-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                    ESB-2009.0031 -- [Win][UNIX/Linux]
                Multiple vulnerabilities reported in Python
                              12 January 2009

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Python
Publisher:            Mandriva
Operating System:     Mandriva
                      UNIX variants (UNIX, Linux, OSX)
                      Windows
Impact:               Execute Arbitrary Code/Commands
                      Reduced Security
Access:               Remote/Unauthenticated
CVE Names:            CVE-2008-5031 CVE-2008-4864

Comment: This advisory references vulnerabilities in products which run on
         platforms other than Mandriva. It is recommended that
         administrators running Python check for an updated version of
         the software for their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2009:003
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : python
 Date    : January 9, 2009
 Affected: 2008.0, 2008.1, 2009.0, Corporate 4.0
 _______________________________________________________________________

 Problem Description:

 Multiple integer overflows in imageop.c in the imageop module in
 Python 1.5.2 through 2.5.1 allow context-dependent attackers to
 break out of the Python VM and execute arbitrary code via large
 integer values in certain arguments to the crop function, leading to
 a buffer overflow, a different vulnerability than CVE-2007-4965 and
 CVE-2008-1679. (CVE-2008-4864)
 
 Multiple integer overflows in Python 2.2.3 through 2.5.1, and 2.6,
 allow context-dependent attackers to have an unknown impact via
 a large integer value in the tabsize argument to the expandtabs
 method, as implemented by (1) the string_expandtabs function in
 Objects/stringobject.c and (2) the unicode_expandtabs function in
 Objects/unicodeobject.c. NOTE: this vulnerability reportedly exists
 because of an incomplete fix for CVE-2008-2315. (CVE-2008-5031)
 
 The updated Python packages have been patched to correct these issues.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4864
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5031
 _______________________________________________________________________

 Updated Packages:

 Mandriva Linux 2008.0:
 99e168ac1b7ae4bd0d340c2aac462e19  2008.0/i586/libpython2.5-2.5.2-2.3mdv2008.0.i586.rpm
 8ddb89d22f9456e52758bdfc060cede1  2008.0/i586/libpython2.5-devel-2.5.2-2.3mdv2008.0.i586.rpm
 c5b19e98a095f6000d5adc2009246ebb  2008.0/i586/python-2.5.2-2.3mdv2008.0.i586.rpm
 4ce7cec71582068f7d5a00e1b53d9b2d  2008.0/i586/python-base-2.5.2-2.3mdv2008.0.i586.rpm
 ad15a443a4f832e44864a83c2a6d6e4c  2008.0/i586/python-docs-2.5.2-2.3mdv2008.0.i586.rpm
 1983242f6100f957af9d264de98119ec  2008.0/i586/tkinter-2.5.2-2.3mdv2008.0.i586.rpm
 e99d03ebb07f9e6fc47f8619ea8cb832  2008.0/i586/tkinter-apps-2.5.2-2.3mdv2008.0.i586.rpm 
 2f8ff50c56f46c191b63878f11f7f606  2008.0/SRPMS/python-2.5.2-2.3mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 7b80a39d64b3a62eabd72cd63df8f2b4  2008.0/x86_64/lib64python2.5-2.5.2-2.3mdv2008.0.x86_64.rpm
 bcb2d996aa22e004a8d1c142a62b852f  2008.0/x86_64/lib64python2.5-devel-2.5.2-2.3mdv2008.0.x86_64.rpm
 75b8005ecb4df3d51da30a308ff7864b  2008.0/x86_64/python-2.5.2-2.3mdv2008.0.x86_64.rpm
 1ee083182c06c5661a2d49e378fe314a  2008.0/x86_64/python-base-2.5.2-2.3mdv2008.0.x86_64.rpm
 71659dba30fb79c8890992ff77cfae08  2008.0/x86_64/python-docs-2.5.2-2.3mdv2008.0.x86_64.rpm
 f03df81a9505fc5480f717267eb4f59c  2008.0/x86_64/tkinter-2.5.2-2.3mdv2008.0.x86_64.rpm
 8bbf6f28976deb9dc9c1651f4179bf3c  2008.0/x86_64/tkinter-apps-2.5.2-2.3mdv2008.0.x86_64.rpm 
 2f8ff50c56f46c191b63878f11f7f606  2008.0/SRPMS/python-2.5.2-2.3mdv2008.0.src.rpm

