It was discovered that the socket.recvfrom_into() function failed to check the size of the supplied buffer. This could lead to a buffer overflow when the function was called with an insufficiently sized buffer.
Find out more about CVE-2014-1912 from the MITRE CVE dictionary dictionary and NIST NVD.
This issue did not affect the versions of python as shipped with Red Hat Enterprise Linux 5 as they did not include the vulnerable socket.recvfrom_into() function. This issue was also corrected in the version of python shipped with Red Hat Enterprise Linux 7.0 prior to release.
The Red Hat Security Response Team has rated this issue as having Moderate security impact. A future update may address this issue in Red Hat Software Collections. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.
Base Score | 5.1 |
---|---|
Base Metrics | AV:N/AC:H/Au:N/C:P/I:P/A:P |
Access Vector | Network |
Access Complexity | High |
Authentication | None |
Confidentiality Impact | Partial |
Integrity Impact | Partial |
Availability Impact | Partial |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat Software Collections for Red Hat Enterprise Linux 6 (python27-python) | RHSA-2015:1064 | 2015-06-04 |
Red Hat Software Collections for Red Hat Enterprise Linux 7 (python27-python) | RHSA-2015:1064 | 2015-06-04 |
Red Hat Enterprise Linux 6 (python) | RHSA-2015:1330 | 2015-07-20 |
Platform | Package | State |
---|---|---|
Red Hat Software Collections for Red Hat Enterprise Linux | python33-python | Will not fix |
Red Hat Software Collections for Red Hat Enterprise Linux | rh-python34-python | Not affected |
Red Hat Enterprise Linux 7 | python | Not affected |
Red Hat Enterprise Linux 5 | python | Not affected |