Acknowledgement sent to debian-bts@spamblock.netzgehirn.de:
New Bug report received and forwarded. Copy sent to Matthias Klose <doko@debian.org>.
(full text, mbox, link).
Subject: Security: buffer overrun in repr() for unicode strings
Date: Sat, 7 Oct 2006 14:45:47 +0200
Package: python
Version: all
Severity: important
Tags: security, fixed-upstream
See
http://sourceforge.net/tracker/index.php?func=detail&aid=1541585&group_id=5470&atid=305470
and
http://www.ubuntu.com/usn/usn-359-1
"
Benjamin C. Wiley Sittler discovered that Python's repr() function did
not properly handle UTF-32/UCS-4 strings. If an application uses
repr() on arbitrary untrusted data, this could be exploited to execute
arbitrary code with the privileges of the python application.)
"
Fixed upstream.
Changed Bug title.
Request was from Ted Percival <ted@midg3t.net>
to control@bugs.debian.org.
(full text, mbox, link).
Information forwarded to debian-bugs-dist@lists.debian.org, Matthias Klose <doko@debian.org>: Bug#391589; Package python.
(full text, mbox, link).
Acknowledgement sent to Ted Percival <ted@midg3t.net>:
Extra info received and forwarded to list. Copy sent to Matthias Klose <doko@debian.org>.
(full text, mbox, link).
I did some research into this, and discovered that most of the affected
packages have already been fixed. The sarge packages have not been
fixed, but I enquired with debian-security and was told there is a fix
in the pipeline. I also noticed that fixed versions of python2.3 and
python2.4 have not propogated to testing yet. python2.3 should propogate
into testing in a couple of days, and I will contact the -release team
to ensure a fixed version of python2.4 (currently frozen) makes its way
into etch.
-Ted
Debbugs is free software and licensed under the terms of the GNU General
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.