![]() |
2014-06-19
, 17:11
|
Posts: 2,154 |
Thanked: 8,464 times |
Joined on May 2010
|
#402
|
![]() |
2014-06-19
, 17:13
|
Posts: 3,074 |
Thanked: 12,964 times |
Joined on Mar 2010
@ Sofia,Bulgaria
|
#403
|
The Following User Says Thank You to freemangordon For This Useful Post: | ||
![]() |
2014-06-19
, 17:18
|
|
Posts: 439 |
Thanked: 282 times |
Joined on Oct 2012
|
#404
|
Give me output of sysinfo-tool -g /device/sw-release-ver
Also are you sure that you did not have unknown before updating?
![]() |
2014-06-19
, 17:28
|
Posts: 2,292 |
Thanked: 4,135 times |
Joined on Apr 2010
@ UK
|
#405
|
new version of osso-product-info and its lib , from unknow message , now i have :
![]() |
2014-06-27
, 14:27
|
Posts: 805 |
Thanked: 1,605 times |
Joined on Feb 2010
@ Gdynia, Poland
|
#406
|
The Following 5 Users Say Thank You to misiak For This Useful Post: | ||
![]() |
2014-06-27
, 17:10
|
Posts: 1,100 |
Thanked: 2,797 times |
Joined on Apr 2011
@ Netherlands
|
#407
|
Is there a python maintainer in CSSU team?
https://hackerone.com/reports/12297 - security issue found in python (2.7 and newer for sure, I'm not sure if 2.5 is also vulnerable - I couldn't run the sample code to test the issue and I'm not sure which additional python package I should install to run it)
user:~# cat vulnerability_test.py from simplejson import JSONDecoder j = JSONDecoder() a = '128931233' b = "472389423" if id(a) < id(b): x = a y = b else: x = b y = a diff = id(x) - id(y) try: j.raw_decode(y, diff) print("Vulnerable") except: print("Not vulnerable") user:~# python Python 2.5.4 (r254:67916, May 17 2010, 21:00:32) [GCC 4.2.1] on linux2 Type "help", "copyright", "credits" or "license" for more information. >>> execfile("vulnerability_test.py") Vulnerable >>>
- if (idx >= length) { + if ( idx < 0 || idx >= length) {
The Following 5 Users Say Thank You to ade For This Useful Post: | ||
![]() |
2014-06-27
, 18:54
|
|
Posts: 4,118 |
Thanked: 8,901 times |
Joined on Aug 2010
@ Ruhrgebiet, Germany
|
#408
|
~ $ python
Python 2.6.6 (r266:84292, Mar 11 2011, 01:19:30)
[GCC 4.4.1] on linux2
Type "help", "copyright", "credits" or "license" for more information.
>>> execfile("vulnerability_test.py")
Traceback (most recent call last):
File "<stdin>", line 1, in <module>
File "vulnerability_test.py", line 1, in <module>
from simplejson import JSONDecoder
ImportError: No module named simplejson
>>>
~ $ python
Python 2.6.6 (r266:84292, Mar 11 2011, 01:19:30)
[GCC 4.4.1] on linux2
Type "help", "copyright", "credits" or "license" for more information.
>>> execfile("vulnerability_test.py")
Not vulnerable
>>>
![]() |
2014-06-27
, 19:53
|
Posts: 1,100 |
Thanked: 2,797 times |
Joined on Apr 2011
@ Netherlands
|
#409
|
Python 2.5.4 (r254:67916, May 17 2010, 21:00:32) [GCC 4.2.1] on linux2 Type "help", "copyright", "credits" or "license" for more information. >>> execfile("vulnerability_test.py") Not vulnerable
The Following 5 Users Say Thank You to ade For This Useful Post: | ||
![]() |
2014-06-27
, 21:11
|
Posts: 805 |
Thanked: 1,605 times |
Joined on Feb 2010
@ Gdynia, Poland
|
#410
|
Just did some more digging. For python 2.5, the code is in python-simplejson (the json module for python 2.5).
And already did the fix in the code
The result now is:
If someone wants to test with the modified code, see the attachment.Code:Python 2.5.4 (r254:67916, May 17 2010, 21:00:32) [GCC 4.2.1] on linux2 Type "help", "copyright", "credits" or "license" for more information. >>> execfile("vulnerability_test.py") Not vulnerable
![]() |
Tags |
easter egg, lockslider |
|
8GB OPTFS@ext4(*performance mount options)
overclock: cpu[125 - 1,150(*VDD1)+Dsp overclock
CSSU-T latest version
Last edited by Alecsandru; 2014-06-19 at 17:11.