Unrated severityNVD Advisory· Published May 27, 2010· Updated Apr 29, 2026
CVE-2010-1634
CVE-2010-1634
Description
Multiple integer overflows in audioop.c in the audioop module in Python 2.6, 2.7, 3.1, and 3.2 allow context-dependent attackers to cause a denial of service (application crash) via a large fragment, as demonstrated by a call to audioop.lin2lin with a long string in the first argument, leading to a buffer overflow. NOTE: this vulnerability exists because of an incorrect fix for CVE-2008-3143.5.
Affected products
11- cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*+ 2 more
- cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*+ 3 more
- cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
26- bugs.python.org/issue8674nvdIssue TrackingPatchVendor Advisory
- svn.python.org/viewnvdPatchPermissions RequiredVendor Advisory
- svn.python.org/viewnvdPatchPermissions RequiredVendor Advisory
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingPatchThird Party Advisory
- lists.apple.com/archives/Security-announce/2011//Oct/msg00003.htmlnvdBroken LinkIssue TrackingThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2010-June/042751.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.htmlnvdMailing ListThird Party Advisory
- support.apple.com/kb/HT5002nvdThird Party Advisory
- www.redhat.com/support/errata/RHSA-2011-0027.htmlnvdThird Party Advisory
- www.securityfocus.com/bid/40370nvdThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/USN-1596-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-1613-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-1613-2nvdThird Party Advisory
- www.ubuntu.com/usn/USN-1616-1nvdThird Party Advisory
- www.vupen.com/english/advisories/2010/1448nvdPermissions RequiredThird Party Advisory
- www.vupen.com/english/advisories/2011/0122nvdPermissions RequiredThird Party Advisory
- www.vupen.com/english/advisories/2011/0212nvdPermissions RequiredThird Party Advisory
- secunia.com/advisories/39937nvdNot Applicable
- secunia.com/advisories/40194nvdNot Applicable
- secunia.com/advisories/42888nvdNot Applicable
- secunia.com/advisories/43068nvdNot Applicable
- secunia.com/advisories/50858nvdNot Applicable
- secunia.com/advisories/51024nvdNot Applicable
- secunia.com/advisories/51040nvdNot Applicable
- secunia.com/advisories/51087nvdNot Applicable
News mentions
0No linked articles in our index yet.