Moderate CentOS python-paste-script Update


python-paste-script-1.7.3-5.el6_3.noarch.rpm, python-paste-script-1.7.3-5.el6_3.src.rpm,
2018-01-18 11:04
2017-07-27 20:03
2017-07-27 19:03
2017-04-01 19:06
2017-01-05 20:10


An updated python-paste-script package that fixes one security issue is now
available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

Python Paste provides middleware for building and running Python web
applications. The python-paste-script package includes paster, a tool for
working with and running Python Paste applications.

It was discovered that paster did not drop supplementary group privileges
when started by the root user. Running "paster serve" as root to start a
Python web application that will run as a non-root user and group resulted
in that application running with root group privileges. This could possibly
allow a remote attacker to gain access to files that should not be
accessible to the application. (CVE-2012-0878)

All paster users should upgrade to this updated package, which contains a
backported patch to resolve this issue. All running paster instances
configured to drop privileges must be restarted for this update to take
Please see

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
6 python-paste-script python-paste-script-1.7.3-5.el6_3.noarch.rpm
python-paste-script python-paste-script-1.7.3-5.el6_3.src.rpm