ELSA-2017-1868

ELSA-2017-1868 - python security and bug fix update

Type:SECURITY
Severity:MODERATE
Release Date:2017-08-07

Description


[2.7.5-58.0.1]
- Add Oracle Linux distribution in platform.py [orabug 20812544]

[2.7.5-58]
- Set stream to None in case an _open() fails.
Resolves: rhbz#1432003

[2.7.5-57]
- Fix implicit declaration warnings of functions added by patches 147 and 265
Resolves: rhbz#1441237

[2.7.5-56]
- Fix shutil.make_archive ignoring empty directories when creating zip files
Resolves: rhbz#1439734

[2.7.5-55]
- Update Python RPM macros with new ones from EPEL7 to simplify packaging
Resolves: rhbz#1297522

[2.7.5-54]
- Protect key list during fork()
Resolves: rhbz#1268226

[2.7.5-53]
- Fix _ssl.c reference leaks
Resolves: rhbz#1272562

[2.7.5-52]
- Workaround Python's threading library issue with non returning wait, for signals with timeout
Resolves: rhbz#1368076

[2.7.5-51]
- Enable certificate verification by default
Resolves: rhbz#1219110

[2.7.5-50]
- Fix incorrect parsing of certain regular expressions
Resolves: rhbz#1373363

[2.7.5-49]
- Fix ssl module's parsing of GEN_RID subject alternative name fields in X.509 certs
Resolves: rhbz#1364444

[2.7.5-48]
- Fix for CVE-2016-1000110 HTTPoxy attack
Resolves: rhbz#1359164

[2.7.5-47]
- Fix for CVE-2016-5636: possible integer overflow and heap corruption in zipimporter.get_data()
Resolves: rhbz#1356364

[2.7.5-46]
- Drop patch 221 that backported sslwrap function since it was introducing regressions
- Refactor patch 227
Resolves: rhbz#1331425

[2.7.5-45]
- Fix for CVE-2016-0772 python: smtplib StartTLS stripping attack (rhbz#1303647)
Raise an error when STARTTLS fails (upstream patch)
- Fix for CVE-2016-5699 python: http protocol steam injection attack (rhbz#1303699)
Disabled HTTP header injections in httplib (upstream patch)
Resolves: rhbz#1346357

[2.7.5-44]
- Fix iteration over files with very long lines
Resolves: rhbz#1271760

[2.7.5-43]
- Move python.conf from /etc/tmpfiles.d/ to /usr/lib/tmpfiles.d/
Resolves: rhbz#1288426

[2.7.5-42]
- JSON decoder lone surrogates fix
Resolves: rhbz#1301017

[2.7.5-41]
- Updated PEP493 implementation
Resolves: rhbz#1315758

[2.7.5-40]
- Backport of Computed Goto dispatch
Resolves: rhbz#1289277


Related CVEs


CVE-2014-9365

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 7 (aarch64) python-2.7.5-58.0.1.el7.src.rpm673259dff2d99880c2dc8834e044abd2ELSA-2021-9107
python-2.7.5-58.0.1.el7.aarch64.rpma90621fa298b8f56adcfc2034c36551aELSA-2021-9107
python-debug-2.7.5-58.0.1.el7.aarch64.rpmc55feaa740c1626403f591999dd1c639ELSA-2021-9107
python-devel-2.7.5-58.0.1.el7.aarch64.rpme7f8d1e8596fb13f59d3709438503cd8ELSA-2021-9107
python-libs-2.7.5-58.0.1.el7.aarch64.rpm69228b3c4f2cfd61a78e6b4aaf617a34ELSA-2021-9107
python-test-2.7.5-58.0.1.el7.aarch64.rpm8e7bb27d9379f35d28ba5e247ca37dbaELSA-2021-9107
python-tools-2.7.5-58.0.1.el7.aarch64.rpm03dc4663b7b6971b3a30628f2711e005ELSA-2021-9107
tkinter-2.7.5-58.0.1.el7.aarch64.rpma4133c887d8f96bb42daa9219899beabELSA-2021-9107
Oracle Linux 7 (x86_64) python-2.7.5-58.0.1.el7.src.rpm673259dff2d99880c2dc8834e044abd2ELSA-2021-9107
python-2.7.5-58.0.1.el7.x86_64.rpm045c967a662bbac0025334f4c9b79554ELSA-2021-9107
python-debug-2.7.5-58.0.1.el7.x86_64.rpmadcf8a3a5a3a7cf884fe922f20f95d1aELSA-2021-9107
python-devel-2.7.5-58.0.1.el7.x86_64.rpm2a0951b1a9aa947d5a50a1b216094844ELSA-2021-9107
python-libs-2.7.5-58.0.1.el7.i686.rpm3ad425cbeec802986fdb70e5f3587f65ELSA-2021-9107
python-libs-2.7.5-58.0.1.el7.x86_64.rpmd171b7eab5699c1974e61ac2da09d720ELSA-2021-9107
python-test-2.7.5-58.0.1.el7.x86_64.rpmf76fd841dbb1d1e533678248a1ee0dcdELSA-2021-9107
python-tools-2.7.5-58.0.1.el7.x86_64.rpm45fb73e843471bc5989521fcfb63fad3ELSA-2021-9107
tkinter-2.7.5-58.0.1.el7.x86_64.rpm12d037a7a4edd0a7b93c49d3e36b5155ELSA-2021-9107



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete