|
Message-Id: <20140925202801.0ED5572E070@smtpvbsrv1.mitre.org> Date: Thu, 25 Sep 2014 16:28:01 -0400 (EDT) From: cve-assign@...re.org To: mancha1@...o.com Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: CVE Request: Python 2.7 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > http://bugs.python.org/issue21831 > https://hg.python.org/cpython/diff/8d963c7db507/Objects/bufferobject.c > avoid overflow with large buffer sizes and/or offsets (closes #21831) > import sys > a = bytearray('CVE request') > b = buffer(a, sys.maxsize, sys.maxsize) > print b[:8192] Our understanding is that this request is entirely about the integer overflow. The request is, as far as we know, not about whether static analysis could have detected that read access to "b" is attempted at a time when the size of "a" is smaller than the offset argument used in the "b =" line. Use CVE-2014-7185. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJUJHo6AAoJEKllVAevmvmsYHkIALazOVosrd1c8CRuzLTp6zt4 /lCyEPo+YlQSn6QLfe4EMZPPZMK6CnbMmCXlpiCr8Ha4oay9ZO3XgXWkiDRz/T7N c2JdHYen60d9iZDjVWQtCvMOBaQEU9jby0cwHetnq4fRK5WMhC869NjquTgoWqA6 tWTbr9NrF+QNgUaJug2DFVd3fW7ev2Uq4aueVh2+or9pMc1yFCATrbVqKiUz8LE7 /UrX1G/xzjxyvDI+N9CYgZrjqVh2PGwbUyzd12ncPOE7guHhcf7X7L/uY9PGGi1R 2c60Jj4bb5JsBn1tfNAYkdC7VL0qxSdrWV6H0cMQgw2ZZk8N7HkKmUaSXnNSznQ= =BwJB -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.