This bug was fixed in the package python2.4 - 2.4.4-7ubuntu1

---------------
python2.4 (2.4.4-7ubuntu1) hardy; urgency=low

  * Merge with Debian; remaining changes:
    - Rebuild the control file.
    - Build the -doc package from this source.

python2.4 (2.4.4-7) unstable; urgency=low

  * SVN update up to 2007-12-23.
  * Register binfmt for .py[co] files.
  * Use -fwrapv when GCC supports it.
  * Rename all exported symbols to avoid conflicts with similarly named
    symbols in other libraries (Robert Edmonds). Closes: #440272.
  * Use absolute paths when byte-compiling files. Closes: #453346.
  * CVE-2007-4965, http://bugs.python.org/issue1179:
    Multiple integer overflows in the imageop module in Python 2.5.1 and
    earlier allow context-dependent attackers to cause a denial of service
    (application crash) and possibly obtain sensitive information (memory
    contents) via crafted arguments to (1) the tovideo method, and unspecified
    other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other
    files, which trigger heap-based buffer overflows.
    Patch prepared by Stephan Herrmann. Closes: #443335, LP: #163845.
  * Remove deprecated value from categories in desktop file. LP: #172874.
  * python2.4-dbg: Don't include the gdbm and _tkinter extensions, now provided
    in separate packages.
  * Provide a symlink changelog -> NEWS. Closes: #439271.

 -- Matthias Klose <[EMAIL PROTECTED]>   Thu, 03 Jan 2008 13:11:54 +0000

** Changed in: python2.4 (Ubuntu)
       Status: In Progress => Fix Released

-- 
[python] Multiple integer overflow vulnerabilities possibly resulting in the 
execution of arbitrary code or DoS
https://bugs.launchpad.net/bugs/163845
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to