---------------------------------------------------------------------- Want to work within IT-Security? Secunia is expanding its team of highly skilled security experts. We will help with relocation and obtaining a work permit. Currently the following type of positions are available: http://secunia.com/hardcore_disassembler_and_reverse_engineer/ ---------------------------------------------------------------------- TITLE: Mandriva update for python SECUNIA ADVISORY ID: SA22358 VERIFY ADVISORY: http://secunia.com/advisories/22358/ CRITICAL: Moderately critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: Mandriva Linux 2006 http://secunia.com/product/9020/ Mandriva Linux 2007 http://secunia.com/product/12165/ DESCRIPTION: Mandriva has issued an update for python. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. For more information: SA22276 SOLUTION: Apply updated packages. Mandriva Linux 2006 a9eb2b13c925cc7e81dd1ba574d8c4c3 2006.0/i586/libpython2.4-2.4.1-5.1.20060mdk.i586.rpm 15c9eead6fd85533159526eed7a6b17e 2006.0/i586/libpython2.4-devel-2.4.1-5.1.20060mdk.i586.rpm c9fc746fac4125d21b7651043573e4b7 2006.0/i586/python-2.4.1-5.1.20060mdk.i586.rpm 92c82f611c1ef25ea32dcd08104773af 2006.0/i586/python-base-2.4.1-5.1.20060mdk.i586.rpm 016687d3639c92954d181a05b0624359 2006.0/i586/python-docs-2.4.1-5.1.20060mdk.i586.rpm 1d6e5e8f6ce12a7c6e210ab9456f479f 2006.0/i586/tkinter-2.4.1-5.1.20060mdk.i586.rpm 0a76a89bc5835828c8219673cbd0b435 2006.0/SRPMS/python-2.4.1-5.1.20060mdk.src.rpm Mandriva Linux 2006/X86_64 3bbf6ed37ce7c4e7529f5fc9d17b7291 2006.0/x86_64/lib64python2.4-2.4.1-5.1.20060mdk.x86_64.rpm 5de894eeb7ec4973bebc25bb1f72d814 2006.0/x86_64/lib64python2.4-devel-2.4.1-5.1.20060mdk.x86_64.rpm 4db5d1a3e39c3f40c4e5050dba3d918a 2006.0/x86_64/python-2.4.1-5.1.20060mdk.x86_64.rpm 4a5a6952e53ab7db8fe5c9471aeae89a 2006.0/x86_64/python-base-2.4.1-5.1.20060mdk.x86_64.rpm 1465a11b9501586f7d9973a2f95fb0cc 2006.0/x86_64/python-docs-2.4.1-5.1.20060mdk.x86_64.rpm 3ff58332759b527310ed3366bad87f04 2006.0/x86_64/tkinter-2.4.1-5.1.20060mdk.x86_64.rpm 0a76a89bc5835828c8219673cbd0b435 2006.0/SRPMS/python-2.4.1-5.1.20060mdk.src.rpm Mandriva Linux 2007 44c48f7600b0f089117a96e5f4357a0c 2007.0/i586/libpython2.4-2.4.3-3.1mdv2007.0.i586.rpm a6c07dd5029afd05daf0b5d427f5cef5 2007.0/i586/libpython2.4-devel-2.4.3-3.1mdv2007.0.i586.rpm 4244b1bbd76123e60f19c75764b00e98 2007.0/i586/python-2.4.3-3.1mdv2007.0.i586.rpm 0b694e436e0cd6628d7369f41ffa3fd9 2007.0/i586/python-base-2.4.3-3.1mdv2007.0.i586.rpm 829c1d6b7eb792bcbd3f7ecbe3f972d5 2007.0/i586/python-docs-2.4.3-3.1mdv2007.0.i586.rpm 48bff204449435e63e9cb24da3f77628 2007.0/i586/tkinter-2.4.3-3.1mdv2007.0.i586.rpm dea3c153d446fb676f7af3ca5c369db3 2007.0/SRPMS/python-2.4.3-3.1mdv2007.0.src.rpm Mandriva Linux 2007/X86_64 3d068b19380f7fc08adb905186d8ef59 2007.0/x86_64/lib64python2.4-2.4.3-3.1mdv2007.0.x86_64.rpm 9399b2fbd78929a705d5d8fdeaf660f0 2007.0/x86_64/lib64python2.4-devel-2.4.3-3.1mdv2007.0.x86_64.rpm c06b2b6d69781cfd9bd9cb9fae3f8f7f 2007.0/x86_64/python-2.4.3-3.1mdv2007.0.x86_64.rpm a7a7ea9f8a6d49f928af411baa3e4087 2007.0/x86_64/python-base-2.4.3-3.1mdv2007.0.x86_64.rpm 4433860f8f42cab135453a2e8eac3f46 2007.0/x86_64/python-docs-2.4.3-3.1mdv2007.0.x86_64.rpm d5d22b53dc48a4150c6d1285f4bb6f33 2007.0/x86_64/tkinter-2.4.3-3.1mdv2007.0.x86_64.rpm dea3c153d446fb676f7af3ca5c369db3 2007.0/SRPMS/python-2.4.3-3.1mdv2007.0.src.rpm ORIGINAL ADVISORY: http://www.mandriva.com/security/advisories?name=MDKSA-2006:181 OTHER REFERENCES: SA22276: http://secunia.com/advisories/22276/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------