Summary: | <dev-lang/python-{2.7.7,3.2.5-r6,3.3.4} : "sock_recvfrom_into()" Buffer Overflow Vulnerability (CVE-2014-1912) | ||||||
---|---|---|---|---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> | ||||
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> | ||||
Status: | RESOLVED FIXED | ||||||
Severity: | major | CC: | daniel+gentoo, djc, nikoli, python, sudormrfhalt | ||||
Priority: | Normal | ||||||
Version: | unspecified | ||||||
Hardware: | All | ||||||
OS: | Linux | ||||||
URL: | http://secunia.com/advisories/56624/ | ||||||
See Also: | https://bugs.gentoo.org/show_bug.cgi?id=516550 | ||||||
Whiteboard: | A2 [glsa] | ||||||
Package list: | Runtime testing required: | --- | |||||
Attachments: |
|
Description
Agostino Sarubbo
2014-02-06 14:30:53 UTC
*** Bug 502404 has been marked as a duplicate of this bug. *** *** Bug 503348 has been marked as a duplicate of this bug. *** Created attachment 381668 [details, diff]
CVE-2014-1912-recvfrom_into.patch
CVE-2014-1912 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1912): Buffer overflow in the socket.recvfrom_into function in Modules/socketmodule.c in Python 2.5 before 2.7.7, 3.x before 3.3.4, and 3.4.x before 3.4rc1 allows remote attackers to execute arbitrary code via a crafted string. Please go ahead and stabilize dev-lang/python-2.7.7 and dev-lang/python-3.3.5. Somebody should probably back-port the fix for python-3.2. http://hg.python.org/cpython/rev/9c56217e5c79/ I think this still leaves us vulnerable to bug 514686, so this will likely be followed by a revbump or version bump for that bug whenever someone can get to it. Arches, please test and mark stable =dev-lang/python-2.7.7 =dev-lang/python-3.2.5-r6 =dev-lang/python-3.3.5-r1 Target keywords: alpha amd64 arm hppa ia64 ppc ppc64 sparc x86 (In reply to Sergey Popov from comment #7) > Arches, please test and mark stable > > =dev-lang/python-2.7.7 > =dev-lang/python-3.2.5-r6 > =dev-lang/python-3.3.5-r1 You forgot: =dev-tcltk/tix-8.4.3-r1 > Target keywords: alpha amd64 arm hppa ia64 ppc ppc64 sparc x86 Stable for HPPA. Stable on alpha. amd64 stable x86 stable arm stable ia64/sparc stable ppc stable ppc64 stable. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one. Cleanup done. (In reply to Dirkjan Ochtman from comment #17) > Cleanup done. Thank you for cleanup. I'm changing title to < 3.3.4 as this is the version mentioned in CVE as fixed for this branch so it seems OK that this is still in the tree. New GLSA request filed. This issue was resolved and addressed in GLSA 201503-10 at https://security.gentoo.org/glsa/201503-10 by GLSA coordinator Kristian Fiskerstrand (K_F). |