Package: python2.4
Version: 2.4.4-3+etch2
Severity: grave
Tags: security patch

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for python2.4.

CVE-2008-5031[0]:
| Multiple integer overflows in Python 2.2.3 through 2.5.1, and 2.6,
| allow context-dependent attackers to have an unknown impact via a
| large integer value in the tabsize argument to the expandtabs method,
| as implemented by (1) the string_expandtabs function in
| Objects/stringobject.c and (2) the unicode_expandtabs function in
| Objects/unicodeobject.c.  NOTE: this vulnerability reportedly exists
| because of an incomplete fix for CVE-2008-2315.

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

verified on stable/testing/unstable. Upstream patches:
http://svn.python.org/view/python/trunk/Objects/unicodeobject.c?p2=%2Fpython%2Ftrunk%2FObjects%2Funicodeobject.c&p1=python%2Ftrunk%2FObjects%2Funicodeobject.c&r1=61350&r2=61349&rev=61350&view=diff&diff_format=u
http://svn.python.org/view/python/trunk/Objects/stringobject.c?p2=%2Fpython%2Ftrunk%2FObjects%2Fstringobject.c&p1=python%2Ftrunk%2FObjects%2Fstringobject.c&r1=61350&r2=61349&rev=61350&view=diff&diff_format=u

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5031
    http://security-tracker.debian.net/tracker/CVE-2008-5031

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpvrG1Lblt73.pgp
Description: PGP signature

Reply via email to