2.3-6.8.ppc", "3WS:tkinter-0:2.2.3-6.8.s390", "3WS:tkinter-0:2.2.3-6.8.s390x", "3WS:tkinter-0:2.2.3-6.8.x86_64", "4AS:python-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-0:2.3.4-14.4.el4_6.1.src", "4AS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-0:2.3.4-14.4.el4_6.1.src", "4Desktop:python-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-0:2.3.4-14.4.el4_6.1.src", "4ES:python-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-0:2.3.4-14.4.el4_6.1.src", "4WS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-7228", }, { category: "external", summary: "RHBZ#383371", url: "https://bugzilla.redhat.com/show_bug.cgi?id=383371", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-7228", url: "https://www.cve.org/CVERecord?id=CVE-2006-7228", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-7228", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-7228", }, ], release_date: "2007-11-07T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2007-12-10T18:20:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "3AS:python-0:2.2.3-6.8.i386", "3AS:python-0:2.2.3-6.8.ia64", "3AS:python-0:2.2.3-6.8.ppc", "3AS:python-0:2.2.3-6.8.s390", "3AS:python-0:2.2.3-6.8.s390x", "3AS:python-0:2.2.3-6.8.src", "3AS:python-0:2.2.3-6.8.x86_64", "3AS:python-debuginfo-0:2.2.3-6.8.i386", "3AS:python-debuginfo-0:2.2.3-6.8.ia64", "3AS:python-debuginfo-0:2.2.3-6.8.ppc", "3AS:python-debuginfo-0:2.2.3-6.8.s390", "3AS:python-debuginfo-0:2.2.3-6.8.s390x", "3AS:python-debuginfo-0:2.2.3-6.8.x86_64", "3AS:python-devel-0:2.2.3-6.8.i386", "3AS:python-devel-0:2.2.3-6.8.ia64", "3AS:python-devel-0:2.2.3-6.8.ppc", "3AS:python-devel-0:2.2.3-6.8.s390", "3AS:python-devel-0:2.2.3-6.8.s390x", "3AS:python-devel-0:2.2.3-6.8.x86_64", "3AS:python-tools-0:2.2.3-6.8.i386", "3AS:python-tools-0:2.2.3-6.8.ia64", "3AS:python-tools-0:2.2.3-6.8.ppc", "3AS:python-tools-0:2.2.3-6.8.s390", "3AS:python-tools-0:2.2.3-6.8.s390x", "3AS:python-tools-0:2.2.3-6.8.x86_64", "3AS:tkinter-0:2.2.3-6.8.i386", "3AS:tkinter-0:2.2.3-6.8.ia64", "3AS:tkinter-0:2.2.3-6.8.ppc", "3AS:tkinter-0:2.2.3-6.8.s390", "3AS:tkinter-0:2.2.3-6.8.s390x", "3AS:tkinter-0:2.2.3-6.8.x86_64", "3Desktop:python-0:2.2.3-6.8.i386", "3Desktop:python-0:2.2.3-6.8.ia64", "3Desktop:python-0:2.2.3-6.8.ppc", "3Desktop:python-0:2.2.3-6.8.s390", "3Desktop:python-0:2.2.3-6.8.s390x", "3Desktop:python-0:2.2.3-6.8.src", "3Desktop:python-0:2.2.3-6.8.x86_64", "3Desktop:python-debuginfo-0:2.2.3-6.8.i386", "3Desktop:python-debuginfo-0:2.2.3-6.8.ia64", "3Desktop:python-debuginfo-0:2.2.3-6.8.ppc", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390x", "3Desktop:python-debuginfo-0:2.2.3-6.8.x86_64", "3Desktop:python-devel-0:2.2.3-6.8.i386", "3Desktop:python-devel-0:2.2.3-6.8.ia64", "3Desktop:python-devel-0:2.2.3-6.8.ppc", "3Desktop:python-devel-0:2.2.3-6.8.s390", "3Desktop:python-devel-0:2.2.3-6.8.s390x", "3Desktop:python-devel-0:2.2.3-6.8.x86_64", "3Desktop:python-tools-0:2.2.3-6.8.i386", "3Desktop:python-tools-0:2.2.3-6.8.ia64", "3Desktop:python-tools-0:2.2.3-6.8.ppc", "3Desktop:python-tools-0:2.2.3-6.8.s390", "3Desktop:python-tools-0:2.2.3-6.8.s390x", "3Desktop:python-tools-0:2.2.3-6.8.x86_64", "3Desktop:tkinter-0:2.2.3-6.8.i386", "3Desktop:tkinter-0:2.2.3-6.8.ia64", "3Desktop:tkinter-0:2.2.3-6.8.ppc", "3Desktop:tkinter-0:2.2.3-6.8.s390", "3Desktop:tkinter-0:2.2.3-6.8.s390x", "3Desktop:tkinter-0:2.2.3-6.8.x86_64", "3ES:python-0:2.2.3-6.8.i386", "3ES:python-0:2.2.3-6.8.ia64", "3ES:python-0:2.2.3-6.8.ppc", "3ES:python-0:2.2.3-6.8.s390", "3ES:python-0:2.2.3-6.8.s390x", "3ES:python-0:2.2.3-6.8.src", "3ES:python-0:2.2.3-6.8.x86_64", "3ES:python-debuginfo-0:2.2.3-6.8.i386", "3ES:python-debuginfo-0:2.2.3-6.8.ia64", "3ES:python-debuginfo-0:2.2.3-6.8.ppc", "3ES:python-debuginfo-0:2.2.3-6.8.s390", "3ES:python-debuginfo-0:2.2.3-6.8.s390x", "3ES:python-debuginfo-0:2.2.3-6.8.x86_64", "3ES:python-devel-0:2.2.3-6.8.i386", "3ES:python-devel-0:2.2.3-6.8.ia64", "3ES:python-devel-0:2.2.3-6.8.ppc", "3ES:python-devel-0:2.2.3-6.8.s390", "3ES:python-devel-0:2.2.3-6.8.s390x", "3ES:python-devel-0:2.2.3-6.8.x86_64", "3ES:python-tools-0:2.2.3-6.8.i386", "3ES:python-tools-0:2.2.3-6.8.ia64", "3ES:python-tools-0:2.2.3-6.8.ppc", "3ES:python-tools-0:2.2.3-6.8.s390", "3ES:python-tools-0:2.2.3-6.8.s390x", "3ES:python-tools-0:2.2.3-6.8.x86_64", "3ES:tkinter-0:2.2.3-6.8.i386", "3ES:tkinter-0:2.2.3-6.8.ia64", "3ES:tkinter-0:2.2.3-6.8.ppc", "3ES:tkinter-0:2.2.3-6.8.s390", "3ES:tkinter-0:2.2.3-6.8.s390x", "3ES:tkinter-0:2.2.3-6.8.x86_64", "3WS:python-0:2.2.3-6.8.i386", "3WS:python-0:2.2.3-6.8.ia64", "3WS:python-0:2.2.3-6.8.ppc", "3WS:python-0:2.2.3-6.8.s390", "3WS:python-0:2.2.3-6.8.s390x", "3WS:python-0:2.2.3-6.8.src", "3WS:python-0:2.2.3-6.8.x86_64", "3WS:python-debuginfo-0:2.2.3-6.8.i386", "3WS:python-debuginfo-0:2.2.3-6.8.ia64", "3WS:python-debuginfo-0:2.2.3-6.8.ppc", "3WS:python-debuginfo-0:2.2.3-6.8.s390", "3WS:python-debuginfo-0:2.2.3-6.8.s390x", "3WS:python-debuginfo-0:2.2.3-6.8.x86_64", "3WS:python-devel-0:2.2.3-6.8.i386", "3WS:python-devel-0:2.2.3-6.8.ia64", "3WS:python-devel-0:2.2.3-6.8.ppc", "3WS:python-devel-0:2.2.3-6.8.s390", "3WS:python-devel-0:2.2.3-6.8.s390x", "3WS:python-devel-0:2.2.3-6.8.x86_64", "3WS:python-tools-0:2.2.3-6.8.i386", "3WS:python-tools-0:2.2.3-6.8.ia64", "3WS:python-tools-0:2.2.3-6.8.ppc", "3WS:python-tools-0:2.2.3-6.8.s390", "3WS:python-tools-0:2.2.3-6.8.s390x", "3WS:python-tools-0:2.2.3-6.8.x86_64", "3WS:tkinter-0:2.2.3-6.8.i386", "3WS:tkinter-0:2.2.3-6.8.ia64", "3WS:tkinter-0:2.2.3-6.8.ppc", "3WS:tkinter-0:2.2.3-6.8.s390", "3WS:tkinter-0:2.2.3-6.8.s390x", "3WS:tkinter-0:2.2.3-6.8.x86_64", "4AS:python-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-0:2.3.4-14.4.el4_6.1.src", "4AS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-0:2.3.4-14.4.el4_6.1.src", "4Desktop:python-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-0:2.3.4-14.4.el4_6.1.src", "4ES:python-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-0:2.3.4-14.4.el4_6.1.src", "4WS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2007:1076", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "pcre integer overflow", }, { cve: "CVE-2007-2052", cwe: { id: "CWE-193", name: "Off-by-one Error", }, discovery_date: "2007-04-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "235093", }, ], notes: [ { category: "description", text: "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", title: "Vulnerability description", }, { category: "summary", text: "python off-by-one locale.strxfrm() (possible memory disclosure)", title: "Vulnerability summary", }, { category: "other", text: "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/", title: "Statement", }, ], product_status: { fixed: [ "3AS:python-0:2.2.3-6.8.i386", "3AS:python-0:2.2.3-6.8.ia64", "3AS:python-0:2.2.3-6.8.ppc", "3AS:python-0:2.2.3-6.8.s390", "3AS:python-0:2.2.3-6.8.s390x", "3AS:python-0:2.2.3-6.8.src", "3AS:python-0:2.2.3-6.8.x86_64", "3AS:python-debuginfo-0:2.2.3-6.8.i386", "3AS:python-debuginfo-0:2.2.3-6.8.ia64", "3AS:python-debuginfo-0:2.2.3-6.8.ppc", "3AS:python-debuginfo-0:2.2.3-6.8.s390", "3AS:python-debuginfo-0:2.2.3-6.8.s390x", "3AS:python-debuginfo-0:2.2.3-6.8.x86_64", "3AS:python-devel-0:2.2.3-6.8.i386", "3AS:python-devel-0:2.2.3-6.8.ia64", "3AS:python-devel-0:2.2.3-6.8.ppc", "3AS:python-devel-0:2.2.3-6.8.s390", "3AS:python-devel-0:2.2.3-6.8.s390x", "3AS:python-devel-0:2.2.3-6.8.x86_64", "3AS:python-tools-0:2.2.3-6.8.i386", "3AS:python-tools-0:2.2.3-6.8.ia64", "3AS:python-tools-0:2.2.3-6.8.ppc", "3AS:python-tools-0:2.2.3-6.8.s390", "3AS:python-tools-0:2.2.3-6.8.s390x", "3AS:python-tools-0:2.2.3-6.8.x86_64", "3AS:tkinter-0:2.2.3-6.8.i386", "3AS:tkinter-0:2.2.3-6.8.ia64", "3AS:tkinter-0:2.2.3-6.8.ppc", "3AS:tkinter-0:2.2.3-6.8.s390", "3AS:tkinter-0:2.2.3-6.8.s390x", "3AS:tkinter-0:2.2.3-6.8.x86_64", "3Desktop:python-0:2.2.3-6.8.i386", "3Desktop:python-0:2.2.3-6.8.ia64", "3Desktop:python-0:2.2.3-6.8.ppc", "3Desktop:python-0:2.2.3-6.8.s390", "3Desktop:python-0:2.2.3-6.8.s390x", "3Desktop:python-0:2.2.3-6.8.src", "3Desktop:python-0:2.2.3-6.8.x86_64", "3Desktop:python-debuginfo-0:2.2.3-6.8.i386", "3Desktop:python-debuginfo-0:2.2.3-6.8.ia64", "3Desktop:python-debuginfo-0:2.2.3-6.8.ppc", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390x", "3Desktop:python-debuginfo-0:2.2.3-6.8.x86_64", "3Desktop:python-devel-0:2.2.3-6.8.i386", "3Desktop:python-devel-0:2.2.3-6.8.ia64", "3Desktop:python-devel-0:2.2.3-6.8.ppc", "3Desktop:python-devel-0:2.2.3-6.8.s390", "3Desktop:python-devel-0:2.2.3-6.8.s390x", "3Desktop:python-devel-0:2.2.3-6.8.x86_64", "3Desktop:python-tools-0:2.2.3-6.8.i386", "3Desktop:python-tools-0:2.2.3-6.8.ia64", "3Desktop:python-tools-0:2.2.3-6.8.ppc", "3Desktop:python-tools-0:2.2.3-6.8.s390", "3Desktop:python-tools-0:2.2.3-6.8.s390x", "3Desktop:python-tools-0:2.2.3-6.8.x86_64", "3Desktop:tkinter-0:2.2.3-6.8.i386", "3Desktop:tkinter-0:2.2.3-6.8.ia64", "3Desktop:tkinter-0:2.2.3-6.8.ppc", "3Desktop:tkinter-0:2.2.3-6.8.s390", "3Desktop:tkinter-0:2.2.3-6.8.s390x", "3Desktop:tkinter-0:2.2.3-6.8.x86_64", "3ES:python-0:2.2.3-6.8.i386", "3ES:python-0:2.2.3-6.8.ia64", "3ES:python-0:2.2.3-6.8.ppc", "3ES:python-0:2.2.3-6.8.s390", "3ES:python-0:2.2.3-6.8.s390x", "3ES:python-0:2.2.3-6.8.src", "3ES:python-0:2.2.3-6.8.x86_64", "3ES:python-debuginfo-0:2.2.3-6.8.i386", "3ES:python-debuginfo-0:2.2.3-6.8.ia64", "3ES:python-debuginfo-0:2.2.3-6.8.ppc", "3ES:python-debuginfo-0:2.2.3-6.8.s390", "3ES:python-debuginfo-0:2.2.3-6.8.s390x", "3ES:python-debuginfo-0:2.2.3-6.8.x86_64", "3ES:python-devel-0:2.2.3-6.8.i386", "3ES:python-devel-0:2.2.3-6.8.ia64", "3ES:python-devel-0:2.2.3-6.8.ppc", "3ES:python-devel-0:2.2.3-6.8.s390", "3ES:python-devel-0:2.2.3-6.8.s390x", "3ES:python-devel-0:2.2.3-6.8.x86_64", "3ES:python-tools-0:2.2.3-6.8.i386", "3ES:python-tools-0:2.2.3-6.8.ia64", "3ES:python-tools-0:2.2.3-6.8.ppc", "3ES:python-tools-0:2.2.3-6.8.s390", "3ES:python-tools-0:2.2.3-6.8.s390x", "3ES:python-tools-0:2.2.3-6.8.x86_64", "3ES:tkinter-0:2.2.3-6.8.i386", "3ES:tkinter-0:2.2.3-6.8.ia64", "3ES:tkinter-0:2.2.3-6.8.ppc", "3ES:tkinter-0:2.2.3-6.8.s390", "3ES:tkinter-0:2.2.3-6.8.s390x", "3ES:tkinter-0:2.2.3-6.8.x86_64", "3WS:python-0:2.2.3-6.8.i386", "3WS:python-0:2.2.3-6.8.ia64", "3WS:python-0:2.2.3-6.8.ppc", "3WS:python-0:2.2.3-6.8.s390", "3WS:python-0:2.2.3-6.8.s390x", "3WS:python-0:2.2.3-6.8.src", "3WS:python-0:2.2.3-6.8.x86_64", "3WS:python-debuginfo-0:2.2.3-6.8.i386", "3WS:python-debuginfo-0:2.2.3-6.8.ia64", "3WS:python-debuginfo-0:2.2.3-6.8.ppc", "3WS:python-debuginfo-0:2.2.3-6.8.s390", "3WS:python-debuginfo-0:2.2.3-6.8.s390x", "3WS:python-debuginfo-0:2.2.3-6.8.x86_64", "3WS:python-devel-0:2.2.3-6.8.i386", "3WS:python-devel-0:2.2.3-6.8.ia64", "3WS:python-devel-0:2.2.3-6.8.ppc", "3WS:python-devel-0:2.2.3-6.8.s390", "3WS:python-devel-0:2.2.3-6.8.s390x", "3WS:python-devel-0:2.2.3-6.8.x86_64", "3WS:python-tools-0:2.2.3-6.8.i386", "3WS:python-tools-0:2.2.3-6.8.ia64", "3WS:python-tools-0:2.2.3-6.8.ppc", "3WS:python-tools-0:2.2.3-6.8.s390", "3WS:python-tools-0:2.2.3-6.8.s390x", "3WS:python-tools-0:2.2.3-6.8.x86_64", "3WS:tkinter-0:2.2.3-6.8.i386", "3WS:tkinter-0:2.2.3-6.8.ia64", "3WS:tkinter-0:2.2.3-6.8.ppc", "3WS:tkinter-0:2.2.3-6.8.s390", "3WS:tkinter-0:2.2.3-6.8.s390x", "3WS:tkinter-0:2.2.3-6.8.x86_64", "4AS:python-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-0:2.3.4-14.4.el4_6.1.src", "4AS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-0:2.3.4-14.4.el4_6.1.src", "4Desktop:python-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-0:2.3.4-14.4.el4_6.1.src", "4ES:python-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-0:2.3.4-14.4.el4_6.1.src", "4WS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2007-2052", }, { category: "external", summary: "RHBZ#235093", url: "https://bugzilla.redhat.com/show_bug.cgi?id=235093", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2007-2052", url: "https://www.cve.org/CVERecord?id=CVE-2007-2052", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", url: "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", }, ], release_date: "2007-04-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2007-12-10T18:20:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "3AS:python-0:2.2.3-6.8.i386", "3AS:python-0:2.2.3-6.8.ia64", "3AS:python-0:2.2.3-6.8.ppc", "3AS:python-0:2.2.3-6.8.s390", "3AS:python-0:2.2.3-6.8.s390x", "3AS:python-0:2.2.3-6.8.src", "3AS:python-0:2.2.3-6.8.x86_64", "3AS:python-debuginfo-0:2.2.3-6.8.i386", "3AS:python-debuginfo-0:2.2.3-6.8.ia64", "3AS:python-debuginfo-0:2.2.3-6.8.ppc", "3AS:python-debuginfo-0:2.2.3-6.8.s390", "3AS:python-debuginfo-0:2.2.3-6.8.s390x", "3AS:python-debuginfo-0:2.2.3-6.8.x86_64", "3AS:python-devel-0:2.2.3-6.8.i386", "3AS:python-devel-0:2.2.3-6.8.ia64", "3AS:python-devel-0:2.2.3-6.8.ppc", "3AS:python-devel-0:2.2.3-6.8.s390", "3AS:python-devel-0:2.2.3-6.8.s390x", "3AS:python-devel-0:2.2.3-6.8.x86_64", "3AS:python-tools-0:2.2.3-6.8.i386", "3AS:python-tools-0:2.2.3-6.8.ia64", "3AS:python-tools-0:2.2.3-6.8.ppc", "3AS:python-tools-0:2.2.3-6.8.s390", "3AS:python-tools-0:2.2.3-6.8.s390x", "3AS:python-tools-0:2.2.3-6.8.x86_64", "3AS:tkinter-0:2.2.3-6.8.i386", "3AS:tkinter-0:2.2.3-6.8.ia64", "3AS:tkinter-0:2.2.3-6.8.ppc", "3AS:tkinter-0:2.2.3-6.8.s390", "3AS:tkinter-0:2.2.3-6.8.s390x", "3AS:tkinter-0:2.2.3-6.8.x86_64", "3Desktop:python-0:2.2.3-6.8.i386", "3Desktop:python-0:2.2.3-6.8.ia64", "3Desktop:python-0:2.2.3-6.8.ppc", "3Desktop:python-0:2.2.3-6.8.s390", "3Desktop:python-0:2.2.3-6.8.s390x", "3Desktop:python-0:2.2.3-6.8.src", "3Desktop:python-0:2.2.3-6.8.x86_64", "3Desktop:python-debuginfo-0:2.2.3-6.8.i386", "3Desktop:python-debuginfo-0:2.2.3-6.8.ia64", "3Desktop:python-debuginfo-0:2.2.3-6.8.ppc", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390x", "3Desktop:python-debuginfo-0:2.2.3-6.8.x86_64", "3Desktop:python-devel-0:2.2.3-6.8.i386", "3Desktop:python-devel-0:2.2.3-6.8.ia64", "3Desktop:python-devel-0:2.2.3-6.8.ppc", "3Desktop:python-devel-0:2.2.3-6.8.s390", "3Desktop:python-devel-0:2.2.3-6.8.s390x", "3Desktop:python-devel-0:2.2.3-6.8.x86_64", "3Desktop:python-tools-0:2.2.3-6.8.i386", "3Desktop:python-tools-0:2.2.3-6.8.ia64", "3Desktop:python-tools-0:2.2.3-6.8.ppc", "3Desktop:python-tools-0:2.2.3-6.8.s390", "3Desktop:python-tools-0:2.2.3-6.8.s390x", "3Desktop:python-tools-0:2.2.3-6.8.x86_64", "3Desktop:tkinter-0:2.2.3-6.8.i386", "3Desktop:tkinter-0:2.2.3-6.8.ia64", "3Desktop:tkinter-0:2.2.3-6.8.ppc", "3Desktop:tkinter-0:2.2.3-6.8.s390", "3Desktop:tkinter-0:2.2.3-6.8.s390x", "3Desktop:tkinter-0:2.2.3-6.8.x86_64", "3ES:python-0:2.2.3-6.8.i386", "3ES:python-0:2.2.3-6.8.ia64", "3ES:python-0:2.2.3-6.8.ppc", "3ES:python-0:2.2.3-6.8.s390", "3ES:python-0:2.2.3-6.8.s390x", "3ES:python-0:2.2.3-6.8.src", "3ES:python-0:2.2.3-6.8.x86_64", "3ES:python-debuginfo-0:2.2.3-6.8.i386", "3ES:python-debuginfo-0:2.2.3-6.8.ia64", "3ES:python-debuginfo-0:2.2.3-6.8.ppc", "3ES:python-debuginfo-0:2.2.3-6.8.s390", "3ES:python-debuginfo-0:2.2.3-6.8.s390x", "3ES:python-debuginfo-0:2.2.3-6.8.x86_64", "3ES:python-devel-0:2.2.3-6.8.i386", "3ES:python-devel-0:2.2.3-6.8.ia64", "3ES:python-devel-0:2.2.3-6.8.ppc", "3ES:python-devel-0:2.2.3-6.8.s390", "3ES:python-devel-0:2.2.3-6.8.s390x", "3ES:python-devel-0:2.2.3-6.8.x86_64", "3ES:python-tools-0:2.2.3-6.8.i386", "3ES:python-tools-0:2.2.3-6.8.ia64", "3ES:python-tools-0:2.2.3-6.8.ppc", "3ES:python-tools-0:2.2.3-6.8.s390", "3ES:python-tools-0:2.2.3-6.8.s390x", "3ES:python-tools-0:2.2.3-6.8.x86_64", "3ES:tkinter-0:2.2.3-6.8.i386", "3ES:tkinter-0:2.2.3-6.8.ia64", "3ES:tkinter-0:2.2.3-6.8.ppc", "3ES:tkinter-0:2.2.3-6.8.s390", "3ES:tkinter-0:2.2.3-6.8.s390x", "3ES:tkinter-0:2.2.3-6.8.x86_64", "3WS:python-0:2.2.3-6.8.i386", "3WS:python-0:2.2.3-6.8.ia64", "3WS:python-0:2.2.3-6.8.ppc", "3WS:python-0:2.2.3-6.8.s390", "3WS:python-0:2.2.3-6.8.s390x", "3WS:python-0:2.2.3-6.8.src", "3WS:python-0:2.2.3-6.8.x86_64", "3WS:python-debuginfo-0:2.2.3-6.8.i386", "3WS:python-debuginfo-0:2.2.3-6.8.ia64", "3WS:python-debuginfo-0:2.2.3-6.8.ppc", "3WS:python-debuginfo-0:2.2.3-6.8.s390", "3WS:python-debuginfo-0:2.2.3-6.8.s390x", "3WS:python-debuginfo-0:2.2.3-6.8.x86_64", "3WS:python-devel-0:2.2.3-6.8.i386", "3WS:python-devel-0:2.2.3-6.8.ia64", "3WS:python-devel-0:2.2.3-6.8.ppc", "3WS:python-devel-0:2.2.3-6.8.s390", "3WS:python-devel-0:2.2.3-6.8.s390x", "3WS:python-devel-0:2.2.3-6.8.x86_64", "3WS:python-tools-0:2.2.3-6.8.i386", "3WS:python-tools-0:2.2.3-6.8.ia64", "3WS:python-tools-0:2.2.3-6.8.ppc", "3WS:python-tools-0:2.2.3-6.8.s390", "3WS:python-tools-0:2.2.3-6.8.s390x", "3WS:python-tools-0:2.2.3-6.8.x86_64", "3WS:tkinter-0:2.2.3-6.8.i386", "3WS:tkinter-0:2.2.3-6.8.ia64", "3WS:tkinter-0:2.2.3-6.8.ppc", "3WS:tkinter-0:2.2.3-6.8.s390", "3WS:tkinter-0:2.2.3-6.8.s390x", "3WS:tkinter-0:2.2.3-6.8.x86_64", "4AS:python-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-0:2.3.4-14.4.el4_6.1.src", "4AS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-0:2.3.4-14.4.el4_6.1.src", "4Desktop:python-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-0:2.3.4-14.4.el4_6.1.src", "4ES:python-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-0:2.3.4-14.4.el4_6.1.src", "4WS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2007:1076", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python off-by-one locale.strxfrm() (possible memory disclosure)", }, { cve: "CVE-2007-4965", discovery_date: "2007-09-18T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "295971", }, ], notes: [ { category: "description", text: "Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.", title: "Vulnerability description", }, { category: "summary", text: "python imageop module heap corruption", title: "Vulnerability summary", }, { category: "other", text: "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=295971\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/", title: "Statement", }, ], product_status: { fixed: [ "3AS:python-0:2.2.3-6.8.i386", "3AS:python-0:2.2.3-6.8.ia64", "3AS:python-0:2.2.3-6.8.ppc", "3AS:python-0:2.2.3-6.8.s390", "3AS:python-0:2.2.3-6.8.s390x", "3AS:python-0:2.2.3-6.8.src", "3AS:python-0:2.2.3-6.8.x86_64", "3AS:python-debuginfo-0:2.2.3-6.8.i386", "3AS:python-debuginfo-0:2.2.3-6.8.ia64", "3AS:python-debuginfo-0:2.2.3-6.8.ppc", "3AS:python-debuginfo-0:2.2.3-6.8.s390", "3AS:python-debuginfo-0:2.2.3-6.8.s390x", "3AS:python-debuginfo-0:2.2.3-6.8.x86_64", "3AS:python-devel-0:2.2.3-6.8.i386", "3AS:python-devel-0:2.2.3-6.8.ia64", "3AS:python-devel-0:2.2.3-6.8.ppc", "3AS:python-devel-0:2.2.3-6.8.s390", "3AS:python-devel-0:2.2.3-6.8.s390x", "3AS:python-devel-0:2.2.3-6.8.x86_64", "3AS:python-tools-0:2.2.3-6.8.i386", "3AS:python-tools-0:2.2.3-6.8.ia64", "3AS:python-tools-0:2.2.3-6.8.ppc", "3AS:python-tools-0:2.2.3-6.8.s390", "3AS:python-tools-0:2.2.3-6.8.s390x", "3AS:python-tools-0:2.2.3-6.8.x86_64", "3AS:tkinter-0:2.2.3-6.8.i386", "3AS:tkinter-0:2.2.3-6.8.ia64", "3AS:tkinter-0:2.2.3-6.8.ppc", "3AS:tkinter-0:2.2.3-6.8.s390", "3AS:tkinter-0:2.2.3-6.8.s390x", "3AS:tkinter-0:2.2.3-6.8.x86_64", "3Desktop:python-0:2.2.3-6.8.i386", "3Desktop:python-0:2.2.3-6.8.ia64", "3Desktop:python-0:2.2.3-6.8.ppc", "3Desktop:python-0:2.2.3-6.8.s390", "3Desktop:python-0:2.2.3-6.8.s390x", "3Desktop:python-0:2.2.3-6.8.src", "3Desktop:python-0:2.2.3-6.8.x86_64", "3Desktop:python-debuginfo-0:2.2.3-6.8.i386", "3Desktop:python-debuginfo-0:2.2.3-6.8.ia64", "3Desktop:python-debuginfo-0:2.2.3-6.8.ppc", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390x", "3Desktop:python-debuginfo-0:2.2.3-6.8.x86_64", "3Desktop:python-devel-0:2.2.3-6.8.i386", "3Desktop:python-devel-0:2.2.3-6.8.ia64", "3Desktop:python-devel-0:2.2.3-6.8.ppc", "3Desktop:python-devel-0:2.2.3-6.8.s390", "3Desktop:python-devel-0:2.2.3-6.8.s390x", "3Desktop:python-devel-0:2.2.3-6.8.x86_64", "3Desktop:python-tools-0:2.2.3-6.8.i386", "3Desktop:python-tools-0:2.2.3-6.8.ia64", "3Desktop:python-tools-0:2.2.3-6.8.ppc", "3Desktop:python-tools-0:2.2.3-6.8.s390", "3Desktop:python-tools-0:2.2.3-6.8.s390x", "3Desktop:python-tools-0:2.2.3-6.8.x86_64", "3Desktop:tkinter-0:2.2.3-6.8.i386", "3Desktop:tkinter-0:2.2.3-6.8.ia64", "3Desktop:tkinter-0:2.2.3-6.8.ppc", "3Desktop:tkinter-0:2.2.3-6.8.s390", "3Desktop:tkinter-0:2.2.3-6.8.s390x", "3Desktop:tkinter-0:2.2.3-6.8.x86_64", "3ES:python-0:2.2.3-6.8.i386", "3ES:python-0:2.2.3-6.8.ia64", "3ES:python-0:2.2.3-6.8.ppc", "3ES:python-0:2.2.3-6.8.s390", "3ES:python-0:2.2.3-6.8.s390x", "3ES:python-0:2.2.3-6.8.src", "3ES:python-0:2.2.3-6.8.x86_64", "3ES:python-debuginfo-0:2.2.3-6.8.i386", "3ES:python-debuginfo-0:2.2.3-6.8.ia64", "3ES:python-debuginfo-0:2.2.3-6.8.ppc", "3ES:python-debuginfo-0:2.2.3-6.8.s390", "3ES:python-debuginfo-0:2.2.3-6.8.s390x", "3ES:python-debuginfo-0:2.2.3-6.8.x86_64", "3ES:python-devel-0:2.2.3-6.8.i386", "3ES:python-devel-0:2.2.3-6.8.ia64", "3ES:python-devel-0:2.2.3-6.8.ppc", "3ES:python-devel-0:2.2.3-6.8.s390", "3ES:python-devel-0:2.2.3-6.8.s390x", "3ES:python-devel-0:2.2.3-6.8.x86_64", "3ES:python-tools-0:2.2.3-6.8.i386", "3ES:python-tools-0:2.2.3-6.8.ia64", "3ES:python-tools-0:2.2.3-6.8.ppc", "3ES:python-tools-0:2.2.3-6.8.s390", "3ES:python-tools-0:2.2.3-6.8.s390x", "3ES:python-tools-0:2.2.3-6.8.x86_64", "3ES:tkinter-0:2.2.3-6.8.i386", "3ES:tkinter-0:2.2.3-6.8.ia64", "3ES:tkinter-0:2.2.3-6.8.ppc", "3ES:tkinter-0:2.2.3-6.8.s390", "3ES:tkinter-0:2.2.3-6.8.s390x", "3ES:tkinter-0:2.2.3-6.8.x86_64", "3WS:python-0:2.2.3-6.8.i386", "3WS:python-0:2.2.3-6.8.ia64", "3WS:python-0:2.2.3-6.8.ppc", "3WS:python-0:2.2.3-6.8.s390", "3WS:python-0:2.2.3-6.8.s390x", "3WS:python-0:2.2.3-6.8.src", "3WS:python-0:2.2.3-6.8.x86_64", "3WS:python-debuginfo-0:2.2.3-6.8.i386", "3WS:python-debuginfo-0:2.2.3-6.8.ia64", "3WS:python-debuginfo-0:2.2.3-6.8.ppc", "3WS:python-debuginfo-0:2.2.3-6.8.s390", "3WS:python-debuginfo-0:2.2.3-6.8.s390x", "3WS:python-debuginfo-0:2.2.3-6.8.x86_64", "3WS:python-devel-0:2.2.3-6.8.i386", "3WS:python-devel-0:2.2.3-6.8.ia64", "3WS:python-devel-0:2.2.3-6.8.ppc", "3WS:python-devel-0:2.2.3-6.8.s390", "3WS:python-devel-0:2.2.3-6.8.s390x", "3WS:python-devel-0:2.2.3-6.8.x86_64", "3WS:python-tools-0:2.2.3-6.8.i386", "3WS:python-tools-0:2.2.3-6.8.ia64", "3WS:python-tools-0:2.2.3-6.8.ppc", "3WS:python-tools-0:2.2.3-6.8.s390", "3WS:python-tools-0:2.2.3-6.8.s390x", "3WS:python-tools-0:2.2.3-6.8.x86_64", "3WS:tkinter-0:2.2.3-6.8.i386", "3WS:tkinter-0:2.2.3-6.8.ia64", "3WS:tkinter-0:2.2.3-6.8.ppc", "3WS:tkinter-0:2.2.3-6.8.s390", "3WS:tkinter-0:2.2.3-6.8.s390x", "3WS:tkinter-0:2.2.3-6.8.x86_64", "4AS:python-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-0:2.3.4-14.4.el4_6.1.src", "4AS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-0:2.3.4-14.4.el4_6.1.src", "4Desktop:python-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-0:2.3.4-14.4.el4_6.1.src", "4ES:python-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-0:2.3.4-14.4.el4_6.1.src", "4WS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2007-4965", }, { category: "external", summary: "RHBZ#295971", url: "https://bugzilla.redhat.com/show_bug.cgi?id=295971", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2007-4965", url: "https://www.cve.org/CVERecord?id=CVE-2007-4965", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", url: "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", }, ], release_date: "2007-09-16T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2007-12-10T18:20:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "3AS:python-0:2.2.3-6.8.i386", "3AS:python-0:2.2.3-6.8.ia64", "3AS:python-0:2.2.3-6.8.ppc", "3AS:python-0:2.2.3-6.8.s390", "3AS:python-0:2.2.3-6.8.s390x", "3AS:python-0:2.2.3-6.8.src", "3AS:python-0:2.2.3-6.8.x86_64", "3AS:python-debuginfo-0:2.2.3-6.8.i386", "3AS:python-debuginfo-0:2.2.3-6.8.ia64", "3AS:python-debuginfo-0:2.2.3-6.8.ppc", "3AS:python-debuginfo-0:2.2.3-6.8.s390", "3AS:python-debuginfo-0:2.2.3-6.8.s390x", "3AS:python-debuginfo-0:2.2.3-6.8.x86_64", "3AS:python-devel-0:2.2.3-6.8.i386", "3AS:python-devel-0:2.2.3-6.8.ia64", "3AS:python-devel-0:2.2.3-6.8.ppc", "3AS:python-devel-0:2.2.3-6.8.s390", "3AS:python-devel-0:2.2.3-6.8.s390x", "3AS:python-devel-0:2.2.3-6.8.x86_64", "3AS:python-tools-0:2.2.3-6.8.i386", "3AS:python-tools-0:2.2.3-6.8.ia64", "3AS:python-tools-0:2.2.3-6.8.ppc", "3AS:python-tools-0:2.2.3-6.8.s390", "3AS:python-tools-0:2.2.3-6.8.s390x", "3AS:python-tools-0:2.2.3-6.8.x86_64", "3AS:tkinter-0:2.2.3-6.8.i386", "3AS:tkinter-0:2.2.3-6.8.ia64", "3AS:tkinter-0:2.2.3-6.8.ppc", "3AS:tkinter-0:2.2.3-6.8.s390", "3AS:tkinter-0:2.2.3-6.8.s390x", "3AS:tkinter-0:2.2.3-6.8.x86_64", "3Desktop:python-0:2.2.3-6.8.i386", "3Desktop:python-0:2.2.3-6.8.ia64", "3Desktop:python-0:2.2.3-6.8.ppc", "3Desktop:python-0:2.2.3-6.8.s390", "3Desktop:python-0:2.2.3-6.8.s390x", "3Desktop:python-0:2.2.3-6.8.src", "3Desktop:python-0:2.2.3-6.8.x86_64", "3Desktop:python-debuginfo-0:2.2.3-6.8.i386", "3Desktop:python-debuginfo-0:2.2.3-6.8.ia64", "3Desktop:python-debuginfo-0:2.2.3-6.8.ppc", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390x", "3Desktop:python-debuginfo-0:2.2.3-6.8.x86_64", "3Desktop:python-devel-0:2.2.3-6.8.i386", "3Desktop:python-devel-0:2.2.3-6.8.ia64", "3Desktop:python-devel-0:2.2.3-6.8.ppc", "3Desktop:python-devel-0:2.2.3-6.8.s390", "3Desktop:python-devel-0:2.2.3-6.8.s390x", "3Desktop:python-devel-0:2.2.3-6.8.x86_64", "3Desktop:python-tools-0:2.2.3-6.8.i386", "3Desktop:python-tools-0:2.2.3-6.8.ia64", "3Desktop:python-tools-0:2.2.3-6.8.ppc", "3Desktop:python-tools-0:2.2.3-6.8.s390", "3Desktop:python-tools-0:2.2.3-6.8.s390x", "3Desktop:python-tools-0:2.2.3-6.8.x86_64", "3Desktop:tkinter-0:2.2.3-6.8.i386", "3Desktop:tkinter-0:2.2.3-6.8.ia64", "3Desktop:tkinter-0:2.2.3-6.8.ppc", "3Desktop:tkinter-0:2.2.3-6.8.s390", "3Desktop:tkinter-0:2.2.3-6.8.s390x", "3Desktop:tkinter-0:2.2.3-6.8.x86_64", "3ES:python-0:2.2.3-6.8.i386", "3ES:python-0:2.2.3-6.8.ia64", "3ES:python-0:2.2.3-6.8.ppc", "3ES:python-0:2.2.3-6.8.s390", "3ES:python-0:2.2.3-6.8.s390x", "3ES:python-0:2.2.3-6.8.src", "3ES:python-0:2.2.3-6.8.x86_64", "3ES:python-debuginfo-0:2.2.3-6.8.i386", "3ES:python-debuginfo-0:2.2.3-6.8.ia64", "3ES:python-debuginfo-0:2.2.3-6.8.ppc", "3ES:python-debuginfo-0:2.2.3-6.8.s390", "3ES:python-debuginfo-0:2.2.3-6.8.s390x", "3ES:python-debuginfo-0:2.2.3-6.8.x86_64", "3ES:python-devel-0:2.2.3-6.8.i386", "3ES:python-devel-0:2.2.3-6.8.ia64", "3ES:python-devel-0:2.2.3-6.8.ppc", "3ES:python-devel-0:2.2.3-6.8.s390", "3ES:python-devel-0:2.2.3-6.8.s390x", "3ES:python-devel-0:2.2.3-6.8.x86_64", "3ES:python-tools-0:2.2.3-6.8.i386", "3ES:python-tools-0:2.2.3-6.8.ia64", "3ES:python-tools-0:2.2.3-6.8.ppc", "3ES:python-tools-0:2.2.3-6.8.s390", "3ES:python-tools-0:2.2.3-6.8.s390x", "3ES:python-tools-0:2.2.3-6.8.x86_64", "3ES:tkinter-0:2.2.3-6.8.i386", "3ES:tkinter-0:2.2.3-6.8.ia64", "3ES:tkinter-0:2.2.3-6.8.ppc", "3ES:tkinter-0:2.2.3-6.8.s390", "3ES:tkinter-0:2.2.3-6.8.s390x", "3ES:tkinter-0:2.2.3-6.8.x86_64", "3WS:python-0:2.2.3-6.8.i386", "3WS:python-0:2.2.3-6.8.ia64", "3WS:python-0:2.2.3-6.8.ppc", "3WS:python-0:2.2.3-6.8.s390", "3WS:python-0:2.2.3-6.8.s390x", "3WS:python-0:2.2.3-6.8.src", "3WS:python-0:2.2.3-6.8.x86_64", "3WS:python-debuginfo-0:2.2.3-6.8.i386", "3WS:python-debuginfo-0:2.2.3-6.8.ia64", "3WS:python-debuginfo-0:2.2.3-6.8.ppc", "3WS:python-debuginfo-0:2.2.3-6.8.s390", "3WS:python-debuginfo-0:2.2.3-6.8.s390x", "3WS:python-debuginfo-0:2.2.3-6.8.x86_64", "3WS:python-devel-0:2.2.3-6.8.i386", "3WS:python-devel-0:2.2.3-6.8.ia64", "3WS:python-devel-0:2.2.3-6.8.ppc", "3WS:python-devel-0:2.2.3-6.8.s390", "3WS:python-devel-0:2.2.3-6.8.s390x", "3WS:python-devel-0:2.2.3-6.8.x86_64", "3WS:python-tools-0:2.2.3-6.8.i386", "3WS:python-tools-0:2.2.3-6.8.ia64", "3WS:python-tools-0:2.2.3-6.8.ppc", "3WS:python-tools-0:2.2.3-6.8.s390", "3WS:python-tools-0:2.2.3-6.8.s390x", "3WS:python-tools-0:2.2.3-6.8.x86_64", "3WS:tkinter-0:2.2.3-6.8.i386", "3WS:tkinter-0:2.2.3-6.8.ia64", "3WS:tkinter-0:2.2.3-6.8.ppc", "3WS:tkinter-0:2.2.3-6.8.s390", "3WS:tkinter-0:2.2.3-6.8.s390x", "3WS:tkinter-0:2.2.3-6.8.x86_64", "4AS:python-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-0:2.3.4-14.4.el4_6.1.src", "4AS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-0:2.3.4-14.4.el4_6.1.src", "4Desktop:python-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-0:2.3.4-14.4.el4_6.1.src", "4ES:python-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-0:2.3.4-14.4.el4_6.1.src", "4WS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2007:1076", }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "python imageop module heap corruption", }, ], }
rhsa-2007:1077
Vulnerability from csaf_redhat
Published
2007-12-10 17:57
Modified
2024-11-22 02:05
Summary
Red Hat Security Advisory: python security update
Notes
Topic
Updated python packages that fix several security issues are now available
for Red Hat Enterprise Linux 2.1.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
Python is an interpreted, interactive, object-oriented programming
language.
An integer overflow flaw was discovered in the way Python's pcre module
handled certain regular expressions. If a Python application used the pcre
module to compile and execute untrusted regular expressions, it may be
possible to cause the application to crash, or allow arbitrary code
execution with the privileges of the Python interpreter. (CVE-2006-7228)
A flaw was discovered in the strxfrm() function of Python's locale module.
Strings generated by this function were not properly NULL-terminated, which
could possibly cause disclosure of data stored in the memory of a Python
application using this function. (CVE-2007-2052)
Users of Python are advised to upgrade to these updated packages, which
contain backported patches to resolve these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Updated python packages that fix several security issues are now available\nfor Red Hat Enterprise Linux 2.1.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", title: "Topic", }, { category: "general", text: "Python is an interpreted, interactive, object-oriented programming\nlanguage.\n\nAn integer overflow flaw was discovered in the way Python's pcre module\nhandled certain regular expressions. If a Python application used the pcre\nmodule to compile and execute untrusted regular expressions, it may be\npossible to cause the application to crash, or allow arbitrary code\nexecution with the privileges of the Python interpreter. (CVE-2006-7228)\n\nA flaw was discovered in the strxfrm() function of Python's locale module.\nStrings generated by this function were not properly NULL-terminated, which\ncould possibly cause disclosure of data stored in the memory of a Python\napplication using this function. (CVE-2007-2052)\n\nUsers of Python are advised to upgrade to these updated packages, which\ncontain backported patches to resolve these issues.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2007:1077", url: "https://access.redhat.com/errata/RHSA-2007:1077", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "235093", url: "https://bugzilla.redhat.com/show_bug.cgi?id=235093", }, { category: "external", summary: "383371", url: "https://bugzilla.redhat.com/show_bug.cgi?id=383371", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_1077.json", }, ], title: "Red Hat Security Advisory: python security update", tracking: { current_release_date: "2024-11-22T02:05:21+00:00", generator: { date: "2024-11-22T02:05:21+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2007:1077", initial_release_date: "2007-12-10T17:57:00+00:00", revision_history: [ { date: "2007-12-10T17:57:00+00:00", number: "1", summary: "Initial version", }, { date: "2007-12-10T12:57:16+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T02:05:21+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product: { name: "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product_id: "2.1AS", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:2.1::as", }, }, }, { category: "product_name", name: "Red Hat Linux Advanced Workstation 2.1", product: { name: "Red Hat Linux Advanced Workstation 2.1", product_id: "2.1AW", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:2.1::aw", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ES version 2.1", product: { name: "Red Hat Enterprise Linux ES version 2.1", product_id: "2.1ES", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:2.1::es", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux WS version 2.1", product: { name: "Red Hat Enterprise Linux WS version 2.1", product_id: "2.1WS", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:2.1::ws", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "tkinter-0:1.5.2-43.72.2.ia64", product: { name: "tkinter-0:1.5.2-43.72.2.ia64", product_id: "tkinter-0:1.5.2-43.72.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@1.5.2-43.72.2?arch=ia64", }, }, }, { category: "product_version", name: "python-0:1.5.2-43.72.2.ia64", product: { name: "python-0:1.5.2-43.72.2.ia64", product_id: "python-0:1.5.2-43.72.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python@1.5.2-43.72.2?arch=ia64", }, }, }, { category: "product_version", name: "python-tools-0:1.5.2-43.72.2.ia64", product: { name: "python-tools-0:1.5.2-43.72.2.ia64", product_id: "python-tools-0:1.5.2-43.72.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@1.5.2-43.72.2?arch=ia64", }, }, }, { category: "product_version", name: "python-devel-0:1.5.2-43.72.2.ia64", product: { name: "python-devel-0:1.5.2-43.72.2.ia64", product_id: "python-devel-0:1.5.2-43.72.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@1.5.2-43.72.2?arch=ia64", }, }, }, { category: "product_version", name: "python-docs-0:1.5.2-43.72.2.ia64", product: { name: "python-docs-0:1.5.2-43.72.2.ia64", product_id: "python-docs-0:1.5.2-43.72.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python-docs@1.5.2-43.72.2?arch=ia64", }, }, }, ], category: "architecture", name: "ia64", }, { branches: [ { category: "product_version", name: "python-0:1.5.2-43.72.2.src", product: { name: "python-0:1.5.2-43.72.2.src", product_id: "python-0:1.5.2-43.72.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/python@1.5.2-43.72.2?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "tkinter-0:1.5.2-43.72.2.i386", product: { name: "tkinter-0:1.5.2-43.72.2.i386", product_id: "tkinter-0:1.5.2-43.72.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@1.5.2-43.72.2?arch=i386", }, }, }, { category: "product_version", name: "python-0:1.5.2-43.72.2.i386", product: { name: "python-0:1.5.2-43.72.2.i386", product_id: "python-0:1.5.2-43.72.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python@1.5.2-43.72.2?arch=i386", }, }, }, { category: "product_version", name: "python-tools-0:1.5.2-43.72.2.i386", product: { name: "python-tools-0:1.5.2-43.72.2.i386", product_id: "python-tools-0:1.5.2-43.72.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@1.5.2-43.72.2?arch=i386", }, }, }, { category: "product_version", name: "python-devel-0:1.5.2-43.72.2.i386", product: { name: "python-devel-0:1.5.2-43.72.2.i386", product_id: "python-devel-0:1.5.2-43.72.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@1.5.2-43.72.2?arch=i386", }, }, }, { category: "product_version", name: "python-docs-0:1.5.2-43.72.2.i386", product: { name: "python-docs-0:1.5.2-43.72.2.i386", product_id: "python-docs-0:1.5.2-43.72.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python-docs@1.5.2-43.72.2?arch=i386", }, }, }, ], category: "architecture", name: "i386", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "python-0:1.5.2-43.72.2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product_id: "2.1AS:python-0:1.5.2-43.72.2.i386", }, product_reference: "python-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1AS", }, { category: "default_component_of", full_product_name: { name: "python-0:1.5.2-43.72.2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product_id: "2.1AS:python-0:1.5.2-43.72.2.ia64", }, product_reference: "python-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1AS", }, { category: "default_component_of", full_product_name: { name: "python-0:1.5.2-43.72.2.src as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product_id: "2.1AS:python-0:1.5.2-43.72.2.src", }, product_reference: "python-0:1.5.2-43.72.2.src", relates_to_product_reference: "2.1AS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:1.5.2-43.72.2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product_id: "2.1AS:python-devel-0:1.5.2-43.72.2.i386", }, product_reference: "python-devel-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1AS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:1.5.2-43.72.2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product_id: "2.1AS:python-devel-0:1.5.2-43.72.2.ia64", }, product_reference: "python-devel-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1AS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:1.5.2-43.72.2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product_id: "2.1AS:python-docs-0:1.5.2-43.72.2.i386", }, product_reference: "python-docs-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1AS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:1.5.2-43.72.2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product_id: "2.1AS:python-docs-0:1.5.2-43.72.2.ia64", }, product_reference: "python-docs-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1AS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:1.5.2-43.72.2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product_id: "2.1AS:python-tools-0:1.5.2-43.72.2.i386", }, product_reference: "python-tools-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1AS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:1.5.2-43.72.2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product_id: "2.1AS:python-tools-0:1.5.2-43.72.2.ia64", }, product_reference: "python-tools-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1AS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:1.5.2-43.72.2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product_id: "2.1AS:tkinter-0:1.5.2-43.72.2.i386", }, product_reference: "tkinter-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1AS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:1.5.2-43.72.2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product_id: "2.1AS:tkinter-0:1.5.2-43.72.2.ia64", }, product_reference: "tkinter-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1AS", }, { category: "default_component_of", full_product_name: { name: "python-0:1.5.2-43.72.2.i386 as a component of Red Hat Linux Advanced Workstation 2.1", product_id: "2.1AW:python-0:1.5.2-43.72.2.i386", }, product_reference: "python-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1AW", }, { category: "default_component_of", full_product_name: { name: "python-0:1.5.2-43.72.2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", product_id: "2.1AW:python-0:1.5.2-43.72.2.ia64", }, product_reference: "python-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1AW", }, { category: "default_component_of", full_product_name: { name: "python-0:1.5.2-43.72.2.src as a component of Red Hat Linux Advanced Workstation 2.1", product_id: "2.1AW:python-0:1.5.2-43.72.2.src", }, product_reference: "python-0:1.5.2-43.72.2.src", relates_to_product_reference: "2.1AW", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:1.5.2-43.72.2.i386 as a component of Red Hat Linux Advanced Workstation 2.1", product_id: "2.1AW:python-devel-0:1.5.2-43.72.2.i386", }, product_reference: "python-devel-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1AW", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:1.5.2-43.72.2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", product_id: "2.1AW:python-devel-0:1.5.2-43.72.2.ia64", }, product_reference: "python-devel-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1AW", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:1.5.2-43.72.2.i386 as a component of Red Hat Linux Advanced Workstation 2.1", product_id: "2.1AW:python-docs-0:1.5.2-43.72.2.i386", }, product_reference: "python-docs-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1AW", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:1.5.2-43.72.2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", product_id: "2.1AW:python-docs-0:1.5.2-43.72.2.ia64", }, product_reference: "python-docs-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1AW", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:1.5.2-43.72.2.i386 as a component of Red Hat Linux Advanced Workstation 2.1", product_id: "2.1AW:python-tools-0:1.5.2-43.72.2.i386", }, product_reference: "python-tools-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1AW", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:1.5.2-43.72.2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", product_id: "2.1AW:python-tools-0:1.5.2-43.72.2.ia64", }, product_reference: "python-tools-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1AW", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:1.5.2-43.72.2.i386 as a component of Red Hat Linux Advanced Workstation 2.1", product_id: "2.1AW:tkinter-0:1.5.2-43.72.2.i386", }, product_reference: "tkinter-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1AW", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:1.5.2-43.72.2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", product_id: "2.1AW:tkinter-0:1.5.2-43.72.2.ia64", }, product_reference: "tkinter-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1AW", }, { category: "default_component_of", full_product_name: { name: "python-0:1.5.2-43.72.2.i386 as a component of Red Hat Enterprise Linux ES version 2.1", product_id: "2.1ES:python-0:1.5.2-43.72.2.i386", }, product_reference: "python-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1ES", }, { category: "default_component_of", full_product_name: { name: "python-0:1.5.2-43.72.2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", product_id: "2.1ES:python-0:1.5.2-43.72.2.ia64", }, product_reference: "python-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1ES", }, { category: "default_component_of", full_product_name: { name: "python-0:1.5.2-43.72.2.src as a component of Red Hat Enterprise Linux ES version 2.1", product_id: "2.1ES:python-0:1.5.2-43.72.2.src", }, product_reference: "python-0:1.5.2-43.72.2.src", relates_to_product_reference: "2.1ES", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:1.5.2-43.72.2.i386 as a component of Red Hat Enterprise Linux ES version 2.1", product_id: "2.1ES:python-devel-0:1.5.2-43.72.2.i386", }, product_reference: "python-devel-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1ES", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:1.5.2-43.72.2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", product_id: "2.1ES:python-devel-0:1.5.2-43.72.2.ia64", }, product_reference: "python-devel-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1ES", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:1.5.2-43.72.2.i386 as a component of Red Hat Enterprise Linux ES version 2.1", product_id: "2.1ES:python-docs-0:1.5.2-43.72.2.i386", }, product_reference: "python-docs-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1ES", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:1.5.2-43.72.2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", product_id: "2.1ES:python-docs-0:1.5.2-43.72.2.ia64", }, product_reference: "python-docs-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1ES", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:1.5.2-43.72.2.i386 as a component of Red Hat Enterprise Linux ES version 2.1", product_id: "2.1ES:python-tools-0:1.5.2-43.72.2.i386", }, product_reference: "python-tools-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1ES", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:1.5.2-43.72.2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", product_id: "2.1ES:python-tools-0:1.5.2-43.72.2.ia64", }, product_reference: "python-tools-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1ES", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:1.5.2-43.72.2.i386 as a component of Red Hat Enterprise Linux ES version 2.1", product_id: "2.1ES:tkinter-0:1.5.2-43.72.2.i386", }, product_reference: "tkinter-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1ES", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:1.5.2-43.72.2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", product_id: "2.1ES:tkinter-0:1.5.2-43.72.2.ia64", }, product_reference: "tkinter-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1ES", }, { category: "default_component_of", full_product_name: { name: "python-0:1.5.2-43.72.2.i386 as a component of Red Hat Enterprise Linux WS version 2.1", product_id: "2.1WS:python-0:1.5.2-43.72.2.i386", }, product_reference: "python-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1WS", }, { category: "default_component_of", full_product_name: { name: "python-0:1.5.2-43.72.2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", product_id: "2.1WS:python-0:1.5.2-43.72.2.ia64", }, product_reference: "python-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1WS", }, { category: "default_component_of", full_product_name: { name: "python-0:1.5.2-43.72.2.src as a component of Red Hat Enterprise Linux WS version 2.1", product_id: "2.1WS:python-0:1.5.2-43.72.2.src", }, product_reference: "python-0:1.5.2-43.72.2.src", relates_to_product_reference: "2.1WS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:1.5.2-43.72.2.i386 as a component of Red Hat Enterprise Linux WS version 2.1", product_id: "2.1WS:python-devel-0:1.5.2-43.72.2.i386", }, product_reference: "python-devel-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1WS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:1.5.2-43.72.2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", product_id: "2.1WS:python-devel-0:1.5.2-43.72.2.ia64", }, product_reference: "python-devel-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1WS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:1.5.2-43.72.2.i386 as a component of Red Hat Enterprise Linux WS version 2.1", product_id: "2.1WS:python-docs-0:1.5.2-43.72.2.i386", }, product_reference: "python-docs-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1WS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:1.5.2-43.72.2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", product_id: "2.1WS:python-docs-0:1.5.2-43.72.2.ia64", }, product_reference: "python-docs-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1WS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:1.5.2-43.72.2.i386 as a component of Red Hat Enterprise Linux WS version 2.1", product_id: "2.1WS:python-tools-0:1.5.2-43.72.2.i386", }, product_reference: "python-tools-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1WS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:1.5.2-43.72.2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", product_id: "2.1WS:python-tools-0:1.5.2-43.72.2.ia64", }, product_reference: "python-tools-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1WS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:1.5.2-43.72.2.i386 as a component of Red Hat Enterprise Linux WS version 2.1", product_id: "2.1WS:tkinter-0:1.5.2-43.72.2.i386", }, product_reference: "tkinter-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1WS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:1.5.2-43.72.2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", product_id: "2.1WS:tkinter-0:1.5.2-43.72.2.ia64", }, product_reference: "tkinter-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1WS", }, ], }, vulnerabilities: [ { cve: "CVE-2006-7228", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2007-11-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "383371", }, ], notes: [ { category: "description", text: "Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 might allow context-dependent attackers to execute arbitrary code via a regular expression that involves large (1) min, (2) max, or (3) duplength values that cause an incorrect length calculation and trigger a buffer overflow, a different vulnerability than CVE-2006-7227. NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split.", title: "Vulnerability description", }, { category: "summary", text: "pcre integer overflow", title: "Vulnerability summary", }, ], product_status: { fixed: [ "2.1AS:python-0:1.5.2-43.72.2.i386", "2.1AS:python-0:1.5.2-43.72.2.ia64", "2.1AS:python-0:1.5.2-43.72.2.src", "2.1AS:python-devel-0:1.5.2-43.72.2.i386", "2.1AS:python-devel-0:1.5.2-43.72.2.ia64", "2.1AS:python-docs-0:1.5.2-43.72.2.i386", "2.1AS:python-docs-0:1.5.2-43.72.2.ia64", "2.1AS:python-tools-0:1.5.2-43.72.2.i386", "2.1AS:python-tools-0:1.5.2-43.72.2.ia64", "2.1AS:tkinter-0:1.5.2-43.72.2.i386", "2.1AS:tkinter-0:1.5.2-43.72.2.ia64", "2.1AW:python-0:1.5.2-43.72.2.i386", "2.1AW:python-0:1.5.2-43.72.2.ia64", "2.1AW:python-0:1.5.2-43.72.2.src", "2.1AW:python-devel-0:1.5.2-43.72.2.i386", "2.1AW:python-devel-0:1.5.2-43.72.2.ia64", "2.1AW:python-docs-0:1.5.2-43.72.2.i386", "2.1AW:python-docs-0:1.5.2-43.72.2.ia64", "2.1AW:python-tools-0:1.5.2-43.72.2.i386", "2.1AW:python-tools-0:1.5.2-43.72.2.ia64", "2.1AW:tkinter-0:1.5.2-43.72.2.i386", "2.1AW:tkinter-0:1.5.2-43.72.2.ia64", "2.1ES:python-0:1.5.2-43.72.2.i386", "2.1ES:python-0:1.5.2-43.72.2.ia64", "2.1ES:python-0:1.5.2-43.72.2.src", "2.1ES:python-devel-0:1.5.2-43.72.2.i386", "2.1ES:python-devel-0:1.5.2-43.72.2.ia64", "2.1ES:python-docs-0:1.5.2-43.72.2.i386", "2.1ES:python-docs-0:1.5.2-43.72.2.ia64", "2.1ES:python-tools-0:1.5.2-43.72.2.i386", "2.1ES:python-tools-0:1.5.2-43.72.2.ia64", "2.1ES:tkinter-0:1.5.2-43.72.2.i386", "2.1ES:tkinter-0:1.5.2-43.72.2.ia64", "2.1WS:python-0:1.5.2-43.72.2.i386", "2.1WS:python-0:1.5.2-43.72.2.ia64", "2.1WS:python-0:1.5.2-43.72.2.src", "2.1WS:python-devel-0:1.5.2-43.72.2.i386", "2.1WS:python-devel-0:1.5.2-43.72.2.ia64", "2.1WS:python-docs-0:1.5.2-43.72.2.i386", "2.1WS:python-docs-0:1.5.2-43.72.2.ia64", "2.1WS:python-tools-0:1.5.2-43.72.2.i386", "2.1WS:python-tools-0:1.5.2-43.72.2.ia64", "2.1WS:tkinter-0:1.5.2-43.72.2.i386", "2.1WS:tkinter-0:1.5.2-43.72.2.ia64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-7228", }, { category: "external", summary: "RHBZ#383371", url: "https://bugzilla.redhat.com/show_bug.cgi?id=383371", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-7228", url: "https://www.cve.org/CVERecord?id=CVE-2006-7228", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-7228", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-7228", }, ], release_date: "2007-11-07T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2007-12-10T17:57:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "2.1AS:python-0:1.5.2-43.72.2.i386", "2.1AS:python-0:1.5.2-43.72.2.ia64", "2.1AS:python-0:1.5.2-43.72.2.src", "2.1AS:python-devel-0:1.5.2-43.72.2.i386", "2.1AS:python-devel-0:1.5.2-43.72.2.ia64", "2.1AS:python-docs-0:1.5.2-43.72.2.i386", "2.1AS:python-docs-0:1.5.2-43.72.2.ia64", "2.1AS:python-tools-0:1.5.2-43.72.2.i386", "2.1AS:python-tools-0:1.5.2-43.72.2.ia64", "2.1AS:tkinter-0:1.5.2-43.72.2.i386", "2.1AS:tkinter-0:1.5.2-43.72.2.ia64", "2.1AW:python-0:1.5.2-43.72.2.i386", "2.1AW:python-0:1.5.2-43.72.2.ia64", "2.1AW:python-0:1.5.2-43.72.2.src", "2.1AW:python-devel-0:1.5.2-43.72.2.i386", "2.1AW:python-devel-0:1.5.2-43.72.2.ia64", "2.1AW:python-docs-0:1.5.2-43.72.2.i386", "2.1AW:python-docs-0:1.5.2-43.72.2.ia64", "2.1AW:python-tools-0:1.5.2-43.72.2.i386", "2.1AW:python-tools-0:1.5.2-43.72.2.ia64", "2.1AW:tkinter-0:1.5.2-43.72.2.i386", "2.1AW:tkinter-0:1.5.2-43.72.2.ia64", "2.1ES:python-0:1.5.2-43.72.2.i386", "2.1ES:python-0:1.5.2-43.72.2.ia64", "2.1ES:python-0:1.5.2-43.72.2.src", "2.1ES:python-devel-0:1.5.2-43.72.2.i386", "2.1ES:python-devel-0:1.5.2-43.72.2.ia64", "2.1ES:python-docs-0:1.5.2-43.72.2.i386", "2.1ES:python-docs-0:1.5.2-43.72.2.ia64", "2.1ES:python-tools-0:1.5.2-43.72.2.i386", "2.1ES:python-tools-0:1.5.2-43.72.2.ia64", "2.1ES:tkinter-0:1.5.2-43.72.2.i386", "2.1ES:tkinter-0:1.5.2-43.72.2.ia64", "2.1WS:python-0:1.5.2-43.72.2.i386", "2.1WS:python-0:1.5.2-43.72.2.ia64", "2.1WS:python-0:1.5.2-43.72.2.src", "2.1WS:python-devel-0:1.5.2-43.72.2.i386", "2.1WS:python-devel-0:1.5.2-43.72.2.ia64", "2.1WS:python-docs-0:1.5.2-43.72.2.i386", "2.1WS:python-docs-0:1.5.2-43.72.2.ia64", "2.1WS:python-tools-0:1.5.2-43.72.2.i386", "2.1WS:python-tools-0:1.5.2-43.72.2.ia64", "2.1WS:tkinter-0:1.5.2-43.72.2.i386", "2.1WS:tkinter-0:1.5.2-43.72.2.ia64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2007:1077", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "pcre integer overflow", }, { cve: "CVE-2007-2052", cwe: { id: "CWE-193", name: "Off-by-one Error", }, discovery_date: "2007-04-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "235093", }, ], notes: [ { category: "description", text: "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", title: "Vulnerability description", }, { category: "summary", text: "python off-by-one locale.strxfrm() (possible memory disclosure)", title: "Vulnerability summary", }, { category: "other", text: "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/", title: "Statement", }, ], product_status: { fixed: [ "2.1AS:python-0:1.5.2-43.72.2.i386", "2.1AS:python-0:1.5.2-43.72.2.ia64", "2.1AS:python-0:1.5.2-43.72.2.src", "2.1AS:python-devel-0:1.5.2-43.72.2.i386", "2.1AS:python-devel-0:1.5.2-43.72.2.ia64", "2.1AS:python-docs-0:1.5.2-43.72.2.i386", "2.1AS:python-docs-0:1.5.2-43.72.2.ia64", "2.1AS:python-tools-0:1.5.2-43.72.2.i386", "2.1AS:python-tools-0:1.5.2-43.72.2.ia64", "2.1AS:tkinter-0:1.5.2-43.72.2.i386", "2.1AS:tkinter-0:1.5.2-43.72.2.ia64", "2.1AW:python-0:1.5.2-43.72.2.i386", "2.1AW:python-0:1.5.2-43.72.2.ia64", "2.1AW:python-0:1.5.2-43.72.2.src", "2.1AW:python-devel-0:1.5.2-43.72.2.i386", "2.1AW:python-devel-0:1.5.2-43.72.2.ia64", "2.1AW:python-docs-0:1.5.2-43.72.2.i386", "2.1AW:python-docs-0:1.5.2-43.72.2.ia64", "2.1AW:python-tools-0:1.5.2-43.72.2.i386", "2.1AW:python-tools-0:1.5.2-43.72.2.ia64", "2.1AW:tkinter-0:1.5.2-43.72.2.i386", "2.1AW:tkinter-0:1.5.2-43.72.2.ia64", "2.1ES:python-0:1.5.2-43.72.2.i386", "2.1ES:python-0:1.5.2-43.72.2.ia64", "2.1ES:python-0:1.5.2-43.72.2.src", "2.1ES:python-devel-0:1.5.2-43.72.2.i386", "2.1ES:python-devel-0:1.5.2-43.72.2.ia64", "2.1ES:python-docs-0:1.5.2-43.72.2.i386", "2.1ES:python-docs-0:1.5.2-43.72.2.ia64", "2.1ES:python-tools-0:1.5.2-43.72.2.i386", "2.1ES:python-tools-0:1.5.2-43.72.2.ia64", "2.1ES:tkinter-0:1.5.2-43.72.2.i386", "2.1ES:tkinter-0:1.5.2-43.72.2.ia64", "2.1WS:python-0:1.5.2-43.72.2.i386", "2.1WS:python-0:1.5.2-43.72.2.ia64", "2.1WS:python-0:1.5.2-43.72.2.src", "2.1WS:python-devel-0:1.5.2-43.72.2.i386", "2.1WS:python-devel-0:1.5.2-43.72.2.ia64", "2.1WS:python-docs-0:1.5.2-43.72.2.i386", "2.1WS:python-docs-0:1.5.2-43.72.2.ia64", "2.1WS:python-tools-0:1.5.2-43.72.2.i386", "2.1WS:python-tools-0:1.5.2-43.72.2.ia64", "2.1WS:tkinter-0:1.5.2-43.72.2.i386", "2.1WS:tkinter-0:1.5.2-43.72.2.ia64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2007-2052", }, { category: "external", summary: "RHBZ#235093", url: "https://bugzilla.redhat.com/show_bug.cgi?id=235093", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2007-2052", url: "https://www.cve.org/CVERecord?id=CVE-2007-2052", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", url: "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", }, ], release_date: "2007-04-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2007-12-10T17:57:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "2.1AS:python-0:1.5.2-43.72.2.i386", "2.1AS:python-0:1.5.2-43.72.2.ia64", "2.1AS:python-0:1.5.2-43.72.2.src", "2.1AS:python-devel-0:1.5.2-43.72.2.i386", "2.1AS:python-devel-0:1.5.2-43.72.2.ia64", "2.1AS:python-docs-0:1.5.2-43.72.2.i386", "2.1AS:python-docs-0:1.5.2-43.72.2.ia64", "2.1AS:python-tools-0:1.5.2-43.72.2.i386", "2.1AS:python-tools-0:1.5.2-43.72.2.ia64", "2.1AS:tkinter-0:1.5.2-43.72.2.i386", "2.1AS:tkinter-0:1.5.2-43.72.2.ia64", "2.1AW:python-0:1.5.2-43.72.2.i386", "2.1AW:python-0:1.5.2-43.72.2.ia64", "2.1AW:python-0:1.5.2-43.72.2.src", "2.1AW:python-devel-0:1.5.2-43.72.2.i386", "2.1AW:python-devel-0:1.5.2-43.72.2.ia64", "2.1AW:python-docs-0:1.5.2-43.72.2.i386", "2.1AW:python-docs-0:1.5.2-43.72.2.ia64", "2.1AW:python-tools-0:1.5.2-43.72.2.i386", "2.1AW:python-tools-0:1.5.2-43.72.2.ia64", "2.1AW:tkinter-0:1.5.2-43.72.2.i386", "2.1AW:tkinter-0:1.5.2-43.72.2.ia64", "2.1ES:python-0:1.5.2-43.72.2.i386", "2.1ES:python-0:1.5.2-43.72.2.ia64", "2.1ES:python-0:1.5.2-43.72.2.src", "2.1ES:python-devel-0:1.5.2-43.72.2.i386", "2.1ES:python-devel-0:1.5.2-43.72.2.ia64", "2.1ES:python-docs-0:1.5.2-43.72.2.i386", "2.1ES:python-docs-0:1.5.2-43.72.2.ia64", "2.1ES:python-tools-0:1.5.2-43.72.2.i386", "2.1ES:python-tools-0:1.5.2-43.72.2.ia64", "2.1ES:tkinter-0:1.5.2-43.72.2.i386", "2.1ES:tkinter-0:1.5.2-43.72.2.ia64", "2.1WS:python-0:1.5.2-43.72.2.i386", "2.1WS:python-0:1.5.2-43.72.2.ia64", "2.1WS:python-0:1.5.2-43.72.2.src", "2.1WS:python-devel-0:1.5.2-43.72.2.i386", "2.1WS:python-devel-0:1.5.2-43.72.2.ia64", "2.1WS:python-docs-0:1.5.2-43.72.2.i386", "2.1WS:python-docs-0:1.5.2-43.72.2.ia64", "2.1WS:python-tools-0:1.5.2-43.72.2.i386", "2.1WS:python-tools-0:1.5.2-43.72.2.ia64", "2.1WS:tkinter-0:1.5.2-43.72.2.i386", "2.1WS:tkinter-0:1.5.2-43.72.2.ia64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2007:1077", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python off-by-one locale.strxfrm() (possible memory disclosure)", }, ], }
rhsa-2009:1176
Vulnerability from csaf_redhat
Published
2009-07-27 09:22
Modified
2024-11-22 02:31
Summary
Red Hat Security Advisory: python security update
Notes
Topic
Updated python packages that fix multiple security issues are now available
for Red Hat Enterprise Linux 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
Python is an interpreted, interactive, object-oriented programming
language.
When the assert() system call was disabled, an input sanitization flaw was
revealed in the Python string object implementation that led to a buffer
overflow. The missing check for negative size values meant the Python
memory allocator could allocate less memory than expected. This could
result in arbitrary code execution with the Python interpreter's
privileges. (CVE-2008-1887)
Multiple buffer and integer overflow flaws were found in the Python Unicode
string processing and in the Python Unicode and string object
implementations. An attacker could use these flaws to cause a denial of
service (Python application crash). (CVE-2008-3142, CVE-2008-5031)
Multiple integer overflow flaws were found in the Python imageop module. If
a Python application used the imageop module to process untrusted images,
it could cause the application to disclose sensitive information, crash or,
potentially, execute arbitrary code with the Python interpreter's
privileges. (CVE-2007-4965, CVE-2008-4864)
Multiple integer underflow and overflow flaws were found in the Python
snprintf() wrapper implementation. An attacker could use these flaws to
cause a denial of service (memory corruption). (CVE-2008-3144)
Multiple integer overflow flaws were found in various Python modules. An
attacker could use these flaws to cause a denial of service (Python
application crash). (CVE-2008-2315, CVE-2008-3143)
An integer signedness error, leading to a buffer overflow, was found
in the Python zlib extension module. If a Python application requested
the negative byte count be flushed for a decompression stream, it could
cause the application to crash or, potentially, execute arbitrary code
with the Python interpreter's privileges. (CVE-2008-1721)
A flaw was discovered in the strxfrm() function of the Python locale
module. Strings generated by this function were not properly
NULL-terminated, which could possibly cause disclosure of data stored in
the memory of a Python application using this function. (CVE-2007-2052)
Red Hat would like to thank David Remahl of the Apple Product Security team
for responsibly reporting the CVE-2008-2315 issue.
