Multiple integer overflows in Python 2.5.2 and earlier allow context-dependent attackers to have an unknown impact via vectors related to the (1) stringobject, (2) unicodeobject, (3) bufferobject, (4) longobject, (5) tupleobject, (6) stropmodule, (7) gcmodule, and (8) mmapmodule modules.
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-2315 IDENTIFIER = WIND00131356
WIND00131363.zip for 1.4
WIND00131364.zip for 1.5
1. Unzip the patch under [install_dir]/updates
2. Install the patch CD by entering the patch CD directory and run setup_linux.
3. This is a source only patch so you will have to build the kernel
4. Issue a make fs and make the kernel in a configured directory.
5. Upload the kernel and rootfs into the target and boot it up.
WIND00131365.zip for 2.0
1. Unzip this patch under [install_dir]/updates
2. From the [install_dir]/updates directory, run the command "../maintenance/mtool/mtool_linux"
3. Follow the instructions for installing the point patch.
4. This is a source only patch so you will have to rebuild the package. This can be done by executing the command "make -C build .clean" followed by "make -C build .rebuild"
5. Run "make fs" next
6. Upload the kernel and rootfs into the target and boot it up.