SB2010060402 - Fedora EPEL 5 update for python26



SB2010060402 - Fedora EPEL 5 update for python26

Published: June 4, 2010 Updated: June 28, 2025

Security Bulletin ID SB2010060402
Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 67% Low 33%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Untrusted search path (CVE-ID: CVE-2008-5983)

The vulnerability allows a local user to execute arbitrary code.

Untrusted search path vulnerability in the PySys_SetArgv API function in Python 2.6 and earlier, and possibly later versions, prepends an empty string to sys.path when the argv[0] argument does not contain a path separator, which might allow local users to execute arbitrary code via a Trojan horse Python file in the current working directory.


2) Input validation error (CVE-ID: CVE-2010-1634)

The vulnerability allows context-dependent attackers to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can cause a denial of service (application crash) via a large fragment, as demonstrated by a call to audioop.lin2lin with a long string in the first argument, leading to a buffer overflow.


3) Out-of-bounds write (CVE-ID: CVE-2010-2089)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The audioop module in Python 2.7 and 3.2 does not verify the relationships between size arguments and byte string lengths, which allows context-dependent attackers to cause a denial of service (memory corruption and application crash) via crafted arguments, as demonstrated by a call to audioop.reverse with a one-byte string, a different vulnerability than CVE-2010-1634.


Remediation

Install update from vendor's website.