Описание
ELSA-2015-2101: python security, bug fix, and enhancement update (MODERATE)
[2.7.5-34.0.1]
- Add Oracle Linux distribution in platform.py [orabug 20812544]
[2.7.5-34]
- Revert fix for rhbz#1117751 as it leads to regressions Resolves: rhbz#1117751
[2.7.5-33]
- Only restore SIG_PIPE when Popen called with restore_sigpipe Resolves: rhbz#1117751
[2.7.5-32]
- Backport SSLSocket.version function
- Temporary disable test_gdb on ppc64le rhbz#1260558 Resolves: rhbz#1259421
[2.7.5-31]
- Update load_cert_chain function to accept None keyfile Resolves: rhbz#1250611
[2.7.5-30]
- Change Patch224 according to latest update in PEP493 Resolves:rhbz#1219108
[2.7.5-29]
- Popen shouldn't ignore SIG_PIPE Resolves: rhbz#1117751
[2.7.5-28]
- Exclude python subprocess temp files from cleaning Resolves: rhbz#1058482
[2.7.5-27]
- Add list for cprofile sort option Resolves:rhbz#1237107
[2.7.5-26]
- Add switch to toggle cert verification on or off globally Resolves:rhbz#1219108
[2.7.5-25]
- PEP476 enable cert verifications by default Resolves:rhbz#1219110
[2.7.5-24]
- Massive backport of ssl module from python3 aka PEP466 Resolves: rhbz#1111461
[2.7.5-23]
- Fixed CVE-2013-1753, CVE-2013-1752, CVE-2014-4616, CVE-2014-4650, CVE-2014-7185 Resolves: rhbz#1206574
[2.7.5-22]
- Fix importing readline producing erroneous output Resolves: rhbz#1189301
[2.7.5-21]
- Add missing import in bdist_rpm Resolves: rhbz#1177613
[2.7.5-20]
- Avoid double close of subprocess pipes Resolves: rhbz#1103452
[2.7.5-19]
- make multiprocessing ignore EINTR Resolves: rhbz#1181624
Обновленные пакеты
Oracle Linux 7
Oracle Linux x86_64
python
2.7.5-34.0.1.el7
python-debug
2.7.5-34.0.1.el7
python-devel
2.7.5-34.0.1.el7
python-libs
2.7.5-34.0.1.el7
python-test
2.7.5-34.0.1.el7
python-tools
2.7.5-34.0.1.el7
tkinter
2.7.5-34.0.1.el7
Ссылки на источники
Связанные уязвимости
ELSA-2015-1064: python27 security, bug fix, and enhancement update (MODERATE)
ELSA-2015-1330: python security, bug fix, and enhancement update (MODERATE)
Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a "buffer" function.
Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a "buffer" function.