Bug 455018 (CVE-2008-3144) - CVE-2008-3144 python: Potential integer underflow and overflow in the PyOS_vsnprintf C API function
Summary: CVE-2008-3144 python: Potential integer underflow and overflow in the PyOS_vs...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2008-3144
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 486114 486329 486330 486351 486352 537915
Blocks:
TreeView+ depends on / blocked
 
Reported: 2008-07-11 14:12 UTC by Jan Lieskovsky
Modified: 2019-09-29 12:25 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2012-02-09 20:20:34 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2009:1176 0 normal SHIPPED_LIVE Moderate: python security update 2009-07-27 09:22:50 UTC
Red Hat Product Errata RHSA-2009:1177 0 normal SHIPPED_LIVE Moderate: python security update 2009-07-27 09:35:19 UTC
Red Hat Product Errata RHSA-2009:1178 0 normal SHIPPED_LIVE Moderate: python security update 2009-07-27 09:36:40 UTC

Description Jan Lieskovsky 2008-07-11 14:12:41 UTC
Description of problem:

Fix potential integer underflow and overflow conditions in the PyOS_vsnprintf
C API function.

Proposed upstream patch:

http://svn.python.org/view?rev=63883&view=rev

Comment 2 James Antill 2008-07-11 15:00:35 UTC
 Does this do anything if python knows you have a working snprintf()? -- Ahh it
does "str[size-1] = '\0';" even when size == 0? ... can that happen? Do we
really wan tto include all the other parts of the patch, given that we won't be
testing any of it -- and won't use it?


Comment 3 Jan Lieskovsky 2008-10-30 14:45:22 UTC
The Red Hat Security Response Team has rated this issue as having low security
impact, a future update may address this flaw.  More information regarding
issue severity can be found here:
http://www.redhat.com/security/updates/classification/

Comment 10 errata-xmlrpc 2009-07-27 09:23:15 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2009:1176 https://rhn.redhat.com/errata/RHSA-2009-1176.html

Comment 11 errata-xmlrpc 2009-07-27 09:35:41 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 4

Via RHSA-2009:1177 https://rhn.redhat.com/errata/RHSA-2009-1177.html

Comment 12 errata-xmlrpc 2009-07-27 09:37:35 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 3

Via RHSA-2009:1178 https://rhn.redhat.com/errata/RHSA-2009-1178.html

Comment 15 Vincent Danen 2012-02-09 20:20:06 UTC
Description:

Multiple integer underflow and overflow flaws were found in the Python snprintf() wrapper implementation. An attacker could use these flaws to cause a denial of service (memory corruption).


Note You need to log in before you can comment on or make changes to this bug.