Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 25 Sep 2014 16:28:01 -0400 (EDT)
From: cve-assign@...re.org
To: mancha1@...o.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE Request: Python 2.7

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> http://bugs.python.org/issue21831
> https://hg.python.org/cpython/diff/8d963c7db507/Objects/bufferobject.c
> avoid overflow with large buffer sizes and/or offsets (closes #21831)

> import sys
> a = bytearray('CVE request')
> b = buffer(a, sys.maxsize, sys.maxsize)
> print b[:8192]

Our understanding is that this request is entirely about the integer
overflow. The request is, as far as we know, not about whether static
analysis could have detected that read access to "b" is attempted at a
time when the size of "a" is smaller than the offset argument used in
the "b =" line.

Use CVE-2014-7185.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJUJHo6AAoJEKllVAevmvmsYHkIALazOVosrd1c8CRuzLTp6zt4
/lCyEPo+YlQSn6QLfe4EMZPPZMK6CnbMmCXlpiCr8Ha4oay9ZO3XgXWkiDRz/T7N
c2JdHYen60d9iZDjVWQtCvMOBaQEU9jby0cwHetnq4fRK5WMhC869NjquTgoWqA6
tWTbr9NrF+QNgUaJug2DFVd3fW7ev2Uq4aueVh2+or9pMc1yFCATrbVqKiUz8LE7
/UrX1G/xzjxyvDI+N9CYgZrjqVh2PGwbUyzd12ncPOE7guHhcf7X7L/uY9PGGi1R
2c60Jj4bb5JsBn1tfNAYkdC7VL0qxSdrWV6H0cMQgw2ZZk8N7HkKmUaSXnNSznQ=
=BwJB
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.