Amazon Linux 1 (EOL) Security Advisory: ALAS-2014-440
Advisory Released Date: 2014-11-05
Advisory Updated Date: 2014-11-11
Severity:
Medium
Issue Overview:
It was discovered (http://bugs.python.org/issue21766) that Python built-in module CGIHTTPServer does not properly handle URL-encoded path separators in URLs which may enable attackers to disclose a CGI script's source code or execute arbitrary scripts in the server's document root. (CVE-2014-4650)
Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a "buffer" function. (CVE-2014-7185)
Affected Packages:
python27
Issue Correction:
Run yum update python27 to update your system.
New Packages:
i686:
python27-tools-2.7.8-6.74.amzn1.i686
python27-debuginfo-2.7.8-6.74.amzn1.i686
python27-devel-2.7.8-6.74.amzn1.i686
python27-test-2.7.8-6.74.amzn1.i686
python27-libs-2.7.8-6.74.amzn1.i686
python27-2.7.8-6.74.amzn1.i686
src:
python27-2.7.8-6.74.amzn1.src
x86_64:
python27-debuginfo-2.7.8-6.74.amzn1.x86_64
python27-devel-2.7.8-6.74.amzn1.x86_64
python27-test-2.7.8-6.74.amzn1.x86_64
python27-2.7.8-6.74.amzn1.x86_64
python27-libs-2.7.8-6.74.amzn1.x86_64
python27-tools-2.7.8-6.74.amzn1.x86_64