Package: python2.4 Version: 2.4.4-3+etch2 Severity: grave Tags: security patch
Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for python2.4. CVE-2008-5031[0]: | Multiple integer overflows in Python 2.2.3 through 2.5.1, and 2.6, | allow context-dependent attackers to have an unknown impact via a | large integer value in the tabsize argument to the expandtabs method, | as implemented by (1) the string_expandtabs function in | Objects/stringobject.c and (2) the unicode_expandtabs function in | Objects/unicodeobject.c. NOTE: this vulnerability reportedly exists | because of an incomplete fix for CVE-2008-2315. If you fix the vulnerability please also make sure to include the CVE id in your changelog entry. verified on stable/testing/unstable. Upstream patches: http://svn.python.org/view/python/trunk/Objects/unicodeobject.c?p2=%2Fpython%2Ftrunk%2FObjects%2Funicodeobject.c&p1=python%2Ftrunk%2FObjects%2Funicodeobject.c&r1=61350&r2=61349&rev=61350&view=diff&diff_format=u http://svn.python.org/view/python/trunk/Objects/stringobject.c?p2=%2Fpython%2Ftrunk%2FObjects%2Fstringobject.c&p1=python%2Ftrunk%2FObjects%2Fstringobject.c&r1=61350&r2=61349&rev=61350&view=diff&diff_format=u For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5031 http://security-tracker.debian.net/tracker/CVE-2008-5031 -- Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted.
pgpvrG1Lblt73.pgp
Description: PGP signature