 Mandriva Linux 2008.1:
 40768be47280f91652106cae7d52bac3  2008.1/i586/libpython2.5-2.5.2-2.3mdv2008.1.i586.rpm
 f740a094492e495a7058324c9d7fe5c0  2008.1/i586/libpython2.5-devel-2.5.2-2.3mdv2008.1.i586.rpm
 8a3a54d6633b1067a303266551fbf11c  2008.1/i586/python-2.5.2-2.3mdv2008.1.i586.rpm
 6ec33343842298ff0e8719cb69d8d8dd  2008.1/i586/python-base-2.5.2-2.3mdv2008.1.i586.rpm
 6cf93281ad513c769a27e1a0aed24d89  2008.1/i586/python-docs-2.5.2-2.3mdv2008.1.i586.rpm
 13b6d462c97fae761f889a9ef1f00445  2008.1/i586/tkinter-2.5.2-2.3mdv2008.1.i586.rpm
 7503eb04531c6705d544a029575d5ba1  2008.1/i586/tkinter-apps-2.5.2-2.3mdv2008.1.i586.rpm 
 befe989985d13d16f6f23b9c44300010  2008.1/SRPMS/python-2.5.2-2.3mdv2008.1.src.rpm

 Mandriva Linux 2008.1/X86_64:
 51bf8e6e9cfe26fc06540fb2e9c89a97  2008.1/x86_64/lib64python2.5-2.5.2-2.3mdv2008.1.x86_64.rpm
 bdf744158bd3d0e856d34341db8f9766  2008.1/x86_64/lib64python2.5-devel-2.5.2-2.3mdv2008.1.x86_64.rpm
 2e48265c3457815f1d8079bbbf289415  2008.1/x86_64/python-2.5.2-2.3mdv2008.1.x86_64.rpm
 c6b77afb3b6f1263602d1ddcbb010582  2008.1/x86_64/python-base-2.5.2-2.3mdv2008.1.x86_64.rpm
 d771f65c3c683e15688e243d7f6b5b31  2008.1/x86_64/python-docs-2.5.2-2.3mdv2008.1.x86_64.rpm
 d392466b1043ed47431e26780402a923  2008.1/x86_64/tkinter-2.5.2-2.3mdv2008.1.x86_64.rpm
 0c333970463f34e01192f50025e5418a  2008.1/x86_64/tkinter-apps-2.5.2-2.3mdv2008.1.x86_64.rpm 
 befe989985d13d16f6f23b9c44300010  2008.1/SRPMS/python-2.5.2-2.3mdv2008.1.src.rpm

 Mandriva Linux 2009.0:
 51130cd5a5075d3ba29c3b65393950fe  2009.0/i586/libpython2.5-2.5.2-5.2mdv2009.0.i586.rpm
 e9a3c47de92e69dc45ee78ec09fdcdf7  2009.0/i586/libpython2.5-devel-2.5.2-5.2mdv2009.0.i586.rpm
 1512cc21647372972d62143538110f0b  2009.0/i586/python-2.5.2-5.2mdv2009.0.i586.rpm
 1ee69545d6e690add84393551b3008fb  2009.0/i586/python-base-2.5.2-5.2mdv2009.0.i586.rpm
 4c2cf514d3bb03dc5690341ef8b57345  2009.0/i586/python-docs-2.5.2-5.2mdv2009.0.i586.rpm
 7f3d125f0c601fbc650441e9d3d84660  2009.0/i586/tkinter-2.5.2-5.2mdv2009.0.i586.rpm
 a5de9edf44334b6bd10914b29875b79d  2009.0/i586/tkinter-apps-2.5.2-5.2mdv2009.0.i586.rpm 
 a693a961c64a55661ff434db34514e54  2009.0/SRPMS/python-2.5.2-5.2mdv2009.0.src.rpm

