SCIENTIFIC-LINUX-ERRATA Archives

March 2012

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Condense Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Sender:
Security Errata for Scientific Linux <[log in to unmask]>
Subject:
From:
Patrick Riehecky <[log in to unmask]>
Date:
Thu, 8 Mar 2012 09:20:38 -0600
Comments:
Reply-To:
Parts/Attachments:
text/plain (25 lines)
Synopsis:    Moderate: python-sqlalchemy security update
Issue Date:  2012-03-07
CVE Numbers: CVE-2012-0805


SQLAlchemy is an Object Relational Mapper (ORM) that provides a flexible,
high-level interface to SQL databases.

It was discovered that SQLAlchemy did not sanitize values for the limit and
offset keywords for SQL select statements. If an application using
SQLAlchemy accepted values for these keywords, and did not filter or
sanitize them before passing them to SQLAlchemy, it could allow an attacker
to perform an SQL injection attack against the application. (CVE-2012-0805)

All users of python-sqlalchemy are advised to upgrade to this updated
package, which contains a patch to correct this issue. All running
applications using SQLAlchemy must be restarted for this update to take
effect.

SL6:
  noarch
     python-sqlalchemy-0.5.5-3.el6_2.noarch.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2