Summary: | <dev-lang/python-2.7.9-r1: potential buffer overflow (CVE-2014-7185) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | python |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=1146026 | ||
Whiteboard: | A2 [glsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 532232 | ||
Bug Blocks: |
Description
Agostino Sarubbo
2014-09-26 13:24:58 UTC
Wouldn't this be covered by the python-2.7.8 ebuild already in the tree? (In reply to Mike Gilbert from comment #1) > Wouldn't this be covered by the python-2.7.8 ebuild already in the tree? yes Please proceed with stabilization then. stabilizing <dev-lang/python-2.7.9-r1 as part of bug 532232 CVE-2014-7185 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7185): Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a "buffer" function. This issue was resolved and addressed in GLSA 201503-10 at https://security.gentoo.org/glsa/201503-10 by GLSA coordinator Kristian Fiskerstrand (K_F). |