All Python users should upgrade to these updated packages, which contain
backported patches to correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Updated python packages that fix multiple security issues are now available\nfor Red Hat Enterprise Linux 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", title: "Topic", }, { category: "general", text: "Python is an interpreted, interactive, object-oriented programming\nlanguage.\n\nWhen the assert() system call was disabled, an input sanitization flaw was\nrevealed in the Python string object implementation that led to a buffer\noverflow. The missing check for negative size values meant the Python\nmemory allocator could allocate less memory than expected. This could\nresult in arbitrary code execution with the Python interpreter's\nprivileges. (CVE-2008-1887)\n\nMultiple buffer and integer overflow flaws were found in the Python Unicode\nstring processing and in the Python Unicode and string object\nimplementations. An attacker could use these flaws to cause a denial of\nservice (Python application crash). (CVE-2008-3142, CVE-2008-5031)\n\nMultiple integer overflow flaws were found in the Python imageop module. If\na Python application used the imageop module to process untrusted images,\nit could cause the application to disclose sensitive information, crash or,\npotentially, execute arbitrary code with the Python interpreter's\nprivileges. (CVE-2007-4965, CVE-2008-4864)\n\nMultiple integer underflow and overflow flaws were found in the Python\nsnprintf() wrapper implementation. An attacker could use these flaws to\ncause a denial of service (memory corruption). (CVE-2008-3144)\n\nMultiple integer overflow flaws were found in various Python modules. An\nattacker could use these flaws to cause a denial of service (Python\napplication crash). (CVE-2008-2315, CVE-2008-3143)\n\nAn integer signedness error, leading to a buffer overflow, was found\nin the Python zlib extension module. If a Python application requested\nthe negative byte count be flushed for a decompression stream, it could\ncause the application to crash or, potentially, execute arbitrary code\nwith the Python interpreter's privileges. (CVE-2008-1721)\n\nA flaw was discovered in the strxfrm() function of the Python locale\nmodule. Strings generated by this function were not properly\nNULL-terminated, which could possibly cause disclosure of data stored in\nthe memory of a Python application using this function. (CVE-2007-2052)\n\nRed Hat would like to thank David Remahl of the Apple Product Security team\nfor responsibly reporting the CVE-2008-2315 issue.\n\nAll Python users should upgrade to these updated packages, which contain\nbackported patches to correct these issues.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2009:1176", url: "https://access.redhat.com/errata/RHSA-2009:1176", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "235093", url: "https://bugzilla.redhat.com/show_bug.cgi?id=235093", }, { category: "external", summary: "295971", url: "https://bugzilla.redhat.com/show_bug.cgi?id=295971", }, { category: "external", summary: "442005", url: "https://bugzilla.redhat.com/show_bug.cgi?id=442005", }, { category: "external", summary: "443810", url: "https://bugzilla.redhat.com/show_bug.cgi?id=443810", }, { category: "external", summary: "454990", url: "https://bugzilla.redhat.com/show_bug.cgi?id=454990", }, { category: "external", summary: "455008", url: "https://bugzilla.redhat.com/show_bug.cgi?id=455008", }, { category: "external", summary: "455013", url: "https://bugzilla.redhat.com/show_bug.cgi?id=455013", }, { category: "external", summary: "455018", url: "https://bugzilla.redhat.com/show_bug.cgi?id=455018", }, { category: "external", summary: "469656", url: "https://bugzilla.redhat.com/show_bug.cgi?id=469656", }, { category: "external", summary: "470915", url: "https://bugzilla.redhat.com/show_bug.cgi?id=470915", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1176.json", }, ], title: "Red Hat Security Advisory: python security update", tracking: { current_release_date: "2024-11-22T02:31:38+00:00", generator: { date: "2024-11-22T02:31:38+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2009:1176", initial_release_date: "2009-07-27T09:22:00+00:00", revision_history: [ { date: "2009-07-27T09:22:00+00:00", number: "1", summary: "Initial version", }, { date: "2009-07-27T05:22:50+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T02:31:38+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux Desktop (v. 5 client)", product: { name: "Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:5::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product: { name: "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:5::client_workstation", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux (v. 5 server)", product: { name: "Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:5::server", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", product: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", product_id: "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.4.3-24.el5_3.6?arch=x86_64", }, }, }, { category: "product_version", name: "python-devel-0:2.4.3-24.el5_3.6.x86_64", product: { name: "python-devel-0:2.4.3-24.el5_3.6.x86_64", product_id: "python-devel-0:2.4.3-24.el5_3.6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.4.3-24.el5_3.6?arch=x86_64", }, }, }, { category: "product_version", name: "tkinter-0:2.4.3-24.el5_3.6.x86_64", product: { name: "tkinter-0:2.4.3-24.el5_3.6.x86_64", product_id: "tkinter-0:2.4.3-24.el5_3.6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.4.3-24.el5_3.6?arch=x86_64", }, }, }, { category: "product_version", name: "python-0:2.4.3-24.el5_3.6.x86_64", product: { name: "python-0:2.4.3-24.el5_3.6.x86_64", product_id: "python-0:2.4.3-24.el5_3.6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.4.3-24.el5_3.6?arch=x86_64", }, }, }, { category: "product_version", name: "python-tools-0:2.4.3-24.el5_3.6.x86_64", product: { name: "python-tools-0:2.4.3-24.el5_3.6.x86_64", product_id: "python-tools-0:2.4.3-24.el5_3.6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.4.3-24.el5_3.6?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "python-debuginfo-0:2.4.3-24.el5_3.6.i386", product: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.i386", product_id: "python-debuginfo-0:2.4.3-24.el5_3.6.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.4.3-24.el5_3.6?arch=i386", }, }, }, { category: "product_version", name: "python-devel-0:2.4.3-24.el5_3.6.i386", product: { name: "python-devel-0:2.4.3-24.el5_3.6.i386", product_id: "python-devel-0:2.4.3-24.el5_3.6.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.4.3-24.el5_3.6?arch=i386", }, }, }, { category: "product_version", name: "tkinter-0:2.4.3-24.el5_3.6.i386", product: { name: "tkinter-0:2.4.3-24.el5_3.6.i386", product_id: "tkinter-0:2.4.3-24.el5_3.6.i386", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.4.3-24.el5_3.6?arch=i386", }, }, }, { category: "product_version", name: "python-0:2.4.3-24.el5_3.6.i386", product: { name: "python-0:2.4.3-24.el5_3.6.i386", product_id: "python-0:2.4.3-24.el5_3.6.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.4.3-24.el5_3.6?arch=i386", }, }, }, { category: "product_version", name: "python-tools-0:2.4.3-24.el5_3.6.i386", product: { name: "python-tools-0:2.4.3-24.el5_3.6.i386", product_id: "python-tools-0:2.4.3-24.el5_3.6.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.4.3-24.el5_3.6?arch=i386", }, }, }, ], category: "architecture", name: "i386", }, { branches: [ { category: "product_version", name: "python-0:2.4.3-24.el5_3.6.src", product: { name: "python-0:2.4.3-24.el5_3.6.src", product_id: "python-0:2.4.3-24.el5_3.6.src", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.4.3-24.el5_3.6?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "python-debuginfo-0:2.4.3-24.el5_3.6.ia64", product: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.ia64", product_id: "python-debuginfo-0:2.4.3-24.el5_3.6.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.4.3-24.el5_3.6?arch=ia64", }, }, }, { category: "product_version", name: "tkinter-0:2.4.3-24.el5_3.6.ia64", product: { name: "tkinter-0:2.4.3-24.el5_3.6.ia64", product_id: "tkinter-0:2.4.3-24.el5_3.6.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.4.3-24.el5_3.6?arch=ia64", }, }, }, { category: "product_version", name: "python-0:2.4.3-24.el5_3.6.ia64", product: { name: "python-0:2.4.3-24.el5_3.6.ia64", product_id: "python-0:2.4.3-24.el5_3.6.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.4.3-24.el5_3.6?arch=ia64", }, }, }, { category: "product_version", name: "python-devel-0:2.4.3-24.el5_3.6.ia64", product: { name: "python-devel-0:2.4.3-24.el5_3.6.ia64", product_id: "python-devel-0:2.4.3-24.el5_3.6.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.4.3-24.el5_3.6?arch=ia64", }, }, }, { category: "product_version", name: "python-tools-0:2.4.3-24.el5_3.6.ia64", product: { name: "python-tools-0:2.4.3-24.el5_3.6.ia64", product_id: "python-tools-0:2.4.3-24.el5_3.6.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.4.3-24.el5_3.6?arch=ia64", }, }, }, ], category: "architecture", name: "ia64", }, { branches: [ { category: "product_version", name: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", product: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", product_id: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.4.3-24.el5_3.6?arch=ppc64", }, }, }, { category: "product_version", name: "python-devel-0:2.4.3-24.el5_3.6.ppc64", product: { name: "python-devel-0:2.4.3-24.el5_3.6.ppc64", product_id: "python-devel-0:2.4.3-24.el5_3.6.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.4.3-24.el5_3.6?arch=ppc64", }, }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc", product: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc", product_id: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.4.3-24.el5_3.6?arch=ppc", }, }, }, { category: "product_version", name: "tkinter-0:2.4.3-24.el5_3.6.ppc", product: { name: "tkinter-0:2.4.3-24.el5_3.6.ppc", product_id: "tkinter-0:2.4.3-24.el5_3.6.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.4.3-24.el5_3.6?arch=ppc", }, }, }, { category: "product_version", name: "python-0:2.4.3-24.el5_3.6.ppc", product: { name: "python-0:2.4.3-24.el5_3.6.ppc", product_id: "python-0:2.4.3-24.el5_3.6.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.4.3-24.el5_3.6?arch=ppc", }, }, }, { category: "product_version", name: "python-devel-0:2.4.3-24.el5_3.6.ppc", product: { name: "python-devel-0:2.4.3-24.el5_3.6.ppc", product_id: "python-devel-0:2.4.3-24.el5_3.6.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.4.3-24.el5_3.6?arch=ppc", }, }, }, { category: "product_version", name: "python-tools-0:2.4.3-24.el5_3.6.ppc", product: { name: "python-tools-0:2.4.3-24.el5_3.6.ppc", product_id: "python-tools-0:2.4.3-24.el5_3.6.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.4.3-24.el5_3.6?arch=ppc", }, }, }, ], category: "architecture", name: "ppc", }, { branches: [ { category: "product_version", name: "python-debuginfo-0:2.4.3-24.el5_3.6.s390x", product: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.s390x", product_id: "python-debuginfo-0:2.4.3-24.el5_3.6.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.4.3-24.el5_3.6?arch=s390x", }, }, }, { category: "product_version", name: "tkinter-0:2.4.3-24.el5_3.6.s390x", product: { name: "tkinter-0:2.4.3-24.el5_3.6.s390x", product_id: "tkinter-0:2.4.3-24.el5_3.6.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@2.4.3-24.el5_3.6?arch=s390x", }, }, }, { category: "product_version", name: "python-0:2.4.3-24.el5_3.6.s390x", product: { name: "python-0:2.4.3-24.el5_3.6.s390x", product_id: "python-0:2.4.3-24.el5_3.6.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/python@2.4.3-24.el5_3.6?arch=s390x", }, }, }, { category: "product_version", name: "python-devel-0:2.4.3-24.el5_3.6.s390x", product: { name: "python-devel-0:2.4.3-24.el5_3.6.s390x", product_id: "python-devel-0:2.4.3-24.el5_3.6.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.4.3-24.el5_3.6?arch=s390x", }, }, }, { category: "product_version", name: "python-tools-0:2.4.3-24.el5_3.6.s390x", product: { name: "python-tools-0:2.4.3-24.el5_3.6.s390x", product_id: "python-tools-0:2.4.3-24.el5_3.6.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@2.4.3-24.el5_3.6?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "python-debuginfo-0:2.4.3-24.el5_3.6.s390", product: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.s390", product_id: "python-debuginfo-0:2.4.3-24.el5_3.6.s390", product_identification_helper: { purl: "pkg:rpm/redhat/python-debuginfo@2.4.3-24.el5_3.6?arch=s390", }, }, }, { category: "product_version", name: "python-devel-0:2.4.3-24.el5_3.6.s390", product: { name: "python-devel-0:2.4.3-24.el5_3.6.s390", product_id: "python-devel-0:2.4.3-24.el5_3.6.s390", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@2.4.3-24.el5_3.6?arch=s390", }, }, }, ], category: "architecture", name: "s390", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", }, product_reference: "python-0:2.4.3-24.el5_3.6.i386", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", }, product_reference: "python-0:2.4.3-24.el5_3.6.ia64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", }, product_reference: "python-0:2.4.3-24.el5_3.6.ppc", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", }, product_reference: "python-0:2.4.3-24.el5_3.6.s390x", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", }, product_reference: "python-0:2.4.3-24.el5_3.6.src", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", }, product_reference: "python-0:2.4.3-24.el5_3.6.x86_64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.i386", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.ia64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.s390", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.s390x", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.i386", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.ia64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.ppc", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.ppc64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.s390", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.s390x", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.x86_64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", }, product_reference: "python-tools-0:2.4.3-24.el5_3.6.i386", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", }, product_reference: "python-tools-0:2.4.3-24.el5_3.6.ia64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", }, product_reference: "python-tools-0:2.4.3-24.el5_3.6.ppc", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", }, product_reference: "python-tools-0:2.4.3-24.el5_3.6.s390x", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", }, product_reference: "python-tools-0:2.4.3-24.el5_3.6.x86_64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", }, product_reference: "tkinter-0:2.4.3-24.el5_3.6.i386", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", }, product_reference: "tkinter-0:2.4.3-24.el5_3.6.ia64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", }, product_reference: "tkinter-0:2.4.3-24.el5_3.6.ppc", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", }, product_reference: "tkinter-0:2.4.3-24.el5_3.6.s390x", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", }, product_reference: "tkinter-0:2.4.3-24.el5_3.6.x86_64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-0:2.4.3-24.el5_3.6.i386", }, product_reference: "python-0:2.4.3-24.el5_3.6.i386", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-0:2.4.3-24.el5_3.6.ia64", }, product_reference: "python-0:2.4.3-24.el5_3.6.ia64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-0:2.4.3-24.el5_3.6.ppc", }, product_reference: "python-0:2.4.3-24.el5_3.6.ppc", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-0:2.4.3-24.el5_3.6.s390x", }, product_reference: "python-0:2.4.3-24.el5_3.6.s390x", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-0:2.4.3-24.el5_3.6.src", }, product_reference: "python-0:2.4.3-24.el5_3.6.src", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-0:2.4.3-24.el5_3.6.x86_64", }, product_reference: "python-0:2.4.3-24.el5_3.6.x86_64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.i386", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.ia64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.s390", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.s390x", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.i386", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.ia64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.ppc", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.ppc64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.s390", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.s390x", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.x86_64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", }, product_reference: "python-tools-0:2.4.3-24.el5_3.6.i386", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", }, product_reference: "python-tools-0:2.4.3-24.el5_3.6.ia64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", }, product_reference: "python-tools-0:2.4.3-24.el5_3.6.ppc", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", }, product_reference: "python-tools-0:2.4.3-24.el5_3.6.s390x", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", }, product_reference: "python-tools-0:2.4.3-24.el5_3.6.x86_64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", }, product_reference: "tkinter-0:2.4.3-24.el5_3.6.i386", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", }, product_reference: "tkinter-0:2.4.3-24.el5_3.6.ia64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", }, product_reference: "tkinter-0:2.4.3-24.el5_3.6.ppc", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", }, product_reference: "tkinter-0:2.4.3-24.el5_3.6.s390x", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", }, product_reference: "tkinter-0:2.4.3-24.el5_3.6.x86_64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-0:2.4.3-24.el5_3.6.i386", }, product_reference: "python-0:2.4.3-24.el5_3.6.i386", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-0:2.4.3-24.el5_3.6.ia64", }, product_reference: "python-0:2.4.3-24.el5_3.6.ia64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-0:2.4.3-24.el5_3.6.ppc", }, product_reference: "python-0:2.4.3-24.el5_3.6.ppc", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-0:2.4.3-24.el5_3.6.s390x", }, product_reference: "python-0:2.4.3-24.el5_3.6.s390x", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.src as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-0:2.4.3-24.el5_3.6.src", }, product_reference: "python-0:2.4.3-24.el5_3.6.src", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-0:2.4.3-24.el5_3.6.x86_64", }, product_reference: "python-0:2.4.3-24.el5_3.6.x86_64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.i386", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.ia64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.s390", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.s390x", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", }, product_reference: "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.i386", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.ia64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.ppc", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.ppc64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.s390", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.s390x", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", }, product_reference: "python-devel-0:2.4.3-24.el5_3.6.x86_64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", }, product_reference: "python-tools-0:2.4.3-24.el5_3.6.i386", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", }, product_reference: "python-tools-0:2.4.3-24.el5_3.6.ia64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", }, product_reference: "python-tools-0:2.4.3-24.el5_3.6.ppc", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", }, product_reference: "python-tools-0:2.4.3-24.el5_3.6.s390x", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", }, product_reference: "python-tools-0:2.4.3-24.el5_3.6.x86_64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", }, product_reference: "tkinter-0:2.4.3-24.el5_3.6.i386", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", }, product_reference: "tkinter-0:2.4.3-24.el5_3.6.ia64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", }, product_reference: "tkinter-0:2.4.3-24.el5_3.6.ppc", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", }, product_reference: "tkinter-0:2.4.3-24.el5_3.6.s390x", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", }, product_reference: "tkinter-0:2.4.3-24.el5_3.6.x86_64", relates_to_product_reference: "5Server", }, ], }, vulnerabilities: [ { cve: "CVE-2007-2052", cwe: { id: "CWE-193", name: "Off-by-one Error", }, discovery_date: "2007-04-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "235093", }, ], notes: [ { category: "description", text: "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", title: "Vulnerability description", }, { category: "summary", text: "python off-by-one locale.strxfrm() (possible memory disclosure)", title: "Vulnerability summary", }, { category: "other", text: "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/", title: "Statement", }, ], product_status: { fixed: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2007-2052", }, { category: "external", summary: "RHBZ#235093", url: "https://bugzilla.redhat.com/show_bug.cgi?id=235093", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2007-2052", url: "https://www.cve.org/CVERecord?id=CVE-2007-2052", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", url: "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", }, ], release_date: "2007-04-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2009-07-27T09:22:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", product_ids: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2009:1176", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python off-by-one locale.strxfrm() (possible memory disclosure)", }, { cve: "CVE-2007-4965", discovery_date: "2007-09-18T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "295971", }, ], notes: [ { category: "description", text: "Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.", title: "Vulnerability description", }, { category: "summary", text: "python imageop module heap corruption", title: "Vulnerability summary", }, { category: "other", text: "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=295971\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/", title: "Statement", }, ], product_status: { fixed: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2007-4965", }, { category: "external", summary: "RHBZ#295971", url: "https://bugzilla.redhat.com/show_bug.cgi?id=295971", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2007-4965", url: "https://www.cve.org/CVERecord?id=CVE-2007-4965", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", url: "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", }, ], release_date: "2007-09-16T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2009-07-27T09:22:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", product_ids: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2009:1176", }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "python imageop module heap corruption", }, { cve: "CVE-2008-1721", discovery_date: "2008-04-09T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "442005", }, ], notes: [ { category: "description", text: "Integer signedness error in the zlib extension module in Python 2.5.2 and earlier allows remote attackers to execute arbitrary code via a negative signed integer, which triggers insufficient memory allocation and a buffer overflow.", title: "Vulnerability description", }, { category: "summary", text: "python: integer signedness error in the zlib extension module", title: "Vulnerability summary", }, { category: "other", text: "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=442005\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/", title: "Statement", }, ], product_status: { fixed: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2008-1721", }, { category: "external", summary: "RHBZ#442005", url: "https://bugzilla.redhat.com/show_bug.cgi?id=442005", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2008-1721", url: "https://www.cve.org/CVERecord?id=CVE-2008-1721", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2008-1721", url: "https://nvd.nist.gov/vuln/detail/CVE-2008-1721", }, ], release_date: "2008-04-09T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2009-07-27T09:22:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", product_ids: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2009:1176", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python: integer signedness error in the zlib extension module", }, { cve: "CVE-2008-1887", discovery_date: "2008-04-18T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "443810", }, ], notes: [ { category: "description", text: "Python 2.5.2 and earlier allows context-dependent attackers to execute arbitrary code via multiple vectors that cause a negative size value to be provided to the PyString_FromStringAndSize function, which allocates less memory than expected when assert() is disabled and triggers a buffer overflow.", title: "Vulnerability description", }, { category: "summary", text: "python: PyString_FromStringAndSize does not check for negative size values", title: "Vulnerability summary", }, ], product_status: { fixed: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2008-1887", }, { category: "external", summary: "RHBZ#443810", url: "https://bugzilla.redhat.com/show_bug.cgi?id=443810", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2008-1887", url: "https://www.cve.org/CVERecord?id=CVE-2008-1887", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2008-1887", url: "https://nvd.nist.gov/vuln/detail/CVE-2008-1887", }, ], release_date: "2008-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2009-07-27T09:22:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", product_ids: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2009:1176", }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "python: PyString_FromStringAndSize does not check for negative size values", }, { acknowledgments: [ { names: [ "David Remahl", ], organization: "Apple Product Security team", }, ], cve: "CVE-2008-2315", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2008-07-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "455008", }, ], notes: [ { category: "description", text: "Multiple integer overflows in Python 2.5.2 and earlier allow context-dependent attackers to have an unknown impact via vectors related to the (1) stringobject, (2) unicodeobject, (3) bufferobject, (4) longobject, (5) tupleobject, (6) stropmodule, (7) gcmodule, and (8) mmapmodule modules. NOTE: The expandtabs integer overflows in stringobject and unicodeobject in 2.5.2 are covered by CVE-2008-5031.", title: "Vulnerability description", }, { category: "summary", text: "python: Multiple integer overflows in python core", title: "Vulnerability summary", }, ], product_status: { fixed: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2008-2315", }, { category: "external", summary: "RHBZ#455008", url: "https://bugzilla.redhat.com/show_bug.cgi?id=455008", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2008-2315", url: "https://www.cve.org/CVERecord?id=CVE-2008-2315", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2008-2315", url: "https://nvd.nist.gov/vuln/detail/CVE-2008-2315", }, ], release_date: "2008-07-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2009-07-27T09:22:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", product_ids: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2009:1176", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python: Multiple integer overflows in python core", }, { cve: "CVE-2008-3142", discovery_date: "2008-07-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "454990", }, ], notes: [ { category: "description", text: "Multiple buffer overflows in Python 2.5.2 and earlier on 32bit platforms allow context-dependent attackers to cause a denial of service (crash) or have unspecified other impact via a long string that leads to incorrect memory allocation during Unicode string processing, related to the unicode_resize function and the PyMem_RESIZE macro.", title: "Vulnerability description", }, { category: "summary", text: "python: Multiple buffer overflows in unicode processing", title: "Vulnerability summary", }, ], product_status: { fixed: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2008-3142", }, { category: "external", summary: "RHBZ#454990", url: "https://bugzilla.redhat.com/show_bug.cgi?id=454990", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2008-3142", url: "https://www.cve.org/CVERecord?id=CVE-2008-3142", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2008-3142", url: "https://nvd.nist.gov/vuln/detail/CVE-2008-3142", }, ], release_date: "2008-04-11T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2009-07-27T09:22:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", product_ids: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2009:1176", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python: Multiple buffer overflows in unicode processing", }, { cve: "CVE-2008-3143", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2008-07-03T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "455013", }, ], notes: [ { category: "description", text: "Multiple integer overflows in Python before 2.5.2 might allow context-dependent attackers to have an unknown impact via vectors related to (1) Include/pymem.h; (2) _csv.c, (3) _struct.c, (4) arraymodule.c, (5) audioop.c, (6) binascii.c, (7) cPickle.c, (8) cStringIO.c, (9) cjkcodecs/multibytecodec.c, (10) datetimemodule.c, (11) md5.c, (12) rgbimgmodule.c, and (13) stropmodule.c in Modules/; (14) bufferobject.c, (15) listobject.c, and (16) obmalloc.c in Objects/; (17) Parser/node.c; and (18) asdl.c, (19) ast.c, (20) bltinmodule.c, and (21) compile.c in Python/, as addressed by \"checks for integer overflows, contributed by Google.\"", title: "Vulnerability description", }, { category: "summary", text: "python: Multiple integer overflows discovered by Google", title: "Vulnerability summary", }, ], product_status: { fixed: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2008-3143", }, { category: "external", summary: "RHBZ#455013", url: "https://bugzilla.redhat.com/show_bug.cgi?id=455013", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2008-3143", url: "https://www.cve.org/CVERecord?id=CVE-2008-3143", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2008-3143", url: "https://nvd.nist.gov/vuln/detail/CVE-2008-3143", }, ], release_date: "2008-02-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2009-07-27T09:22:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", product_ids: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2009:1176", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python: Multiple integer overflows discovered by Google", }, { cve: "CVE-2008-3144", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2008-07-03T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "455018", }, ], notes: [ { category: "description", text: "Multiple integer overflows in the PyOS_vsnprintf function in Python/mysnprintf.c in Python 2.5.2 and earlier allow context-dependent attackers to cause a denial of service (memory corruption) or have unspecified other impact via crafted input to string formatting operations. NOTE: the handling of certain integer values is also affected by related integer underflows and an off-by-one error.", title: "Vulnerability description", }, { category: "summary", text: "python: Potential integer underflow and overflow in the PyOS_vsnprintf C API function", title: "Vulnerability summary", }, ], product_status: { fixed: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2008-3144", }, { category: "external", summary: "RHBZ#455018", url: "https://bugzilla.redhat.com/show_bug.cgi?id=455018", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2008-3144", url: "https://www.cve.org/CVERecord?id=CVE-2008-3144", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2008-3144", url: "https://nvd.nist.gov/vuln/detail/CVE-2008-3144", }, ], release_date: "2008-06-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2009-07-27T09:22:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", product_ids: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2009:1176", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python: Potential integer underflow and overflow in the PyOS_vsnprintf C API function", }, { cve: "CVE-2008-4864", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2008-10-19T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "469656", }, ], notes: [ { category: "description", text: "Multiple integer overflows in imageop.c in the imageop module in Python 1.5.2 through 2.5.1 allow context-dependent attackers to break out of the Python VM and execute arbitrary code via large integer values in certain arguments to the crop function, leading to a buffer overflow, a different vulnerability than CVE-2007-4965 and CVE-2008-1679.", title: "Vulnerability description", }, { category: "summary", text: "python: imageop module multiple integer overflows", title: "Vulnerability summary", }, ], product_status: { fixed: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2008-4864", }, { category: "external", summary: "RHBZ#469656", url: "https://bugzilla.redhat.com/show_bug.cgi?id=469656", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2008-4864", url: "https://www.cve.org/CVERecord?id=CVE-2008-4864", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2008-4864", url: "https://nvd.nist.gov/vuln/detail/CVE-2008-4864", }, ], release_date: "2008-10-19T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2009-07-27T09:22:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", product_ids: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2009:1176", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python: imageop module multiple integer overflows", }, { cve: "CVE-2008-5031", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2008-10-19T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "470915", }, ], notes: [ { category: "description", text: "Multiple integer overflows in Python 2.2.3 through 2.5.1, and 2.6, allow context-dependent attackers to have an unknown impact via a large integer value in the tabsize argument to the expandtabs method, as implemented by (1) the string_expandtabs function in Objects/stringobject.c and (2) the unicode_expandtabs function in Objects/unicodeobject.c. NOTE: this vulnerability reportedly exists because of an incomplete fix for CVE-2008-2315.", title: "Vulnerability description", }, { category: "summary", text: "python: stringobject, unicodeobject integer overflows", title: "Vulnerability summary", }, ], product_status: { fixed: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2008-5031", }, { category: "external", summary: "RHBZ#470915", url: "https://bugzilla.redhat.com/show_bug.cgi?id=470915", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2008-5031", url: "https://www.cve.org/CVERecord?id=CVE-2008-5031", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2008-5031", url: "https://nvd.nist.gov/vuln/detail/CVE-2008-5031", }, ], release_date: "2008-10-19T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2009-07-27T09:22:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", product_ids: [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2009:1176", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python: stringobject, unicodeobject integer overflows", }, ], }
RHSA-2008:0264
Vulnerability from csaf_redhat
Published
2008-05-20 14:15
Modified
2024-11-22 01:57
Summary
Red Hat Security Advisory: Red Hat Network Satellite Server Solaris client security update
Notes
Topic
Red Hat Network Satellite Server version 5.0.2 is now available. This
update includes fixes for a number of security issues in Red Hat Network
Satellite Server Solaris client components.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
This release corrects several security vulnerabilities in various
components shipped as part of the Red Hat Network Satellite Server Solaris
client. In a typical operating environment, these components are not used
by the Satellite Server in a vulnerable manner. These security updates will
reduce risk should these components be used by other applications.
Two denial-of-service flaws were fixed in ZLib. (CVE-2005-2096,
CVE-2005-1849)
Multiple flaws were fixed in OpenSSL. (CVE-2006-4343, CVE-2006-4339,
CVE-2006-3738, CVE-2006-2940, CVE-2006-2937, CVE-2005-2969)
Multiple flaws were fixed in Python. (CVE-2007-4965, CVE-2007-2052,
CVE-2006-4980, CVE-2006-1542)
Users of Red Hat Network Satellite Server 5.0.1 are advised to upgrade to
5.0.2, which resolves these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Red Hat Network Satellite Server version 5.0.2 is now available. This\nupdate includes fixes for a number of security issues in Red Hat Network\nSatellite Server Solaris client components.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", title: "Topic", }, { category: "general", text: "This release corrects several security vulnerabilities in various\ncomponents shipped as part of the Red Hat Network Satellite Server Solaris\nclient. In a typical operating environment, these components are not used\nby the Satellite Server in a vulnerable manner. These security updates will\nreduce risk should these components be used by other applications.\n\nTwo denial-of-service flaws were fixed in ZLib. (CVE-2005-2096,\nCVE-2005-1849)\n\nMultiple flaws were fixed in OpenSSL. (CVE-2006-4343, CVE-2006-4339,\nCVE-2006-3738, CVE-2006-2940, CVE-2006-2937, CVE-2005-2969)\n\nMultiple flaws were fixed in Python. (CVE-2007-4965, CVE-2007-2052,\nCVE-2006-4980, CVE-2006-1542)\n\nUsers of Red Hat Network Satellite Server 5.0.1 are advised to upgrade to\n5.0.2, which resolves these issues.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2008:0264", url: "https://access.redhat.com/errata/RHSA-2008:0264", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "235093", url: "https://bugzilla.redhat.com/show_bug.cgi?id=235093", }, { category: "external", summary: "295971", url: "https://bugzilla.redhat.com/show_bug.cgi?id=295971", }, { category: "external", summary: "430640", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430640", }, { category: "external", summary: "430641", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430641", }, { category: "external", summary: "430649", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430649", }, { category: "external", summary: "430651", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430651", }, { category: "external", summary: "430652", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430652", }, { category: "external", summary: "430654", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430654", }, { category: "external", summary: "430655", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430655", }, { category: "external", summary: "430659", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430659", }, { category: "external", summary: "430660", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430660", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0264.json", }, ], title: "Red Hat Security Advisory: Red Hat Network Satellite Server Solaris client security update", tracking: { current_release_date: "2024-11-22T01:57:54+00:00", generator: { date: "2024-11-22T01:57:54+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2008:0264", initial_release_date: "2008-05-20T14:15:00+00:00", revision_history: [ { date: "2008-05-20T14:15:00+00:00", number: "1", summary: "Initial version", }, { date: "2008-05-20T10:16:00+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T01:57:54+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Satellite 5.0 (RHEL v.4 AS)", product: { name: "Red Hat Satellite 5.0 (RHEL v.4 AS)", product_id: "4AS-RHNSAT5", product_identification_helper: { cpe: "cpe:/a:redhat:network_satellite:5.0:el4", }, }, }, ], category: "product_family", name: "Red Hat Satellite", }, { branches: [ { category: "product_version", name: "rhn-solaris-bootstrap-0:5.0.2-3.noarch", product: { name: "rhn-solaris-bootstrap-0:5.0.2-3.noarch", product_id: "rhn-solaris-bootstrap-0:5.0.2-3.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/rhn-solaris-bootstrap@5.0.2-3?arch=noarch", }, }, }, { category: "product_version", name: "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", product: { name: "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", product_id: "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/rhn_solaris_bootstrap_5_0_2_3@1-0?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "rhn-solaris-bootstrap-0:5.0.2-3.noarch as a component of Red Hat Satellite 5.0 (RHEL v.4 AS)", product_id: "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", }, product_reference: "rhn-solaris-bootstrap-0:5.0.2-3.noarch", relates_to_product_reference: "4AS-RHNSAT5", }, { category: "default_component_of", full_product_name: { name: "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch as a component of Red Hat Satellite 5.0 (RHEL v.4 AS)", product_id: "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", }, product_reference: "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", relates_to_product_reference: "4AS-RHNSAT5", }, ], }, vulnerabilities: [ { cve: "CVE-2005-1849", discovery_date: "2006-07-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430649", }, ], notes: [ { category: "description", text: "inftrees.h in zlib 1.2.2 allows remote attackers to cause a denial of service (application crash) via an invalid file that causes a large dynamic tree to be produced.", title: "Vulnerability description", }, { category: "summary", text: "zlib DoS", title: "Vulnerability summary", }, ], product_status: { fixed: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2005-1849", }, { category: "external", summary: "RHBZ#430649", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430649", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2005-1849", url: "https://www.cve.org/CVERecord?id=CVE-2005-1849", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2005-1849", url: "https://nvd.nist.gov/vuln/detail/CVE-2005-1849", }, ], release_date: "2005-08-20T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-05-20T14:15:00+00:00", details: "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", product_ids: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0264", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "zlib DoS", }, { cve: "CVE-2005-2096", discovery_date: "2006-06-30T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430650", }, ], notes: [ { category: "description", text: "zlib 1.2 and later versions allows remote attackers to cause a denial of service (crash) via a crafted compressed stream with an incomplete code description of a length greater than 1, which leads to a buffer overflow, as demonstrated using a crafted PNG file.", title: "Vulnerability description", }, { category: "summary", text: "zlib DoS", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2005-2096", }, { category: "external", summary: "RHBZ#430650", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430650", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2005-2096", url: "https://www.cve.org/CVERecord?id=CVE-2005-2096", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2005-2096", url: "https://nvd.nist.gov/vuln/detail/CVE-2005-2096", }, ], release_date: "2005-07-06T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-05-20T14:15:00+00:00", details: "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", product_ids: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0264", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "zlib DoS", }, { cve: "CVE-2005-2969", discovery_date: "2005-10-04T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430660", }, ], notes: [ { category: "description", text: "The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.", title: "Vulnerability description", }, { category: "summary", text: "openssl mitm downgrade attack", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2005-2969", }, { category: "external", summary: "RHBZ#430660", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430660", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2005-2969", url: "https://www.cve.org/CVERecord?id=CVE-2005-2969", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2005-2969", url: "https://nvd.nist.gov/vuln/detail/CVE-2005-2969", }, ], release_date: "2005-10-11T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-05-20T14:15:00+00:00", details: "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", product_ids: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0264", }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "openssl mitm downgrade attack", }, { cve: "CVE-2006-1542", discovery_date: "2006-03-30T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430640", }, ], notes: [ { category: "description", text: "Stack-based buffer overflow in Python 2.4.2 and earlier, running on Linux 2.6.12.5 under gcc 4.0.3 with libc 2.3.5, allows local users to cause a \"stack overflow,\" and possibly gain privileges, by running a script from a current working directory that has a long name, related to the realpath function. NOTE: this might not be a vulnerability. However, the fact that it appears in a programming language interpreter could mean that some applications are affected, although attack scenarios might be limited because the attacker might already need to cross privilege boundaries to cause an exploitable program to be placed in a directory with a long name; or, depending on the method that Python uses to determine the current working directory, setuid applications might be affected.", title: "Vulnerability description", }, { category: "summary", text: "python buffer overflow", title: "Vulnerability summary", }, { category: "other", text: "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/\n\nRed Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-1542", }, { category: "external", summary: "RHBZ#430640", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430640", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-1542", url: "https://www.cve.org/CVERecord?id=CVE-2006-1542", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-1542", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-1542", }, ], release_date: "2005-09-22T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-05-20T14:15:00+00:00", details: "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", product_ids: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0264", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python buffer overflow", }, { cve: "CVE-2006-2937", discovery_date: "2006-07-03T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430655", }, ], notes: [ { category: "description", text: "OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition.", title: "Vulnerability description", }, { category: "summary", text: "openssl ASN.1 DoS", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-2937", }, { category: "external", summary: "RHBZ#430655", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430655", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-2937", url: "https://www.cve.org/CVERecord?id=CVE-2006-2937", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-2937", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-2937", }, ], release_date: "2006-09-28T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-05-20T14:15:00+00:00", details: "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", product_ids: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0264", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "openssl ASN.1 DoS", }, { cve: "CVE-2006-2940", discovery_date: "2006-07-03T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430654", }, ], notes: [ { category: "description", text: "OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) \"public exponent\" or (2) \"public modulus\" values in X.509 certificates that require extra time to process when using RSA signature verification.", title: "Vulnerability description", }, { category: "summary", text: "openssl public key DoS", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-2940", }, { category: "external", summary: "RHBZ#430654", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430654", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-2940", url: "https://www.cve.org/CVERecord?id=CVE-2006-2940", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-2940", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-2940", }, ], release_date: "2006-09-28T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-05-20T14:15:00+00:00", details: "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", product_ids: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0264", }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "openssl public key DoS", }, { cve: "CVE-2006-3738", discovery_date: "2006-08-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430652", }, ], notes: [ { category: "description", text: "Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.", title: "Vulnerability description", }, { category: "summary", text: "openssl get_shared_ciphers overflow", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-3738", }, { category: "external", summary: "RHBZ#430652", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430652", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-3738", url: "https://www.cve.org/CVERecord?id=CVE-2006-3738", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-3738", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-3738", }, ], release_date: "2006-09-28T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-05-20T14:15:00+00:00", details: "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", product_ids: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0264", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "openssl get_shared_ciphers overflow", }, { cve: "CVE-2006-4339", discovery_date: "2006-09-05T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430659", }, ], notes: [ { category: "description", text: "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.", title: "Vulnerability description", }, { category: "summary", text: "openssl signature forgery", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-4339", }, { category: "external", summary: "RHBZ#430659", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430659", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-4339", url: "https://www.cve.org/CVERecord?id=CVE-2006-4339", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-4339", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-4339", }, ], release_date: "2006-09-05T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-05-20T14:15:00+00:00", details: "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", product_ids: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0264", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "openssl signature forgery", }, { cve: "CVE-2006-4343", discovery_date: "2006-08-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430651", }, ], notes: [ { category: "description", text: "The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.", title: "Vulnerability description", }, { category: "summary", text: "openssl sslv2 client code", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-4343", }, { category: "external", summary: "RHBZ#430651", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430651", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-4343", url: "https://www.cve.org/CVERecord?id=CVE-2006-4343", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-4343", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-4343", }, ], release_date: "2006-09-28T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-05-20T14:15:00+00:00", details: "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", product_ids: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0264", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "openssl sslv2 client code", }, { cve: "CVE-2006-4980", discovery_date: "2006-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430641", }, ], notes: [ { category: "description", text: "Buffer overflow in the repr function in Python 2.3 through 2.6 before 20060822 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via crafted wide character UTF-32/UCS-4 strings to certain scripts.", title: "Vulnerability description", }, { category: "summary", text: "python repr unicode buffer overflow", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-4980", }, { category: "external", summary: "RHBZ#430641", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430641", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-4980", url: "https://www.cve.org/CVERecord?id=CVE-2006-4980", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-4980", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-4980", }, ], release_date: "2006-08-16T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-05-20T14:15:00+00:00", details: "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", product_ids: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0264", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "python repr unicode buffer overflow", }, { cve: "CVE-2007-2052", cwe: { id: "CWE-193", name: "Off-by-one Error", }, discovery_date: "2007-04-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "235093", }, ], notes: [ { category: "description", text: "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", title: "Vulnerability description", }, { category: "summary", text: "python off-by-one locale.strxfrm() (possible memory disclosure)", title: "Vulnerability summary", }, { category: "other", text: "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2007-2052", }, { category: "external", summary: "RHBZ#235093", url: "https://bugzilla.redhat.com/show_bug.cgi?id=235093", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2007-2052", url: "https://www.cve.org/CVERecord?id=CVE-2007-2052", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", url: "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", }, ], release_date: "2007-04-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-05-20T14:15:00+00:00", details: "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", product_ids: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0264", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python off-by-one locale.strxfrm() (possible memory disclosure)", }, { cve: "CVE-2007-4965", discovery_date: "2007-09-18T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "295971", }, ], notes: [ { category: "description", text: "Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.", title: "Vulnerability description", }, { category: "summary", text: "python imageop module heap corruption", title: "Vulnerability summary", }, { category: "other", text: "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=295971\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2007-4965", }, { category: "external", summary: "RHBZ#295971", url: "https://bugzilla.redhat.com/show_bug.cgi?id=295971", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2007-4965", url: "https://www.cve.org/CVERecord?id=CVE-2007-4965", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", url: "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", }, ], release_date: "2007-09-16T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-05-20T14:15:00+00:00", details: "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", product_ids: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0264", }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "python imageop module heap corruption", }, ], }
RHSA-2007:1077
Vulnerability from csaf_redhat
Published
2007-12-10 17:57
Modified
2024-11-22 02:05
Summary
Red Hat Security Advisory: python security update
Notes
Topic
Updated python packages that fix several security issues are now available
for Red Hat Enterprise Linux 2.1.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
Python is an interpreted, interactive, object-oriented programming
language.
