[issue1179] [CVE-2007-4965] Integer overflow in imageop module

2008-08-19 Thread Guido van Rossum
Guido van Rossum [EMAIL PROTECTED] added the comment: Looking into this now. ___ Python tracker [EMAIL PROTECTED] http://bugs.python.org/issue1179 ___ ___ Python-bugs-list mailing

[issue1179] [CVE-2007-4965] Integer overflow in imageop module

2008-08-19 Thread Guido van Rossum
Guido van Rossum [EMAIL PROTECTED] added the comment: Latest patches applied to 2.5 branch: r65878. And to 2.6 trunk: r65880. -- resolution: - accepted status: open - closed ___ Python tracker [EMAIL PROTECTED] http://bugs.python.org/issue1179

[issue1179] [CVE-2007-4965] Integer overflow in imageop module

2008-08-15 Thread Antoine Pitrou
Changes by Antoine Pitrou [EMAIL PROTECTED]: -- nosy: -pitrou ___ Python tracker [EMAIL PROTECTED] http://bugs.python.org/issue1179 ___ ___ Python-bugs-list mailing list

[issue1179] [CVE-2007-4965] Integer overflow in imageop module

2008-08-11 Thread Antoine Pitrou
Changes by Antoine Pitrou [EMAIL PROTECTED]: -- nosy: +pitrou ___ Python tracker [EMAIL PROTECTED] http://bugs.python.org/issue1179 ___ ___ Python-bugs-list mailing list

[issue1179] [CVE-2007-4965] Integer overflow in imageop module

2008-08-05 Thread Guido van Rossum
Guido van Rossum [EMAIL PROTECTED] added the comment: The two segfaults reported in msg64682 are still there in 2.6. I'm elevating this to release blocker but don't have time to fix this myself. -- assignee: gvanrossum - priority: critical - release blocker versions: +Python 2.6

[issue1179] [CVE-2007-4965] Integer overflow in imageop module

2008-07-30 Thread Benjamin Peterson
Benjamin Peterson [EMAIL PROTECTED] added the comment: Does anybody still care about this for 2.6? -- nosy: +benjamin.peterson ___ Python tracker [EMAIL PROTECTED] http://bugs.python.org/issue1179 ___

[issue1179] [CVE-2007-4965] Integer overflow in imageop module

2008-05-07 Thread Barry A. Warsaw
Barry A. Warsaw [EMAIL PROTECTED] added the comment: This is not a release blocker for 2.6 or 3.0. -- nosy: +barry priority: release blocker - critical __ Tracker [EMAIL PROTECTED] http://bugs.python.org/issue1179 __

[issue1179] [CVE-2007-4965] Integer overflow in imageop module

2008-05-07 Thread Ismail Donmez
Ismail Donmez [EMAIL PROTECTED] added the comment: This _must_ be a release blocker for Python 3.0, Its a shame that this bug still is not fixed and a patch is available for months now. __ Tracker [EMAIL PROTECTED] http://bugs.python.org/issue1179

[issue1179] [CVE-2007-4965] Integer overflow in imageop module

2008-05-07 Thread Guido van Rossum
Guido van Rossum [EMAIL PROTECTED] added the comment: imageop is deleted in 3.0. See PEP 3108. So it can't be a release blocker. This also explains my general lack of interest in this module. __ Tracker [EMAIL PROTECTED] http://bugs.python.org/issue1179

[issue1179] [CVE-2007-4965] Integer overflow in imageop module

2008-05-07 Thread Ismail Donmez
Ismail Donmez [EMAIL PROTECTED] added the comment: I am sorry for the drama then, :) __ Tracker [EMAIL PROTECTED] http://bugs.python.org/issue1179 __ ___ Python-bugs-list mailing list

[issue1179] [CVE-2007-4965] Integer overflow in imageop module

2008-04-07 Thread David Remahl
David Remahl [EMAIL PROTECTED] added the comment: Uploading patch that addresses the test cases above. It applies on top of nevyn’s latest patch. Added file: http://bugs.python.org/file9975/python-2.5-int-overflow-2.patch __ Tracker [EMAIL PROTECTED]

[issue1179] [CVE-2007-4965] Integer overflow in imageop module

2008-04-04 Thread jan matejek
Changes by jan matejek [EMAIL PROTECTED]: -- nosy: +matejcik __ Tracker [EMAIL PROTECTED] http://bugs.python.org/issue1179 __ ___ Python-bugs-list mailing list Unsubscribe:

[issue1179] [CVE-2007-4965] Integer overflow in imageop module

2008-04-04 Thread Neal Norwitz
Neal Norwitz [EMAIL PROTECTED] added the comment: I think this was a module that I skipped. I think Anthony might have had a patch, but if we have a fix, I'm not sure it matters. We need to fix this for 2.5.3, upping the priority. -- nosy: +anthonybaxter priority: high - release

[issue1179] [CVE-2007-4965] Integer overflow in imageop module

2008-03-28 Thread David Remahl
David Remahl [EMAIL PROTECTED] added the comment: The following test cases still cause bus errors with the patch applied: import imageop; imageop.rgb82rgb('A'*(2**30), 32768, 32768) import imageop; imageop.grey2rgb('A'*(2**30), 32768, 32768) -- nosy: +chmod007

[issue1179] [CVE-2007-4965] Integer overflow in imageop module

2008-03-17 Thread Guido van Rossum
Guido van Rossum [EMAIL PROTECTED] added the comment: Sorry this missed the 2.5.2 release. I'll try to look again before 2.5.3 is imminent. -- components: +Extension Modules -Library (Lib) __ Tracker [EMAIL PROTECTED] http://bugs.python.org/issue1179

