Python 2.5.2 and earlier allows context-dependent attackers to execute arbitrary code via multiple vectors that cause a negative size value to provided to the PyString_FromStringAndSize function, which allocates less memory than expected when assert() is disabled and triggers a buffer overflow.
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1887 IDENTIFIER = WIND00122602
WIND00124672.zip is for 1.4
WIND00124673.zip is for 1.5
WIND00132382.zip is for 2.0
1. Unzip the patch under [install_dir]/updates
2. Install the patch CD by entering the patch CD directory and run setup_linux.
3. This is a source only patch so you will have to build the kernel
4. Issue a make fs and make the kernel in a configured directory.
5. Upload the kernel and rootfs into the target and boot it up.