An integer overflow flaw was discovered in the way Python's pcre module
handled certain regular expressions. If a Python application used the pcre
module to compile and execute untrusted regular expressions, it may be
possible to cause the application to crash, or allow arbitrary code
execution with the privileges of the Python interpreter. (CVE-2006-7228)
A flaw was discovered in the strxfrm() function of Python's locale module.
Strings generated by this function were not properly NULL-terminated, which
could possibly cause disclosure of data stored in the memory of a Python
application using this function. (CVE-2007-2052)
Users of Python are advised to upgrade to these updated packages, which
contain backported patches to resolve these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Updated python packages that fix several security issues are now available\nfor Red Hat Enterprise Linux 2.1.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", title: "Topic", }, { category: "general", text: "Python is an interpreted, interactive, object-oriented programming\nlanguage.\n\nAn integer overflow flaw was discovered in the way Python's pcre module\nhandled certain regular expressions. If a Python application used the pcre\nmodule to compile and execute untrusted regular expressions, it may be\npossible to cause the application to crash, or allow arbitrary code\nexecution with the privileges of the Python interpreter. (CVE-2006-7228)\n\nA flaw was discovered in the strxfrm() function of Python's locale module.\nStrings generated by this function were not properly NULL-terminated, which\ncould possibly cause disclosure of data stored in the memory of a Python\napplication using this function. (CVE-2007-2052)\n\nUsers of Python are advised to upgrade to these updated packages, which\ncontain backported patches to resolve these issues.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2007:1077", url: "https://access.redhat.com/errata/RHSA-2007:1077", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "235093", url: "https://bugzilla.redhat.com/show_bug.cgi?id=235093", }, { category: "external", summary: "383371", url: "https://bugzilla.redhat.com/show_bug.cgi?id=383371", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_1077.json", }, ], title: "Red Hat Security Advisory: python security update", tracking: { current_release_date: "2024-11-22T02:05:21+00:00", generator: { date: "2024-11-22T02:05:21+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2007:1077", initial_release_date: "2007-12-10T17:57:00+00:00", revision_history: [ { date: "2007-12-10T17:57:00+00:00", number: "1", summary: "Initial version", }, { date: "2007-12-10T12:57:16+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T02:05:21+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product: { name: "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product_id: "2.1AS", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:2.1::as", }, }, }, { category: "product_name", name: "Red Hat Linux Advanced Workstation 2.1", product: { name: "Red Hat Linux Advanced Workstation 2.1", product_id: "2.1AW", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:2.1::aw", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ES version 2.1", product: { name: "Red Hat Enterprise Linux ES version 2.1", product_id: "2.1ES", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:2.1::es", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux WS version 2.1", product: { name: "Red Hat Enterprise Linux WS version 2.1", product_id: "2.1WS", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:2.1::ws", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "tkinter-0:1.5.2-43.72.2.ia64", product: { name: "tkinter-0:1.5.2-43.72.2.ia64", product_id: "tkinter-0:1.5.2-43.72.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@1.5.2-43.72.2?arch=ia64", }, }, }, { category: "product_version", name: "python-0:1.5.2-43.72.2.ia64", product: { name: "python-0:1.5.2-43.72.2.ia64", product_id: "python-0:1.5.2-43.72.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python@1.5.2-43.72.2?arch=ia64", }, }, }, { category: "product_version", name: "python-tools-0:1.5.2-43.72.2.ia64", product: { name: "python-tools-0:1.5.2-43.72.2.ia64", product_id: "python-tools-0:1.5.2-43.72.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@1.5.2-43.72.2?arch=ia64", }, }, }, { category: "product_version", name: "python-devel-0:1.5.2-43.72.2.ia64", product: { name: "python-devel-0:1.5.2-43.72.2.ia64", product_id: "python-devel-0:1.5.2-43.72.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@1.5.2-43.72.2?arch=ia64", }, }, }, { category: "product_version", name: "python-docs-0:1.5.2-43.72.2.ia64", product: { name: "python-docs-0:1.5.2-43.72.2.ia64", product_id: "python-docs-0:1.5.2-43.72.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/python-docs@1.5.2-43.72.2?arch=ia64", }, }, }, ], category: "architecture", name: "ia64", }, { branches: [ { category: "product_version", name: "python-0:1.5.2-43.72.2.src", product: { name: "python-0:1.5.2-43.72.2.src", product_id: "python-0:1.5.2-43.72.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/python@1.5.2-43.72.2?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "tkinter-0:1.5.2-43.72.2.i386", product: { name: "tkinter-0:1.5.2-43.72.2.i386", product_id: "tkinter-0:1.5.2-43.72.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/tkinter@1.5.2-43.72.2?arch=i386", }, }, }, { category: "product_version", name: "python-0:1.5.2-43.72.2.i386", product: { name: "python-0:1.5.2-43.72.2.i386", product_id: "python-0:1.5.2-43.72.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python@1.5.2-43.72.2?arch=i386", }, }, }, { category: "product_version", name: "python-tools-0:1.5.2-43.72.2.i386", product: { name: "python-tools-0:1.5.2-43.72.2.i386", product_id: "python-tools-0:1.5.2-43.72.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python-tools@1.5.2-43.72.2?arch=i386", }, }, }, { category: "product_version", name: "python-devel-0:1.5.2-43.72.2.i386", product: { name: "python-devel-0:1.5.2-43.72.2.i386", product_id: "python-devel-0:1.5.2-43.72.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python-devel@1.5.2-43.72.2?arch=i386", }, }, }, { category: "product_version", name: "python-docs-0:1.5.2-43.72.2.i386", product: { name: "python-docs-0:1.5.2-43.72.2.i386", product_id: "python-docs-0:1.5.2-43.72.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/python-docs@1.5.2-43.72.2?arch=i386", }, }, }, ], category: "architecture", name: "i386", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "python-0:1.5.2-43.72.2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product_id: "2.1AS:python-0:1.5.2-43.72.2.i386", }, product_reference: "python-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1AS", }, { category: "default_component_of", full_product_name: { name: "python-0:1.5.2-43.72.2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product_id: "2.1AS:python-0:1.5.2-43.72.2.ia64", }, product_reference: "python-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1AS", }, { category: "default_component_of", full_product_name: { name: "python-0:1.5.2-43.72.2.src as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product_id: "2.1AS:python-0:1.5.2-43.72.2.src", }, product_reference: "python-0:1.5.2-43.72.2.src", relates_to_product_reference: "2.1AS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:1.5.2-43.72.2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product_id: "2.1AS:python-devel-0:1.5.2-43.72.2.i386", }, product_reference: "python-devel-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1AS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:1.5.2-43.72.2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product_id: "2.1AS:python-devel-0:1.5.2-43.72.2.ia64", }, product_reference: "python-devel-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1AS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:1.5.2-43.72.2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product_id: "2.1AS:python-docs-0:1.5.2-43.72.2.i386", }, product_reference: "python-docs-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1AS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:1.5.2-43.72.2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product_id: "2.1AS:python-docs-0:1.5.2-43.72.2.ia64", }, product_reference: "python-docs-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1AS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:1.5.2-43.72.2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product_id: "2.1AS:python-tools-0:1.5.2-43.72.2.i386", }, product_reference: "python-tools-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1AS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:1.5.2-43.72.2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product_id: "2.1AS:python-tools-0:1.5.2-43.72.2.ia64", }, product_reference: "python-tools-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1AS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:1.5.2-43.72.2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product_id: "2.1AS:tkinter-0:1.5.2-43.72.2.i386", }, product_reference: "tkinter-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1AS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:1.5.2-43.72.2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product_id: "2.1AS:tkinter-0:1.5.2-43.72.2.ia64", }, product_reference: "tkinter-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1AS", }, { category: "default_component_of", full_product_name: { name: "python-0:1.5.2-43.72.2.i386 as a component of Red Hat Linux Advanced Workstation 2.1", product_id: "2.1AW:python-0:1.5.2-43.72.2.i386", }, product_reference: "python-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1AW", }, { category: "default_component_of", full_product_name: { name: "python-0:1.5.2-43.72.2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", product_id: "2.1AW:python-0:1.5.2-43.72.2.ia64", }, product_reference: "python-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1AW", }, { category: "default_component_of", full_product_name: { name: "python-0:1.5.2-43.72.2.src as a component of Red Hat Linux Advanced Workstation 2.1", product_id: "2.1AW:python-0:1.5.2-43.72.2.src", }, product_reference: "python-0:1.5.2-43.72.2.src", relates_to_product_reference: "2.1AW", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:1.5.2-43.72.2.i386 as a component of Red Hat Linux Advanced Workstation 2.1", product_id: "2.1AW:python-devel-0:1.5.2-43.72.2.i386", }, product_reference: "python-devel-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1AW", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:1.5.2-43.72.2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", product_id: "2.1AW:python-devel-0:1.5.2-43.72.2.ia64", }, product_reference: "python-devel-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1AW", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:1.5.2-43.72.2.i386 as a component of Red Hat Linux Advanced Workstation 2.1", product_id: "2.1AW:python-docs-0:1.5.2-43.72.2.i386", }, product_reference: "python-docs-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1AW", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:1.5.2-43.72.2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", product_id: "2.1AW:python-docs-0:1.5.2-43.72.2.ia64", }, product_reference: "python-docs-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1AW", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:1.5.2-43.72.2.i386 as a component of Red Hat Linux Advanced Workstation 2.1", product_id: "2.1AW:python-tools-0:1.5.2-43.72.2.i386", }, product_reference: "python-tools-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1AW", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:1.5.2-43.72.2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", product_id: "2.1AW:python-tools-0:1.5.2-43.72.2.ia64", }, product_reference: "python-tools-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1AW", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:1.5.2-43.72.2.i386 as a component of Red Hat Linux Advanced Workstation 2.1", product_id: "2.1AW:tkinter-0:1.5.2-43.72.2.i386", }, product_reference: "tkinter-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1AW", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:1.5.2-43.72.2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", product_id: "2.1AW:tkinter-0:1.5.2-43.72.2.ia64", }, product_reference: "tkinter-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1AW", }, { category: "default_component_of", full_product_name: { name: "python-0:1.5.2-43.72.2.i386 as a component of Red Hat Enterprise Linux ES version 2.1", product_id: "2.1ES:python-0:1.5.2-43.72.2.i386", }, product_reference: "python-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1ES", }, { category: "default_component_of", full_product_name: { name: "python-0:1.5.2-43.72.2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", product_id: "2.1ES:python-0:1.5.2-43.72.2.ia64", }, product_reference: "python-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1ES", }, { category: "default_component_of", full_product_name: { name: "python-0:1.5.2-43.72.2.src as a component of Red Hat Enterprise Linux ES version 2.1", product_id: "2.1ES:python-0:1.5.2-43.72.2.src", }, product_reference: "python-0:1.5.2-43.72.2.src", relates_to_product_reference: "2.1ES", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:1.5.2-43.72.2.i386 as a component of Red Hat Enterprise Linux ES version 2.1", product_id: "2.1ES:python-devel-0:1.5.2-43.72.2.i386", }, product_reference: "python-devel-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1ES", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:1.5.2-43.72.2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", product_id: "2.1ES:python-devel-0:1.5.2-43.72.2.ia64", }, product_reference: "python-devel-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1ES", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:1.5.2-43.72.2.i386 as a component of Red Hat Enterprise Linux ES version 2.1", product_id: "2.1ES:python-docs-0:1.5.2-43.72.2.i386", }, product_reference: "python-docs-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1ES", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:1.5.2-43.72.2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", product_id: "2.1ES:python-docs-0:1.5.2-43.72.2.ia64", }, product_reference: "python-docs-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1ES", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:1.5.2-43.72.2.i386 as a component of Red Hat Enterprise Linux ES version 2.1", product_id: "2.1ES:python-tools-0:1.5.2-43.72.2.i386", }, product_reference: "python-tools-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1ES", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:1.5.2-43.72.2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", product_id: "2.1ES:python-tools-0:1.5.2-43.72.2.ia64", }, product_reference: "python-tools-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1ES", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:1.5.2-43.72.2.i386 as a component of Red Hat Enterprise Linux ES version 2.1", product_id: "2.1ES:tkinter-0:1.5.2-43.72.2.i386", }, product_reference: "tkinter-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1ES", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:1.5.2-43.72.2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", product_id: "2.1ES:tkinter-0:1.5.2-43.72.2.ia64", }, product_reference: "tkinter-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1ES", }, { category: "default_component_of", full_product_name: { name: "python-0:1.5.2-43.72.2.i386 as a component of Red Hat Enterprise Linux WS version 2.1", product_id: "2.1WS:python-0:1.5.2-43.72.2.i386", }, product_reference: "python-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1WS", }, { category: "default_component_of", full_product_name: { name: "python-0:1.5.2-43.72.2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", product_id: "2.1WS:python-0:1.5.2-43.72.2.ia64", }, product_reference: "python-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1WS", }, { category: "default_component_of", full_product_name: { name: "python-0:1.5.2-43.72.2.src as a component of Red Hat Enterprise Linux WS version 2.1", product_id: "2.1WS:python-0:1.5.2-43.72.2.src", }, product_reference: "python-0:1.5.2-43.72.2.src", relates_to_product_reference: "2.1WS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:1.5.2-43.72.2.i386 as a component of Red Hat Enterprise Linux WS version 2.1", product_id: "2.1WS:python-devel-0:1.5.2-43.72.2.i386", }, product_reference: "python-devel-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1WS", }, { category: "default_component_of", full_product_name: { name: "python-devel-0:1.5.2-43.72.2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", product_id: "2.1WS:python-devel-0:1.5.2-43.72.2.ia64", }, product_reference: "python-devel-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1WS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:1.5.2-43.72.2.i386 as a component of Red Hat Enterprise Linux WS version 2.1", product_id: "2.1WS:python-docs-0:1.5.2-43.72.2.i386", }, product_reference: "python-docs-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1WS", }, { category: "default_component_of", full_product_name: { name: "python-docs-0:1.5.2-43.72.2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", product_id: "2.1WS:python-docs-0:1.5.2-43.72.2.ia64", }, product_reference: "python-docs-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1WS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:1.5.2-43.72.2.i386 as a component of Red Hat Enterprise Linux WS version 2.1", product_id: "2.1WS:python-tools-0:1.5.2-43.72.2.i386", }, product_reference: "python-tools-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1WS", }, { category: "default_component_of", full_product_name: { name: "python-tools-0:1.5.2-43.72.2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", product_id: "2.1WS:python-tools-0:1.5.2-43.72.2.ia64", }, product_reference: "python-tools-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1WS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:1.5.2-43.72.2.i386 as a component of Red Hat Enterprise Linux WS version 2.1", product_id: "2.1WS:tkinter-0:1.5.2-43.72.2.i386", }, product_reference: "tkinter-0:1.5.2-43.72.2.i386", relates_to_product_reference: "2.1WS", }, { category: "default_component_of", full_product_name: { name: "tkinter-0:1.5.2-43.72.2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", product_id: "2.1WS:tkinter-0:1.5.2-43.72.2.ia64", }, product_reference: "tkinter-0:1.5.2-43.72.2.ia64", relates_to_product_reference: "2.1WS", }, ], }, vulnerabilities: [ { cve: "CVE-2006-7228", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2007-11-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "383371", }, ], notes: [ { category: "description", text: "Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 might allow context-dependent attackers to execute arbitrary code via a regular expression that involves large (1) min, (2) max, or (3) duplength values that cause an incorrect length calculation and trigger a buffer overflow, a different vulnerability than CVE-2006-7227. NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split.", title: "Vulnerability description", }, { category: "summary", text: "pcre integer overflow", title: "Vulnerability summary", }, ], product_status: { fixed: [ "2.1AS:python-0:1.5.2-43.72.2.i386", "2.1AS:python-0:1.5.2-43.72.2.ia64", "2.1AS:python-0:1.5.2-43.72.2.src", "2.1AS:python-devel-0:1.5.2-43.72.2.i386", "2.1AS:python-devel-0:1.5.2-43.72.2.ia64", "2.1AS:python-docs-0:1.5.2-43.72.2.i386", "2.1AS:python-docs-0:1.5.2-43.72.2.ia64", "2.1AS:python-tools-0:1.5.2-43.72.2.i386", "2.1AS:python-tools-0:1.5.2-43.72.2.ia64", "2.1AS:tkinter-0:1.5.2-43.72.2.i386", "2.1AS:tkinter-0:1.5.2-43.72.2.ia64", "2.1AW:python-0:1.5.2-43.72.2.i386", "2.1AW:python-0:1.5.2-43.72.2.ia64", "2.1AW:python-0:1.5.2-43.72.2.src", "2.1AW:python-devel-0:1.5.2-43.72.2.i386", "2.1AW:python-devel-0:1.5.2-43.72.2.ia64", "2.1AW:python-docs-0:1.5.2-43.72.2.i386", "2.1AW:python-docs-0:1.5.2-43.72.2.ia64", "2.1AW:python-tools-0:1.5.2-43.72.2.i386", "2.1AW:python-tools-0:1.5.2-43.72.2.ia64", "2.1AW:tkinter-0:1.5.2-43.72.2.i386", "2.1AW:tkinter-0:1.5.2-43.72.2.ia64", "2.1ES:python-0:1.5.2-43.72.2.i386", "2.1ES:python-0:1.5.2-43.72.2.ia64", "2.1ES:python-0:1.5.2-43.72.2.src", "2.1ES:python-devel-0:1.5.2-43.72.2.i386", "2.1ES:python-devel-0:1.5.2-43.72.2.ia64", "2.1ES:python-docs-0:1.5.2-43.72.2.i386", "2.1ES:python-docs-0:1.5.2-43.72.2.ia64", "2.1ES:python-tools-0:1.5.2-43.72.2.i386", "2.1ES:python-tools-0:1.5.2-43.72.2.ia64", "2.1ES:tkinter-0:1.5.2-43.72.2.i386", "2.1ES:tkinter-0:1.5.2-43.72.2.ia64", "2.1WS:python-0:1.5.2-43.72.2.i386", "2.1WS:python-0:1.5.2-43.72.2.ia64", "2.1WS:python-0:1.5.2-43.72.2.src", "2.1WS:python-devel-0:1.5.2-43.72.2.i386", "2.1WS:python-devel-0:1.5.2-43.72.2.ia64", "2.1WS:python-docs-0:1.5.2-43.72.2.i386", "2.1WS:python-docs-0:1.5.2-43.72.2.ia64", "2.1WS:python-tools-0:1.5.2-43.72.2.i386", "2.1WS:python-tools-0:1.5.2-43.72.2.ia64", "2.1WS:tkinter-0:1.5.2-43.72.2.i386", "2.1WS:tkinter-0:1.5.2-43.72.2.ia64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-7228", }, { category: "external", summary: "RHBZ#383371", url: "https://bugzilla.redhat.com/show_bug.cgi?id=383371", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-7228", url: "https://www.cve.org/CVERecord?id=CVE-2006-7228", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-7228", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-7228", }, ], release_date: "2007-11-07T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2007-12-10T17:57:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "2.1AS:python-0:1.5.2-43.72.2.i386", "2.1AS:python-0:1.5.2-43.72.2.ia64", "2.1AS:python-0:1.5.2-43.72.2.src", "2.1AS:python-devel-0:1.5.2-43.72.2.i386", "2.1AS:python-devel-0:1.5.2-43.72.2.ia64", "2.1AS:python-docs-0:1.5.2-43.72.2.i386", "2.1AS:python-docs-0:1.5.2-43.72.2.ia64", "2.1AS:python-tools-0:1.5.2-43.72.2.i386", "2.1AS:python-tools-0:1.5.2-43.72.2.ia64", "2.1AS:tkinter-0:1.5.2-43.72.2.i386", "2.1AS:tkinter-0:1.5.2-43.72.2.ia64", "2.1AW:python-0:1.5.2-43.72.2.i386", "2.1AW:python-0:1.5.2-43.72.2.ia64", "2.1AW:python-0:1.5.2-43.72.2.src", "2.1AW:python-devel-0:1.5.2-43.72.2.i386", "2.1AW:python-devel-0:1.5.2-43.72.2.ia64", "2.1AW:python-docs-0:1.5.2-43.72.2.i386", "2.1AW:python-docs-0:1.5.2-43.72.2.ia64", "2.1AW:python-tools-0:1.5.2-43.72.2.i386", "2.1AW:python-tools-0:1.5.2-43.72.2.ia64", "2.1AW:tkinter-0:1.5.2-43.72.2.i386", "2.1AW:tkinter-0:1.5.2-43.72.2.ia64", "2.1ES:python-0:1.5.2-43.72.2.i386", "2.1ES:python-0:1.5.2-43.72.2.ia64", "2.1ES:python-0:1.5.2-43.72.2.src", "2.1ES:python-devel-0:1.5.2-43.72.2.i386", "2.1ES:python-devel-0:1.5.2-43.72.2.ia64", "2.1ES:python-docs-0:1.5.2-43.72.2.i386", "2.1ES:python-docs-0:1.5.2-43.72.2.ia64", "2.1ES:python-tools-0:1.5.2-43.72.2.i386", "2.1ES:python-tools-0:1.5.2-43.72.2.ia64", "2.1ES:tkinter-0:1.5.2-43.72.2.i386", "2.1ES:tkinter-0:1.5.2-43.72.2.ia64", "2.1WS:python-0:1.5.2-43.72.2.i386", "2.1WS:python-0:1.5.2-43.72.2.ia64", "2.1WS:python-0:1.5.2-43.72.2.src", "2.1WS:python-devel-0:1.5.2-43.72.2.i386", "2.1WS:python-devel-0:1.5.2-43.72.2.ia64", "2.1WS:python-docs-0:1.5.2-43.72.2.i386", "2.1WS:python-docs-0:1.5.2-43.72.2.ia64", "2.1WS:python-tools-0:1.5.2-43.72.2.i386", "2.1WS:python-tools-0:1.5.2-43.72.2.ia64", "2.1WS:tkinter-0:1.5.2-43.72.2.i386", "2.1WS:tkinter-0:1.5.2-43.72.2.ia64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2007:1077", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "pcre integer overflow", }, { cve: "CVE-2007-2052", cwe: { id: "CWE-193", name: "Off-by-one Error", }, discovery_date: "2007-04-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "235093", }, ], notes: [ { category: "description", text: "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", title: "Vulnerability description", }, { category: "summary", text: "python off-by-one locale.strxfrm() (possible memory disclosure)", title: "Vulnerability summary", }, { category: "other", text: "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/", title: "Statement", }, ], product_status: { fixed: [ "2.1AS:python-0:1.5.2-43.72.2.i386", "2.1AS:python-0:1.5.2-43.72.2.ia64", "2.1AS:python-0:1.5.2-43.72.2.src", "2.1AS:python-devel-0:1.5.2-43.72.2.i386", "2.1AS:python-devel-0:1.5.2-43.72.2.ia64", "2.1AS:python-docs-0:1.5.2-43.72.2.i386", "2.1AS:python-docs-0:1.5.2-43.72.2.ia64", "2.1AS:python-tools-0:1.5.2-43.72.2.i386", "2.1AS:python-tools-0:1.5.2-43.72.2.ia64", "2.1AS:tkinter-0:1.5.2-43.72.2.i386", "2.1AS:tkinter-0:1.5.2-43.72.2.ia64", "2.1AW:python-0:1.5.2-43.72.2.i386", "2.1AW:python-0:1.5.2-43.72.2.ia64", "2.1AW:python-0:1.5.2-43.72.2.src", "2.1AW:python-devel-0:1.5.2-43.72.2.i386", "2.1AW:python-devel-0:1.5.2-43.72.2.ia64", "2.1AW:python-docs-0:1.5.2-43.72.2.i386", "2.1AW:python-docs-0:1.5.2-43.72.2.ia64", "2.1AW:python-tools-0:1.5.2-43.72.2.i386", "2.1AW:python-tools-0:1.5.2-43.72.2.ia64", "2.1AW:tkinter-0:1.5.2-43.72.2.i386", "2.1AW:tkinter-0:1.5.2-43.72.2.ia64", "2.1ES:python-0:1.5.2-43.72.2.i386", "2.1ES:python-0:1.5.2-43.72.2.ia64", "2.1ES:python-0:1.5.2-43.72.2.src", "2.1ES:python-devel-0:1.5.2-43.72.2.i386", "2.1ES:python-devel-0:1.5.2-43.72.2.ia64", "2.1ES:python-docs-0:1.5.2-43.72.2.i386", "2.1ES:python-docs-0:1.5.2-43.72.2.ia64", "2.1ES:python-tools-0:1.5.2-43.72.2.i386", "2.1ES:python-tools-0:1.5.2-43.72.2.ia64", "2.1ES:tkinter-0:1.5.2-43.72.2.i386", "2.1ES:tkinter-0:1.5.2-43.72.2.ia64", "2.1WS:python-0:1.5.2-43.72.2.i386", "2.1WS:python-0:1.5.2-43.72.2.ia64", "2.1WS:python-0:1.5.2-43.72.2.src", "2.1WS:python-devel-0:1.5.2-43.72.2.i386", "2.1WS:python-devel-0:1.5.2-43.72.2.ia64", "2.1WS:python-docs-0:1.5.2-43.72.2.i386", "2.1WS:python-docs-0:1.5.2-43.72.2.ia64", "2.1WS:python-tools-0:1.5.2-43.72.2.i386", "2.1WS:python-tools-0:1.5.2-43.72.2.ia64", "2.1WS:tkinter-0:1.5.2-43.72.2.i386", "2.1WS:tkinter-0:1.5.2-43.72.2.ia64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2007-2052", }, { category: "external", summary: "RHBZ#235093", url: "https://bugzilla.redhat.com/show_bug.cgi?id=235093", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2007-2052", url: "https://www.cve.org/CVERecord?id=CVE-2007-2052", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", url: "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", }, ], release_date: "2007-04-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2007-12-10T17:57:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "2.1AS:python-0:1.5.2-43.72.2.i386", "2.1AS:python-0:1.5.2-43.72.2.ia64", "2.1AS:python-0:1.5.2-43.72.2.src", "2.1AS:python-devel-0:1.5.2-43.72.2.i386", "2.1AS:python-devel-0:1.5.2-43.72.2.ia64", "2.1AS:python-docs-0:1.5.2-43.72.2.i386", "2.1AS:python-docs-0:1.5.2-43.72.2.ia64", "2.1AS:python-tools-0:1.5.2-43.72.2.i386", "2.1AS:python-tools-0:1.5.2-43.72.2.ia64", "2.1AS:tkinter-0:1.5.2-43.72.2.i386", "2.1AS:tkinter-0:1.5.2-43.72.2.ia64", "2.1AW:python-0:1.5.2-43.72.2.i386", "2.1AW:python-0:1.5.2-43.72.2.ia64", "2.1AW:python-0:1.5.2-43.72.2.src", "2.1AW:python-devel-0:1.5.2-43.72.2.i386", "2.1AW:python-devel-0:1.5.2-43.72.2.ia64", "2.1AW:python-docs-0:1.5.2-43.72.2.i386", "2.1AW:python-docs-0:1.5.2-43.72.2.ia64", "2.1AW:python-tools-0:1.5.2-43.72.2.i386", "2.1AW:python-tools-0:1.5.2-43.72.2.ia64", "2.1AW:tkinter-0:1.5.2-43.72.2.i386", "2.1AW:tkinter-0:1.5.2-43.72.2.ia64", "2.1ES:python-0:1.5.2-43.72.2.i386", "2.1ES:python-0:1.5.2-43.72.2.ia64", "2.1ES:python-0:1.5.2-43.72.2.src", "2.1ES:python-devel-0:1.5.2-43.72.2.i386", "2.1ES:python-devel-0:1.5.2-43.72.2.ia64", "2.1ES:python-docs-0:1.5.2-43.72.2.i386", "2.1ES:python-docs-0:1.5.2-43.72.2.ia64", "2.1ES:python-tools-0:1.5.2-43.72.2.i386", "2.1ES:python-tools-0:1.5.2-43.72.2.ia64", "2.1ES:tkinter-0:1.5.2-43.72.2.i386", "2.1ES:tkinter-0:1.5.2-43.72.2.ia64", "2.1WS:python-0:1.5.2-43.72.2.i386", "2.1WS:python-0:1.5.2-43.72.2.ia64", "2.1WS:python-0:1.5.2-43.72.2.src", "2.1WS:python-devel-0:1.5.2-43.72.2.i386", "2.1WS:python-devel-0:1.5.2-43.72.2.ia64", "2.1WS:python-docs-0:1.5.2-43.72.2.i386", "2.1WS:python-docs-0:1.5.2-43.72.2.ia64", "2.1WS:python-tools-0:1.5.2-43.72.2.i386", "2.1WS:python-tools-0:1.5.2-43.72.2.ia64", "2.1WS:tkinter-0:1.5.2-43.72.2.i386", "2.1WS:tkinter-0:1.5.2-43.72.2.ia64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2007:1077", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python off-by-one locale.strxfrm() (possible memory disclosure)", }, ], }
rhsa-2008_0525
Vulnerability from csaf_redhat
Published
2008-06-30 15:36
Modified
2024-11-22 01:57
Summary
Red Hat Security Advisory: Red Hat Network Satellite Server Solaris client security update
Notes
Topic
Red Hat Network Satellite Server version 4.2.3 is now available. This
update includes fixes for a number of security issues in Red Hat Network
Satellite Server Solaris client components.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
This release corrects several security vulnerabilities in various
components shipped as part of the Red Hat Network Satellite Server Solaris
client. In a typical operating environment, these components are not used
by the Satellite Server in a vulnerable manner. These security updates will
reduce risk should these components be used by other applications.
Several flaws in Zlib was discovered. An attacker could create a
carefully-crafted compressed stream that would cause an application to
crash if the stream is opened by a user. (CVE-2005-2096). An attacker
could create a carefully crafted compressed stream that would cause an
application to crash if the stream is opened by a user. (CVE-2005-1849)
A buffer overflow was discovered in the OpenSSL SSL_get_shared_ciphers()
utility function. An attacker could send a list of ciphers to an
application that used this function and overrun a buffer (CVE-2006-3738).
A flaw in the SSLv2 client code was discovered. If a client application
used OpenSSL to create an SSLv2 connection to a malicious server, that
server could cause the client to crash. (CVE-2006-4343)
An attack on OpenSSL PKCS #1 v1.5 signatures was discovered. Where an RSA
key with exponent 3 is used it may be possible for an attacker to forge a
PKCS #1 v1.5 signature that would be incorrectly verified by
implementations that do not check for excess data in the RSA exponentiation
result of the signature. This issue affected applications that use OpenSSL
to verify X.509 certificates as well as other uses of PKCS #1 v1.5.
(CVE-2006-4339)
OpenSSL contained a software work-around for a bug in SSL handling in
Microsoft Internet Explorer version 3.0.2. It is enabled in most servers
that use OpenSSL to provide support for SSL and TLS. This work-around could
allow an attacker, acting as a "man in the middle" to force an SSL
connection to use SSL 2.0 rather than a stronger protocol, such as SSL 3.0
or TLS 1.0. (CVE-2005-2969)
During OpenSSL parsing of certain invalid ASN.1 structures an error
condition was mishandled. This can result in an infinite loop which
consumed system memory (CVE-2006-2937).
Certain public key types can take disproportionate amounts of time to
process in OpenSSL, leading to a denial of service. (CVE-2006-2940)
A flaw was discovered in the way that the Python repr() function handled
UTF-32/UCS-4 strings. If an application written in Python used the repr()
function on untrusted data, this could lead to a denial of service or
possibly allow the execution of arbitrary code with the privileges of the
Python application. (CVE-2006-4980)
A flaw was discovered in the strxfrm() function of Python's locale module.
Strings generated by this function were not properly NULL-terminated. This
may possibly cause disclosure of data stored in the memory of a Python
application using this function. (CVE-2007-2052)
Multiple integer overflow flaws were discovered in Python's imageop module.
