Bug 442005 (CVE-2008-1721)
Summary: | CVE-2008-1721 python: integer signedness error in the zlib extension module | ||||||||
---|---|---|---|---|---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Tomas Hoger <thoger> | ||||||
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||||
Status: | CLOSED ERRATA | QA Contact: | |||||||
Severity: | low | Docs Contact: | |||||||
Priority: | low | ||||||||
Version: | unspecified | CC: | james.antill, jlieskov, ohudlick, pfrields | ||||||
Target Milestone: | --- | Keywords: | Security | ||||||
Target Release: | --- | ||||||||
Hardware: | All | ||||||||
OS: | Linux | ||||||||
URL: | http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1721 | ||||||||
Whiteboard: | |||||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||||
Doc Text: | Story Points: | --- | |||||||
Clone Of: | Environment: | ||||||||
Last Closed: | 2021-10-19 09:06:06 UTC | Type: | --- | ||||||
Regression: | --- | Mount Type: | --- | ||||||
Documentation: | --- | CRM: | |||||||
Verified Versions: | Category: | --- | |||||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||
Cloudforms Team: | --- | Target Upstream Version: | |||||||
Embargoed: | |||||||||
Bug Depends On: | 486329, 486330, 486351, 486352, 537915 | ||||||||
Bug Blocks: | |||||||||
Attachments: |
|
Description
Tomas Hoger
2008-04-11 07:12:11 UTC
Since this issue requires a rather silly use of the python zlib module, we have classified it as having a low security impact. A future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/ Fix as applied in zlib module: http://svn.python.org/view?rev=62235&view=rev Created attachment 303501 [details]
Copy of the reproducer from the upstream bug
python-2.5.2-zlib-unflush-misallocation.py
Created attachment 303502 [details]
Copy of the reproducer from the upstream bug
python-2.5.2-zlib-unflush-signedness.py
The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/ This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2009:1176 https://rhn.redhat.com/errata/RHSA-2009-1176.html This issue has been addressed in following products: Red Hat Enterprise Linux 4 Via RHSA-2009:1177 https://rhn.redhat.com/errata/RHSA-2009-1177.html |