oss-sec mailing list archives

Re: CVE Request: Python 2.7


From: cve-assign () mitre org
Date: Thu, 25 Sep 2014 16:28:01 -0400 (EDT)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

http://bugs.python.org/issue21831
https://hg.python.org/cpython/diff/8d963c7db507/Objects/bufferobject.c
avoid overflow with large buffer sizes and/or offsets (closes #21831)

import sys
a = bytearray('CVE request')
b = buffer(a, sys.maxsize, sys.maxsize)
print b[:8192]

Our understanding is that this request is entirely about the integer
overflow. The request is, as far as we know, not about whether static
analysis could have detected that read access to "b" is attempted at a
time when the size of "a" is smaller than the offset argument used in
the "b =" line.

Use CVE-2014-7185.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJUJHo6AAoJEKllVAevmvmsYHkIALazOVosrd1c8CRuzLTp6zt4
/lCyEPo+YlQSn6QLfe4EMZPPZMK6CnbMmCXlpiCr8Ha4oay9ZO3XgXWkiDRz/T7N
c2JdHYen60d9iZDjVWQtCvMOBaQEU9jby0cwHetnq4fRK5WMhC869NjquTgoWqA6
tWTbr9NrF+QNgUaJug2DFVd3fW7ev2Uq4aueVh2+or9pMc1yFCATrbVqKiUz8LE7
/UrX1G/xzjxyvDI+N9CYgZrjqVh2PGwbUyzd12ncPOE7guHhcf7X7L/uY9PGGi1R
2c60Jj4bb5JsBn1tfNAYkdC7VL0qxSdrWV6H0cMQgw2ZZk8N7HkKmUaSXnNSznQ=
=BwJB
-----END PGP SIGNATURE-----


Current thread: