The utf-16 decoder in Python 3.1 through 3.3 does not update the aligned_end variable after calling the unicode_decode_call_errorhandler function, which allows remote attackers to obtain sensitive information (process memory) or cause a denial of service (memory corruption and crash) via unspecified vectors.
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2135 Signed-off-by: yanjun.zhu <[email protected]> --- .../python/python/python-2.7.2-CVE-2012-2135.patch | 12 ++++++++++++ recipes-devtools/python/python_2.7.2.bbappend | 1 + 2 files changed, 13 insertions(+), 0 deletions(-) create mode 100644 recipes-devtools/python/python/python-2.7.2-CVE-2012-2135.patch diff --git a/recipes-devtools/python/python/python-2.7.2-CVE-2012-2135.patch b/recipes-devtools/python/python/python-2.7.2-CVE-2012-2135.patch new file mode 100644 index 0000000..b913097 --- /dev/null +++ b/recipes-devtools/python/python/python-2.7.2-CVE-2012-2135.patch @@ -0,0 +1,12 @@ +diff -urpN a/Objects/unicodeobject.c b/Objects/unicodeobject.c +--- a/Objects/unicodeobject.c 2012-11-12 16:25:33.000000000 +0800 ++++ b/Objects/unicodeobject.c 2012-11-12 16:26:22.000000000 +0800 +@@ -2568,7 +2568,7 @@ PyUnicode_DecodeUTF16Stateful(const char + } + + /* UTF-16 code pair: */ +- if (q >= e) { ++ if (e - q < 2) { + errmsg = "unexpected end of data"; + startinpos = (((const char *)q)-2)-starts; + endinpos = ((const char *)e)-starts; diff --git a/recipes-devtools/python/python_2.7.2.bbappend b/recipes-devtools/python/python_2.7.2.bbappend index 87be410..64ada6c 100644 --- a/recipes-devtools/python/python_2.7.2.bbappend +++ b/recipes-devtools/python/python_2.7.2.bbappend @@ -5,5 +5,6 @@ SRC_URI += "\ file://python-CVE-2010-3492.patch \ file://python-2.7.2-CVE-2012-0845.patch \ file://python-2.7.2-CVE-2012-1150.patch \ + file://python-2.7.2-CVE-2012-2135.patch \ " PRINC = "2" -- 1.6.3.1 _______________________________________________ Openembedded-devel mailing list [email protected] http://lists.linuxtogo.org/cgi-bin/mailman/listinfo/openembedded-devel
