=========================================================== 
Ubuntu Security Notice USN-430-1             March 06, 2007
libapache2-mod-python vulnerability
CVE-2004-2680
==========================================================
A security issue affects the following Ubuntu releases:

Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.10:
  libapache2-mod-python                    3.1.3-3ubuntu1.1

Ubuntu 6.06 LTS:
  libapache2-mod-python                    3.1.4-0ubuntu1.1

After a standard system upgrade you need to restart Apache to effect the 
necessary changes.

Details follow:

Miles Egan discovered that mod_python, when used in output filter mode, 
did not handle output larger than 16384 bytes, and would display freed 
memory, possibly disclosing private data.  Thanks to Jim Garrison of the 
Software Freedom Law Center for identifying the original bug as a 
security vulnerability.


Updated packages for Ubuntu 5.10:

  Source archives:

          Size/MD5:    42855 1529fea7b05b869a360b6bc68d52386e
          Size/MD5:      810 63072c8e787515557969a57119e5d4c5
          Size/MD5:   293548 2e1983e35edd428f308b0dfeb1c23bfe

  Architecture independent packages:

          Size/MD5:   101052 02819855dfc2346b9582b8687b7ce3f3
          Size/MD5:    12890 29d8f3ad95844a81ef2bac9921be4ea2

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

          Size/MD5:    88482 bbbc44abd50a165ae5df51d97c8b59f4
          Size/MD5:    88506 33430412a637252533673023a0eb556e

  i386 architecture (x86 compatible Intel/AMD)

          Size/MD5:    80692 43cf25dacf95697200b50280ff4b1c74
          Size/MD5:    80722 7003abb20896ed3d218febd92ad176c2

  powerpc architecture (Apple Macintosh G3/G4/G5)

          Size/MD5:    85980 75be899b0568d8a332ac04ae820d955e
          Size/MD5:    86010 f706350855b692417a9d32f2c1962abd

  sparc architecture (Sun SPARC/UltraSPARC)

          Size/MD5:    82038 0b8d6e081d3e6506139a9fac4674d8ad
          Size/MD5:    82078 71b5c528867eb166cd140a564d3fde0b

Updated packages for Ubuntu 6.06 LTS:

  Source archives:

          Size/MD5:    25348 f53b1e046220df8e1cdcf4cd602ac563
          Size/MD5:      769 41f6be106885d14e487317c57cc8e940
          Size/MD5:   308510 607175958137b06bcda91110414c82a1

  Architecture independent packages:

          Size/MD5:   113106 0b66fc0e0a15cbc6a57df85100e3ca62
          Size/MD5:    13076 5488f0a55a436648c587e9a300d63881

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

          Size/MD5:    88678 8542060889c4b3c32a6937070911bf33

  i386 architecture (x86 compatible Intel/AMD)

          Size/MD5:    80676 13f3b9e1d7260ad8c34f7597954ed315

  powerpc architecture (Apple Macintosh G3/G4/G5)

          Size/MD5:    85840 684789cb3c7acbeed9064200554d8da4

  sparc architecture (Sun SPARC/UltraSPARC)

          Size/MD5:    82000 297ab56501345f12ee9c6c0951287980


Ubuntu: mod_python vulnerability

March 6, 2007
Miles Egan discovered that mod_python, when used in output filter mode, did not handle output larger than 16384 bytes, and would display freed memory, possibly disclosing private d...

Summary

Update Instructions

References

Severity
Ubuntu Security Notice USN-430-1 March 06, 2007

Package Information

Related News