Launchpad has imported 32 comments from the remote bug at https://bugs.gentoo.org/show_bug.cgi?id=214068.
If you reply to an imported comment from within Launchpad, your comment will be sent to the remote bug automatically. Read more about Launchpad's inter-bugtracker facilities at https://help.launchpad.net/InterBugTracking. ------------------------------------------------------------------------ On 2008-03-20T17:59:08+00:00 rbu wrote: Tomas Hoger writes: Value of code_size is read from GIF image, but not properly validated before use to initialize table array in gif_read_lzw(). clear_code used as upper bound in for loop is short, hence overflow is limited to ~16k - 4k short int values. Moreover, attacker has limited control over the values written past the end of the buffer. Reply at: https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/3 ------------------------------------------------------------------------ On 2008-03-20T18:00:21+00:00 rbu wrote: Timo, this issue is under embargo until 2008-03-26. Do not commit anything to CVS until this date. Please prepare an updated ebuild and attach it to this bug, we will do prestable testing here. Thanks. Reply at: https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/4 ------------------------------------------------------------------------ On 2008-03-20T18:00:52+00:00 rbu wrote: Created attachment 146667 cups-1.2.12-CVE-2008-1373.patch Reply at: https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/5 ------------------------------------------------------------------------ On 2008-03-20T18:01:05+00:00 rbu wrote: Created attachment 146668 cups-1.3.6-CVE-2008-1373.patch Reply at: https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/6 ------------------------------------------------------------------------ On 2008-03-20T22:49:11+00:00 tgurr wrote: Created attachment 146714 cups-1.2.12-r7.ebuild Added the patch for CVE-2008-1373 and also removed the unneeded (as also discussed per mail and with upstream) patch for CVE-2007-4045. Reply at: https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/7 ------------------------------------------------------------------------ On 2008-03-20T22:52:31+00:00 tgurr wrote: Created attachment 146721 cups-1.3.6-r3.ebuild Reply at: https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/8 ------------------------------------------------------------------------ On 2008-03-20T23:12:42+00:00 rbu wrote: Arch Security Liaisons, please test the attached ebuild and report it stable on this bug. Target keywords : "alpha amd64 arm hppa ia64 m68k ppc ppc64 release s390 sh sparc x86" CC'ing current Liaisons: alpha : ferdy amd64 : welp hppa : jer ppc : dertobi123 ppc64 : corsair release : pva sparc : fmccor x86 : opfer Reply at: https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/9 ------------------------------------------------------------------------ On 2008-03-20T23:14:24+00:00 rbu wrote: (In reply to comment #6) > Arch Security Liaisons, please test the attached ebuild and report it stable > on > this bug. That is: =net-print/cups-1.2.12-r7 Reply at: https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/10 ------------------------------------------------------------------------ On 2008-03-21T09:43:02+00:00 fauli wrote: Good to go on x86 Reply at: https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/11 ------------------------------------------------------------------------ On 2008-03-21T13:12:38+00:00 fmccor wrote: Looks good on sparc. Tested -1.2.12-r7, remote only, with {.ps, .pdf} files. Reply at: https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/12 ------------------------------------------------------------------------ On 2008-03-21T16:43:37+00:00 jer wrote: HPPA is OK. Reply at: https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/13 ------------------------------------------------------------------------ On 2008-03-22T08:03:33+00:00 corsair wrote: looks good on ppc64 Reply at: https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/14 ------------------------------------------------------------------------ On 2008-03-22T10:05:09+00:00 dertobi123 wrote: looks good on ppc Reply at: https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/15 ------------------------------------------------------------------------ On 2008-03-22T16:15:00+00:00 armin76 wrote: Adding Tobias for alpha Reply at: https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/16 ------------------------------------------------------------------------ On 2008-03-22T16:51:17+00:00 klausman wrote: =net-print/cups-1.2.12-r7 works dandy on alpha. Reply at: https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/17 ------------------------------------------------------------------------ On 2008-03-24T02:05:24+00:00 rbu wrote: Created attachment 147078 cups-1.2.12-CVE-2008-0053.patch Reply at: https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/18 ------------------------------------------------------------------------ On 2008-03-24T02:10:20+00:00 rbu wrote: Created attachment 147080 cups-1.2.12-r7.ebuild Ok, cups