Wind River Support Network

HomeOther DownloadsSecurity Advisory - Python - CVE-2008-2315
Recommended Type: Patch

Security Advisory - Python - CVE-2008-2315

Released: Sep 4, 2008     Updated: Sep 4, 2008

Description

Multiple integer overflows in Python 2.5.2 and earlier allow context-dependent attackers to have an unknown impact via vectors related to the (1) stringobject, (2) unicodeobject, (3) bufferobject, (4) longobject, (5) tupleobject, (6) stropmodule, (7) gcmodule, and (8) mmapmodule modules.

http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-2315 IDENTIFIER = WIND00131356


Product Version

Linux Platforms 2.0

Downloads


Installation Notes

Installation Notes

WIND00131363.zip for 1.4
WIND00131364.zip for 1.5

1. Unzip the patch under [install_dir]/updates

2. Install the patch CD by entering the patch CD directory and run setup_linux.

3. This is a source only patch so you will have to build the kernel

4. Issue a make fs and make the kernel in a configured directory.

5. Upload the kernel and rootfs into the target and boot it up.

WIND00131365.zip for 2.0

1. Unzip this patch under [install_dir]/updates

2. From the [install_dir]/updates directory, run the command "../maintenance/mtool/mtool_linux"

3. Follow the instructions for installing the point patch.

4. This is a source only patch so you will have to rebuild the package. This can be done by executing the command "make -C build .clean" followed by "make -C build .rebuild"

5. Run "make fs" next

6. Upload the kernel and rootfs into the target and boot it up.


Live chat
Online