If an application written in Python used the imageop module to process
untrusted images, it could cause the application to crash, enter an
infinite loop, or possibly execute arbitrary code with the privileges of
the Python interpreter. (CVE-2007-4965)
A stack-based buffer overflow was discovered in the Python interpreter,
which could allow a local user to gain privileges by running a script with
a long name from the current working directory. (CVE-2006-1542)
Users of Red Hat Network Satellite Server should upgrade to these updated
packages, which contain backported patches to correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Red Hat Network Satellite Server version 4.2.3 is now available. This\nupdate includes fixes for a number of security issues in Red Hat Network\nSatellite Server Solaris client components.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", title: "Topic", }, { category: "general", text: "This release corrects several security vulnerabilities in various\ncomponents shipped as part of the Red Hat Network Satellite Server Solaris\nclient. In a typical operating environment, these components are not used\nby the Satellite Server in a vulnerable manner. These security updates will\nreduce risk should these components be used by other applications.\n\nSeveral flaws in Zlib was discovered. An attacker could create a\ncarefully-crafted compressed stream that would cause an application to\ncrash if the stream is opened by a user. (CVE-2005-2096). An attacker\ncould create a carefully crafted compressed stream that would cause an\napplication to crash if the stream is opened by a user. (CVE-2005-1849)\n\nA buffer overflow was discovered in the OpenSSL SSL_get_shared_ciphers()\nutility function. An attacker could send a list of ciphers to an\napplication that used this function and overrun a buffer (CVE-2006-3738).\n\nA flaw in the SSLv2 client code was discovered. If a client application\nused OpenSSL to create an SSLv2 connection to a malicious server, that\nserver could cause the client to crash. (CVE-2006-4343)\n\nAn attack on OpenSSL PKCS #1 v1.5 signatures was discovered. Where an RSA\nkey with exponent 3 is used it may be possible for an attacker to forge a\nPKCS #1 v1.5 signature that would be incorrectly verified by\nimplementations that do not check for excess data in the RSA exponentiation\nresult of the signature. This issue affected applications that use OpenSSL\nto verify X.509 certificates as well as other uses of PKCS #1 v1.5.\n(CVE-2006-4339)\n\nOpenSSL contained a software work-around for a bug in SSL handling in\nMicrosoft Internet Explorer version 3.0.2. It is enabled in most servers\nthat use OpenSSL to provide support for SSL and TLS. This work-around could\nallow an attacker, acting as a \"man in the middle\" to force an SSL\nconnection to use SSL 2.0 rather than a stronger protocol, such as SSL 3.0\nor TLS 1.0. (CVE-2005-2969)\n\nDuring OpenSSL parsing of certain invalid ASN.1 structures an error\ncondition was mishandled. This can result in an infinite loop which\nconsumed system memory (CVE-2006-2937). \n\nCertain public key types can take disproportionate amounts of time to\nprocess in OpenSSL, leading to a denial of service. (CVE-2006-2940)\n\nA flaw was discovered in the way that the Python repr() function handled\nUTF-32/UCS-4 strings. If an application written in Python used the repr()\nfunction on untrusted data, this could lead to a denial of service or\npossibly allow the execution of arbitrary code with the privileges of the\nPython application. (CVE-2006-4980)\n\nA flaw was discovered in the strxfrm() function of Python's locale module.\nStrings generated by this function were not properly NULL-terminated. This\nmay possibly cause disclosure of data stored in the memory of a Python\napplication using this function. (CVE-2007-2052)\n\nMultiple integer overflow flaws were discovered in Python's imageop module.\nIf an application written in Python used the imageop module to process\nuntrusted images, it could cause the application to crash, enter an\ninfinite loop, or possibly execute arbitrary code with the privileges of\nthe Python interpreter. (CVE-2007-4965)\n\nA stack-based buffer overflow was discovered in the Python interpreter,\nwhich could allow a local user to gain privileges by running a script with\na long name from the current working directory. (CVE-2006-1542)\n\nUsers of Red Hat Network Satellite Server should upgrade to these updated\npackages, which contain backported patches to correct these issues.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2008:0525", url: "https://access.redhat.com/errata/RHSA-2008:0525", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "235093", url: "https://bugzilla.redhat.com/show_bug.cgi?id=235093", }, { category: "external", summary: "295971", url: "https://bugzilla.redhat.com/show_bug.cgi?id=295971", }, { category: "external", summary: "430640", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430640", }, { category: "external", summary: "430641", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430641", }, { category: "external", summary: "430649", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430649", }, { category: "external", summary: "430650", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430650", }, { category: "external", summary: "430651", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430651", }, { category: "external", summary: "430652", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430652", }, { category: "external", summary: "430654", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430654", }, { category: "external", summary: "430655", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430655", }, { category: "external", summary: "430659", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430659", }, { category: "external", summary: "430660", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430660", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0525.json", }, ], title: "Red Hat Security Advisory: Red Hat Network Satellite Server Solaris client security update", tracking: { current_release_date: "2024-11-22T01:57:58+00:00", generator: { date: "2024-11-22T01:57:58+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2008:0525", initial_release_date: "2008-06-30T15:36:00+00:00", revision_history: [ { date: "2008-06-30T15:36:00+00:00", number: "1", summary: "Initial version", }, { date: "2008-06-30T11:36:03+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T01:57:58+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Satellite v 4.2 (RHEL v.3 AS)", product: { name: "Red Hat Satellite v 4.2 (RHEL v.3 AS)", product_id: "3AS-RHNSAT4.2", product_identification_helper: { cpe: "cpe:/a:redhat:network_satellite:4.2::el3", }, }, }, { category: "product_name", name: "Red Hat Satellite v 4.2 (RHEL v.4 AS)", product: { name: "Red Hat Satellite v 4.2 (RHEL v.4 AS)", product_id: "4AS-RHNSAT4.2", product_identification_helper: { cpe: "cpe:/a:redhat:network_satellite:4.2::el4", }, }, }, ], category: "product_family", name: "Red Hat Satellite", }, { branches: [ { category: "product_version", name: "rhn-solaris-bootstrap-0:5.0.2-3.noarch", product: { name: "rhn-solaris-bootstrap-0:5.0.2-3.noarch", product_id: "rhn-solaris-bootstrap-0:5.0.2-3.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/rhn-solaris-bootstrap@5.0.2-3?arch=noarch", }, }, }, { category: "product_version", name: "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", product: { name: "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", product_id: "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/rhn_solaris_bootstrap_5_0_2_3@1-0?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "rhn-solaris-bootstrap-0:5.0.2-3.noarch as a component of Red Hat Satellite v 4.2 (RHEL v.3 AS)", product_id: "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", }, product_reference: "rhn-solaris-bootstrap-0:5.0.2-3.noarch", relates_to_product_reference: "3AS-RHNSAT4.2", }, { category: "default_component_of", full_product_name: { name: "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch as a component of Red Hat Satellite v 4.2 (RHEL v.3 AS)", product_id: "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", }, product_reference: "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", relates_to_product_reference: "3AS-RHNSAT4.2", }, { category: "default_component_of", full_product_name: { name: "rhn-solaris-bootstrap-0:5.0.2-3.noarch as a component of Red Hat Satellite v 4.2 (RHEL v.4 AS)", product_id: "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", }, product_reference: "rhn-solaris-bootstrap-0:5.0.2-3.noarch", relates_to_product_reference: "4AS-RHNSAT4.2", }, { category: "default_component_of", full_product_name: { name: "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch as a component of Red Hat Satellite v 4.2 (RHEL v.4 AS)", product_id: "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", }, product_reference: "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", relates_to_product_reference: "4AS-RHNSAT4.2", }, ], }, vulnerabilities: [ { cve: "CVE-2005-1849", discovery_date: "2006-07-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430649", }, ], notes: [ { category: "description", text: "inftrees.h in zlib 1.2.2 allows remote attackers to cause a denial of service (application crash) via an invalid file that causes a large dynamic tree to be produced.", title: "Vulnerability description", }, { category: "summary", text: "zlib DoS", title: "Vulnerability summary", }, ], product_status: { fixed: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2005-1849", }, { category: "external", summary: "RHBZ#430649", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430649", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2005-1849", url: "https://www.cve.org/CVERecord?id=CVE-2005-1849", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2005-1849", url: "https://nvd.nist.gov/vuln/detail/CVE-2005-1849", }, ], release_date: "2005-08-20T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-06-30T15:36:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0525", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "zlib DoS", }, { cve: "CVE-2005-2096", discovery_date: "2006-06-30T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430650", }, ], notes: [ { category: "description", text: "zlib 1.2 and later versions allows remote attackers to cause a denial of service (crash) via a crafted compressed stream with an incomplete code description of a length greater than 1, which leads to a buffer overflow, as demonstrated using a crafted PNG file.", title: "Vulnerability description", }, { category: "summary", text: "zlib DoS", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2005-2096", }, { category: "external", summary: "RHBZ#430650", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430650", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2005-2096", url: "https://www.cve.org/CVERecord?id=CVE-2005-2096", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2005-2096", url: "https://nvd.nist.gov/vuln/detail/CVE-2005-2096", }, ], release_date: "2005-07-06T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-06-30T15:36:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0525", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "zlib DoS", }, { cve: "CVE-2005-2969", discovery_date: "2005-10-04T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430660", }, ], notes: [ { category: "description", text: "The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.", title: "Vulnerability description", }, { category: "summary", text: "openssl mitm downgrade attack", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2005-2969", }, { category: "external", summary: "RHBZ#430660", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430660", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2005-2969", url: "https://www.cve.org/CVERecord?id=CVE-2005-2969", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2005-2969", url: "https://nvd.nist.gov/vuln/detail/CVE-2005-2969", }, ], release_date: "2005-10-11T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-06-30T15:36:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0525", }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "openssl mitm downgrade attack", }, { cve: "CVE-2006-1542", discovery_date: "2006-03-30T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430640", }, ], notes: [ { category: "description", text: "Stack-based buffer overflow in Python 2.4.2 and earlier, running on Linux 2.6.12.5 under gcc 4.0.3 with libc 2.3.5, allows local users to cause a \"stack overflow,\" and possibly gain privileges, by running a script from a current working directory that has a long name, related to the realpath function. NOTE: this might not be a vulnerability. However, the fact that it appears in a programming language interpreter could mean that some applications are affected, although attack scenarios might be limited because the attacker might already need to cross privilege boundaries to cause an exploitable program to be placed in a directory with a long name; or, depending on the method that Python uses to determine the current working directory, setuid applications might be affected.", title: "Vulnerability description", }, { category: "summary", text: "python buffer overflow", title: "Vulnerability summary", }, { category: "other", text: "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/\n\nRed Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-1542", }, { category: "external", summary: "RHBZ#430640", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430640", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-1542", url: "https://www.cve.org/CVERecord?id=CVE-2006-1542", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-1542", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-1542", }, ], release_date: "2005-09-22T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-06-30T15:36:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0525", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python buffer overflow", }, { cve: "CVE-2006-2937", discovery_date: "2006-07-03T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430655", }, ], notes: [ { category: "description", text: "OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition.", title: "Vulnerability description", }, { category: "summary", text: "openssl ASN.1 DoS", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-2937", }, { category: "external", summary: "RHBZ#430655", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430655", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-2937", url: "https://www.cve.org/CVERecord?id=CVE-2006-2937", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-2937", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-2937", }, ], release_date: "2006-09-28T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-06-30T15:36:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0525", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "openssl ASN.1 DoS", }, { cve: "CVE-2006-2940", discovery_date: "2006-07-03T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430654", }, ], notes: [ { category: "description", text: "OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) \"public exponent\" or (2) \"public modulus\" values in X.509 certificates that require extra time to process when using RSA signature verification.", title: "Vulnerability description", }, { category: "summary", text: "openssl public key DoS", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-2940", }, { category: "external", summary: "RHBZ#430654", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430654", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-2940", url: "https://www.cve.org/CVERecord?id=CVE-2006-2940", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-2940", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-2940", }, ], release_date: "2006-09-28T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-06-30T15:36:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0525", }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "openssl public key DoS", }, { cve: "CVE-2006-3738", discovery_date: "2006-08-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430652", }, ], notes: [ { category: "description", text: "Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.", title: "Vulnerability description", }, { category: "summary", text: "openssl get_shared_ciphers overflow", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-3738", }, { category: "external", summary: "RHBZ#430652", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430652", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-3738", url: "https://www.cve.org/CVERecord?id=CVE-2006-3738", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-3738", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-3738", }, ], release_date: "2006-09-28T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-06-30T15:36:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0525", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "openssl get_shared_ciphers overflow", }, { cve: "CVE-2006-4339", discovery_date: "2006-09-05T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430659", }, ], notes: [ { category: "description", text: "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.", title: "Vulnerability description", }, { category: "summary", text: "openssl signature forgery", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-4339", }, { category: "external", summary: "RHBZ#430659", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430659", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-4339", url: "https://www.cve.org/CVERecord?id=CVE-2006-4339", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-4339", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-4339", }, ], release_date: "2006-09-05T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-06-30T15:36:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0525", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "openssl signature forgery", }, { cve: "CVE-2006-4343", discovery_date: "2006-08-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430651", }, ], notes: [ { category: "description", text: "The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.", title: "Vulnerability description", }, { category: "summary", text: "openssl sslv2 client code", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-4343", }, { category: "external", summary: "RHBZ#430651", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430651", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-4343", url: "https://www.cve.org/CVERecord?id=CVE-2006-4343", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-4343", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-4343", }, ], release_date: "2006-09-28T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-06-30T15:36:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0525", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "openssl sslv2 client code", }, { cve: "CVE-2006-4980", discovery_date: "2006-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430641", }, ], notes: [ { category: "description", text: "Buffer overflow in the repr function in Python 2.3 through 2.6 before 20060822 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via crafted wide character UTF-32/UCS-4 strings to certain scripts.", title: "Vulnerability description", }, { category: "summary", text: "python repr unicode buffer overflow", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-4980", }, { category: "external", summary: "RHBZ#430641", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430641", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-4980", url: "https://www.cve.org/CVERecord?id=CVE-2006-4980", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-4980", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-4980", }, ], release_date: "2006-08-16T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-06-30T15:36:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0525", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "python repr unicode buffer overflow", }, { cve: "CVE-2007-2052", cwe: { id: "CWE-193", name: "Off-by-one Error", }, discovery_date: "2007-04-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "235093", }, ], notes: [ { category: "description", text: "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", title: "Vulnerability description", }, { category: "summary", text: "python off-by-one locale.strxfrm() (possible memory disclosure)", title: "Vulnerability summary", }, { category: "other", text: "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/", title: "Statement", }, ], product_status: { fixed: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2007-2052", }, { category: "external", summary: "RHBZ#235093", url: "https://bugzilla.redhat.com/show_bug.cgi?id=235093", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2007-2052", url: "https://www.cve.org/CVERecord?id=CVE-2007-2052", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", url: "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", }, ], release_date: "2007-04-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-06-30T15:36:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0525", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python off-by-one locale.strxfrm() (possible memory disclosure)", }, { cve: "CVE-2007-4965", discovery_date: "2007-09-18T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "295971", }, ], notes: [ { category: "description", text: "Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.", title: "Vulnerability description", }, { category: "summary", text: "python imageop module heap corruption", title: "Vulnerability summary", }, { category: "other", text: "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=295971\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/", title: "Statement", }, ], product_status: { fixed: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2007-4965", }, { category: "external", summary: "RHBZ#295971", url: "https://bugzilla.redhat.com/show_bug.cgi?id=295971", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2007-4965", url: "https://www.cve.org/CVERecord?id=CVE-2007-4965", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", url: "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", }, ], release_date: "2007-09-16T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-06-30T15:36:00+00:00", details: "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", product_ids: [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0525", }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "python imageop module heap corruption", }, ], }
rhsa-2008:0264
Vulnerability from csaf_redhat
Published
2008-05-20 14:15
Modified
2024-11-22 01:57
Summary
Red Hat Security Advisory: Red Hat Network Satellite Server Solaris client security update
Notes
Topic
Red Hat Network Satellite Server version 5.0.2 is now available. This
update includes fixes for a number of security issues in Red Hat Network
Satellite Server Solaris client components.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
This release corrects several security vulnerabilities in various
components shipped as part of the Red Hat Network Satellite Server Solaris
client. In a typical operating environment, these components are not used
by the Satellite Server in a vulnerable manner. These security updates will
reduce risk should these components be used by other applications.
Two denial-of-service flaws were fixed in ZLib. (CVE-2005-2096,
CVE-2005-1849)
Multiple flaws were fixed in OpenSSL. (CVE-2006-4343, CVE-2006-4339,
CVE-2006-3738, CVE-2006-2940, CVE-2006-2937, CVE-2005-2969)
Multiple flaws were fixed in Python. (CVE-2007-4965, CVE-2007-2052,
CVE-2006-4980, CVE-2006-1542)
Users of Red Hat Network Satellite Server 5.0.1 are advised to upgrade to
5.0.2, which resolves these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Red Hat Network Satellite Server version 5.0.2 is now available. This\nupdate includes fixes for a number of security issues in Red Hat Network\nSatellite Server Solaris client components.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", title: "Topic", }, { category: "general", text: "This release corrects several security vulnerabilities in various\ncomponents shipped as part of the Red Hat Network Satellite Server Solaris\nclient. In a typical operating environment, these components are not used\nby the Satellite Server in a vulnerable manner. These security updates will\nreduce risk should these components be used by other applications.\n\nTwo denial-of-service flaws were fixed in ZLib. (CVE-2005-2096,\nCVE-2005-1849)\n\nMultiple flaws were fixed in OpenSSL. (CVE-2006-4343, CVE-2006-4339,\nCVE-2006-3738, CVE-2006-2940, CVE-2006-2937, CVE-2005-2969)\n\nMultiple flaws were fixed in Python. (CVE-2007-4965, CVE-2007-2052,\nCVE-2006-4980, CVE-2006-1542)\n\nUsers of Red Hat Network Satellite Server 5.0.1 are advised to upgrade to\n5.0.2, which resolves these issues.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2008:0264", url: "https://access.redhat.com/errata/RHSA-2008:0264", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "235093", url: "https://bugzilla.redhat.com/show_bug.cgi?id=235093", }, { category: "external", summary: "295971", url: "https://bugzilla.redhat.com/show_bug.cgi?id=295971", }, { category: "external", summary: "430640", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430640", }, { category: "external", summary: "430641", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430641", }, { category: "external", summary: "430649", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430649", }, { category: "external", summary: "430651", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430651", }, { category: "external", summary: "430652", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430652", }, { category: "external", summary: "430654", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430654", }, { category: "external", summary: "430655", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430655", }, { category: "external", summary: "430659", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430659", }, { category: "external", summary: "430660", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430660", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0264.json", }, ], title: "Red Hat Security Advisory: Red Hat Network Satellite Server Solaris client security update", tracking: { current_release_date: "2024-11-22T01:57:54+00:00", generator: { date: "2024-11-22T01:57:54+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2008:0264", initial_release_date: "2008-05-20T14:15:00+00:00", revision_history: [ { date: "2008-05-20T14:15:00+00:00", number: "1", summary: "Initial version", }, { date: "2008-05-20T10:16:00+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T01:57:54+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Satellite 5.0 (RHEL v.4 AS)", product: { name: "Red Hat Satellite 5.0 (RHEL v.4 AS)", product_id: "4AS-RHNSAT5", product_identification_helper: { cpe: "cpe:/a:redhat:network_satellite:5.0:el4", }, }, }, ], category: "product_family", name: "Red Hat Satellite", }, { branches: [ { category: "product_version", name: "rhn-solaris-bootstrap-0:5.0.2-3.noarch", product: { name: "rhn-solaris-bootstrap-0:5.0.2-3.noarch", product_id: "rhn-solaris-bootstrap-0:5.0.2-3.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/rhn-solaris-bootstrap@5.0.2-3?arch=noarch", }, }, }, { category: "product_version", name: "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", product: { name: "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", product_id: "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/rhn_solaris_bootstrap_5_0_2_3@1-0?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "rhn-solaris-bootstrap-0:5.0.2-3.noarch as a component of Red Hat Satellite 5.0 (RHEL v.4 AS)", product_id: "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", }, product_reference: "rhn-solaris-bootstrap-0:5.0.2-3.noarch", relates_to_product_reference: "4AS-RHNSAT5", }, { category: "default_component_of", full_product_name: { name: "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch as a component of Red Hat Satellite 5.0 (RHEL v.4 AS)", product_id: "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", }, product_reference: "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", relates_to_product_reference: "4AS-RHNSAT5", }, ], }, vulnerabilities: [ { cve: "CVE-2005-1849", discovery_date: "2006-07-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430649", }, ], notes: [ { category: "description", text: "inftrees.h in zlib 1.2.2 allows remote attackers to cause a denial of service (application crash) via an invalid file that causes a large dynamic tree to be produced.", title: "Vulnerability description", }, { category: "summary", text: "zlib DoS", title: "Vulnerability summary", }, ], product_status: { fixed: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2005-1849", }, { category: "external", summary: "RHBZ#430649", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430649", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2005-1849", url: "https://www.cve.org/CVERecord?id=CVE-2005-1849", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2005-1849", url: "https://nvd.nist.gov/vuln/detail/CVE-2005-1849", }, ], release_date: "2005-08-20T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-05-20T14:15:00+00:00", details: "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", product_ids: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0264", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "zlib DoS", }, { cve: "CVE-2005-2096", discovery_date: "2006-06-30T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430650", }, ], notes: [ { category: "description", text: "zlib 1.2 and later versions allows remote attackers to cause a denial of service (crash) via a crafted compressed stream with an incomplete code description of a length greater than 1, which leads to a buffer overflow, as demonstrated using a crafted PNG file.", title: "Vulnerability description", }, { category: "summary", text: "zlib DoS", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2005-2096", }, { category: "external", summary: "RHBZ#430650", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430650", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2005-2096", url: "https://www.cve.org/CVERecord?id=CVE-2005-2096", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2005-2096", url: "https://nvd.nist.gov/vuln/detail/CVE-2005-2096", }, ], release_date: "2005-07-06T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-05-20T14:15:00+00:00", details: "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", product_ids: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0264", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "zlib DoS", }, { cve: "CVE-2005-2969", discovery_date: "2005-10-04T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430660", }, ], notes: [ { category: "description", text: "The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.", title: "Vulnerability description", }, { category: "summary", text: "openssl mitm downgrade attack", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2005-2969", }, { category: "external", summary: "RHBZ#430660", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430660", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2005-2969", url: "https://www.cve.org/CVERecord?id=CVE-2005-2969", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2005-2969", url: "https://nvd.nist.gov/vuln/detail/CVE-2005-2969", }, ], release_date: "2005-10-11T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-05-20T14:15:00+00:00", details: "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", product_ids: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0264", }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "openssl mitm downgrade attack", }, { cve: "CVE-2006-1542", discovery_date: "2006-03-30T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430640", }, ], notes: [ { category: "description", text: "Stack-based buffer overflow in Python 2.4.2 and earlier, running on Linux 2.6.12.5 under gcc 4.0.3 with libc 2.3.5, allows local users to cause a \"stack overflow,\" and possibly gain privileges, by running a script from a current working directory that has a long name, related to the realpath function. NOTE: this might not be a vulnerability. However, the fact that it appears in a programming language interpreter could mean that some applications are affected, although attack scenarios might be limited because the attacker might already need to cross privilege boundaries to cause an exploitable program to be placed in a directory with a long name; or, depending on the method that Python uses to determine the current working directory, setuid applications might be affected.", title: "Vulnerability description", }, { category: "summary", text: "python buffer overflow", title: "Vulnerability summary", }, { category: "other", text: "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/\n\nRed Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-1542", }, { category: "external", summary: "RHBZ#430640", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430640", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-1542", url: "https://www.cve.org/CVERecord?id=CVE-2006-1542", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-1542", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-1542", }, ], release_date: "2005-09-22T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-05-20T14:15:00+00:00", details: "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", product_ids: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0264", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python buffer overflow", }, { cve: "CVE-2006-2937", discovery_date: "2006-07-03T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430655", }, ], notes: [ { category: "description", text: "OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition.", title: "Vulnerability description", }, { category: "summary", text: "openssl ASN.1 DoS", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-2937", }, { category: "external", summary: "RHBZ#430655", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430655", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-2937", url: "https://www.cve.org/CVERecord?id=CVE-2006-2937", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-2937", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-2937", }, ], release_date: "2006-09-28T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-05-20T14:15:00+00:00", details: "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", product_ids: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0264", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "openssl ASN.1 DoS", }, { cve: "CVE-2006-2940", discovery_date: "2006-07-03T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430654", }, ], notes: [ { category: "description", text: "OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) \"public exponent\" or (2) \"public modulus\" values in X.509 certificates that require extra time to process when using RSA signature verification.", title: "Vulnerability description", }, { category: "summary", text: "openssl public key DoS", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-2940", }, { category: "external", summary: "RHBZ#430654", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430654", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-2940", url: "https://www.cve.org/CVERecord?id=CVE-2006-2940", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-2940", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-2940", }, ], release_date: "2006-09-28T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-05-20T14:15:00+00:00", details: "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", product_ids: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0264", }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "openssl public key DoS", }, { cve: "CVE-2006-3738", discovery_date: "2006-08-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430652", }, ], notes: [ { category: "description", text: "Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.", title: "Vulnerability description", }, { category: "summary", text: "openssl get_shared_ciphers overflow", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-3738", }, { category: "external", summary: "RHBZ#430652", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430652", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-3738", url: "https://www.cve.org/CVERecord?id=CVE-2006-3738", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-3738", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-3738", }, ], release_date: "2006-09-28T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-05-20T14:15:00+00:00", details: "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", product_ids: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0264", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "openssl get_shared_ciphers overflow", }, { cve: "CVE-2006-4339", discovery_date: "2006-09-05T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430659", }, ], notes: [ { category: "description", text: "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.", title: "Vulnerability description", }, { category: "summary", text: "openssl signature forgery", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-4339", }, { category: "external", summary: "RHBZ#430659", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430659", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-4339", url: "https://www.cve.org/CVERecord?id=CVE-2006-4339", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-4339", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-4339", }, ], release_date: "2006-09-05T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-05-20T14:15:00+00:00", details: "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", product_ids: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0264", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "openssl signature forgery", }, { cve: "CVE-2006-4343", discovery_date: "2006-08-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430651", }, ], notes: [ { category: "description", text: "The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.", title: "Vulnerability description", }, { category: "summary", text: "openssl sslv2 client code", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-4343", }, { category: "external", summary: "RHBZ#430651", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430651", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-4343", url: "https://www.cve.org/CVERecord?id=CVE-2006-4343", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-4343", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-4343", }, ], release_date: "2006-09-28T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-05-20T14:15:00+00:00", details: "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", product_ids: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0264", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "openssl sslv2 client code", }, { cve: "CVE-2006-4980", discovery_date: "2006-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "430641", }, ], notes: [ { category: "description", text: "Buffer overflow in the repr function in Python 2.3 through 2.6 before 20060822 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via crafted wide character UTF-32/UCS-4 strings to certain scripts.", title: "Vulnerability description", }, { category: "summary", text: "python repr unicode buffer overflow", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2006-4980", }, { category: "external", summary: "RHBZ#430641", url: "https://bugzilla.redhat.com/show_bug.cgi?id=430641", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2006-4980", url: "https://www.cve.org/CVERecord?id=CVE-2006-4980", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2006-4980", url: "https://nvd.nist.gov/vuln/detail/CVE-2006-4980", }, ], release_date: "2006-08-16T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-05-20T14:15:00+00:00", details: "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", product_ids: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0264", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "python repr unicode buffer overflow", }, { cve: "CVE-2007-2052", cwe: { id: "CWE-193", name: "Off-by-one Error", }, discovery_date: "2007-04-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "235093", }, ], notes: [ { category: "description", text: "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", title: "Vulnerability description", }, { category: "summary", text: "python off-by-one locale.strxfrm() (possible memory disclosure)", title: "Vulnerability summary", }, { category: "other", text: "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2007-2052", }, { category: "external", summary: "RHBZ#235093", url: "https://bugzilla.redhat.com/show_bug.cgi?id=235093", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2007-2052", url: "https://www.cve.org/CVERecord?id=CVE-2007-2052", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", url: "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", }, ], release_date: "2007-04-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-05-20T14:15:00+00:00", details: "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", product_ids: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0264", }, ], threats: [ { category: "impact", details: "Low", }, ], title: "python off-by-one locale.strxfrm() (possible memory disclosure)", }, { cve: "CVE-2007-4965", discovery_date: "2007-09-18T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "295971", }, ], notes: [ { category: "description", text: "Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.", title: "Vulnerability description", }, { category: "summary", text: "python imageop module heap corruption", title: "Vulnerability summary", }, { category: "other", text: "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=295971\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/", title: "Statement", }, ], product_status: { fixed: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2007-4965", }, { category: "external", summary: "RHBZ#295971", url: "https://bugzilla.redhat.com/show_bug.cgi?id=295971", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2007-4965", url: "https://www.cve.org/CVERecord?id=CVE-2007-4965", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", url: "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", }, ], release_date: "2007-09-16T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2008-05-20T14:15:00+00:00", details: "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", product_ids: [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2008:0264", }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "python imageop module heap corruption", }, ], }
fkie_cve-2007-2052
Vulnerability from fkie_nvd
Published
2007-04-16 22:19
Modified
2025-04-09 00:30
Severity ?
Summary
Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.
References
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:python:python:2.4.0:*:*:*:*:*:*:*", matchCriteriaId: "FE315FF0-8715-4FF6-ADBD-AD99AB0D0882", vulnerable: true, }, { criteria: "cpe:2.3:a:python:python:2.5.0:*:*:*:*:*:*:*", matchCriteriaId: "690CBE11-2D97-4D59-A21C-2AC388E67273", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", }, { lang: "es", value: "Error de superación de límite (off-by-one) en la función PyLocale_strxfrm de Modules/_localemodule.c para Python 2.4 y 2.5 provoca que se utilice un tamaño de búfer incorrecto para la función strxfrm, lo cual permite a atacantes locales o remotos dependiendo del contexto leer porciones de memoria mediante manipulaciones desconocidas que disparan una lectura fuera de límite del búfer debido a la falta de una terminación null.", }, ], id: "CVE-2007-2052", lastModified: "2025-04-09T00:30:58.490", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2007-04-16T22:19:00.000", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=416934", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://lists.vmware.com/pipermail/security-announce/2008/000005.html", }, { source: "cve@mitre.org", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/25190", }, { source: "cve@mitre.org", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/25217", }, { source: "cve@mitre.org", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/25233", }, { source: "cve@mitre.org", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/25353", }, { source: "cve@mitre.org", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/25787", }, { source: "cve@mitre.org", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/28027", }, { source: "cve@mitre.org", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/28050", }, { source: "cve@mitre.org", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/29032", }, { source: "cve@mitre.org", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/29303", }, { source: "cve@mitre.org", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/29889", }, { source: "cve@mitre.org", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/31255", }, { source: "cve@mitre.org", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/31492", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://secunia.com/advisories/37471", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://www.debian.org/security/2008/dsa-1551", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://www.debian.org/security/2008/dsa-1620", }, { source: "cve@mitre.org", tags: [ "Broken Link", "Third Party Advisory", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:099", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://www.novell.com/linux/security/advisories/2007_13_sr.html", }, { source: "cve@mitre.org", tags: [ "Broken Link", "Vendor Advisory", ], url: "http://www.python.org/download/releases/2.5.1/NEWS.txt", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2007-1076.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2007-1077.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2008-0629.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/archive/1/469294/30/6450/threaded", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/archive/1/488457/100/0/threaded", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/archive/1/507985/100/0/threaded", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/23887", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://www.trustix.org/errata/2007/0019/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://www.ubuntu.com/usn/usn-585-1", }, { source: "cve@mitre.org", tags: [ "Broken Link", "Third Party Advisory", ], url: "http://www.vmware.com/security/advisories/VMSA-2009-0016.html", }, { source: "cve@mitre.org", tags: [ "Broken Link", "Third Party Advisory", ], url: "http://www.vupen.com/english/advisories/2007/1465", }, { source: "cve@mitre.org", tags: [ "Broken Link", "Third Party Advisory", ], url: "http://www.vupen.com/english/advisories/2008/0637", }, { source: "cve@mitre.org", tags: [ "Broken Link", "Third Party Advisory", ], url: "http://www.vupen.com/english/advisories/2009/3316", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", ], url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=235093", }, { source: "cve@mitre.org", tags: [ "VDB Entry", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/34060", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://issues.rpath.com/browse/RPL-1358", }, { source: "cve@mitre.org", tags: [ "Broken Link", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11716", }, { source: "cve@mitre.org", tags: [ "Broken Link", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8353", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=416934", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://lists.vmware.com/pipermail/security-announce/2008/000005.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/25190", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/25217", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/25233", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/25353", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/25787", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/28027", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/28050", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/29032", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/29303", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/29889", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/31255", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/31492", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://secunia.com/advisories/37471", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.debian.org/security/2008/dsa-1551", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.debian.org/security/2008/dsa-1620", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", "Third Party Advisory", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:099", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.novell.com/linux/security/advisories/2007_13_sr.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", "Vendor Advisory", ], url: "http://www.python.org/download/releases/2.5.1/NEWS.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2007-1076.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2007-1077.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2008-0629.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/archive/1/469294/30/6450/threaded", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/archive/1/488457/100/0/threaded", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/archive/1/507985/100/0/threaded", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/23887", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.trustix.org/errata/2007/0019/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.ubuntu.com/usn/usn-585-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", "Third Party Advisory", ], url: "http://www.vmware.com/security/advisories/VMSA-2009-0016.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", "Third Party Advisory", ], url: "http://www.vupen.com/english/advisories/2007/1465", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", "Third Party Advisory", ], url: "http://www.vupen.com/english/advisories/2008/0637", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", "Third Party Advisory", ], url: "http://www.vupen.com/english/advisories/2009/3316", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", ], url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=235093", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "VDB Entry", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/34060", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://issues.rpath.com/browse/RPL-1358", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11716", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8353", }, ], sourceIdentifier: "cve@mitre.org", vendorComments: [ { comment: "Red Hat is aware of this issue and is tracking it via the following bug:\nhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=235093\n\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttp://www.redhat.com/security/updates/classification/\n", lastModified: "2007-04-19T00:00:00", organization: "Red Hat", }, ], vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-193", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
gsd-2007-2052
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.
Aliases
Aliases
{ GSD: { alias: "CVE-2007-2052", description: "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", id: "GSD-2007-2052", references: [ "https://www.suse.com/security/cve/CVE-2007-2052.html", "https://www.debian.org/security/2008/dsa-1620", "https://www.debian.org/security/2008/dsa-1551", "https://access.redhat.com/errata/RHSA-2009:1176", "https://access.redhat.com/errata/RHSA-2008:0629", "https://access.redhat.com/errata/RHSA-2008:0525", "https://access.redhat.com/errata/RHSA-2008:0264", "https://access.redhat.com/errata/RHSA-2007:1077", "https://access.redhat.com/errata/RHSA-2007:1076", "https://linux.oracle.com/cve/CVE-2007-2052.html", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2007-2052", ], details: "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", id: "GSD-2007-2052", modified: "2023-12-13T01:21:38.062492Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2007-2052", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "[Security-announce] 20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates", refsource: "MLIST", url: "http://lists.vmware.com/pipermail/security-announce/2008/000005.html", }, { name: "28050", refsource: "SECUNIA", url: "http://secunia.com/advisories/28050", }, { name: "25190", refsource: "SECUNIA", url: "http://secunia.com/advisories/25190", }, { name: "25217", refsource: "SECUNIA", url: "http://secunia.com/advisories/25217", }, { name: "37471", refsource: "SECUNIA", url: "http://secunia.com/advisories/37471", }, { name: "http://www.python.org/download/releases/2.5.1/NEWS.txt", refsource: "CONFIRM", url: "http://www.python.org/download/releases/2.5.1/NEWS.txt", }, { name: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=416934", refsource: "CONFIRM", url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=416934", }, { name: "DSA-1551", refsource: "DEBIAN", url: "http://www.debian.org/security/2008/dsa-1551", }, { name: "http://www.vmware.com/security/advisories/VMSA-2009-0016.html", refsource: "CONFIRM", url: "http://www.vmware.com/security/advisories/VMSA-2009-0016.html", }, { name: "29303", refsource: "SECUNIA", url: "http://secunia.com/advisories/29303", }, { name: "ADV-2007-1465", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2007/1465", }, { name: "29032", refsource: "SECUNIA", url: "http://secunia.com/advisories/29032", }, { name: "31492", refsource: "SECUNIA", url: "http://secunia.com/advisories/31492", }, { name: "oval:org.mitre.oval:def:8353", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8353", }, { name: "20070521 FLEA-2007-0019-1: python", refsource: "BUGTRAQ", url: "http://www.securityfocus.com/archive/1/469294/30/6450/threaded", }, { name: "RHSA-2008:0629", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2008-0629.html", }, { name: "RHSA-2007:1077", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2007-1077.html", }, { name: "20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates", refsource: "BUGTRAQ", url: "http://www.securityfocus.com/archive/1/488457/100/0/threaded", }, { name: "RHSA-2007:1076", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2007-1076.html", }, { name: "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", refsource: "BUGTRAQ", url: "http://www.securityfocus.com/archive/1/507985/100/0/threaded", }, { name: "ADV-2008-0637", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2008/0637", }, { name: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=235093", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=235093", }, { name: "25353", refsource: "SECUNIA", url: "http://secunia.com/advisories/25353", }, { name: "25233", refsource: "SECUNIA", url: "http://secunia.com/advisories/25233", }, { name: "https://issues.rpath.com/browse/RPL-1358", refsource: "CONFIRM", url: "https://issues.rpath.com/browse/RPL-1358", }, { name: "USN-585-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/usn-585-1", }, { name: "2007-0019", refsource: "TRUSTIX", url: "http://www.trustix.org/errata/2007/0019/", }, { name: "28027", refsource: "SECUNIA", url: "http://secunia.com/advisories/28027", }, { name: "SUSE-SR:2007:013", refsource: "SUSE", url: "http://www.novell.com/linux/security/advisories/2007_13_sr.html", }, { name: "31255", refsource: "SECUNIA", url: "http://secunia.com/advisories/31255", }, { name: "DSA-1620", refsource: "DEBIAN", url: "http://www.debian.org/security/2008/dsa-1620", }, { name: "25787", refsource: "SECUNIA", url: "http://secunia.com/advisories/25787", }, { name: "23887", refsource: "BID", url: "http://www.securityfocus.com/bid/23887", }, { name: "python-localemodule-information-disclosure(34060)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/34060", }, { name: "oval:org.mitre.oval:def:11716", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11716", }, { name: "ADV-2009-3316", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2009/3316", }, { name: "MDKSA-2007:099", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:099", }, { name: "29889", refsource: "SECUNIA", url: "http://secunia.com/advisories/29889", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:python:python:2.4.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:python:python:2.5.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2007-2052", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-193", }, ], }, ], }, references: { reference_data: [ { name: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=416934", refsource: "CONFIRM", tags: [ "Third Party Advisory", ], url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=416934", }, { name: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=235093", refsource: "CONFIRM", tags: [ "Issue Tracking", ], url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=235093", }, { name: "http://www.python.org/download/releases/2.5.1/NEWS.txt", refsource: "CONFIRM", tags: [ "Broken Link", "Vendor Advisory", ], url: "http://www.python.org/download/releases/2.5.1/NEWS.txt", }, { name: "23887", refsource: "BID", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/23887", }, { name: "25190", refsource: "SECUNIA", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/25190", }, { name: "25217", refsource: "SECUNIA", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/25217", }, { name: "https://issues.rpath.com/browse/RPL-1358", refsource: "CONFIRM", tags: [ "Third Party Advisory", ], url: "https://issues.rpath.com/browse/RPL-1358", }, { name: "25233", refsource: "SECUNIA", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/25233", }, { name: "MDKSA-2007:099", refsource: "MANDRIVA", tags: [ "Broken Link", "Third Party Advisory", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:099", }, { name: "RHSA-2007:1076", refsource: "REDHAT", tags: [ "Third Party Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2007-1076.html", }, { name: "RHSA-2007:1077", refsource: "REDHAT", tags: [ "Third Party Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2007-1077.html", }, { name: "SUSE-SR:2007:013", refsource: "SUSE", tags: [ "Third Party Advisory", ], url: "http://www.novell.com/linux/security/advisories/2007_13_sr.html", }, { name: "2007-0019", refsource: "TRUSTIX", tags: [ "Third Party Advisory", ], url: "http://www.trustix.org/errata/2007/0019/", }, { name: "25353", refsource: "SECUNIA", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/25353", }, { name: "25787", refsource: "SECUNIA", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/25787", }, { name: "28027", refsource: "SECUNIA", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/28027", }, { name: "28050", refsource: "SECUNIA", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/28050", }, { name: "[Security-announce] 20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates", refsource: "MLIST", tags: [ "Third Party Advisory", ], url: "http://lists.vmware.com/pipermail/security-announce/2008/000005.html", }, { name: "29032", refsource: "SECUNIA", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/29032", }, { name: "USN-585-1", refsource: "UBUNTU", tags: [ "Third Party Advisory", ], url: "http://www.ubuntu.com/usn/usn-585-1", }, { name: "29303", refsource: "SECUNIA", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/29303", }, { name: "DSA-1551", refsource: "DEBIAN", tags: [ "Third Party Advisory", ], url: "http://www.debian.org/security/2008/dsa-1551", }, { name: "29889", refsource: "SECUNIA", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/29889", }, { name: "DSA-1620", refsource: "DEBIAN", tags: [ "Third Party Advisory", ], url: "http://www.debian.org/security/2008/dsa-1620", }, { name: "31255", refsource: "SECUNIA", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/31255", }, { name: "RHSA-2008:0629", refsource: "REDHAT", tags: [ "Third Party Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2008-0629.html", }, { name: "31492", refsource: "SECUNIA", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/31492", }, { name: "http://www.vmware.com/security/advisories/VMSA-2009-0016.html", refsource: "CONFIRM", tags: [ "Broken Link", "Third Party Advisory", ], url: "http://www.vmware.com/security/advisories/VMSA-2009-0016.html", }, { name: "ADV-2009-3316", refsource: "VUPEN", tags: [ "Broken Link", "Third Party Advisory", ], url: "http://www.vupen.com/english/advisories/2009/3316", }, { name: "37471", refsource: "SECUNIA", tags: [ "Third Party Advisory", ], url: "http://secunia.com/advisories/37471", }, { name: "ADV-2007-1465", refsource: "VUPEN", tags: [ "Broken Link", "Third Party Advisory", ], url: "http://www.vupen.com/english/advisories/2007/1465", }, { name: "ADV-2008-0637", refsource: "VUPEN", tags: [ "Broken Link", "Third Party Advisory", ], url: "http://www.vupen.com/english/advisories/2008/0637", }, { name: "python-localemodule-information-disclosure(34060)", refsource: "XF", tags: [ "VDB Entry", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/34060", }, { name: "oval:org.mitre.oval:def:8353", refsource: "OVAL", tags: [ "Broken Link", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8353", }, { name: "oval:org.mitre.oval:def:11716", refsource: "OVAL", tags: [ "Broken Link", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11716", }, { name: "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", refsource: "BUGTRAQ", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/archive/1/507985/100/0/threaded", }, { name: "20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates", refsource: "BUGTRAQ", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/archive/1/488457/100/0/threaded", }, { name: "20070521 FLEA-2007-0019-1: python", refsource: "BUGTRAQ", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/archive/1/469294/30/6450/threaded", }, ], }, }, impact: { baseMetricV2: { cvssV2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", userInteractionRequired: false, }, }, lastModifiedDate: "2023-08-02T18:04Z", publishedDate: "2007-04-16T22:19Z", }, }, }
ghsa-7hcx-rxp8-j55g
Vulnerability from github
Published
2022-05-01 17:59
Modified
2025-04-09 03:40
Details
Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.
