aboutsummaryrefslogtreecommitdiff
path: root/lang/python25/files/patch-objects_stringobject.c
Commit message (Collapse)AuthorAgeFilesLines
* - Remove 0 byte patchesMartin Wilke2009-02-171-0/+0
| | | | | | | Reported by: Gej Notes: svn path=/head/; revision=228539
* - Update to python 2.5.4 and python 2.6.1Martin Wilke2009-02-161-49/+0
| | | | | | | | Reviewed by: perky | lwhsu Tested with: exp-run via pav Notes: svn path=/head/; revision=228521
* - Security fixesMartin Wilke2008-09-081-0/+49
Multiple vulnerabilities: 1) Various integer overflow errors exist in core modules e.g. stringobject, unicodeobject, bufferobject, longobject, tupleobject, stropmodule, gcmodule, mmapmodule. 2) An integer overflow in the hashlib module can lead to an unreliable cryptographic digest results. 3) Integer overflow errors in the processing of unicode strings can be exploited to cause buffer overflows on 32-bit systems. 4) An integer overflow exists in the PyOS_vsnprintf() function on architectures that do not have a "vsnprintf()" function. 5) An integer underflow error in the PyOS_vsnprintf() function when passing zero-length strings can lead to memory corruption. PR: 127172 (based on) Submitted by: bf <bf2006a@yahoo.com> Obtained from: python svn Security: CVE-2008-2315, CVE-2008-2316, CVE-2008-3142, CVE-2008-3144, CVE-2008-3143. (vuxml come later) Notes: svn path=/head/; revision=220193