ArchLinux: 201412-15: python2: multiple issues
Summary
- CVE-2013-1752 (denial of service)
Multiple unbound readline() flaws in python stdlib were found, which can
lead to excessive memory usage if a malicious or broken server sends
excessively long lines without any line breaks.
- CVE-2013-1753 (denial of service)
The XMLRPC library is vulnerable to unrestricted decompression of HTTP
responses using gzip enconding. A malicious server can send a specially
prepared HTTP request that can result in memory exhaustion.
- CVE-2014-9365 (man-in-the-middle)
When Python's standard library HTTP clients (httplib, urllib, urllib2,
xmlrpclib) are used to access resources with HTTPS, by default the
certificate is not checked against any trust store, nor is the hostname
in the certificate checked against the requested host. It was possible
to configure a trust root to be checked against, however there were no
faculties for hostname checking. This made MITM attacks against the HTTP
clients trivial, and violated RFC 2818.
Resolution
Upgrade to 2.7.9-1.
# pacman -Syu "python2>=2.7.9-1"
The problems have been fixed upstream in version 2.7.9.
References
https://hg.python.org/cpython/raw-file/v2.7.9/Misc/NEWS https://access.redhat.com/security/cve/CVE-2013-1752 https://access.redhat.com/security/cve/CVE-2013-1753 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9365 https://bugs.python.org/issue16041 https://bugs.python.org/issue16042 https://bugs.python.org/issue16043 https://bugs.python.org/issue22417
Workaround
None.