Amazon Linux 1 Security Advisory: ALAS-2013-241
Advisory Release Date: 2013-11-03 12:09 Pacific
Advisory Updated Date: 2015-06-22 10:35 Pacific
It was discovered that multiple Python standard library modules implementing network protocols (such as httplib or smtplib) failed to restrict sizes of server responses. A malicious server could cause a client using one of the affected modules to consume an excessive amount of memory. (CVE-2013-1752)
The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. (CVE-2013-4238)
Affected Packages:
python26
Issue Correction:
Run yum update python26 to update your system.
i686:
python26-devel-2.6.9-1.40.amzn1.i686
python26-2.6.9-1.40.amzn1.i686
python26-test-2.6.9-1.40.amzn1.i686
python26-tools-2.6.9-1.40.amzn1.i686
python26-libs-2.6.9-1.40.amzn1.i686
python26-debuginfo-2.6.9-1.40.amzn1.i686
src:
python26-2.6.9-1.40.amzn1.src
x86_64:
python26-tools-2.6.9-1.40.amzn1.x86_64
python26-2.6.9-1.40.amzn1.x86_64
python26-debuginfo-2.6.9-1.40.amzn1.x86_64
python26-test-2.6.9-1.40.amzn1.x86_64
python26-libs-2.6.9-1.40.amzn1.x86_64
python26-devel-2.6.9-1.40.amzn1.x86_64