{ affected: [], aliases: [ "CVE-2007-2052", ], database_specific: { cwe_ids: [ "CWE-193", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2007-04-16T22:19:00Z", severity: "MODERATE", }, details: "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", id: "GHSA-7hcx-rxp8-j55g", modified: "2025-04-09T03:40:15Z", published: "2022-05-01T17:59:42Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", }, { type: "WEB", url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=235093", }, { type: "WEB", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/34060", }, { type: "WEB", url: "https://issues.rpath.com/browse/RPL-1358", }, { type: "WEB", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11716", }, { type: "WEB", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8353", }, { type: "WEB", url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=416934", }, { type: "WEB", url: "http://lists.vmware.com/pipermail/security-announce/2008/000005.html", }, { type: "WEB", url: "http://secunia.com/advisories/25190", }, { type: "WEB", url: "http://secunia.com/advisories/25217", }, { type: "WEB", url: "http://secunia.com/advisories/25233", }, { type: "WEB", url: "http://secunia.com/advisories/25353", }, { type: "WEB", url: "http://secunia.com/advisories/25787", }, { type: "WEB", url: "http://secunia.com/advisories/28027", }, { type: "WEB", url: "http://secunia.com/advisories/28050", }, { type: "WEB", url: "http://secunia.com/advisories/29032", }, { type: "WEB", url: "http://secunia.com/advisories/29303", }, { type: "WEB", url: "http://secunia.com/advisories/29889", }, { type: "WEB", url: "http://secunia.com/advisories/31255", }, { type: "WEB", url: "http://secunia.com/advisories/31492", }, { type: "WEB", url: "http://secunia.com/advisories/37471", }, { type: "WEB", url: "http://www.debian.org/security/2008/dsa-1551", }, { type: "WEB", url: "http://www.debian.org/security/2008/dsa-1620", }, { type: "WEB", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:099", }, { type: "WEB", url: "http://www.novell.com/linux/security/advisories/2007_13_sr.html", }, { type: "WEB", url: "http://www.python.org/download/releases/2.5.1/NEWS.txt", }, { type: "WEB", url: "http://www.redhat.com/support/errata/RHSA-2007-1076.html", }, { type: "WEB", url: "http://www.redhat.com/support/errata/RHSA-2007-1077.html", }, { type: "WEB", url: "http://www.redhat.com/support/errata/RHSA-2008-0629.html", }, { type: "WEB", url: "http://www.securityfocus.com/archive/1/469294/30/6450/threaded", }, { type: "WEB", url: "http://www.securityfocus.com/archive/1/488457/100/0/threaded", }, { type: "WEB", url: "http://www.securityfocus.com/archive/1/507985/100/0/threaded", }, { type: "WEB", url: "http://www.securityfocus.com/bid/23887", }, { type: "WEB", url: "http://www.trustix.org/errata/2007/0019", }, { type: "WEB", url: "http://www.ubuntu.com/usn/usn-585-1", }, { type: "WEB", url: "http://www.vmware.com/security/advisories/VMSA-2009-0016.html", }, { type: "WEB", url: "http://www.vupen.com/english/advisories/2007/1465", }, { type: "WEB", url: "http://www.vupen.com/english/advisories/2008/0637", }, { type: "WEB", url: "http://www.vupen.com/english/advisories/2009/3316", }, ], schema_version: "1.4.0", severity: [], }
suse-su-2020:0234-1
Vulnerability from csaf_suse
Published
2020-01-24 15:34
Modified
2020-01-24 15:34
Summary
Security update for python
Notes
Title of the patch
Security update for python
Description of the patch
This update for python fixes the following issues:
Updated to version 2.7.17 to unify packages among openSUSE:Factory and SLE versions (bsc#1159035).
Patchnames
SUSE-2020-234,SUSE-SLE-Module-Basesystem-15-2020-234,SUSE-SLE-Module-Basesystem-15-SP1-2020-234,SUSE-SLE-Module-Desktop-Applications-15-2020-234,SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-234,SUSE-SLE-Module-Development-Tools-OBS-15-2020-234,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-234,SUSE-SLE-Module-Python2-15-SP1-2020-234
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for python", title: "Title of the patch", }, { category: "description", text: "This update for python fixes the following issues:\n\nUpdated to version 2.7.17 to unify packages among openSUSE:Factory and SLE versions (bsc#1159035).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2020-234,SUSE-SLE-Module-Basesystem-15-2020-234,SUSE-SLE-Module-Basesystem-15-SP1-2020-234,SUSE-SLE-Module-Desktop-Applications-15-2020-234,SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-234,SUSE-SLE-Module-Development-Tools-OBS-15-2020-234,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-234,SUSE-SLE-Module-Python2-15-SP1-2020-234", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_0234-1.json", }, { category: "self", summary: "URL for SUSE-SU-2020:0234-1", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200234-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2020:0234-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html", }, { category: "self", summary: "SUSE Bug 1027282", url: "https://bugzilla.suse.com/1027282", }, { category: "self", summary: "SUSE Bug 1041090", url: "https://bugzilla.suse.com/1041090", }, { category: "self", summary: "SUSE Bug 1042670", url: "https://bugzilla.suse.com/1042670", }, { category: "self", summary: "SUSE Bug 1068664", url: "https://bugzilla.suse.com/1068664", }, { category: "self", summary: "SUSE Bug 1073269", url: "https://bugzilla.suse.com/1073269", }, { category: "self", summary: "SUSE Bug 1073748", url: "https://bugzilla.suse.com/1073748", }, { category: "self", summary: "SUSE Bug 1078326", url: "https://bugzilla.suse.com/1078326", }, { category: "self", summary: "SUSE Bug 1078485", url: "https://bugzilla.suse.com/1078485", }, { category: "self", summary: "SUSE Bug 1079300", url: "https://bugzilla.suse.com/1079300", }, { category: "self", summary: "SUSE Bug 1081750", url: "https://bugzilla.suse.com/1081750", }, { category: "self", summary: "SUSE Bug 1083507", url: "https://bugzilla.suse.com/1083507", }, { category: "self", summary: "SUSE Bug 1084650", url: "https://bugzilla.suse.com/1084650", }, { category: "self", summary: "SUSE Bug 1086001", url: "https://bugzilla.suse.com/1086001", }, { category: "self", summary: "SUSE Bug 1088004", url: "https://bugzilla.suse.com/1088004", }, { category: "self", summary: "SUSE Bug 1088009", url: "https://bugzilla.suse.com/1088009", }, { category: "self", summary: "SUSE Bug 1109847", url: "https://bugzilla.suse.com/1109847", }, { category: "self", summary: "SUSE Bug 1111793", url: "https://bugzilla.suse.com/1111793", }, { category: "self", summary: "SUSE Bug 1113755", url: "https://bugzilla.suse.com/1113755", }, { category: "self", summary: "SUSE Bug 1122191", url: "https://bugzilla.suse.com/1122191", }, { category: "self", summary: "SUSE Bug 1129346", url: "https://bugzilla.suse.com/1129346", }, { category: "self", summary: "SUSE Bug 1130840", url: "https://bugzilla.suse.com/1130840", }, { category: "self", summary: "SUSE Bug 1130847", url: "https://bugzilla.suse.com/1130847", }, { category: "self", summary: "SUSE Bug 1138459", url: "https://bugzilla.suse.com/1138459", }, { category: "self", summary: "SUSE Bug 1141853", url: "https://bugzilla.suse.com/1141853", }, { category: "self", summary: "SUSE Bug 1149792", url: "https://bugzilla.suse.com/1149792", }, { category: "self", summary: "SUSE Bug 1149955", url: "https://bugzilla.suse.com/1149955", }, { category: "self", summary: "SUSE Bug 1153238", url: "https://bugzilla.suse.com/1153238", }, { category: "self", summary: "SUSE Bug 1153830", url: "https://bugzilla.suse.com/1153830", }, { category: "self", summary: "SUSE Bug 1159035", url: "https://bugzilla.suse.com/1159035", }, { category: "self", summary: "SUSE Bug 214983", url: "https://bugzilla.suse.com/214983", }, { category: "self", summary: "SUSE Bug 298378", url: "https://bugzilla.suse.com/298378", }, { category: "self", summary: "SUSE Bug 346490", url: "https://bugzilla.suse.com/346490", }, { category: "self", summary: "SUSE Bug 367853", url: "https://bugzilla.suse.com/367853", }, { category: "self", summary: "SUSE Bug 379534", url: "https://bugzilla.suse.com/379534", }, { category: "self", summary: "SUSE Bug 380942", url: "https://bugzilla.suse.com/380942", }, { category: "self", summary: "SUSE Bug 399190", url: "https://bugzilla.suse.com/399190", }, { category: "self", summary: "SUSE Bug 406051", url: "https://bugzilla.suse.com/406051", }, { category: "self", summary: "SUSE Bug 425138", url: "https://bugzilla.suse.com/425138", }, { category: "self", summary: "SUSE Bug 426563", url: "https://bugzilla.suse.com/426563", }, { category: "self", summary: "SUSE Bug 430761", url: "https://bugzilla.suse.com/430761", }, { category: "self", summary: "SUSE Bug 432677", url: "https://bugzilla.suse.com/432677", }, { category: "self", summary: "SUSE Bug 436966", url: "https://bugzilla.suse.com/436966", }, { category: "self", summary: "SUSE Bug 437293", url: "https://bugzilla.suse.com/437293", }, { category: "self", summary: "SUSE Bug 441088", url: "https://bugzilla.suse.com/441088", }, { category: "self", summary: "SUSE Bug 462375", url: "https://bugzilla.suse.com/462375", }, { category: "self", summary: "SUSE Bug 525295", url: "https://bugzilla.suse.com/525295", }, { category: "self", summary: "SUSE Bug 534721", url: "https://bugzilla.suse.com/534721", }, { category: "self", summary: "SUSE Bug 551715", url: "https://bugzilla.suse.com/551715", }, { category: "self", summary: "SUSE Bug 572673", url: "https://bugzilla.suse.com/572673", }, { category: "self", summary: "SUSE Bug 577032", url: "https://bugzilla.suse.com/577032", }, { category: "self", summary: "SUSE Bug 581765", url: "https://bugzilla.suse.com/581765", }, { category: "self", summary: "SUSE Bug 603255", url: "https://bugzilla.suse.com/603255", }, { category: "self", summary: "SUSE Bug 617751", url: "https://bugzilla.suse.com/617751", }, { category: "self", summary: "SUSE Bug 637176", url: "https://bugzilla.suse.com/637176", }, { category: "self", summary: "SUSE Bug 638233", url: "https://bugzilla.suse.com/638233", }, { category: "self", summary: "SUSE Bug 658604", url: "https://bugzilla.suse.com/658604", }, { category: "self", summary: "SUSE Bug 673071", url: "https://bugzilla.suse.com/673071", }, { category: "self", summary: "SUSE Bug 682554", url: "https://bugzilla.suse.com/682554", }, { category: "self", summary: "SUSE Bug 697251", url: "https://bugzilla.suse.com/697251", }, { category: "self", summary: "SUSE Bug 707667", url: "https://bugzilla.suse.com/707667", }, { category: "self", summary: "SUSE Bug 718009", url: "https://bugzilla.suse.com/718009", }, { category: "self", summary: "SUSE Bug 747125", url: "https://bugzilla.suse.com/747125", }, { category: "self", summary: "SUSE Bug 747794", url: "https://bugzilla.suse.com/747794", }, { category: "self", summary: "SUSE Bug 751718", url: "https://bugzilla.suse.com/751718", }, { category: "self", summary: "SUSE Bug 754447", url: "https://bugzilla.suse.com/754447", }, { category: "self", summary: "SUSE Bug 766778", url: "https://bugzilla.suse.com/766778", }, { category: "self", summary: "SUSE Bug 794139", url: "https://bugzilla.suse.com/794139", }, { category: "self", summary: "SUSE Bug 804978", url: "https://bugzilla.suse.com/804978", }, { category: "self", summary: "SUSE Bug 827982", url: "https://bugzilla.suse.com/827982", }, { category: "self", summary: "SUSE Bug 831442", url: "https://bugzilla.suse.com/831442", }, { category: "self", summary: "SUSE Bug 834601", url: "https://bugzilla.suse.com/834601", }, { category: "self", summary: "SUSE Bug 836739", url: "https://bugzilla.suse.com/836739", }, { category: "self", summary: "SUSE Bug 856835", url: "https://bugzilla.suse.com/856835", }, { category: "self", summary: "SUSE Bug 856836", url: "https://bugzilla.suse.com/856836", }, { category: "self", summary: "SUSE Bug 857470", url: "https://bugzilla.suse.com/857470", }, { category: "self", summary: "SUSE Bug 863741", url: "https://bugzilla.suse.com/863741", }, { category: "self", summary: "SUSE Bug 885882", url: "https://bugzilla.suse.com/885882", }, { category: "self", summary: "SUSE Bug 898572", url: "https://bugzilla.suse.com/898572", }, { category: "self", summary: "SUSE Bug 901715", url: "https://bugzilla.suse.com/901715", }, { category: "self", summary: "SUSE Bug 935856", url: "https://bugzilla.suse.com/935856", }, { category: "self", summary: "SUSE Bug 945401", url: "https://bugzilla.suse.com/945401", }, { category: "self", summary: "SUSE Bug 964182", url: "https://bugzilla.suse.com/964182", }, { category: "self", summary: "SUSE Bug 984751", url: "https://bugzilla.suse.com/984751", }, { category: "self", summary: "SUSE Bug 985177", url: "https://bugzilla.suse.com/985177", }, { category: "self", summary: "SUSE Bug 985348", url: "https://bugzilla.suse.com/985348", }, { category: "self", summary: "SUSE Bug 989523", url: "https://bugzilla.suse.com/989523", }, { category: "self", summary: "SUSE Bug 997436", url: "https://bugzilla.suse.com/997436", }, { category: "self", summary: "SUSE CVE CVE-2007-2052 page", url: "https://www.suse.com/security/cve/CVE-2007-2052/", }, { category: "self", summary: "SUSE CVE CVE-2008-1721 page", url: "https://www.suse.com/security/cve/CVE-2008-1721/", }, { category: "self", summary: "SUSE CVE CVE-2008-2315 page", url: "https://www.suse.com/security/cve/CVE-2008-2315/", }, { category: "self", summary: "SUSE CVE CVE-2008-2316 page", url: "https://www.suse.com/security/cve/CVE-2008-2316/", }, { category: "self", summary: "SUSE CVE CVE-2008-3142 page", url: "https://www.suse.com/security/cve/CVE-2008-3142/", }, { category: "self", summary: "SUSE CVE CVE-2008-3143 page", url: "https://www.suse.com/security/cve/CVE-2008-3143/", }, { category: "self", summary: "SUSE CVE CVE-2008-3144 page", url: "https://www.suse.com/security/cve/CVE-2008-3144/", }, { category: "self", summary: "SUSE CVE CVE-2011-1521 page", url: "https://www.suse.com/security/cve/CVE-2011-1521/", }, { category: "self", summary: "SUSE CVE CVE-2011-3389 page", url: "https://www.suse.com/security/cve/CVE-2011-3389/", }, { category: "self", summary: "SUSE CVE CVE-2011-4944 page", url: "https://www.suse.com/security/cve/CVE-2011-4944/", }, { category: "self", summary: "SUSE CVE CVE-2012-0845 page", url: "https://www.suse.com/security/cve/CVE-2012-0845/", }, { category: "self", summary: "SUSE CVE CVE-2012-1150 page", url: "https://www.suse.com/security/cve/CVE-2012-1150/", }, { category: "self", summary: "SUSE CVE CVE-2013-1752 page", url: "https://www.suse.com/security/cve/CVE-2013-1752/", }, { category: "self", summary: "SUSE CVE CVE-2013-1753 page", url: "https://www.suse.com/security/cve/CVE-2013-1753/", }, { category: "self", summary: "SUSE CVE CVE-2013-4238 page", url: "https://www.suse.com/security/cve/CVE-2013-4238/", }, { category: "self", summary: "SUSE CVE CVE-2014-1912 page", url: "https://www.suse.com/security/cve/CVE-2014-1912/", }, { category: "self", summary: "SUSE CVE CVE-2014-4650 page", url: "https://www.suse.com/security/cve/CVE-2014-4650/", }, { category: "self", summary: "SUSE CVE CVE-2014-7185 page", url: "https://www.suse.com/security/cve/CVE-2014-7185/", }, { category: "self", summary: "SUSE CVE CVE-2016-0772 page", url: "https://www.suse.com/security/cve/CVE-2016-0772/", }, { category: "self", summary: "SUSE CVE CVE-2016-1000110 page", url: "https://www.suse.com/security/cve/CVE-2016-1000110/", }, { category: "self", summary: "SUSE CVE CVE-2016-5636 page", url: "https://www.suse.com/security/cve/CVE-2016-5636/", }, { category: "self", summary: "SUSE CVE CVE-2016-5699 page", url: "https://www.suse.com/security/cve/CVE-2016-5699/", }, { category: "self", summary: "SUSE CVE CVE-2017-1000158 page", url: "https://www.suse.com/security/cve/CVE-2017-1000158/", }, { category: "self", summary: "SUSE CVE CVE-2017-18207 page", url: "https://www.suse.com/security/cve/CVE-2017-18207/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000030 page", url: "https://www.suse.com/security/cve/CVE-2018-1000030/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000802 page", url: "https://www.suse.com/security/cve/CVE-2018-1000802/", }, { category: "self", summary: "SUSE CVE CVE-2018-1060 page", url: "https://www.suse.com/security/cve/CVE-2018-1060/", }, { category: "self", summary: "SUSE CVE CVE-2018-1061 page", url: "https://www.suse.com/security/cve/CVE-2018-1061/", }, { category: "self", summary: "SUSE CVE CVE-2018-14647 page", url: "https://www.suse.com/security/cve/CVE-2018-14647/", }, { category: "self", summary: "SUSE CVE CVE-2018-20852 page", url: "https://www.suse.com/security/cve/CVE-2018-20852/", }, { category: "self", summary: "SUSE CVE CVE-2019-10160 page", url: "https://www.suse.com/security/cve/CVE-2019-10160/", }, { category: "self", summary: "SUSE CVE CVE-2019-16056 page", url: "https://www.suse.com/security/cve/CVE-2019-16056/", }, { category: "self", summary: "SUSE CVE CVE-2019-16935 page", url: "https://www.suse.com/security/cve/CVE-2019-16935/", }, { category: "self", summary: "SUSE CVE CVE-2019-5010 page", url: "https://www.suse.com/security/cve/CVE-2019-5010/", }, { category: "self", summary: "SUSE CVE CVE-2019-9636 page", url: "https://www.suse.com/security/cve/CVE-2019-9636/", }, { category: "self", summary: "SUSE CVE CVE-2019-9947 page", url: "https://www.suse.com/security/cve/CVE-2019-9947/", }, { category: "self", summary: "SUSE CVE CVE-2019-9948 page", url: "https://www.suse.com/security/cve/CVE-2019-9948/", }, ], title: "Security update for python", tracking: { current_release_date: "2020-01-24T15:34:18Z", generator: { date: "2020-01-24T15:34:18Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2020:0234-1", initial_release_date: "2020-01-24T15:34:18Z", revision_history: [ { date: "2020-01-24T15:34:18Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "libpython2_7-1_0-2.7.17-7.32.1.aarch64", product: { name: "libpython2_7-1_0-2.7.17-7.32.1.aarch64", product_id: "libpython2_7-1_0-2.7.17-7.32.1.aarch64", }, }, { category: "product_version", name: "python-2.7.17-7.32.2.aarch64", product: { name: "python-2.7.17-7.32.2.aarch64", product_id: "python-2.7.17-7.32.2.aarch64", }, }, { category: "product_version", name: "python-base-2.7.17-7.32.1.aarch64", product: { name: "python-base-2.7.17-7.32.1.aarch64", product_id: "python-base-2.7.17-7.32.1.aarch64", }, }, { category: "product_version", name: "python-curses-2.7.17-7.32.2.aarch64", product: { name: "python-curses-2.7.17-7.32.2.aarch64", product_id: "python-curses-2.7.17-7.32.2.aarch64", }, }, { category: "product_version", name: "python-demo-2.7.17-7.32.2.aarch64", product: { name: "python-demo-2.7.17-7.32.2.aarch64", product_id: "python-demo-2.7.17-7.32.2.aarch64", }, }, { category: "product_version", name: "python-devel-2.7.17-7.32.1.aarch64", product: { name: "python-devel-2.7.17-7.32.1.aarch64", product_id: "python-devel-2.7.17-7.32.1.aarch64", }, }, { category: "product_version", name: "python-gdbm-2.7.17-7.32.2.aarch64", product: { name: "python-gdbm-2.7.17-7.32.2.aarch64", product_id: "python-gdbm-2.7.17-7.32.2.aarch64", }, }, { category: "product_version", name: "python-idle-2.7.17-7.32.2.aarch64", product: { name: "python-idle-2.7.17-7.32.2.aarch64", product_id: "python-idle-2.7.17-7.32.2.aarch64", }, }, { category: "product_version", name: "python-tk-2.7.17-7.32.2.aarch64", product: { name: "python-tk-2.7.17-7.32.2.aarch64", product_id: "python-tk-2.7.17-7.32.2.aarch64", }, }, { category: "product_version", name: "python-xml-2.7.17-7.32.1.aarch64", product: { name: "python-xml-2.7.17-7.32.1.aarch64", product_id: "python-xml-2.7.17-7.32.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "libpython2_7-1_0-64bit-2.7.17-7.32.1.aarch64_ilp32", product: { name: "libpython2_7-1_0-64bit-2.7.17-7.32.1.aarch64_ilp32", product_id: "libpython2_7-1_0-64bit-2.7.17-7.32.1.aarch64_ilp32", }, }, { category: "product_version", name: "python-64bit-2.7.17-7.32.2.aarch64_ilp32", product: { name: "python-64bit-2.7.17-7.32.2.aarch64_ilp32", product_id: "python-64bit-2.7.17-7.32.2.aarch64_ilp32", }, }, { category: "product_version", name: "python-base-64bit-2.7.17-7.32.1.aarch64_ilp32", product: { name: "python-base-64bit-2.7.17-7.32.1.aarch64_ilp32", product_id: "python-base-64bit-2.7.17-7.32.1.aarch64_ilp32", }, }, ], category: "architecture", name: "aarch64_ilp32", }, { branches: [ { category: "product_version", name: "libpython2_7-1_0-2.7.17-7.32.1.i586", product: { name: "libpython2_7-1_0-2.7.17-7.32.1.i586", product_id: "libpython2_7-1_0-2.7.17-7.32.1.i586", }, }, { category: "product_version", name: "python-2.7.17-7.32.2.i586", product: { name: "python-2.7.17-7.32.2.i586", product_id: "python-2.7.17-7.32.2.i586", }, }, { category: "product_version", name: "python-base-2.7.17-7.32.1.i586", product: { name: "python-base-2.7.17-7.32.1.i586", product_id: "python-base-2.7.17-7.32.1.i586", }, }, { category: "product_version", name: "python-curses-2.7.17-7.32.2.i586", product: { name: "python-curses-2.7.17-7.32.2.i586", product_id: "python-curses-2.7.17-7.32.2.i586", }, }, { category: "product_version", name: "python-demo-2.7.17-7.32.2.i586", product: { name: "python-demo-2.7.17-7.32.2.i586", product_id: "python-demo-2.7.17-7.32.2.i586", }, }, { category: "product_version", name: "python-devel-2.7.17-7.32.1.i586", product: { name: "python-devel-2.7.17-7.32.1.i586", product_id: "python-devel-2.7.17-7.32.1.i586", }, }, { category: "product_version", name: "python-gdbm-2.7.17-7.32.2.i586", product: { name: "python-gdbm-2.7.17-7.32.2.i586", product_id: "python-gdbm-2.7.17-7.32.2.i586", }, }, { category: "product_version", name: "python-idle-2.7.17-7.32.2.i586", product: { name: "python-idle-2.7.17-7.32.2.i586", product_id: "python-idle-2.7.17-7.32.2.i586", }, }, { category: "product_version", name: "python-tk-2.7.17-7.32.2.i586", product: { name: "python-tk-2.7.17-7.32.2.i586", product_id: "python-tk-2.7.17-7.32.2.i586", }, }, { category: "product_version", name: "python-xml-2.7.17-7.32.1.i586", product: { name: "python-xml-2.7.17-7.32.1.i586", product_id: "python-xml-2.7.17-7.32.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "python-doc-2.7.17-7.32.2.noarch", product: { name: "python-doc-2.7.17-7.32.2.noarch", product_id: "python-doc-2.7.17-7.32.2.noarch", }, }, { category: "product_version", name: "python-doc-pdf-2.7.17-7.32.2.noarch", product: { name: "python-doc-pdf-2.7.17-7.32.2.noarch", product_id: "python-doc-pdf-2.7.17-7.32.2.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "libpython2_7-1_0-2.7.17-7.32.1.ppc64le", product: { name: "libpython2_7-1_0-2.7.17-7.32.1.ppc64le", product_id: "libpython2_7-1_0-2.7.17-7.32.1.ppc64le", }, }, { category: "product_version", name: "python-2.7.17-7.32.2.ppc64le", product: { name: "python-2.7.17-7.32.2.ppc64le", product_id: "python-2.7.17-7.32.2.ppc64le", }, }, { category: "product_version", name: "python-base-2.7.17-7.32.1.ppc64le", product: { name: "python-base-2.7.17-7.32.1.ppc64le", product_id: "python-base-2.7.17-7.32.1.ppc64le", }, }, { category: "product_version", name: "python-curses-2.7.17-7.32.2.ppc64le", product: { name: "python-curses-2.7.17-7.32.2.ppc64le", product_id: "python-curses-2.7.17-7.32.2.ppc64le", }, }, { category: "product_version", name: "python-demo-2.7.17-7.32.2.ppc64le", product: { name: "python-demo-2.7.17-7.32.2.ppc64le", product_id: "python-demo-2.7.17-7.32.2.ppc64le", }, }, { category: "product_version", name: "python-devel-2.7.17-7.32.1.ppc64le", product: { name: "python-devel-2.7.17-7.32.1.ppc64le", product_id: "python-devel-2.7.17-7.32.1.ppc64le", }, }, { category: "product_version", name: "python-gdbm-2.7.17-7.32.2.ppc64le", product: { name: "python-gdbm-2.7.17-7.32.2.ppc64le", product_id: "python-gdbm-2.7.17-7.32.2.ppc64le", }, }, { category: "product_version", name: "python-idle-2.7.17-7.32.2.ppc64le", product: { name: "python-idle-2.7.17-7.32.2.ppc64le", product_id: "python-idle-2.7.17-7.32.2.ppc64le", }, }, { category: "product_version", name: "python-tk-2.7.17-7.32.2.ppc64le", product: { name: "python-tk-2.7.17-7.32.2.ppc64le", product_id: "python-tk-2.7.17-7.32.2.ppc64le", }, }, { category: "product_version", name: "python-xml-2.7.17-7.32.1.ppc64le", product: { name: "python-xml-2.7.17-7.32.1.ppc64le", product_id: "python-xml-2.7.17-7.32.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "libpython2_7-1_0-2.7.17-7.32.1.s390x", product: { name: "libpython2_7-1_0-2.7.17-7.32.1.s390x", product_id: "libpython2_7-1_0-2.7.17-7.32.1.s390x", }, }, { category: "product_version", name: "python-2.7.17-7.32.2.s390x", product: { name: "python-2.7.17-7.32.2.s390x", product_id: "python-2.7.17-7.32.2.s390x", }, }, { category: "product_version", name: "python-base-2.7.17-7.32.1.s390x", product: { name: "python-base-2.7.17-7.32.1.s390x", product_id: "python-base-2.7.17-7.32.1.s390x", }, }, { category: "product_version", name: "python-curses-2.7.17-7.32.2.s390x", product: { name: "python-curses-2.7.17-7.32.2.s390x", product_id: "python-curses-2.7.17-7.32.2.s390x", }, }, { category: "product_version", name: "python-demo-2.7.17-7.32.2.s390x", product: { name: "python-demo-2.7.17-7.32.2.s390x", product_id: "python-demo-2.7.17-7.32.2.s390x", }, }, { category: "product_version", name: "python-devel-2.7.17-7.32.1.s390x", product: { name: "python-devel-2.7.17-7.32.1.s390x", product_id: "python-devel-2.7.17-7.32.1.s390x", }, }, { category: "product_version", name: "python-gdbm-2.7.17-7.32.2.s390x", product: { name: "python-gdbm-2.7.17-7.32.2.s390x", product_id: "python-gdbm-2.7.17-7.32.2.s390x", }, }, { category: "product_version", name: "python-idle-2.7.17-7.32.2.s390x", product: { name: "python-idle-2.7.17-7.32.2.s390x", product_id: "python-idle-2.7.17-7.32.2.s390x", }, }, { category: "product_version", name: "python-tk-2.7.17-7.32.2.s390x", product: { name: "python-tk-2.7.17-7.32.2.s390x", product_id: "python-tk-2.7.17-7.32.2.s390x", }, }, { category: "product_version", name: "python-xml-2.7.17-7.32.1.s390x", product: { name: "python-xml-2.7.17-7.32.1.s390x", product_id: "python-xml-2.7.17-7.32.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "libpython2_7-1_0-2.7.17-7.32.1.x86_64", product: { name: "libpython2_7-1_0-2.7.17-7.32.1.x86_64", product_id: "libpython2_7-1_0-2.7.17-7.32.1.x86_64", }, }, { category: "product_version", name: "libpython2_7-1_0-32bit-2.7.17-7.32.1.x86_64", product: { name: "libpython2_7-1_0-32bit-2.7.17-7.32.1.x86_64", product_id: "libpython2_7-1_0-32bit-2.7.17-7.32.1.x86_64", }, }, { category: "product_version", name: "python-2.7.17-7.32.2.x86_64", product: { name: "python-2.7.17-7.32.2.x86_64", product_id: "python-2.7.17-7.32.2.x86_64", }, }, { category: "product_version", name: "python-32bit-2.7.17-7.32.2.x86_64", product: { name: "python-32bit-2.7.17-7.32.2.x86_64", product_id: "python-32bit-2.7.17-7.32.2.x86_64", }, }, { category: "product_version", name: "python-base-2.7.17-7.32.1.x86_64", product: { name: "python-base-2.7.17-7.32.1.x86_64", product_id: "python-base-2.7.17-7.32.1.x86_64", }, }, { category: "product_version", name: "python-base-32bit-2.7.17-7.32.1.x86_64", product: { name: "python-base-32bit-2.7.17-7.32.1.x86_64", product_id: "python-base-32bit-2.7.17-7.32.1.x86_64", }, }, { category: "product_version", name: "python-curses-2.7.17-7.32.2.x86_64", product: { name: "python-curses-2.7.17-7.32.2.x86_64", product_id: "python-curses-2.7.17-7.32.2.x86_64", }, }, { category: "product_version", name: "python-demo-2.7.17-7.32.2.x86_64", product: { name: "python-demo-2.7.17-7.32.2.x86_64", product_id: "python-demo-2.7.17-7.32.2.x86_64", }, }, { category: "product_version", name: "python-devel-2.7.17-7.32.1.x86_64", product: { name: "python-devel-2.7.17-7.32.1.x86_64", product_id: "python-devel-2.7.17-7.32.1.x86_64", }, }, { category: "product_version", name: "python-gdbm-2.7.17-7.32.2.x86_64", product: { name: "python-gdbm-2.7.17-7.32.2.x86_64", product_id: "python-gdbm-2.7.17-7.32.2.x86_64", }, }, { category: "product_version", name: "python-idle-2.7.17-7.32.2.x86_64", product: { name: "python-idle-2.7.17-7.32.2.x86_64", product_id: "python-idle-2.7.17-7.32.2.x86_64", }, }, { category: "product_version", name: "python-tk-2.7.17-7.32.2.x86_64", product: { name: "python-tk-2.7.17-7.32.2.x86_64", product_id: "python-tk-2.7.17-7.32.2.x86_64", }, }, { category: "product_version", name: "python-xml-2.7.17-7.32.1.x86_64", product: { name: "python-xml-2.7.17-7.32.1.x86_64", product_id: "python-xml-2.7.17-7.32.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15", product: { name: "SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15 SP1", product: { name: "SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Desktop Applications 15", product: { name: "SUSE Linux Enterprise Module for Desktop Applications 15", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-desktop-applications:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Desktop Applications 15 SP1", product: { name: "SUSE Linux Enterprise Module for Desktop Applications 15 SP1", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-desktop-applications:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Python 2 15 SP1", product: { name: "SUSE Linux Enterprise Module for Python 2 15 SP1", product_id: "SUSE Linux Enterprise Module for Python 2 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-python2:15:sp1", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "libpython2_7-1_0-2.7.17-7.32.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", }, product_reference: "libpython2_7-1_0-2.7.17-7.32.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libpython2_7-1_0-2.7.17-7.32.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", }, product_reference: "libpython2_7-1_0-2.7.17-7.32.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libpython2_7-1_0-2.7.17-7.32.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", }, product_reference: "libpython2_7-1_0-2.7.17-7.32.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libpython2_7-1_0-2.7.17-7.32.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", }, product_reference: "libpython2_7-1_0-2.7.17-7.32.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "python-2.7.17-7.32.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", }, product_reference: "python-2.7.17-7.32.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "python-2.7.17-7.32.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", }, product_reference: "python-2.7.17-7.32.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "python-2.7.17-7.32.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", }, product_reference: "python-2.7.17-7.32.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "python-2.7.17-7.32.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", }, product_reference: "python-2.7.17-7.32.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "python-base-2.7.17-7.32.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", }, product_reference: "python-base-2.7.17-7.32.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "python-base-2.7.17-7.32.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", }, product_reference: "python-base-2.7.17-7.32.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "python-base-2.7.17-7.32.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", }, product_reference: "python-base-2.7.17-7.32.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "python-base-2.7.17-7.32.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", }, product_reference: "python-base-2.7.17-7.32.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "python-curses-2.7.17-7.32.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", }, product_reference: "python-curses-2.7.17-7.32.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "python-curses-2.7.17-7.32.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", }, product_reference: "python-curses-2.7.17-7.32.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "python-curses-2.7.17-7.32.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", }, product_reference: "python-curses-2.7.17-7.32.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "python-curses-2.7.17-7.32.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", }, product_reference: "python-curses-2.7.17-7.32.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "python-devel-2.7.17-7.32.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", }, product_reference: "python-devel-2.7.17-7.32.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "python-devel-2.7.17-7.32.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", }, product_reference: "python-devel-2.7.17-7.32.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "python-devel-2.7.17-7.32.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", }, product_reference: "python-devel-2.7.17-7.32.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "python-devel-2.7.17-7.32.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", }, product_reference: "python-devel-2.7.17-7.32.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "python-gdbm-2.7.17-7.32.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", }, product_reference: "python-gdbm-2.7.17-7.32.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "python-gdbm-2.7.17-7.32.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", }, product_reference: "python-gdbm-2.7.17-7.32.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "python-gdbm-2.7.17-7.32.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", }, product_reference: "python-gdbm-2.7.17-7.32.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "python-gdbm-2.7.17-7.32.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", }, product_reference: "python-gdbm-2.7.17-7.32.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "python-xml-2.7.17-7.32.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", }, product_reference: "python-xml-2.7.17-7.32.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "python-xml-2.7.17-7.32.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", }, product_reference: "python-xml-2.7.17-7.32.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "python-xml-2.7.17-7.32.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", }, product_reference: "python-xml-2.7.17-7.32.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "python-xml-2.7.17-7.32.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", }, product_reference: "python-xml-2.7.17-7.32.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libpython2_7-1_0-2.7.17-7.32.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", }, product_reference: "libpython2_7-1_0-2.7.17-7.32.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libpython2_7-1_0-2.7.17-7.32.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", }, product_reference: "libpython2_7-1_0-2.7.17-7.32.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libpython2_7-1_0-2.7.17-7.32.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", }, product_reference: "libpython2_7-1_0-2.7.17-7.32.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libpython2_7-1_0-2.7.17-7.32.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", }, product_reference: "libpython2_7-1_0-2.7.17-7.32.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "python-2.7.17-7.32.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", }, product_reference: "python-2.7.17-7.32.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "python-2.7.17-7.32.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", }, product_reference: "python-2.7.17-7.32.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "python-2.7.17-7.32.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", }, product_reference: "python-2.7.17-7.32.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "python-2.7.17-7.32.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", }, product_reference: "python-2.7.17-7.32.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "python-base-2.7.17-7.32.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", }, product_reference: "python-base-2.7.17-7.32.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "python-base-2.7.17-7.32.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", }, product_reference: "python-base-2.7.17-7.32.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "python-base-2.7.17-7.32.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", }, product_reference: "python-base-2.7.17-7.32.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "python-base-2.7.17-7.32.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", }, product_reference: "python-base-2.7.17-7.32.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "python-tk-2.7.17-7.32.2.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", }, product_reference: "python-tk-2.7.17-7.32.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Desktop Applications 15", }, { category: "default_component_of", full_product_name: { name: "python-tk-2.7.17-7.32.2.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", }, product_reference: "python-tk-2.7.17-7.32.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Desktop Applications 15", }, { category: "default_component_of", full_product_name: { name: "python-tk-2.7.17-7.32.2.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", }, product_reference: "python-tk-2.7.17-7.32.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Desktop Applications 15", }, { category: "default_component_of", full_product_name: { name: "python-tk-2.7.17-7.32.2.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", }, product_reference: "python-tk-2.7.17-7.32.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Desktop Applications 15", }, { category: "default_component_of", full_product_name: { name: "python-tk-2.7.17-7.32.2.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP1", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", }, product_reference: "python-tk-2.7.17-7.32.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Desktop Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "python-tk-2.7.17-7.32.2.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP1", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", }, product_reference: "python-tk-2.7.17-7.32.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Desktop Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "python-tk-2.7.17-7.32.2.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP1", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", }, product_reference: "python-tk-2.7.17-7.32.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Desktop Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "python-tk-2.7.17-7.32.2.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP1", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", }, product_reference: "python-tk-2.7.17-7.32.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Desktop Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "python-curses-2.7.17-7.32.2.aarch64 as component of SUSE Linux Enterprise Module for Python 2 15 SP1", product_id: "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", }, product_reference: "python-curses-2.7.17-7.32.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Python 2 15 SP1", }, { category: "default_component_of", full_product_name: { name: "python-curses-2.7.17-7.32.2.ppc64le as component of SUSE Linux Enterprise Module for Python 2 15 SP1", product_id: "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", }, product_reference: "python-curses-2.7.17-7.32.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Python 2 15 SP1", }, { category: "default_component_of", full_product_name: { name: "python-curses-2.7.17-7.32.2.s390x as component of SUSE Linux Enterprise Module for Python 2 15 SP1", product_id: "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", }, product_reference: "python-curses-2.7.17-7.32.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Python 2 15 SP1", }, { category: "default_component_of", full_product_name: { name: "python-curses-2.7.17-7.32.2.x86_64 as component of SUSE Linux Enterprise Module for Python 2 15 SP1", product_id: "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", }, product_reference: "python-curses-2.7.17-7.32.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Python 2 15 SP1", }, { category: "default_component_of", full_product_name: { name: "python-devel-2.7.17-7.32.1.aarch64 as component of SUSE Linux Enterprise Module for Python 2 15 SP1", product_id: "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", }, product_reference: "python-devel-2.7.17-7.32.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Python 2 15 SP1", }, { category: "default_component_of", full_product_name: { name: "python-devel-2.7.17-7.32.1.ppc64le as component of SUSE Linux Enterprise Module for Python 2 15 SP1", product_id: "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", }, product_reference: "python-devel-2.7.17-7.32.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Python 2 15 SP1", }, { category: "default_component_of", full_product_name: { name: "python-devel-2.7.17-7.32.1.s390x as component of SUSE Linux Enterprise Module for Python 2 15 SP1", product_id: "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", }, product_reference: "python-devel-2.7.17-7.32.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Python 2 15 SP1", }, { category: "default_component_of", full_product_name: { name: "python-devel-2.7.17-7.32.1.x86_64 as component of SUSE Linux Enterprise Module for Python 2 15 SP1", product_id: "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", }, product_reference: "python-devel-2.7.17-7.32.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Python 2 15 SP1", }, { category: "default_component_of", full_product_name: { name: "python-gdbm-2.7.17-7.32.2.aarch64 as component of SUSE Linux Enterprise Module for Python 2 15 SP1", product_id: "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", }, product_reference: "python-gdbm-2.7.17-7.32.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Python 2 15 SP1", }, { category: "default_component_of", full_product_name: { name: "python-gdbm-2.7.17-7.32.2.ppc64le as component of SUSE Linux Enterprise Module for Python 2 15 SP1", product_id: "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", }, product_reference: "python-gdbm-2.7.17-7.32.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Python 2 15 SP1", }, { category: "default_component_of", full_product_name: { name: "python-gdbm-2.7.17-7.32.2.s390x as component of SUSE Linux Enterprise Module for Python 2 15 SP1", product_id: "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", }, product_reference: "python-gdbm-2.7.17-7.32.