diff options
author | miwi <miwi@FreeBSD.org> | 2008-09-11 15:52:32 +0800 |
---|---|---|
committer | miwi <miwi@FreeBSD.org> | 2008-09-11 15:52:32 +0800 |
commit | 17f8b3c53432c2f24669ba2edf61db47145a5344 (patch) | |
tree | 64b0da26dd82a4d7be7401a26e3e841f26aacb3e | |
parent | c8273754b4a7beffad357698e9e6065e8b745b8c (diff) | |
download | freebsd-ports-gnome-17f8b3c53432c2f24669ba2edf61db47145a5344.tar.gz freebsd-ports-gnome-17f8b3c53432c2f24669ba2edf61db47145a5344.tar.zst freebsd-ports-gnome-17f8b3c53432c2f24669ba2edf61db47145a5344.zip |
- Document python -- multiple vulnerabilities
Reviewed by: remko/tabthorpe
Approved by: portmgr (secteam blanked)
-rw-r--r-- | security/vuxml/vuln.xml | 57 |
1 files changed, 57 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index c19eb364191d..b5c604db64a5 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,63 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="0dccaa28-7f3c-11dd-8de5-0030843d3802"> + <topic>python -- multiple vulnerabilities</topic> + <affects> + <package> + <name>python24</name> + <range><lt>2.4.5_2</lt></range> + </package> + <package> + <name>python25</name> + <range><lt>2.5.2_3</lt></range> + </package> + <package> + <name>python23</name> + <range><gt>0</gt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Secunia reports:</p> + <blockquote cite="http://secunia.com/advisories/31305"> + <p>Some vulnerabilities have been reported in Python, where some have + unknown impact and others can potentially be exploited by malicious + people to cause a DoS (Denial of Service) or to compromise a + vulnerable system.</p> + <p>Various integer overflow errors exist in core modules e.g. + stringobject, unicodeobject, bufferobject, longobject, tupleobject, + stropmodule, gcmodule, mmapmodule.</p> + <p>An integer overflow in the hashlib module can lead to an unreliable + cryptographic digest results.</p> + <p>Integer overflow errors in the processing of unicode strings can be + exploited to cause buffer overflows on 32-bit systems.</p> + <p>An integer overflow exists in the PyOS_vsnprintf() function on + architectures that do not have a "vsnprintf()" function.</p> + <p>An integer underflow error in the PyOS_vsnprintf() function when + passing zero-length strings can lead to memory corruption.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2008-2315</cvename> + <cvename>CVE-2008-2316</cvename> + <cvename>CVE-2008-3142</cvename> + <cvename>CVE-2008-3144</cvename> + <url>http://bugs.python.org/issue2620</url> + <url>http://bugs.python.org/issue2588</url> + <url>http://bugs.python.org/issue2589</url> + <url>http://secunia.com/advisories/31305</url> + <mlist>http://mail.python.org/pipermail/python-checkins/2008-July/072276.html</mlist> + <mlist>http://mail.python.org/pipermail/python-checkins/2008-July/072174.html</mlist> + <mlist>http://mail.python.org/pipermail/python-checkins/2008-June/070481.html</mlist> + </references> + <dates> + <discovery>2008-08-04</discovery> + <entry>2008-09-10</entry> + </dates> + </vuln> + <vuln vid="388d9ee4-7f22-11dd-a66a-0019666436c2"> <topic>mysql -- MyISAM table privileges secuity bypass vulnerability</topic> <affects> |