is killing me these days. Could you please retest with the new -r7 ebuild? Thanks. Reply at: https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/19 ------------------------------------------------------------------------ On 2008-03-24T02:18:09+00:00 rbu wrote: CVE-2008-0053 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0053): Unspecified vulnerability in CUPS before 1.3.6 in Apple Mac OS X 10.5.2 has unknown impact and attack vectors related to "input validation." Apple Advisory: http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html Impact: Multiple vulnerabilities in CUPS may lead to an unexpected application termination or arbitrary code execution with system privileges Description: Multiple input validation issues exist in CUPS, the most serious of which may lead to arbitrary code execution with system privileges. This update addresses the issues by updating to CUPS 1.3.6. These issues do not affect systems prior to Mac OS X v10.5. Tomas Hoger writes: According to upstream, this CVE id was allocated for following issue fixed in CUPS 1.3.6 (see CHANGES.txt): - Fixed two overflow bugs in the HP-GL/2 filter (Coverity) Reply at: https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/20 ------------------------------------------------------------------------ On 2008-03-24T08:40:48+00:00 fauli wrote: Local printing ....ok Remote printing from Windows ...ok Linux ...ok x86 good to go...again. Reply at: https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/21 ------------------------------------------------------------------------ On 2008-03-24T12:47:01+00:00 fmccor wrote: sparc still looks good, too, as described in Comment 9. Reply at: https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/22 ------------------------------------------------------------------------ On 2008-03-24T15:42:03+00:00 corsair wrote: looks good on ppc64, too. Reply at: https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/23 ------------------------------------------------------------------------ On 2008-03-24T16:27:44+00:00 jer wrote: HPPA is OK again. Reply at: https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/24 ------------------------------------------------------------------------ On 2008-03-24T19:07:24+00:00 klausman wrote: And on alpha, it works, too. Reply at: https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/25 ------------------------------------------------------------------------ On 2008-03-24T19:34:00+00:00 dertobi123 wrote: still looks good for ppc Reply at: https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/26 ------------------------------------------------------------------------ On 2008-03-26T01:48:40+00:00 rbu wrote: Please note that the embargo has been delayed until Monday, 03/31. Reply at: https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/27 ------------------------------------------------------------------------ On 2008-03-26T07:30:46+00:00 corsair wrote: looks good on ppc64 Reply at: https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/28 ------------------------------------------------------------------------ On 2008-03-26T23:16:55+00:00 rbu wrote: (In reply to comment #24) > Please note that the embargo has been delayed until Monday, 03/31. .... and again, Tuesday it is. Reply at: https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/29 ------------------------------------------------------------------------ On 2008-04-01T14:24:55+00:00 rbu wrote: This is public now. Printing, please commit with the keywords you gathered. Reply at: https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/30 ------------------------------------------------------------------------ On 2008-04-01T19:12:36+00:00 rbu wrote: Arches, please test and mark stable: =net-print/cups-1.2.12-r7 Target keywords : "alpha amd64 arm hppa ia64 m68k ppc ppc64 release s390 sh sparc x86" Already stabled : "alpha amd64 hppa ppc ppc64 sparc x86" Missing keywords: "arm ia64 m68k release s390 sh" Reply at: https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/32 ------------------------------------------------------------------------ On 2008-04-01T19:18:49+00:00 rbu wrote: 1.3.6 is unaffected for CVE-2008-0053. This is GLSA-200804-01 - no joke! Reply at: https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/33 ------------------------------------------------------------------------ On 2008-04-02T11:52:25+00:00 pva wrote: Stable on ia64 by armin76. Fixed in release snapshot. Reply at: https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/37 ------------------------------------------------------------------------ On 2008-04-02T12:55:07+00:00 rbu wrote: *** Bug 215863 has been marked as a duplicate of this bug. *** Reply at: https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/38 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2007-4045 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-0053 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/210718 Title: CVE-2008-1373: CUPS GIF image filter overflow To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