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Python 2 15 SP1", }, { category: "default_component_of", full_product_name: { name: "python-gdbm-2.7.17-7.32.2.x86_64 as component of SUSE Linux Enterprise Module for Python 2 15 SP1", product_id: "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", }, product_reference: "python-gdbm-2.7.17-7.32.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Python 2 15 SP1", }, { category: "default_component_of", full_product_name: { name: "python-xml-2.7.17-7.32.1.aarch64 as component of SUSE Linux Enterprise Module for Python 2 15 SP1", product_id: "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", }, product_reference: "python-xml-2.7.17-7.32.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Python 2 15 SP1", }, { category: "default_component_of", full_product_name: { name: "python-xml-2.7.17-7.32.1.ppc64le as component of SUSE Linux Enterprise Module for Python 2 15 SP1", product_id: "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", }, product_reference: "python-xml-2.7.17-7.32.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Python 2 15 SP1", }, { category: "default_component_of", full_product_name: { name: "python-xml-2.7.17-7.32.1.s390x as component of SUSE Linux Enterprise Module for Python 2 15 SP1", product_id: "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", }, product_reference: "python-xml-2.7.17-7.32.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Python 2 15 SP1", }, { category: "default_component_of", full_product_name: { name: "python-xml-2.7.17-7.32.1.x86_64 as component of SUSE Linux Enterprise Module for Python 2 15 SP1", product_id: "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", }, product_reference: "python-xml-2.7.17-7.32.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Python 2 15 SP1", }, ], }, vulnerabilities: [ { cve: "CVE-2007-2052", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2007-2052", }, ], notes: [ { category: "general", text: "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2007-2052", url: "https://www.suse.com/security/cve/CVE-2007-2052", }, { category: "external", summary: "SUSE Bug 276889 for CVE-2007-2052", url: "https://bugzilla.suse.com/276889", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-24T15:34:18Z", details: "moderate", }, ], title: "CVE-2007-2052", }, { cve: "CVE-2008-1721", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2008-1721", }, ], notes: [ { category: "general", text: "Integer signedness error in the zlib extension module in Python 2.5.2 and earlier allows remote attackers to execute arbitrary code via a negative signed integer, which triggers insufficient memory allocation and a buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2008-1721", url: "https://www.suse.com/security/cve/CVE-2008-1721", }, { category: "external", summary: "SUSE Bug 379044 for CVE-2008-1721", url: "https://bugzilla.suse.com/379044", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-24T15:34:18Z", details: "important", }, ], title: "CVE-2008-1721", }, { cve: "CVE-2008-2315", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2008-2315", }, ], notes: [ { category: "general", text: "Multiple integer overflows in Python 2.5.2 and earlier allow context-dependent attackers to have an unknown impact via vectors related to the (1) stringobject, (2) unicodeobject, (3) bufferobject, (4) longobject, (5) tupleobject, (6) stropmodule, (7) gcmodule, and (8) mmapmodule modules. NOTE: The expandtabs integer overflows in stringobject and unicodeobject in 2.5.2 are covered by CVE-2008-5031.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2008-2315", url: "https://www.suse.com/security/cve/CVE-2008-2315", }, { category: "external", summary: "SUSE Bug 406051 for CVE-2008-2315", url: "https://bugzilla.suse.com/406051", }, { category: "external", summary: "SUSE Bug 443653 for CVE-2008-2315", url: "https://bugzilla.suse.com/443653", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-24T15:34:18Z", details: "important", }, ], title: "CVE-2008-2315", }, { cve: "CVE-2008-2316", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2008-2316", }, ], notes: [ { category: "general", text: "Integer overflow in _hashopenssl.c in the hashlib module in Python 2.5.2 and earlier might allow context-dependent attackers to defeat cryptographic digests, related to \"partial hashlib hashing of data exceeding 4GB.\"", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2008-2316", url: "https://www.suse.com/security/cve/CVE-2008-2316", }, { category: "external", summary: "SUSE Bug 406051 for CVE-2008-2316", url: "https://bugzilla.suse.com/406051", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-24T15:34:18Z", details: "important", }, ], title: "CVE-2008-2316", }, { cve: "CVE-2008-3142", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2008-3142", }, ], notes: [ { category: "general", text: "Multiple buffer overflows in Python 2.5.2 and earlier on 32bit platforms allow context-dependent attackers to cause a denial of service (crash) or have unspecified other impact via a long string that leads to incorrect memory allocation during Unicode string processing, related to the unicode_resize function and the PyMem_RESIZE macro.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2008-3142", url: "https://www.suse.com/security/cve/CVE-2008-3142", }, { category: "external", summary: "SUSE Bug 406051 for CVE-2008-3142", url: "https://bugzilla.suse.com/406051", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-24T15:34:18Z", details: "important", }, ], title: "CVE-2008-3142", }, { cve: "CVE-2008-3143", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2008-3143", }, ], notes: [ { category: "general", text: "Multiple integer overflows in Python before 2.5.2 might allow context-dependent attackers to have an unknown impact via vectors related to (1) Include/pymem.h; (2) _csv.c, (3) _struct.c, (4) arraymodule.c, (5) audioop.c, (6) binascii.c, (7) cPickle.c, (8) cStringIO.c, (9) cjkcodecs/multibytecodec.c, (10) datetimemodule.c, (11) md5.c, (12) rgbimgmodule.c, and (13) stropmodule.c in Modules/; (14) bufferobject.c, (15) listobject.c, and (16) obmalloc.c in Objects/; (17) Parser/node.c; and (18) asdl.c, (19) ast.c, (20) bltinmodule.c, and (21) compile.c in Python/, as addressed by \"checks for integer overflows, contributed by Google.\"", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2008-3143", url: "https://www.suse.com/security/cve/CVE-2008-3143", }, { category: "external", summary: "SUSE Bug 406051 for CVE-2008-3143", url: "https://bugzilla.suse.com/406051", }, { category: "external", summary: "SUSE Bug 444989 for CVE-2008-3143", url: "https://bugzilla.suse.com/444989", }, { category: "external", summary: "SUSE Bug 609759 for CVE-2008-3143", url: "https://bugzilla.suse.com/609759", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-24T15:34:18Z", details: "important", }, ], title: "CVE-2008-3143", }, { cve: "CVE-2008-3144", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2008-3144", }, ], notes: [ { category: "general", text: "Multiple integer overflows in the PyOS_vsnprintf function in Python/mysnprintf.c in Python 2.5.2 and earlier allow context-dependent attackers to cause a denial of service (memory corruption) or have unspecified other impact via crafted input to string formatting operations. NOTE: the handling of certain integer values is also affected by related integer underflows and an off-by-one error.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2008-3144", url: "https://www.suse.com/security/cve/CVE-2008-3144", }, { category: "external", summary: "SUSE Bug 406051 for CVE-2008-3144", url: "https://bugzilla.suse.com/406051", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-24T15:34:18Z", details: "moderate", }, ], title: "CVE-2008-3144", }, { cve: "CVE-2011-1521", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2011-1521", }, ], notes: [ { category: "general", text: "The urllib and urllib2 modules in Python 2.x before 2.7.2 and 3.x before 3.2.1 process Location headers that specify redirection to file: URLs, which makes it easier for remote attackers to obtain sensitive information or cause a denial of service (resource consumption) via a crafted URL, as demonstrated by the file:///etc/passwd and file:///dev/zero URLs.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2011-1521", url: "https://www.suse.com/security/cve/CVE-2011-1521", }, { category: "external", summary: "SUSE Bug 682554 for CVE-2011-1521", url: "https://bugzilla.suse.com/682554", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-24T15:34:18Z", details: "moderate", }, ], title: "CVE-2011-1521", }, { cve: "CVE-2011-3389", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2011-3389", }, ], notes: [ { category: "general", text: "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2011-3389", url: "https://www.suse.com/security/cve/CVE-2011-3389", }, { category: "external", summary: "SUSE Bug 716002 for CVE-2011-3389", url: "https://bugzilla.suse.com/716002", }, { category: "external", summary: "SUSE Bug 719047 for CVE-2011-3389", url: "https://bugzilla.suse.com/719047", }, { category: "external", summary: "SUSE Bug 725167 for CVE-2011-3389", url: "https://bugzilla.suse.com/725167", }, { category: "external", summary: "SUSE Bug 726096 for CVE-2011-3389", url: "https://bugzilla.suse.com/726096", }, { category: "external", summary: "SUSE Bug 739248 for CVE-2011-3389", url: "https://bugzilla.suse.com/739248", }, { category: "external", summary: "SUSE Bug 739256 for CVE-2011-3389", url: "https://bugzilla.suse.com/739256", }, { category: "external", summary: "SUSE Bug 742306 for CVE-2011-3389", url: "https://bugzilla.suse.com/742306", }, { category: "external", summary: "SUSE Bug 751718 for CVE-2011-3389", url: "https://bugzilla.suse.com/751718", }, { category: "external", summary: "SUSE Bug 759666 for CVE-2011-3389", url: "https://bugzilla.suse.com/759666", }, { category: "external", summary: "SUSE Bug 763598 for CVE-2011-3389", url: "https://bugzilla.suse.com/763598", }, { category: "external", summary: "SUSE Bug 814655 for CVE-2011-3389", url: "https://bugzilla.suse.com/814655", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-24T15:34:18Z", details: "moderate", }, ], title: "CVE-2011-3389", }, { cve: "CVE-2011-4944", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2011-4944", }, ], notes: [ { category: "general", text: "Python 2.6 through 3.2 creates ~/.pypirc with world-readable permissions before changing them after data has been written, which introduces a race condition that allows local users to obtain a username and password by reading this file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2011-4944", url: "https://www.suse.com/security/cve/CVE-2011-4944", }, { category: "external", summary: "SUSE Bug 754447 for CVE-2011-4944", url: "https://bugzilla.suse.com/754447", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-24T15:34:18Z", details: "low", }, ], title: "CVE-2011-4944", }, { cve: "CVE-2012-0845", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2012-0845", }, ], notes: [ { category: "general", text: "SimpleXMLRPCServer.py in SimpleXMLRPCServer in Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an XML-RPC POST request that contains a smaller amount of data than specified by the Content-Length header.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2012-0845", url: "https://www.suse.com/security/cve/CVE-2012-0845", }, { category: "external", summary: "SUSE Bug 747125 for CVE-2012-0845", url: "https://bugzilla.suse.com/747125", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-24T15:34:18Z", details: "moderate", }, ], title: "CVE-2012-0845", }, { cve: "CVE-2012-1150", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2012-1150", }, ], notes: [ { category: "general", text: "Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2012-1150", url: "https://www.suse.com/security/cve/CVE-2012-1150", }, { category: "external", summary: "SUSE Bug 751718 for CVE-2012-1150", url: "https://bugzilla.suse.com/751718", }, { category: "external", summary: "SUSE Bug 755383 for CVE-2012-1150", url: "https://bugzilla.suse.com/755383", }, { category: "external", summary: "SUSE Bug 826682 for CVE-2012-1150", url: "https://bugzilla.suse.com/826682", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-24T15:34:18Z", details: "moderate", }, ], title: "CVE-2012-1150", }, { cve: "CVE-2013-1752", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2013-1752", }, ], notes: [ { category: "general", text: "** REJECT ** Various versions of Python do not properly restrict readline calls, which allows remote attackers to cause a denial of service (memory consumption) via a long string, related to (1) httplib - fixed in 2.7.4, 2.6.9, and 3.3.3; (2) ftplib - fixed in 2.7.6, 2.6.9, 3.3.3; (3) imaplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; (4) nntplib - fixed in 2.7.6, 2.6.9, 3.3.3; (5) poplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; and (6) smtplib - not yet fixed in 2.7.x, fixed in 2.6.9, not yet fixed in 3.3.x. NOTE: this was REJECTed because it is incompatible with CNT1 \"Independently Fixable\" in the CVE Counting Decisions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2013-1752", url: "https://www.suse.com/security/cve/CVE-2013-1752", }, { category: "external", summary: "SUSE Bug 856835 for CVE-2013-1752", url: "https://bugzilla.suse.com/856835", }, { category: "external", summary: "SUSE Bug 856836 for CVE-2013-1752", url: "https://bugzilla.suse.com/856836", }, { category: "external", summary: "SUSE Bug 863741 for CVE-2013-1752", url: "https://bugzilla.suse.com/863741", }, { category: "external", summary: "SUSE Bug 885882 for CVE-2013-1752", url: "https://bugzilla.suse.com/885882", }, { category: "external", summary: "SUSE Bug 898572 for CVE-2013-1752", url: "https://bugzilla.suse.com/898572", }, { category: "external", summary: "SUSE Bug 912739 for CVE-2013-1752", url: "https://bugzilla.suse.com/912739", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-24T15:34:18Z", details: "moderate", }, ], title: "CVE-2013-1752", }, { cve: "CVE-2013-1753", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2013-1753", }, ], notes: [ { category: "general", text: "The gzip_decode function in the xmlrpc client library in Python 3.4 and earlier allows remote attackers to cause a denial of service (memory consumption) via a crafted HTTP request.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2013-1753", url: "https://www.suse.com/security/cve/CVE-2013-1753", }, { category: "external", summary: "SUSE Bug 856835 for CVE-2013-1753", url: "https://bugzilla.suse.com/856835", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-24T15:34:18Z", details: "moderate", }, ], title: "CVE-2013-1753", }, { cve: "CVE-2013-4238", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2013-4238", }, ], notes: [ { category: "general", text: "The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a '\\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2013-4238", url: "https://www.suse.com/security/cve/CVE-2013-4238", }, { category: "external", summary: "SUSE Bug 834601 for CVE-2013-4238", url: "https://bugzilla.suse.com/834601", }, { category: "external", summary: "SUSE Bug 839107 for CVE-2013-4238", url: "https://bugzilla.suse.com/839107", }, { category: "external", summary: "SUSE Bug 882915 for CVE-2013-4238", url: "https://bugzilla.suse.com/882915", }, { category: "external", summary: "SUSE Bug 912739 for CVE-2013-4238", url: "https://bugzilla.suse.com/912739", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-24T15:34:18Z", details: "moderate", }, ], title: "CVE-2013-4238", }, { cve: "CVE-2014-1912", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-1912", }, ], notes: [ { category: "general", text: "Buffer overflow in the socket.recvfrom_into function in Modules/socketmodule.c in Python 2.5 before 2.7.7, 3.x before 3.3.4, and 3.4.x before 3.4rc1 allows remote attackers to execute arbitrary code via a crafted string.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-1912", url: "https://www.suse.com/security/cve/CVE-2014-1912", }, { category: "external", summary: "SUSE Bug 1049392 for CVE-2014-1912", url: "https://bugzilla.suse.com/1049392", }, { category: "external", summary: "SUSE Bug 1049422 for CVE-2014-1912", url: "https://bugzilla.suse.com/1049422", }, { category: "external", summary: "SUSE Bug 863741 for CVE-2014-1912", url: "https://bugzilla.suse.com/863741", }, { category: "external", summary: "SUSE Bug 882915 for CVE-2014-1912", url: "https://bugzilla.suse.com/882915", }, { category: "external", summary: "SUSE Bug 912739 for CVE-2014-1912", url: "https://bugzilla.suse.com/912739", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-24T15:34:18Z", details: "important", }, ], title: "CVE-2014-1912", }, { cve: "CVE-2014-4650", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-4650", }, ], notes: [ { category: "general", text: "The CGIHTTPServer module in Python 2.7.5 and 3.3.4 does not properly handle URLs in which URL encoding is used for path separators, which allows remote attackers to read script source code or conduct directory traversal attacks and execute unintended code via a crafted character sequence, as demonstrated by a %2f separator.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-4650", url: "https://www.suse.com/security/cve/CVE-2014-4650", }, { category: "external", summary: "SUSE Bug 856835 for CVE-2014-4650", url: "https://bugzilla.suse.com/856835", }, { category: "external", summary: "SUSE Bug 856836 for CVE-2014-4650", url: "https://bugzilla.suse.com/856836", }, { category: "external", summary: "SUSE Bug 863741 for CVE-2014-4650", url: "https://bugzilla.suse.com/863741", }, { category: "external", summary: "SUSE Bug 885882 for CVE-2014-4650", url: "https://bugzilla.suse.com/885882", }, { category: "external", summary: "SUSE Bug 898572 for CVE-2014-4650", url: "https://bugzilla.suse.com/898572", }, { category: "external", summary: "SUSE Bug 912739 for CVE-2014-4650", url: "https://bugzilla.suse.com/912739", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-24T15:34:18Z", details: "moderate", }, ], title: "CVE-2014-4650", }, { cve: "CVE-2014-7185", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-7185", }, ], notes: [ { category: "general", text: "Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a \"buffer\" function.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-7185", url: "https://www.suse.com/security/cve/CVE-2014-7185", }, { category: "external", summary: "SUSE Bug 898572 for CVE-2014-7185", url: "https://bugzilla.suse.com/898572", }, { category: "external", summary: "SUSE Bug 912739 for CVE-2014-7185", url: "https://bugzilla.suse.com/912739", }, { category: "external", summary: "SUSE Bug 913479 for CVE-2014-7185", url: "https://bugzilla.suse.com/913479", }, { category: "external", summary: "SUSE Bug 955182 for CVE-2014-7185", url: "https://bugzilla.suse.com/955182", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-24T15:34:18Z", details: "moderate", }, ], title: "CVE-2014-7185", }, { cve: "CVE-2016-0772", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-0772", }, ], notes: [ { category: "general", text: "The smtplib library in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 does not return an error when StartTLS fails, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a \"StartTLS stripping attack.\"", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-0772", url: "https://www.suse.com/security/cve/CVE-2016-0772", }, { category: "external", summary: "SUSE Bug 984751 for CVE-2016-0772", url: "https://bugzilla.suse.com/984751", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-24T15:34:18Z", details: "moderate", }, ], title: "CVE-2016-0772", }, { cve: "CVE-2016-1000110", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1000110", }, ], notes: [ { category: "general", text: "The CGIHandler class in Python before 2.7.12 does not protect against the HTTP_PROXY variable name clash in a CGI script, which could allow a remote attacker to redirect HTTP requests.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1000110", url: "https://www.suse.com/security/cve/CVE-2016-1000110", }, { category: "external", summary: "SUSE Bug 988484 for CVE-2016-1000110", url: "https://bugzilla.suse.com/988484", }, { category: "external", summary: "SUSE Bug 989523 for CVE-2016-1000110", url: "https://bugzilla.suse.com/989523", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-24T15:34:18Z", details: "moderate", }, ], title: "CVE-2016-1000110", }, { cve: "CVE-2016-5636", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5636", }, ], notes: [ { category: "general", text: "Integer overflow in the get_data function in zipimport.c in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 allows remote attackers to have unspecified impact via a negative data size value, which triggers a heap-based buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5636", url: "https://www.suse.com/security/cve/CVE-2016-5636", }, { category: "external", summary: "SUSE Bug 1065451 for CVE-2016-5636", url: "https://bugzilla.suse.com/1065451", }, { category: "external", summary: "SUSE Bug 1106262 for CVE-2016-5636", url: "https://bugzilla.suse.com/1106262", }, { category: "external", summary: "SUSE Bug 985177 for CVE-2016-5636", url: "https://bugzilla.suse.com/985177", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-24T15:34:18Z", details: "important", }, ], title: "CVE-2016-5636", }, { cve: "CVE-2016-5699", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5699", }, ], notes: [ { category: "general", text: "CRLF injection vulnerability in the HTTPConnection.putheader function in urllib2 and urllib in CPython (aka Python) before 2.7.10 and 3.x before 3.4.4 allows remote attackers to inject arbitrary HTTP headers via CRLF sequences in a URL.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5699", url: "https://www.suse.com/security/cve/CVE-2016-5699", }, { category: "external", summary: "SUSE Bug 1122729 for CVE-2016-5699", url: "https://bugzilla.suse.com/1122729", }, { category: "external", summary: "SUSE Bug 1130840 for CVE-2016-5699", url: "https://bugzilla.suse.com/1130840", }, { category: "external", summary: "SUSE Bug 985348 for CVE-2016-5699", url: "https://bugzilla.suse.com/985348", }, { category: "external", summary: "SUSE Bug 985351 for CVE-2016-5699", url: "https://bugzilla.suse.com/985351", }, { category: "external", summary: "SUSE Bug 986630 for CVE-2016-5699", url: "https://bugzilla.suse.com/986630", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-24T15:34:18Z", details: "moderate", }, ], title: "CVE-2016-5699", }, { cve: "CVE-2017-1000158", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-1000158", }, ], notes: [ { category: "general", text: "CPython (aka Python) up to 2.7.13 is vulnerable to an integer overflow in the PyString_DecodeEscape function in stringobject.c, resulting in heap-based buffer overflow (and possible arbitrary code execution)", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-1000158", url: "https://www.suse.com/security/cve/CVE-2017-1000158", }, { category: "external", summary: "SUSE Bug 1068664 for CVE-2017-1000158", url: "https://bugzilla.suse.com/1068664", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-24T15:34:18Z", details: "important", }, ], title: "CVE-2017-1000158", }, { cve: "CVE-2017-18207", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-18207", }, ], notes: [ { category: "general", text: "** DISPUTED ** The Wave_read._read_fmt_chunk function in Lib/wave.py in Python through 3.6.4 does not ensure a nonzero channel value, which allows attackers to cause a denial of service (divide-by-zero and exception) via a crafted wav format audio file. NOTE: the vendor disputes this issue because Python applications \"need to be prepared to handle a wide variety of exceptions.\"", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-18207", url: "https://www.suse.com/security/cve/CVE-2017-18207", }, { category: "external", summary: "SUSE Bug 1083507 for CVE-2017-18207", url: "https://bugzilla.suse.com/1083507", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-24T15:34:18Z", details: "moderate", }, ], title: "CVE-2017-18207", }, { cve: "CVE-2018-1000030", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000030", }, ], notes: [ { category: "general", text: "Python 2.7.14 is vulnerable to a Heap-Buffer-Overflow as well as a Heap-Use-After-Free. Python versions prior to 2.7.14 may also be vulnerable and it appears that Python 2.7.17 and prior may also be vulnerable however this has not been confirmed. The vulnerability lies when multiply threads are handling large amounts of data. In both cases there is essentially a race condition that occurs. For the Heap-Buffer-Overflow, Thread 2 is creating the size for a buffer, but Thread1 is already writing to the buffer without knowing how much to write. So when a large amount of data is being processed, it is very easy to cause memory corruption using a Heap-Buffer-Overflow. As for the Use-After-Free, Thread3->Malloc->Thread1->Free's->Thread2-Re-uses-Free'd Memory. The PSRT has stated that this is not a security vulnerability due to the fact that the attacker must be able to run code, however in some situations, such as function as a service, this vulnerability can potentially be used by an attacker to violate a trust boundary, as such the DWF feels this issue deserves a CVE.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000030", url: "https://www.suse.com/security/cve/CVE-2018-1000030", }, { category: "external", summary: "SUSE Bug 1079300 for CVE-2018-1000030", url: "https://bugzilla.suse.com/1079300", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-24T15:34:18Z", details: "important", }, ], title: "CVE-2018-1000030", }, { cve: "CVE-2018-1000802", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000802", }, ], notes: [ { category: "general", text: "Python Software Foundation Python (CPython) version 2.7 contains a CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in shutil module (make_archive function) that can result in Denial of service, Information gain via injection of arbitrary files on the system or entire drive. This attack appear to be exploitable via Passage of unfiltered user input to the function. This vulnerability appears to have been fixed in after commit add531a1e55b0a739b0f42582f1c9747e5649ace.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000802", url: "https://www.suse.com/security/cve/CVE-2018-1000802", }, { category: "external", summary: "SUSE Bug 1109663 for CVE-2018-1000802", url: "https://bugzilla.suse.com/1109663", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-24T15:34:18Z", details: "moderate", }, ], title: "CVE-2018-1000802", }, { cve: "CVE-2018-1060", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1060", }, ], notes: [ { category: "general", text: "python before versions 2.7.15, 3.4.9, 3.5.6rc1, 3.6.5rc1 and 3.7.0 is vulnerable to catastrophic backtracking in pop3lib's apop() method. An attacker could use this flaw to cause denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1060", url: "https://www.suse.com/security/cve/CVE-2018-1060", }, { category: "external", summary: "SUSE Bug 1088009 for CVE-2018-1060", url: "https://bugzilla.suse.com/1088009", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-24T15:34:18Z", details: "low", }, ], title: "CVE-2018-1060", }, { cve: "CVE-2018-1061", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1061", }, ], notes: [ { category: "general", text: "python before versions 2.7.15, 3.4.9, 3.5.6rc1, 3.6.5rc1 and 3.7.0 is vulnerable to catastrophic backtracking in the difflib.IS_LINE_JUNK method. An attacker could use this flaw to cause denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1061", url: "https://www.suse.com/security/cve/CVE-2018-1061", }, { category: "external", summary: "SUSE Bug 1088004 for CVE-2018-1061", url: "https://bugzilla.suse.com/1088004", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-24T15:34:18Z", details: "moderate", }, ], title: "CVE-2018-1061", }, { cve: "CVE-2018-14647", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14647", }, ], notes: [ { category: "general", text: "Python's elementtree C accelerator failed to initialise Expat's hash salt during initialization. This could make it easy to conduct denial of service attacks against Expat by constructing an XML document that would cause pathological hash collisions in Expat's internal data structures, consuming large amounts CPU and RAM. The vulnerability exists in Python versions 3.7.0, 3.6.0 through 3.6.6, 3.5.0 through 3.5.6, 3.4.0 through 3.4.9, 2.7.0 through 2.7.15.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14647", url: "https://www.suse.com/security/cve/CVE-2018-14647", }, { category: "external", summary: "SUSE Bug 1109847 for CVE-2018-14647", url: "https://bugzilla.suse.com/1109847", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-14647", url: "https://bugzilla.suse.com/1126909", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-24T15:34:18Z", details: "moderate", }, ], title: "CVE-2018-14647", }, { cve: "CVE-2018-20852", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20852", }, ], notes: [ { category: "general", text: "http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20852", url: "https://www.suse.com/security/cve/CVE-2018-20852", }, { category: "external", summary: "SUSE Bug 1141853 for CVE-2018-20852", url: "https://bugzilla.suse.com/1141853", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-24T15:34:18Z", details: "moderate", }, ], title: "CVE-2018-20852", }, { cve: "CVE-2019-10160", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-10160", }, ], notes: [ { category: "general", text: "A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-10160", url: "https://www.suse.com/security/cve/CVE-2019-10160", }, { category: "external", summary: "SUSE Bug 1138459 for CVE-2019-10160", url: "https://bugzilla.suse.com/1138459", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-24T15:34:18Z", details: "critical", }, ], title: "CVE-2019-10160", }, { cve: "CVE-2019-16056", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-16056", }, ], notes: [ { category: "general", text: "An issue was discovered in Python through 2.7.16, 3.x through 3.5.7, 3.6.x through 3.6.9, and 3.7.x through 3.7.4. The email module wrongly parses email addresses that contain multiple @ characters. An application that uses the email module and implements some kind of checks on the From/To headers of a message could be tricked into accepting an email address that should be denied. An attack may be the same as in CVE-2019-11340; however, this CVE applies to Python more generally.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-16056", url: "https://www.suse.com/security/cve/CVE-2019-16056", }, { category: "external", summary: "SUSE Bug 1149955 for CVE-2019-16056", url: "https://bugzilla.suse.com/1149955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-24T15:34:18Z", details: "moderate", }, ], title: "CVE-2019-16056", }, { cve: "CVE-2019-16935", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-16935", }, ], notes: [ { category: "general", text: "The documentation XML-RPC server in Python through 2.7.16, 3.x through 3.6.9, and 3.7.x through 3.7.4 has XSS via the server_title field. This occurs in Lib/DocXMLRPCServer.py in Python 2.x, and in Lib/xmlrpc/server.py in Python 3.x. If set_server_title is called with untrusted input, arbitrary JavaScript can be delivered to clients that visit the http URL for this server.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-16935", url: "https://www.suse.com/security/cve/CVE-2019-16935", }, { category: "external", summary: "SUSE Bug 1153238 for CVE-2019-16935", url: "https://bugzilla.suse.com/1153238", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-24T15:34:18Z", details: "moderate", }, ], title: "CVE-2019-16935", }, { cve: "CVE-2019-5010", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-5010", }, ], notes: [ { category: "general", text: "An exploitable denial-of-service vulnerability exists in the X509 certificate parser of Python.org Python 2.7.11 / 3.6.6. A specially crafted X509 certificate can cause a NULL pointer dereference, resulting in a denial of service. An attacker can initiate or accept TLS connections using crafted certificates to trigger this vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-5010", url: "https://www.suse.com/security/cve/CVE-2019-5010", }, { category: "external", summary: "SUSE Bug 1122191 for CVE-2019-5010", url: "https://bugzilla.suse.com/1122191", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2019-5010", url: "https://bugzilla.suse.com/1126909", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-24T15:34:18Z", details: "important", }, ], title: "CVE-2019-5010", }, { cve: "CVE-2019-9636", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-9636", }, ], notes: [ { category: "general", text: "Python 2.7.x through 2.7.16 and 3.x through 3.7.2 is affected by: Improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization. The impact is: Information disclosure (credentials, cookies, etc. that are cached against a given hostname). The components are: urllib.parse.urlsplit, urllib.parse.urlparse. The attack vector is: A specially crafted URL could be incorrectly parsed to locate cookies or authentication data and send that information to a different host than when parsed correctly. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-9636", url: "https://www.suse.com/security/cve/CVE-2019-9636", }, { category: "external", summary: "SUSE Bug 1129346 for CVE-2019-9636", url: "https://bugzilla.suse.com/1129346", }, { category: "external", summary: "SUSE Bug 1135433 for CVE-2019-9636", url: "https://bugzilla.suse.com/1135433", }, { category: "external", summary: "SUSE Bug 1138459 for CVE-2019-9636", url: "https://bugzilla.suse.com/1138459", }, { category: "external", summary: "SUSE Bug 1145004 for CVE-2019-9636", url: "https://bugzilla.suse.com/1145004", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-24T15:34:18Z", details: "important", }, ], title: "CVE-2019-9636", }, { cve: "CVE-2019-9947", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-9947", }, ], notes: [ { category: "general", text: "An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-9947", url: "https://www.suse.com/security/cve/CVE-2019-9947", }, { category: "external", summary: "SUSE Bug 1130840 for CVE-2019-9947", url: "https://bugzilla.suse.com/1130840", }, { category: "external", summary: "SUSE Bug 1136184 for CVE-2019-9947", url: "https://bugzilla.suse.com/1136184", }, { category: "external", summary: "SUSE Bug 1155094 for CVE-2019-9947", url: "https://bugzilla.suse.com/1155094", }, { category: "external", summary: "SUSE Bug 1201559 for CVE-2019-9947", url: "https://bugzilla.suse.com/1201559", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-24T15:34:18Z", details: "moderate", }, ], title: "CVE-2019-9947", }, { cve: "CVE-2019-9948", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-9948", }, ], notes: [ { category: "general", text: "urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen('local_file:///etc/passwd') call.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-9948", url: "https://www.suse.com/security/cve/CVE-2019-9948", }, { category: "external", summary: "SUSE Bug 1130847 for CVE-2019-9948", url: "https://bugzilla.suse.com/1130847", }, { category: "external", summary: "SUSE Bug 1135433 for CVE-2019-9948", url: "https://bugzilla.suse.com/1135433", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libpython2_7-1_0-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-base-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:python-xml-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:python-tk-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-curses-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-devel-2.7.17-7.32.1.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-gdbm-2.7.17-7.32.2.x86_64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.aarch64", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.ppc64le", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.s390x", "SUSE Linux Enterprise Module for Python 2 15 SP1:python-xml-2.7.17-7.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-24T15:34:18Z", details: "low", }, ], title: "CVE-2019-9948", }, ], }
opensuse-su-2024:11202-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
python-2.7.18-8.1 on GA media
Notes
Title of the patch
python-2.7.18-8.1 on GA media
Description of the patch
These are all security issues fixed in the python-2.7.18-8.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-11202
