Home
Reading
Searching
Subscribe
Sponsors
Statistics
Posting
Contact
Spam
Lists
Links
About
Hosting
Filtering
Features Download
Marketing
Archives
FAQ
Blog
 
Gmane
From: Pat Riehecky <riehecky-13hema8v3vg <at> public.gmane.org>
Subject: Security ERRATA Moderate: python-paste-script on SL6.x i386/x86_64
Newsgroups: gmane.linux.scientific.errata
Date: Monday 27th August 2012 18:04:47 UTC (over 4 years ago)
Synopsis:          Moderate: python-paste-script security update
Issue Date:        2012-08-27
CVE Numbers:       CVE-2012-0878

Python Paste provides middleware for building and running Python web
applications. The python-paste-script package includes paster, a tool for
working with and running Python Paste applications.

It was discovered that paster did not drop supplementary group privileges
when started by the root user. Running "paster serve" as root to start a
Python web application that will run as a non-root user and group resulted
in that application running with root group privileges. This could possibly
allow a remote attacker to gain access to files that should not be
accessible to the application. (CVE-2012-0878)

All paster users should upgrade to this updated package, which contains a
backported patch to resolve this issue. All running paster instances
configured to drop privileges must be restarted for this update to take
effect.

SL6
   noarch
     python-paste-script-1.7.3-5.el6_3.noarch.rpm

- Scientific Linux Development Team
 
CD: 2ms