CVE-2008-3142

Publication date 1 August 2008

Last updated 24 July 2024


Ubuntu priority

Multiple buffer overflows in Python 2.5.2 and earlier on 32bit platforms allow context-dependent attackers to cause a denial of service (crash) or have unspecified other impact via a long string that leads to incorrect memory allocation during Unicode string processing, related to the unicode_resize function and the PyMem_RESIZE macro.

Status

Package Ubuntu Release Status
python2.4 8.04 LTS hardy
Fixed 2.4.5-1ubuntu4.1
7.10 gutsy
Fixed 2.4.4-6ubuntu4.2
7.04 feisty
Fixed 2.4.4-2ubuntu7.2
6.06 LTS dapper
Fixed 2.4.3-0ubuntu6.2
python2.5 8.04 LTS hardy
Fixed 2.5.2-2ubuntu4.1
7.10 gutsy
Fixed 2.5.1-5ubuntu5.2
7.04 feisty
Fixed 2.5.1-0ubuntu1.2
6.06 LTS dapper Not in release

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
python2.4
python2.5

References

Related Ubuntu Security Notices (USN)

    • USN-632-1
    • Python vulnerabilities
    • 1 August 2008

Other references