 Mandriva Linux 2009.0/X86_64:
 6c08e75992d0dbcc0588486ba110b7d0  2009.0/x86_64/lib64python2.5-2.5.2-5.2mdv2009.0.x86_64.rpm
 14b108a893efbe023251b153d1e82510  2009.0/x86_64/lib64python2.5-devel-2.5.2-5.2mdv2009.0.x86_64.rpm
 993aae03321911db6a6658b1d9c59770  2009.0/x86_64/python-2.5.2-5.2mdv2009.0.x86_64.rpm
 2b7c1156968c717a439bc0f09cae6377  2009.0/x86_64/python-base-2.5.2-5.2mdv2009.0.x86_64.rpm
 0d3827f4b2abd8d8708374a10f3d6a29  2009.0/x86_64/python-docs-2.5.2-5.2mdv2009.0.x86_64.rpm
 850ba6348ca56583ac9d9cdcfe363cf9  2009.0/x86_64/tkinter-2.5.2-5.2mdv2009.0.x86_64.rpm
 36bd4ed23029a5c85846306722c5c539  2009.0/x86_64/tkinter-apps-2.5.2-5.2mdv2009.0.x86_64.rpm 
 a693a961c64a55661ff434db34514e54  2009.0/SRPMS/python-2.5.2-5.2mdv2009.0.src.rpm

 Corporate 4.0:
 d1aaa4775604a3de987ea812484cbbe4  corporate/4.0/i586/libpython2.4-2.4.5-0.2.20060mlcs4.i586.rpm
 044319e405c74c74ada649911fea096b  corporate/4.0/i586/libpython2.4-devel-2.4.5-0.2.20060mlcs4.i586.rpm
 70a92760d7ee37150357fd5eed43d0cd  corporate/4.0/i586/python-2.4.5-0.2.20060mlcs4.i586.rpm
 dd69e4feb812394c47140b42ec319dad  corporate/4.0/i586/python-base-2.4.5-0.2.20060mlcs4.i586.rpm
 40137c85bd8f45948823be862da2c224  corporate/4.0/i586/python-docs-2.4.5-0.2.20060mlcs4.i586.rpm
 2f226b42cb832b2c9860f18528a71936  corporate/4.0/i586/tkinter-2.4.5-0.2.20060mlcs4.i586.rpm 
 83a6e83bb1b31cb4b5a43628e6a762d4  corporate/4.0/SRPMS/python-2.4.5-0.2.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 496d164ca85142afa629e3ea374810d2  corporate/4.0/x86_64/lib64python2.4-2.4.5-0.2.20060mlcs4.x86_64.rpm
 0ee91a3adf261607b8df677d98b45704  corporate/4.0/x86_64/lib64python2.4-devel-2.4.5-0.2.20060mlcs4.x86_64.rpm
 05be6f567bd0ae454878fbc91950d5e0  corporate/4.0/x86_64/python-2.4.5-0.2.20060mlcs4.x86_64.rpm
 5fcaa1f9cc19b6c7a69422fee87081cb  corporate/4.0/x86_64/python-base-2.4.5-0.2.20060mlcs4.x86_64.rpm
 e449b5dc09573a81c2d46305c0dcc641  corporate/4.0/x86_64/python-docs-2.4.5-0.2.20060mlcs4.x86_64.rpm
 7e41ff74e33e237c319c36d7de726f3c  corporate/4.0/x86_64/tkinter-2.4.5-0.2.20060mlcs4.x86_64.rpm 
 83a6e83bb1b31cb4b5a43628e6a762d4  corporate/4.0/SRPMS/python-2.4.5-0.2.20060mlcs4.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFJZ8kcmqjQ0CJFipgRAid1AJ4r2XGu3/mwmj94DeibPLPf3SLhcQCeLATO
i4D9EZtmJCdN/0XK3eWOBnc=
=iXWH
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBSWqa2Sh9+71yA2DNAQK+zQP/UpLyqGvXECkXhNs8Y/rOMkURjJ/HT3cT
R3AyooG7weZOosX6v+a5jm8ke/115XPuIEfm87CXqgLjmBOUizkizbSG4IzhQ1mQ
I/lSj51dmW0yMsy3p0uBRilZnPUcheWzBZt8WKP2rkXHMX0ctOZoXVccFyoPE6+h
Ea2VP4oYCa4=
=dYp3
-----END PGP SIGNATURE-----