oss-sec mailing list archives
Re: CVE Request: Python 2.7
From: cve-assign () mitre org
Date: Thu, 25 Sep 2014 16:28:01 -0400 (EDT)
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
http://bugs.python.org/issue21831 https://hg.python.org/cpython/diff/8d963c7db507/Objects/bufferobject.c avoid overflow with large buffer sizes and/or offsets (closes #21831)
import sys a = bytearray('CVE request') b = buffer(a, sys.maxsize, sys.maxsize) print b[:8192]
Our understanding is that this request is entirely about the integer overflow. The request is, as far as we know, not about whether static analysis could have detected that read access to "b" is attempted at a time when the size of "a" is smaller than the offset argument used in the "b =" line. Use CVE-2014-7185. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJUJHo6AAoJEKllVAevmvmsYHkIALazOVosrd1c8CRuzLTp6zt4 /lCyEPo+YlQSn6QLfe4EMZPPZMK6CnbMmCXlpiCr8Ha4oay9ZO3XgXWkiDRz/T7N c2JdHYen60d9iZDjVWQtCvMOBaQEU9jby0cwHetnq4fRK5WMhC869NjquTgoWqA6 tWTbr9NrF+QNgUaJug2DFVd3fW7ev2Uq4aueVh2+or9pMc1yFCATrbVqKiUz8LE7 /UrX1G/xzjxyvDI+N9CYgZrjqVh2PGwbUyzd12ncPOE7guHhcf7X7L/uY9PGGi1R 2c60Jj4bb5JsBn1tfNAYkdC7VL0qxSdrWV6H0cMQgw2ZZk8N7HkKmUaSXnNSznQ= =BwJB -----END PGP SIGNATURE-----
Current thread:
- CVE Request: Python 2.7 mancha (Sep 23)
- Re: CVE Request: Python 2.7 cve-assign (Sep 25)