Lucene search

K
centosCentOS ProjectCESA-2012:1206
HistoryAug 27, 2012 - 7:18 p.m.

python security update

2012-08-2719:18:21
CentOS Project
lists.centos.org
40

5.1 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

0.045 Low

EPSS

Percentile

92.5%

CentOS Errata and Security Advisory CESA-2012:1206

Python Paste provides middleware for building and running Python web
applications. The python-paste-script package includes paster, a tool for
working with and running Python Paste applications.

It was discovered that paster did not drop supplementary group privileges
when started by the root user. Running “paster serve” as root to start a
Python web application that will run as a non-root user and group resulted
in that application running with root group privileges. This could possibly
allow a remote attacker to gain access to files that should not be
accessible to the application. (CVE-2012-0878)

All paster users should upgrade to this updated package, which contains a
backported patch to resolve this issue. All running paster instances
configured to drop privileges must be restarted for this update to take
effect.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2012-August/080989.html

Affected packages:
python-paste-script

Upstream details at:
https://access.redhat.com/errata/RHSA-2012:1206

5.1 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

0.045 Low

EPSS

Percentile

92.5%