Upstream information

CVE-2006-4980 at MITRE

Description

Buffer overflow in the repr function in Python 2.3 through 2.6 before 20060822 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via crafted wide character UTF-32/UCS-4 strings to certain scripts.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having important severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 7.5
Vector AV:N/AC:L/Au:N/C:P/I:P/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial
SUSE Bugzilla entries: 208223 [RESOLVED / FIXED], 406051 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
Novell Linux Desktop 9 for x86
Open Enterprise Server
  • python >= 2.3.3-88.13
  • python-devel >= 2.3.3-88.13
sled10.x86
sles9-oes.x86
core9.s390
ZYPP Patch Nr: 2167
Novell Linux Desktop 9 for x86_64
  • python >= 2.3.3-88.13
  • python-32bit >= 9-200610132325
  • python-devel >= 2.3.3-88.13
sled10.x86
sles9-oes.x86
core9.s390
ZYPP Patch Nr: 2167
SUSE LINUX 10.0
  • python >= 2.4.1-3.2
  • python-32bit >= 2.4.1-3.2
  • python-64bit >= 2.4.1-3.2
  • python-devel >= 2.4.1-3.2
SUSE LINUX 10.1
  • python >= 2.4.2-18.5
  • python-32bit >= 2.4.2-18.5
  • python-64bit >= 2.4.2-18.5
  • python-devel >= 2.4.2-18.5
SUSE LINUX 9.2
  • python >= 2.3.4-3.4
  • python-32bit >= 9.2-200610140358
  • python-devel >= 2.3.4-3.4
SUSE LINUX 9.3
  • python >= 2.4-14.2
  • python-32bit >= 9.3-7.1
  • python-devel >= 2.4-14.2