Your message dated Mon, 22 Feb 2010 22:54:41 -0500
with message-id <20100222225441.3486b70d.michael.s.gilb...@gmail.com>
and subject line 
has caused the Debian Bug report #559759,
regarding webkit: multiple security issues
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
559759: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559759
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: webkit
Version: 1.0.1-4
Severity: serious
Tags: security

Hi,
the following CVE (Common Vulnerabilities & Exposures) ids were
published for webkit.

CVE-2009-3384[1]:
| Multiple unspecified vulnerabilities in WebKit in Apple Safari before
| 4.0.4 on Windows allow remote FTP servers to execute arbitrary code,
| cause a denial of service (application crash), or obtain sensitive
| information via a crafted directory listing in a reply.

CVE-2009-3272[2]:
| Stack consumption vulnerability in WebKit.dll in WebKit in Apple
| Safari 3.2.3, and possibly other versions before 4.1.2, allows remote
| attackers to cause a denial of service (application crash) via
| JavaScript code that calls eval on a long string composed of A/
| sequences.

CVE-2009-2841[3]:
| WebKit in Apple Safari before 4.0.4 on Mac OS X does not perform the
| expected callbacks for HTML 5 media elements that have external URLs
| for media resources, which allows remote attackers to trigger requests
| to arbitrary web sites via a crafted HTML document, as demonstrated by
| an HTML e-mail message that uses a media element for
| X-Confirm-Reading-To functionality.

CVE-2009-2816[4]:
| The implementation of Cross-Origin Resource Sharing (CORS) in WebKit,
| as used in Apple Safari before 4.0.4 and Google Chrome before
| 3.0.195.33, includes certain custom HTTP headers in the OPTIONS
| request during cross-origin operations with preflight, which makes it
| easier for remote attackers to conduct cross-site request forgery
| (CSRF) attacks via a crafted web page.

CVE-2009-2797[5]:
| The WebKit component in Safari in Apple iPhone OS before 3.1, and
| iPhone OS before 3.1.1 for iPod touch, does not remove usernames and
| passwords from URLs sent in Referer headers, which allows remote
| attackers to obtain sensitive information by reading Referer logs on a
| web server.

Some additional notes:
- CVE-2009-3384 is already fixed in unstable.
- lenny's webkit does not contain the vulnerable code in CVE-2009-2816.
- I was unable to find any patch info for CVE-2009-2841 or
  CVE-2009-2797, so it is unclear whether debian's webkit is affected or
  not (thanks apple...).

If you fix the vulnerabilities please also make sure to include the
CVE ids in your changelog entry.

For further information see:

[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3384
    http://security-tracker.debian.org/tracker/CVE-2009-3384
[2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3272
    http://security-tracker.debian.org/tracker/CVE-2009-3272
[3] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2841
    http://security-tracker.debian.org/tracker/CVE-2009-2841
[4] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2816
    http://security-tracker.debian.org/tracker/CVE-2009-2816
[5] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2797
    http://security-tracker.debian.org/tracker/CVE-2009-2797



--- End Message ---
--- Begin Message ---


--- End Message ---

Reply via email to