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "python-2.7.18-8.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the python-2.7.18-8.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-11202", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11202-1.json", }, { category: "self", summary: "SUSE CVE CVE-2007-2052 page", url: "https://www.suse.com/security/cve/CVE-2007-2052/", }, { category: "self", summary: "SUSE CVE CVE-2008-1721 page", url: "https://www.suse.com/security/cve/CVE-2008-1721/", }, { category: "self", summary: "SUSE CVE CVE-2008-2315 page", url: "https://www.suse.com/security/cve/CVE-2008-2315/", }, { category: "self", summary: "SUSE CVE CVE-2008-2316 page", url: "https://www.suse.com/security/cve/CVE-2008-2316/", }, { category: "self", summary: "SUSE CVE CVE-2008-3142 page", url: "https://www.suse.com/security/cve/CVE-2008-3142/", }, { category: "self", summary: "SUSE CVE CVE-2008-3143 page", url: "https://www.suse.com/security/cve/CVE-2008-3143/", }, { category: "self", summary: "SUSE CVE CVE-2008-3144 page", url: "https://www.suse.com/security/cve/CVE-2008-3144/", }, { category: "self", summary: "SUSE CVE CVE-2011-1521 page", url: "https://www.suse.com/security/cve/CVE-2011-1521/", }, { category: "self", summary: "SUSE CVE CVE-2011-3389 page", url: "https://www.suse.com/security/cve/CVE-2011-3389/", }, { category: "self", summary: "SUSE CVE CVE-2011-4944 page", url: "https://www.suse.com/security/cve/CVE-2011-4944/", }, { category: "self", summary: "SUSE CVE CVE-2012-0845 page", url: "https://www.suse.com/security/cve/CVE-2012-0845/", }, { category: "self", summary: "SUSE CVE CVE-2012-1150 page", url: "https://www.suse.com/security/cve/CVE-2012-1150/", }, { category: "self", summary: "SUSE CVE CVE-2013-1752 page", url: "https://www.suse.com/security/cve/CVE-2013-1752/", }, { category: "self", summary: "SUSE CVE CVE-2013-1753 page", url: "https://www.suse.com/security/cve/CVE-2013-1753/", }, { category: "self", summary: "SUSE CVE CVE-2014-1912 page", url: "https://www.suse.com/security/cve/CVE-2014-1912/", }, { category: "self", summary: "SUSE CVE CVE-2014-4650 page", url: "https://www.suse.com/security/cve/CVE-2014-4650/", }, { category: "self", summary: "SUSE CVE CVE-2014-7185 page", url: "https://www.suse.com/security/cve/CVE-2014-7185/", }, { category: "self", summary: "SUSE CVE CVE-2016-1000110 page", url: "https://www.suse.com/security/cve/CVE-2016-1000110/", }, { category: "self", summary: "SUSE CVE CVE-2017-1000158 page", url: "https://www.suse.com/security/cve/CVE-2017-1000158/", }, { category: "self", summary: "SUSE CVE CVE-2017-18207 page", url: "https://www.suse.com/security/cve/CVE-2017-18207/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000030 page", url: "https://www.suse.com/security/cve/CVE-2018-1000030/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000802 page", url: "https://www.suse.com/security/cve/CVE-2018-1000802/", }, { category: "self", summary: "SUSE CVE CVE-2018-1060 page", url: "https://www.suse.com/security/cve/CVE-2018-1060/", }, { category: "self", summary: "SUSE CVE CVE-2018-1061 page", url: "https://www.suse.com/security/cve/CVE-2018-1061/", }, { category: "self", summary: "SUSE CVE CVE-2018-14647 page", url: "https://www.suse.com/security/cve/CVE-2018-14647/", }, { category: "self", summary: "SUSE CVE CVE-2018-20852 page", url: "https://www.suse.com/security/cve/CVE-2018-20852/", }, { category: "self", summary: "SUSE CVE CVE-2019-10160 page", url: "https://www.suse.com/security/cve/CVE-2019-10160/", }, { category: "self", summary: "SUSE CVE CVE-2019-16056 page", url: "https://www.suse.com/security/cve/CVE-2019-16056/", }, { category: "self", summary: "SUSE CVE CVE-2019-16935 page", url: "https://www.suse.com/security/cve/CVE-2019-16935/", }, { category: "self", summary: "SUSE CVE CVE-2019-18348 page", url: "https://www.suse.com/security/cve/CVE-2019-18348/", }, { category: "self", summary: "SUSE CVE CVE-2019-5010 page", url: "https://www.suse.com/security/cve/CVE-2019-5010/", }, { category: "self", summary: "SUSE CVE CVE-2019-9636 page", url: "https://www.suse.com/security/cve/CVE-2019-9636/", }, { category: "self", summary: "SUSE CVE CVE-2019-9674 page", url: "https://www.suse.com/security/cve/CVE-2019-9674/", }, { category: "self", summary: "SUSE CVE CVE-2019-9947 page", url: "https://www.suse.com/security/cve/CVE-2019-9947/", }, { category: "self", summary: "SUSE CVE CVE-2019-9948 page", url: "https://www.suse.com/security/cve/CVE-2019-9948/", }, { category: "self", summary: "SUSE CVE CVE-2020-8492 page", url: "https://www.suse.com/security/cve/CVE-2020-8492/", }, { category: "self", summary: "SUSE CVE CVE-2021-23336 page", url: "https://www.suse.com/security/cve/CVE-2021-23336/", }, { category: "self", summary: "SUSE CVE CVE-2021-3177 page", url: "https://www.suse.com/security/cve/CVE-2021-3177/", }, { category: "self", summary: "SUSE CVE CVE-2021-3733 page", url: "https://www.suse.com/security/cve/CVE-2021-3733/", }, { category: "self", summary: "SUSE CVE CVE-2021-3737 page", url: "https://www.suse.com/security/cve/CVE-2021-3737/", }, ], title: "python-2.7.18-8.1 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:11202-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "python-2.7.18-8.1.aarch64", product: { name: "python-2.7.18-8.1.aarch64", product_id: "python-2.7.18-8.1.aarch64", }, }, { category: "product_version", name: "python-32bit-2.7.18-8.1.aarch64", product: { name: "python-32bit-2.7.18-8.1.aarch64", product_id: "python-32bit-2.7.18-8.1.aarch64", }, }, { category: "product_version", name: "python-curses-2.7.18-8.1.aarch64", product: { name: "python-curses-2.7.18-8.1.aarch64", product_id: "python-curses-2.7.18-8.1.aarch64", }, }, { category: "product_version", name: "python-demo-2.7.18-8.1.aarch64", product: { name: "python-demo-2.7.18-8.1.aarch64", product_id: "python-demo-2.7.18-8.1.aarch64", }, }, { category: "product_version", name: "python-gdbm-2.7.18-8.1.aarch64", product: { name: "python-gdbm-2.7.18-8.1.aarch64", product_id: "python-gdbm-2.7.18-8.1.aarch64", }, }, { category: "product_version", name: "python-idle-2.7.18-8.1.aarch64", product: { name: "python-idle-2.7.18-8.1.aarch64", product_id: "python-idle-2.7.18-8.1.aarch64", }, }, { category: "product_version", name: "python-tk-2.7.18-8.1.aarch64", product: { name: "python-tk-2.7.18-8.1.aarch64", product_id: "python-tk-2.7.18-8.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "python-2.7.18-8.1.ppc64le", product: { name: "python-2.7.18-8.1.ppc64le", product_id: "python-2.7.18-8.1.ppc64le", }, }, { category: "product_version", name: "python-32bit-2.7.18-8.1.ppc64le", product: { name: "python-32bit-2.7.18-8.1.ppc64le", product_id: "python-32bit-2.7.18-8.1.ppc64le", }, }, { category: "product_version", name: "python-curses-2.7.18-8.1.ppc64le", product: { name: "python-curses-2.7.18-8.1.ppc64le", product_id: "python-curses-2.7.18-8.1.ppc64le", }, }, { category: "product_version", name: "python-demo-2.7.18-8.1.ppc64le", product: { name: "python-demo-2.7.18-8.1.ppc64le", product_id: "python-demo-2.7.18-8.1.ppc64le", }, }, { category: "product_version", name: "python-gdbm-2.7.18-8.1.ppc64le", product: { name: "python-gdbm-2.7.18-8.1.ppc64le", product_id: "python-gdbm-2.7.18-8.1.ppc64le", }, }, { category: "product_version", name: "python-idle-2.7.18-8.1.ppc64le", product: { name: "python-idle-2.7.18-8.1.ppc64le", product_id: "python-idle-2.7.18-8.1.ppc64le", }, }, { category: "product_version", name: "python-tk-2.7.18-8.1.ppc64le", product: { name: "python-tk-2.7.18-8.1.ppc64le", product_id: "python-tk-2.7.18-8.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "python-2.7.18-8.1.s390x", product: { name: "python-2.7.18-8.1.s390x", product_id: "python-2.7.18-8.1.s390x", }, }, { category: "product_version", name: "python-32bit-2.7.18-8.1.s390x", product: { name: "python-32bit-2.7.18-8.1.s390x", product_id: "python-32bit-2.7.18-8.1.s390x", }, }, { category: "product_version", name: "python-curses-2.7.18-8.1.s390x", product: { name: "python-curses-2.7.18-8.1.s390x", product_id: "python-curses-2.7.18-8.1.s390x", }, }, { category: "product_version", name: "python-demo-2.7.18-8.1.s390x", product: { name: "python-demo-2.7.18-8.1.s390x", product_id: "python-demo-2.7.18-8.1.s390x", }, }, { category: "product_version", name: "python-gdbm-2.7.18-8.1.s390x", product: { name: "python-gdbm-2.7.18-8.1.s390x", product_id: "python-gdbm-2.7.18-8.1.s390x", }, }, { category: "product_version", name: "python-idle-2.7.18-8.1.s390x", product: { name: "python-idle-2.7.18-8.1.s390x", product_id: "python-idle-2.7.18-8.1.s390x", }, }, { category: "product_version", name: "python-tk-2.7.18-8.1.s390x", product: { name: "python-tk-2.7.18-8.1.s390x", product_id: "python-tk-2.7.18-8.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "python-2.7.18-8.1.x86_64", product: { name: "python-2.7.18-8.1.x86_64", product_id: "python-2.7.18-8.1.x86_64", }, }, { category: "product_version", name: "python-32bit-2.7.18-8.1.x86_64", product: { name: "python-32bit-2.7.18-8.1.x86_64", product_id: "python-32bit-2.7.18-8.1.x86_64", }, }, { category: "product_version", name: "python-curses-2.7.18-8.1.x86_64", product: { name: "python-curses-2.7.18-8.1.x86_64", product_id: "python-curses-2.7.18-8.1.x86_64", }, }, { category: "product_version", name: "python-demo-2.7.18-8.1.x86_64", product: { name: "python-demo-2.7.18-8.1.x86_64", product_id: "python-demo-2.7.18-8.1.x86_64", }, }, { category: "product_version", name: "python-gdbm-2.7.18-8.1.x86_64", product: { name: "python-gdbm-2.7.18-8.1.x86_64", product_id: "python-gdbm-2.7.18-8.1.x86_64", }, }, { category: "product_version", name: "python-idle-2.7.18-8.1.x86_64", product: { name: "python-idle-2.7.18-8.1.x86_64", product_id: "python-idle-2.7.18-8.1.x86_64", }, }, { category: "product_version", name: "python-tk-2.7.18-8.1.x86_64", product: { name: "python-tk-2.7.18-8.1.x86_64", product_id: "python-tk-2.7.18-8.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "python-2.7.18-8.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", }, product_reference: "python-2.7.18-8.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python-2.7.18-8.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", }, product_reference: "python-2.7.18-8.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python-2.7.18-8.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", }, product_reference: "python-2.7.18-8.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python-2.7.18-8.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", }, product_reference: "python-2.7.18-8.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python-32bit-2.7.18-8.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", }, product_reference: "python-32bit-2.7.18-8.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python-32bit-2.7.18-8.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", }, product_reference: "python-32bit-2.7.18-8.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python-32bit-2.7.18-8.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", }, product_reference: "python-32bit-2.7.18-8.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python-32bit-2.7.18-8.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", }, product_reference: "python-32bit-2.7.18-8.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python-curses-2.7.18-8.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", }, product_reference: "python-curses-2.7.18-8.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python-curses-2.7.18-8.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", }, product_reference: "python-curses-2.7.18-8.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python-curses-2.7.18-8.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", }, product_reference: "python-curses-2.7.18-8.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python-curses-2.7.18-8.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", }, product_reference: "python-curses-2.7.18-8.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python-demo-2.7.18-8.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", }, product_reference: "python-demo-2.7.18-8.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python-demo-2.7.18-8.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", }, product_reference: "python-demo-2.7.18-8.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python-demo-2.7.18-8.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", }, product_reference: "python-demo-2.7.18-8.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python-demo-2.7.18-8.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", }, product_reference: "python-demo-2.7.18-8.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python-gdbm-2.7.18-8.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", }, product_reference: "python-gdbm-2.7.18-8.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python-gdbm-2.7.18-8.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", }, product_reference: "python-gdbm-2.7.18-8.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python-gdbm-2.7.18-8.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", }, product_reference: "python-gdbm-2.7.18-8.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python-gdbm-2.7.18-8.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", }, product_reference: "python-gdbm-2.7.18-8.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python-idle-2.7.18-8.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", }, product_reference: "python-idle-2.7.18-8.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python-idle-2.7.18-8.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", }, product_reference: "python-idle-2.7.18-8.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python-idle-2.7.18-8.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", }, product_reference: "python-idle-2.7.18-8.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python-idle-2.7.18-8.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", }, product_reference: "python-idle-2.7.18-8.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python-tk-2.7.18-8.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", }, product_reference: "python-tk-2.7.18-8.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python-tk-2.7.18-8.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", }, product_reference: "python-tk-2.7.18-8.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python-tk-2.7.18-8.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", }, product_reference: "python-tk-2.7.18-8.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python-tk-2.7.18-8.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", }, product_reference: "python-tk-2.7.18-8.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2007-2052", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2007-2052", }, ], notes: [ { category: "general", text: "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2007-2052", url: "https://www.suse.com/security/cve/CVE-2007-2052", }, { category: "external", summary: "SUSE Bug 276889 for CVE-2007-2052", url: "https://bugzilla.suse.com/276889", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2007-2052", }, { cve: "CVE-2008-1721", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2008-1721", }, ], notes: [ { category: "general", text: "Integer signedness error in the zlib extension module in Python 2.5.2 and earlier allows remote attackers to execute arbitrary code via a negative signed integer, which triggers insufficient memory allocation and a buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2008-1721", url: "https://www.suse.com/security/cve/CVE-2008-1721", }, { category: "external", summary: "SUSE Bug 379044 for CVE-2008-1721", url: "https://bugzilla.suse.com/379044", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2008-1721", }, { cve: "CVE-2008-2315", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2008-2315", }, ], notes: [ { category: "general", text: "Multiple integer overflows in Python 2.5.2 and earlier allow context-dependent attackers to have an unknown impact via vectors related to the (1) stringobject, (2) unicodeobject, (3) bufferobject, (4) longobject, (5) tupleobject, (6) stropmodule, (7) gcmodule, and (8) mmapmodule modules. NOTE: The expandtabs integer overflows in stringobject and unicodeobject in 2.5.2 are covered by CVE-2008-5031.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2008-2315", url: "https://www.suse.com/security/cve/CVE-2008-2315", }, { category: "external", summary: "SUSE Bug 406051 for CVE-2008-2315", url: "https://bugzilla.suse.com/406051", }, { category: "external", summary: "SUSE Bug 443653 for CVE-2008-2315", url: "https://bugzilla.suse.com/443653", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2008-2315", }, { cve: "CVE-2008-2316", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2008-2316", }, ], notes: [ { category: "general", text: "Integer overflow in _hashopenssl.c in the hashlib module in Python 2.5.2 and earlier might allow context-dependent attackers to defeat cryptographic digests, related to \"partial hashlib hashing of data exceeding 4GB.\"", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2008-2316", url: "https://www.suse.com/security/cve/CVE-2008-2316", }, { category: "external", summary: "SUSE Bug 406051 for CVE-2008-2316", url: "https://bugzilla.suse.com/406051", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2008-2316", }, { cve: "CVE-2008-3142", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2008-3142", }, ], notes: [ { category: "general", text: "Multiple buffer overflows in Python 2.5.2 and earlier on 32bit platforms allow context-dependent attackers to cause a denial of service (crash) or have unspecified other impact via a long string that leads to incorrect memory allocation during Unicode string processing, related to the unicode_resize function and the PyMem_RESIZE macro.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2008-3142", url: "https://www.suse.com/security/cve/CVE-2008-3142", }, { category: "external", summary: "SUSE Bug 406051 for CVE-2008-3142", url: "https://bugzilla.suse.com/406051", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2008-3142", }, { cve: "CVE-2008-3143", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2008-3143", }, ], notes: [ { category: "general", text: "Multiple integer overflows in Python before 2.5.2 might allow context-dependent attackers to have an unknown impact via vectors related to (1) Include/pymem.h; (2) _csv.c, (3) _struct.c, (4) arraymodule.c, (5) audioop.c, (6) binascii.c, (7) cPickle.c, (8) cStringIO.c, (9) cjkcodecs/multibytecodec.c, (10) datetimemodule.c, (11) md5.c, (12) rgbimgmodule.c, and (13) stropmodule.c in Modules/; (14) bufferobject.c, (15) listobject.c, and (16) obmalloc.c in Objects/; (17) Parser/node.c; and (18) asdl.c, (19) ast.c, (20) bltinmodule.c, and (21) compile.c in Python/, as addressed by \"checks for integer overflows, contributed by Google.\"", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2008-3143", url: "https://www.suse.com/security/cve/CVE-2008-3143", }, { category: "external", summary: "SUSE Bug 406051 for CVE-2008-3143", url: "https://bugzilla.suse.com/406051", }, { category: "external", summary: "SUSE Bug 444989 for CVE-2008-3143", url: "https://bugzilla.suse.com/444989", }, { category: "external", summary: "SUSE Bug 609759 for CVE-2008-3143", url: "https://bugzilla.suse.com/609759", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2008-3143", }, { cve: "CVE-2008-3144", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2008-3144", }, ], notes: [ { category: "general", text: "Multiple integer overflows in the PyOS_vsnprintf function in Python/mysnprintf.c in Python 2.5.2 and earlier allow context-dependent attackers to cause a denial of service (memory corruption) or have unspecified other impact via crafted input to string formatting operations. NOTE: the handling of certain integer values is also affected by related integer underflows and an off-by-one error.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2008-3144", url: "https://www.suse.com/security/cve/CVE-2008-3144", }, { category: "external", summary: "SUSE Bug 406051 for CVE-2008-3144", url: "https://bugzilla.suse.com/406051", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2008-3144", }, { cve: "CVE-2011-1521", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2011-1521", }, ], notes: [ { category: "general", text: "The urllib and urllib2 modules in Python 2.x before 2.7.2 and 3.x before 3.2.1 process Location headers that specify redirection to file: URLs, which makes it easier for remote attackers to obtain sensitive information or cause a denial of service (resource consumption) via a crafted URL, as demonstrated by the file:///etc/passwd and file:///dev/zero URLs.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2011-1521", url: "https://www.suse.com/security/cve/CVE-2011-1521", }, { category: "external", summary: "SUSE Bug 682554 for CVE-2011-1521", url: "https://bugzilla.suse.com/682554", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2011-1521", }, { cve: "CVE-2011-3389", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2011-3389", }, ], notes: [ { category: "general", text: "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2011-3389", url: "https://www.suse.com/security/cve/CVE-2011-3389", }, { category: "external", summary: "SUSE Bug 716002 for CVE-2011-3389", url: "https://bugzilla.suse.com/716002", }, { category: "external", summary: "SUSE Bug 719047 for CVE-2011-3389", url: "https://bugzilla.suse.com/719047", }, { category: "external", summary: "SUSE Bug 725167 for CVE-2011-3389", url: "https://bugzilla.suse.com/725167", }, { category: "external", summary: "SUSE Bug 726096 for CVE-2011-3389", url: "https://bugzilla.suse.com/726096", }, { category: "external", summary: "SUSE Bug 739248 for CVE-2011-3389", url: "https://bugzilla.suse.com/739248", }, { category: "external", summary: "SUSE Bug 739256 for CVE-2011-3389", url: "https://bugzilla.suse.com/739256", }, { category: "external", summary: "SUSE Bug 742306 for CVE-2011-3389", url: "https://bugzilla.suse.com/742306", }, { category: "external", summary: "SUSE Bug 751718 for CVE-2011-3389", url: "https://bugzilla.suse.com/751718", }, { category: "external", summary: "SUSE Bug 759666 for CVE-2011-3389", url: "https://bugzilla.suse.com/759666", }, { category: "external", summary: "SUSE Bug 763598 for CVE-2011-3389", url: "https://bugzilla.suse.com/763598", }, { category: "external", summary: "SUSE Bug 814655 for CVE-2011-3389", url: "https://bugzilla.suse.com/814655", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2011-3389", }, { cve: "CVE-2011-4944", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2011-4944", }, ], notes: [ { category: "general", text: "Python 2.6 through 3.2 creates ~/.pypirc with world-readable permissions before changing them after data has been written, which introduces a race condition that allows local users to obtain a username and password by reading this file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2011-4944", url: "https://www.suse.com/security/cve/CVE-2011-4944", }, { category: "external", summary: "SUSE Bug 754447 for CVE-2011-4944", url: "https://bugzilla.suse.com/754447", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2011-4944", }, { cve: "CVE-2012-0845", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2012-0845", }, ], notes: [ { category: "general", text: "SimpleXMLRPCServer.py in SimpleXMLRPCServer in Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an XML-RPC POST request that contains a smaller amount of data than specified by the Content-Length header.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2012-0845", url: "https://www.suse.com/security/cve/CVE-2012-0845", }, { category: "external", summary: "SUSE Bug 747125 for CVE-2012-0845", url: "https://bugzilla.suse.com/747125", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2012-0845", }, { cve: "CVE-2012-1150", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2012-1150", }, ], notes: [ { category: "general", text: "Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2012-1150", url: "https://www.suse.com/security/cve/CVE-2012-1150", }, { category: "external", summary: "SUSE Bug 751718 for CVE-2012-1150", url: "https://bugzilla.suse.com/751718", }, { category: "external", summary: "SUSE Bug 755383 for CVE-2012-1150", url: "https://bugzilla.suse.com/755383", }, { category: "external", summary: "SUSE Bug 826682 for CVE-2012-1150", url: "https://bugzilla.suse.com/826682", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2012-1150", }, { cve: "CVE-2013-1752", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2013-1752", }, ], notes: [ { category: "general", text: "** REJECT ** Various versions of Python do not properly restrict readline calls, which allows remote attackers to cause a denial of service (memory consumption) via a long string, related to (1) httplib - fixed in 2.7.4, 2.6.9, and 3.3.3; (2) ftplib - fixed in 2.7.6, 2.6.9, 3.3.3; (3) imaplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; (4) nntplib - fixed in 2.7.6, 2.6.9, 3.3.3; (5) poplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; and (6) smtplib - not yet fixed in 2.7.x, fixed in 2.6.9, not yet fixed in 3.3.x. NOTE: this was REJECTed because it is incompatible with CNT1 \"Independently Fixable\" in the CVE Counting Decisions.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2013-1752", url: "https://www.suse.com/security/cve/CVE-2013-1752", }, { category: "external", summary: "SUSE Bug 856835 for CVE-2013-1752", url: "https://bugzilla.suse.com/856835", }, { category: "external", summary: "SUSE Bug 856836 for CVE-2013-1752", url: "https://bugzilla.suse.com/856836", }, { category: "external", summary: "SUSE Bug 863741 for CVE-2013-1752", url: "https://bugzilla.suse.com/863741", }, { category: "external", summary: "SUSE Bug 885882 for CVE-2013-1752", url: "https://bugzilla.suse.com/885882", }, { category: "external", summary: "SUSE Bug 898572 for CVE-2013-1752", url: "https://bugzilla.suse.com/898572", }, { category: "external", summary: "SUSE Bug 912739 for CVE-2013-1752", url: "https://bugzilla.suse.com/912739", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2013-1752", }, { cve: "CVE-2013-1753", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2013-1753", }, ], notes: [ { category: "general", text: "The gzip_decode function in the xmlrpc client library in Python 3.4 and earlier allows remote attackers to cause a denial of service (memory consumption) via a crafted HTTP request.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2013-1753", url: "https://www.suse.com/security/cve/CVE-2013-1753", }, { category: "external", summary: "SUSE Bug 856835 for CVE-2013-1753", url: "https://bugzilla.suse.com/856835", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2013-1753", }, { cve: "CVE-2014-1912", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-1912", }, ], notes: [ { category: "general", text: "Buffer overflow in the socket.recvfrom_into function in Modules/socketmodule.c in Python 2.5 before 2.7.7, 3.x before 3.3.4, and 3.4.x before 3.4rc1 allows remote attackers to execute arbitrary code via a crafted string.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-1912", url: "https://www.suse.com/security/cve/CVE-2014-1912", }, { category: "external", summary: "SUSE Bug 1049392 for CVE-2014-1912", url: "https://bugzilla.suse.com/1049392", }, { category: "external", summary: "SUSE Bug 1049422 for CVE-2014-1912", url: "https://bugzilla.suse.com/1049422", }, { category: "external", summary: "SUSE Bug 863741 for CVE-2014-1912", url: "https://bugzilla.suse.com/863741", }, { category: "external", summary: "SUSE Bug 882915 for CVE-2014-1912", url: "https://bugzilla.suse.com/882915", }, { category: "external", summary: "SUSE Bug 912739 for CVE-2014-1912", url: "https://bugzilla.suse.com/912739", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2014-1912", }, { cve: "CVE-2014-4650", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-4650", }, ], notes: [ { category: "general", text: "The CGIHTTPServer module in Python 2.7.5 and 3.3.4 does not properly handle URLs in which URL encoding is used for path separators, which allows remote attackers to read script source code or conduct directory traversal attacks and execute unintended code via a crafted character sequence, as demonstrated by a %2f separator.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-4650", url: "https://www.suse.com/security/cve/CVE-2014-4650", }, { category: "external", summary: "SUSE Bug 856835 for CVE-2014-4650", url: "https://bugzilla.suse.com/856835", }, { category: "external", summary: "SUSE Bug 856836 for CVE-2014-4650", url: "https://bugzilla.suse.com/856836", }, { category: "external", summary: "SUSE Bug 863741 for CVE-2014-4650", url: "https://bugzilla.suse.com/863741", }, { category: "external", summary: "SUSE Bug 885882 for CVE-2014-4650", url: "https://bugzilla.suse.com/885882", }, { category: "external", summary: "SUSE Bug 898572 for CVE-2014-4650", url: "https://bugzilla.suse.com/898572", }, { category: "external", summary: "SUSE Bug 912739 for CVE-2014-4650", url: "https://bugzilla.suse.com/912739", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2014-4650", }, { cve: "CVE-2014-7185", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-7185", }, ], notes: [ { category: "general", text: "Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a \"buffer\" function.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-7185", url: "https://www.suse.com/security/cve/CVE-2014-7185", }, { category: "external", summary: "SUSE Bug 898572 for CVE-2014-7185", url: "https://bugzilla.suse.com/898572", }, { category: "external", summary: "SUSE Bug 912739 for CVE-2014-7185", url: "https://bugzilla.suse.com/912739", }, { category: "external", summary: "SUSE Bug 913479 for CVE-2014-7185", url: "https://bugzilla.suse.com/913479", }, { category: "external", summary: "SUSE Bug 955182 for CVE-2014-7185", url: "https://bugzilla.suse.com/955182", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2014-7185", }, { cve: "CVE-2016-1000110", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1000110", }, ], notes: [ { category: "general", text: "The CGIHandler class in Python before 2.7.12 does not protect against the HTTP_PROXY variable name clash in a CGI script, which could allow a remote attacker to redirect HTTP requests.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1000110", url: "https://www.suse.com/security/cve/CVE-2016-1000110", }, { category: "external", summary: "SUSE Bug 988484 for CVE-2016-1000110", url: "https://bugzilla.suse.com/988484", }, { category: "external", summary: "SUSE Bug 989523 for CVE-2016-1000110", url: "https://bugzilla.suse.com/989523", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-1000110", }, { cve: "CVE-2017-1000158", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-1000158", }, ], notes: [ { category: "general", text: "CPython (aka Python) up to 2.7.13 is vulnerable to an integer overflow in the PyString_DecodeEscape function in stringobject.c, resulting in heap-based buffer overflow (and possible arbitrary code execution)", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-1000158", url: "https://www.suse.com/security/cve/CVE-2017-1000158", }, { category: "external", summary: "SUSE Bug 1068664 for CVE-2017-1000158", url: "https://bugzilla.suse.com/1068664", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-1000158", }, { cve: "CVE-2017-18207", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-18207", }, ], notes: [ { category: "general", text: "** DISPUTED ** The Wave_read._read_fmt_chunk function in Lib/wave.py in Python through 3.6.4 does not ensure a nonzero channel value, which allows attackers to cause a denial of service (divide-by-zero and exception) via a crafted wav format audio file. NOTE: the vendor disputes this issue because Python applications \"need to be prepared to handle a wide variety of exceptions.\"", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-18207", url: "https://www.suse.com/security/cve/CVE-2017-18207", }, { category: "external", summary: "SUSE Bug 1083507 for CVE-2017-18207", url: "https://bugzilla.suse.com/1083507", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-18207", }, { cve: "CVE-2018-1000030", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000030", }, ], notes: [ { category: "general", text: "Python 2.7.14 is vulnerable to a Heap-Buffer-Overflow as well as a Heap-Use-After-Free. Python versions prior to 2.7.14 may also be vulnerable and it appears that Python 2.7.17 and prior may also be vulnerable however this has not been confirmed. The vulnerability lies when multiply threads are handling large amounts of data. In both cases there is essentially a race condition that occurs. For the Heap-Buffer-Overflow, Thread 2 is creating the size for a buffer, but Thread1 is already writing to the buffer without knowing how much to write. So when a large amount of data is being processed, it is very easy to cause memory corruption using a Heap-Buffer-Overflow. As for the Use-After-Free, Thread3->Malloc->Thread1->Free's->Thread2-Re-uses-Free'd Memory. The PSRT has stated that this is not a security vulnerability due to the fact that the attacker must be able to run code, however in some situations, such as function as a service, this vulnerability can potentially be used by an attacker to violate a trust boundary, as such the DWF feels this issue deserves a CVE.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000030", url: "https://www.suse.com/security/cve/CVE-2018-1000030", }, { category: "external", summary: "SUSE Bug 1079300 for CVE-2018-1000030", url: "https://bugzilla.suse.com/1079300", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-1000030", }, { cve: "CVE-2018-1000802", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000802", }, ], notes: [ { category: "general", text: "Python Software Foundation Python (CPython) version 2.7 contains a CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in shutil module (make_archive function) that can result in Denial of service, Information gain via injection of arbitrary files on the system or entire drive. This attack appear to be exploitable via Passage of unfiltered user input to the function. This vulnerability appears to have been fixed in after commit add531a1e55b0a739b0f42582f1c9747e5649ace.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000802", url: "https://www.suse.com/security/cve/CVE-2018-1000802", }, { category: "external", summary: "SUSE Bug 1109663 for CVE-2018-1000802", url: "https://bugzilla.suse.com/1109663", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-1000802", }, { cve: "CVE-2018-1060", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1060", }, ], notes: [ { category: "general", text: "python before versions 2.7.15, 3.4.9, 3.5.6rc1, 3.6.5rc1 and 3.7.0 is vulnerable to catastrophic backtracking in pop3lib's apop() method. An attacker could use this flaw to cause denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1060", url: "https://www.suse.com/security/cve/CVE-2018-1060", }, { category: "external", summary: "SUSE Bug 1088009 for CVE-2018-1060", url: "https://bugzilla.suse.com/1088009", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-1060", }, { cve: "CVE-2018-1061", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1061", }, ], notes: [ { category: "general", text: "python before versions 2.7.15, 3.4.9, 3.5.6rc1, 3.6.5rc1 and 3.7.0 is vulnerable to catastrophic backtracking in the difflib.IS_LINE_JUNK method. An attacker could use this flaw to cause denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1061", url: "https://www.suse.com/security/cve/CVE-2018-1061", }, { category: "external", summary: "SUSE Bug 1088004 for CVE-2018-1061", url: "https://bugzilla.suse.com/1088004", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-1061", }, { cve: "CVE-2018-14647", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14647", }, ], notes: [ { category: "general", text: "Python's elementtree C accelerator failed to initialise Expat's hash salt during initialization. This could make it easy to conduct denial of service attacks against Expat by constructing an XML document that would cause pathological hash collisions in Expat's internal data structures, consuming large amounts CPU and RAM. The vulnerability exists in Python versions 3.7.0, 3.6.0 through 3.6.6, 3.5.0 through 3.5.6, 3.4.0 through 3.4.9, 2.7.0 through 2.7.15.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14647", url: "https://www.suse.com/security/cve/CVE-2018-14647", }, { category: "external", summary: "SUSE Bug 1109847 for CVE-2018-14647", url: "https://bugzilla.suse.com/1109847", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2018-14647", url: "https://bugzilla.suse.com/1126909", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-14647", }, { cve: "CVE-2018-20852", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20852", }, ], notes: [ { category: "general", text: "http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20852", url: "https://www.suse.com/security/cve/CVE-2018-20852", }, { category: "external", summary: "SUSE Bug 1141853 for CVE-2018-20852", url: "https://bugzilla.suse.com/1141853", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-20852", }, { cve: "CVE-2019-10160", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-10160", }, ], notes: [ { category: "general", text: "A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-10160", url: "https://www.suse.com/security/cve/CVE-2019-10160", }, { category: "external", summary: "SUSE Bug 1138459 for CVE-2019-10160", url: "https://bugzilla.suse.com/1138459", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2019-10160", }, { cve: "CVE-2019-16056", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-16056", }, ], notes: [ { category: "general", text: "An issue was discovered in Python through 2.7.16, 3.x through 3.5.7, 3.6.x through 3.6.9, and 3.7.x through 3.7.4. The email module wrongly parses email addresses that contain multiple @ characters. An application that uses the email module and implements some kind of checks on the From/To headers of a message could be tricked into accepting an email address that should be denied. An attack may be the same as in CVE-2019-11340; however, this CVE applies to Python more generally.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-16056", url: "https://www.suse.com/security/cve/CVE-2019-16056", }, { category: "external", summary: "SUSE Bug 1149955 for CVE-2019-16056", url: "https://bugzilla.suse.com/1149955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-16056", }, { cve: "CVE-2019-16935", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-16935", }, ], notes: [ { category: "general", text: "The documentation XML-RPC server in Python through 2.7.16, 3.x through 3.6.9, and 3.7.x through 3.7.4 has XSS via the server_title field. This occurs in Lib/DocXMLRPCServer.py in Python 2.x, and in Lib/xmlrpc/server.py in Python 3.x. If set_server_title is called with untrusted input, arbitrary JavaScript can be delivered to clients that visit the http URL for this server.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-16935", url: "https://www.suse.com/security/cve/CVE-2019-16935", }, { category: "external", summary: "SUSE Bug 1153238 for CVE-2019-16935", url: "https://bugzilla.suse.com/1153238", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-16935", }, { cve: "CVE-2019-18348", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18348", }, ], notes: [ { category: "general", text: "An issue was discovered in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x through 3.8.0. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the host component of a URL) followed by an HTTP header. This is similar to the CVE-2019-9740 query string issue and the CVE-2019-9947 path string issue. (This is not exploitable when glibc has CVE-2016-10739 fixed.). This is fixed in: v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1; v3.6.11, v3.6.11rc1, v3.6.12; v3.7.8, v3.7.8rc1, v3.7.9; v3.8.3, v3.8.3rc1, v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18348", url: "https://www.suse.com/security/cve/CVE-2019-18348", }, { category: "external", summary: "SUSE Bug 1155094 for CVE-2019-18348", url: "https://bugzilla.suse.com/1155094", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-18348", }, { cve: "CVE-2019-5010", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-5010", }, ], notes: [ { category: "general", text: "An exploitable denial-of-service vulnerability exists in the X509 certificate parser of Python.org Python 2.7.11 / 3.6.6. A specially crafted X509 certificate can cause a NULL pointer dereference, resulting in a denial of service. An attacker can initiate or accept TLS connections using crafted certificates to trigger this vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-5010", url: "https://www.suse.com/security/cve/CVE-2019-5010", }, { category: "external", summary: "SUSE Bug 1122191 for CVE-2019-5010", url: "https://bugzilla.suse.com/1122191", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2019-5010", url: "https://bugzilla.suse.com/1126909", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-5010", }, { cve: "CVE-2019-9636", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-9636", }, ], notes: [ { category: "general", text: "Python 2.7.x through 2.7.16 and 3.x through 3.7.2 is affected by: Improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization. The impact is: Information disclosure (credentials, cookies, etc. that are cached against a given hostname). The components are: urllib.parse.urlsplit, urllib.parse.urlparse. The attack vector is: A specially crafted URL could be incorrectly parsed to locate cookies or authentication data and send that information to a different host than when parsed correctly. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-9636", url: "https://www.suse.com/security/cve/CVE-2019-9636", }, { category: "external", summary: "SUSE Bug 1129346 for CVE-2019-9636", url: "https://bugzilla.suse.com/1129346", }, { category: "external", summary: "SUSE Bug 1135433 for CVE-2019-9636", url: "https://bugzilla.suse.com/1135433", }, { category: "external", summary: "SUSE Bug 1138459 for CVE-2019-9636", url: "https://bugzilla.suse.com/1138459", }, { category: "external", summary: "SUSE Bug 1145004 for CVE-2019-9636", url: "https://bugzilla.suse.com/1145004", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-9636", }, { cve: "CVE-2019-9674", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-9674", }, ], notes: [ { category: "general", text: "Lib/zipfile.py in Python through 3.7.2 allows remote attackers to cause a denial of service (resource consumption) via a ZIP bomb.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-9674", url: "https://www.suse.com/security/cve/CVE-2019-9674", }, { category: "external", summary: "SUSE Bug 1162825 for CVE-2019-9674", url: "https://bugzilla.suse.com/1162825", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-9674", }, { cve: "CVE-2019-9947", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-9947", }, ], notes: [ { category: "general", text: "An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-9947", url: "https://www.suse.com/security/cve/CVE-2019-9947", }, { category: "external", summary: "SUSE Bug 1130840 for CVE-2019-9947", url: "https://bugzilla.suse.com/1130840", }, { category: "external", summary: "SUSE Bug 1136184 for CVE-2019-9947", url: "https://bugzilla.suse.com/1136184", }, { category: "external", summary: "SUSE Bug 1155094 for CVE-2019-9947", url: "https://bugzilla.suse.com/1155094", }, { category: "external", summary: "SUSE Bug 1201559 for CVE-2019-9947", url: "https://bugzilla.suse.com/1201559", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-9947", }, { cve: "CVE-2019-9948", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-9948", }, ], notes: [ { category: "general", text: "urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen('local_file:///etc/passwd') call.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-9948", url: "https://www.suse.com/security/cve/CVE-2019-9948", }, { category: "external", summary: "SUSE Bug 1130847 for CVE-2019-9948", url: "https://bugzilla.suse.com/1130847", }, { category: "external", summary: "SUSE Bug 1135433 for CVE-2019-9948", url: "https://bugzilla.suse.com/1135433", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-9948", }, { cve: "CVE-2020-8492", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-8492", }, ], notes: [ { category: "general", text: "Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-8492", url: "https://www.suse.com/security/cve/CVE-2020-8492", }, { category: "external", summary: "SUSE Bug 1162367 for CVE-2020-8492", url: "https://bugzilla.suse.com/1162367", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-8492", }, { cve: "CVE-2021-23336", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-23336", }, ], notes: [ { category: "general", text: "The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-23336", url: "https://www.suse.com/security/cve/CVE-2021-23336", }, { category: "external", summary: "SUSE Bug 1182179 for CVE-2021-23336", url: "https://bugzilla.suse.com/1182179", }, { category: "external", summary: "SUSE Bug 1182379 for CVE-2021-23336", url: "https://bugzilla.suse.com/1182379", }, { category: "external", summary: "SUSE Bug 1182433 for CVE-2021-23336", url: "https://bugzilla.suse.com/1182433", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-23336", }, { cve: "CVE-2021-3177", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3177", }, ], notes: [ { category: "general", text: "Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3177", url: "https://www.suse.com/security/cve/CVE-2021-3177", }, { category: "external", summary: "SUSE Bug 1181126 for CVE-2021-3177", url: "https://bugzilla.suse.com/1181126", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-3177", }, { cve: "CVE-2021-3733", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3733", }, ], notes: [ { category: "general", text: "There's a flaw in urllib's AbstractBasicAuthHandler class. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafted payload that is sent by the server to the client. The greatest threat that this flaw poses is to application availability.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3733", url: "https://www.suse.com/security/cve/CVE-2021-3733", }, { category: "external", summary: "SUSE Bug 1189287 for CVE-2021-3733", url: "https://bugzilla.suse.com/1189287", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2021-3733", }, { cve: "CVE-2021-3737", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3737", }, ], notes: [ { category: "general", text: "A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3737", url: "https://www.suse.com/security/cve/CVE-2021-3737", }, { category: "external", summary: "SUSE Bug 1189241 for CVE-2021-3737", url: "https://bugzilla.suse.com/1189241", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:python-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-32bit-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-curses-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-demo-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-gdbm-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-idle-2.7.18-8.1.x86_64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.aarch64", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.ppc64le", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.s390x", "openSUSE Tumbleweed:python-tk-2.7.18-8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-3737", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.