[issue1179] [CVE-2007-4965] Integer overflow in imageop module

2007-12-19 Thread Guido van Rossum
Guido van Rossum added the comment: Sigh. I'll try to make time to review apply this. -- assignee: - gvanrossum __ Tracker [EMAIL PROTECTED] http://bugs.python.org/issue1179 __

[issue1179] [CVE-2007-4965] Integer overflow in imageop module

2007-12-19 Thread James Antill
James Antill added the comment: I've applied the last patch I posted to recent RHEL and Fedora releases, and it doesn't seem to break anything ... and from what I could see it fixed the problem. __ Tracker [EMAIL PROTECTED] http://bugs.python.org/issue1179

[issue1179] [CVE-2007-4965] Integer overflow in imageop module

2007-12-19 Thread Ismail Donmez
Ismail Donmez added the comment: Same here for Pardus Linux, applied the patch without a regression. __ Tracker [EMAIL PROTECTED] http://bugs.python.org/issue1179 __ ___ Python-bugs-list

[issue1179] [CVE-2007-4965] Integer overflow in imageop module

2007-12-18 Thread Jim Panetta
Jim Panetta added the comment: Is this final yet? Our system security group is a little paranoid about buffer overflows of any sort and are starting to make noises. I can confirm that the Oct 20 patch applies against Python 2.5.1 on RHEL4, and that the string length error is generated when

[issue1179] [CVE-2007-4965] Integer overflow in imageop module

2007-10-19 Thread Guido van Rossum
Guido van Rossum added the comment: Neal, didn't you say you had a fix for this? -- nosy: +nnorwitz __ Tracker [EMAIL PROTECTED] http://bugs.python.org/issue1179 __ ___

[issue1179] [CVE-2007-4965] Integer overflow in imageop module

2007-09-24 Thread Martin v. Löwis
Changes by Martin v. Löwis: -- keywords: +patch __ Tracker [EMAIL PROTECTED] http://bugs.python.org/issue1179 __ ___ Python-bugs-list mailing list Unsubscribe:

[issue1179] [CVE-2007-4965] Integer overflow in imageop module

2007-09-20 Thread Sean Reifschneider
Changes by Sean Reifschneider: -- priority: - high __ Tracker [EMAIL PROTECTED] http://bugs.python.org/issue1179 __ ___ Python-bugs-list mailing list Unsubscribe:

[issue1179] [CVE-2007-4965] Integer overflow in imageop module

2007-09-19 Thread Guido van Rossum
Guido van Rossum added the comment: Cartman, please refrain from using vulgarities in your sample code. It's hard to take a bug report seriously with such variable names. -- nosy: +gvanrossum __ Tracker [EMAIL PROTECTED] http://bugs.python.org/issue1179

[issue1179] [CVE-2007-4965] Integer overflow in imageop module

2007-09-19 Thread Sean Reifschneider
Sean Reifschneider added the comment: Guido: That code came from the full-disclosure list posting, I think cartman was just passing it on. __ Tracker [EMAIL PROTECTED] http://bugs.python.org/issue1179 __

[issue1179] [CVE-2007-4965] Integer overflow in imageop module

2007-09-19 Thread James Antill
James Antill added the comment: So I think this is all the places integer overflow checking is needed in imageop.c and rbgimgmodule.c. There might be checks here which can't be exploited anyway, and I haven't checked any other files yet. Feel free to comment. Ps. This is against the 2.5 in

[issue1179] [CVE-2007-4965] Integer overflow in imageop module

2007-09-19 Thread James Antill
Changes by James Antill: __ Tracker [EMAIL PROTECTED] http://bugs.python.org/issue1179 __ ___ Python-bugs-list mailing list Unsubscribe:

[issue1179] [CVE-2007-4965] Integer overflow in imageop module

2007-09-19 Thread Ismail Donmez
Ismail Donmez added the comment: Guido, The poc is taken as is, sorry. __ Tracker [EMAIL PROTECTED] http://bugs.python.org/issue1179 __ ___ Python-bugs-list mailing list Unsubscribe:

[issue1179] [CVE-2007-4965] Integer overflow in imageop module

2007-09-19 Thread Ismail Donmez
Ismail Donmez added the comment: nevyn: Your patch cleanly applies to python 2.4.4 and fixes the interpreter crash with poc.py Thanks. __ Tracker [EMAIL PROTECTED] http://bugs.python.org/issue1179 __

[issue1179] [CVE-2007-4965] Integer overflow in imageop module

2007-09-19 Thread Guido van Rossum
Guido van Rossum added the comment: Hm. First of all, it seems the imageop module has completely missed the Py_ssize_t changes. Second, I don't think that if ( x != len / y ) is a valid replacement for if ( x*y != len ) -- consider x==5, y==2, len==11. -- priority: high -

[issue1179] [CVE-2007-4965] Integer overflow in imageop module

2007-09-19 Thread James Antill
James Antill added the comment: Guido: It's true that that len can be slightly bigger than x*y, the big thing is that it can't be smaller so we can malloc(len) and use upto x*y (which was my main focus). I first looked at any of this code today, but I didn't see any reason that having len be

[issue1179] [CVE-2007-4965] Integer overflow in imageop module

2007-09-18 Thread Ismail Donmez
New submission from Ismail Donmez: As reported at http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065826.html . There is an integer overflow in imageop module which results in an interpreter crash. Original proof of concept code is attached. -- components: Library

[issue1179] [CVE-2007-4965] Integer overflow in imageop module

2007-09-18 Thread Sean Reifschneider
Sean Reifschneider added the comment: It's unclear if this only causes a crash or if it can inject data. Referenced mailing list post points out where one error is. -- nosy: +jafo priority: - high __ Tracker [EMAIL PROTECTED]