Launchpad has imported 32 comments from the remote bug at
https://bugs.gentoo.org/show_bug.cgi?id=214068.

If you reply to an imported comment from within Launchpad, your comment
will be sent to the remote bug automatically. Read more about
Launchpad's inter-bugtracker facilities at
https://help.launchpad.net/InterBugTracking.

------------------------------------------------------------------------
On 2008-03-20T17:59:08+00:00 rbu wrote:

Tomas Hoger writes:
Value of code_size is read from GIF image, but not properly validated
before use to initialize table array in gif_read_lzw().  clear_code
used as upper bound in for loop is short, hence overflow is limited to
~16k - 4k short int values.  Moreover, attacker has limited control
over the values written past the end of the buffer.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/3

------------------------------------------------------------------------
On 2008-03-20T18:00:21+00:00 rbu wrote:

Timo, this issue is under embargo until 2008-03-26. Do not commit
anything to CVS until this date. Please prepare an updated ebuild and
attach it to this bug, we will do prestable testing here. Thanks.


Reply at: 
https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/4

------------------------------------------------------------------------
On 2008-03-20T18:00:52+00:00 rbu wrote:

Created attachment 146667
cups-1.2.12-CVE-2008-1373.patch

Reply at:
https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/5

------------------------------------------------------------------------
On 2008-03-20T18:01:05+00:00 rbu wrote:

Created attachment 146668
cups-1.3.6-CVE-2008-1373.patch

Reply at:
https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/6

------------------------------------------------------------------------
On 2008-03-20T22:49:11+00:00 tgurr wrote:

Created attachment 146714
cups-1.2.12-r7.ebuild

Added the patch for CVE-2008-1373 and also removed the unneeded (as also
discussed per mail and with upstream) patch for CVE-2007-4045.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/7

------------------------------------------------------------------------
On 2008-03-20T22:52:31+00:00 tgurr wrote:

Created attachment 146721
cups-1.3.6-r3.ebuild

Reply at:
https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/8

------------------------------------------------------------------------
On 2008-03-20T23:12:42+00:00 rbu wrote:

Arch Security Liaisons, please test the attached ebuild and report it stable on 
this bug.
Target keywords : "alpha amd64 arm hppa ia64 m68k ppc ppc64 release s390 sh 
sparc x86"

CC'ing current Liaisons:
   alpha : ferdy
   amd64 : welp
    hppa : jer
     ppc : dertobi123
   ppc64 : corsair
 release : pva
   sparc : fmccor
     x86 : opfer


Reply at: 
https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/9

------------------------------------------------------------------------
On 2008-03-20T23:14:24+00:00 rbu wrote:

(In reply to comment #6)
> Arch Security Liaisons, please test the attached ebuild and report it stable 
> on
> this bug.

That is:
=net-print/cups-1.2.12-r7

Reply at:
https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/10

------------------------------------------------------------------------
On 2008-03-21T09:43:02+00:00 fauli wrote:

Good to go on x86

Reply at:
https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/11

------------------------------------------------------------------------
On 2008-03-21T13:12:38+00:00 fmccor wrote:

Looks good on sparc.  Tested -1.2.12-r7, remote only, with {.ps, .pdf}
files.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/12

------------------------------------------------------------------------
On 2008-03-21T16:43:37+00:00 jer wrote:

HPPA is OK.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/13

------------------------------------------------------------------------
On 2008-03-22T08:03:33+00:00 corsair wrote:

looks good on ppc64

Reply at:
https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/14

------------------------------------------------------------------------
On 2008-03-22T10:05:09+00:00 dertobi123 wrote:

looks good on ppc

Reply at:
https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/15

------------------------------------------------------------------------
On 2008-03-22T16:15:00+00:00 armin76 wrote:

Adding Tobias for alpha

Reply at:
https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/16

------------------------------------------------------------------------
On 2008-03-22T16:51:17+00:00 klausman wrote:

=net-print/cups-1.2.12-r7 works dandy on alpha.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/17

------------------------------------------------------------------------
On 2008-03-24T02:05:24+00:00 rbu wrote:

Created attachment 147078
cups-1.2.12-CVE-2008-0053.patch

Reply at:
https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/18

------------------------------------------------------------------------
On 2008-03-24T02:10:20+00:00 rbu wrote:

Created attachment 147080
cups-1.2.12-r7.ebuild

Ok, cups is killing me these days. Could you please retest with the new
-r7 ebuild? Thanks.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/19

------------------------------------------------------------------------
On 2008-03-24T02:18:09+00:00 rbu wrote:

CVE-2008-0053 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0053):
  Unspecified vulnerability in CUPS before 1.3.6 in Apple Mac OS X 10.5.2 has
  unknown impact and attack vectors related to "input validation."

Apple Advisory:
http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html

Impact:  Multiple vulnerabilities in CUPS may lead to an unexpected
application termination or arbitrary code execution with system
privileges
Description:  Multiple input validation issues exist in CUPS, the
most serious of which may lead to arbitrary code execution with
system privileges. This update addresses the issues by updating to
CUPS 1.3.6. These issues do not affect systems prior to Mac OS X
v10.5.

Tomas Hoger writes:
According to upstream, this CVE id was allocated for following issue fixed in
CUPS 1.3.6 (see CHANGES.txt):

- Fixed two overflow bugs in the HP-GL/2 filter (Coverity)


Reply at: 
https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/20

------------------------------------------------------------------------
On 2008-03-24T08:40:48+00:00 fauli wrote:

Local printing ....ok
Remote printing from
  Windows ...ok
  Linux ...ok

x86 good to go...again.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/21

------------------------------------------------------------------------
On 2008-03-24T12:47:01+00:00 fmccor wrote:

sparc still looks good, too, as described in Comment 9.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/22

------------------------------------------------------------------------
On 2008-03-24T15:42:03+00:00 corsair wrote:

looks good on ppc64, too.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/23

------------------------------------------------------------------------
On 2008-03-24T16:27:44+00:00 jer wrote:

HPPA is OK again.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/24

------------------------------------------------------------------------
On 2008-03-24T19:07:24+00:00 klausman wrote:

And on alpha, it works, too.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/25

------------------------------------------------------------------------
On 2008-03-24T19:34:00+00:00 dertobi123 wrote:

still looks good for ppc

Reply at:
https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/26

------------------------------------------------------------------------
On 2008-03-26T01:48:40+00:00 rbu wrote:

Please note that the embargo has been delayed until Monday, 03/31.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/27

------------------------------------------------------------------------
On 2008-03-26T07:30:46+00:00 corsair wrote:

looks good on ppc64

Reply at:
https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/28

------------------------------------------------------------------------
On 2008-03-26T23:16:55+00:00 rbu wrote:

(In reply to comment #24)
> Please note that the embargo has been delayed until Monday, 03/31.

.... and again, Tuesday it is.


Reply at: 
https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/29

------------------------------------------------------------------------
On 2008-04-01T14:24:55+00:00 rbu wrote:

This is public now. Printing, please commit with the keywords you
gathered.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/30

------------------------------------------------------------------------
On 2008-04-01T19:12:36+00:00 rbu wrote:

Arches, please test and mark stable:
=net-print/cups-1.2.12-r7
Target keywords : "alpha amd64 arm hppa ia64 m68k ppc ppc64 release s390 sh 
sparc x86"
Already stabled : "alpha amd64 hppa ppc ppc64 sparc x86"
Missing keywords: "arm ia64 m68k release s390 sh"


Reply at: 
https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/32

------------------------------------------------------------------------
On 2008-04-01T19:18:49+00:00 rbu wrote:

1.3.6 is unaffected for CVE-2008-0053.

This is GLSA-200804-01 - no joke!

Reply at:
https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/33

------------------------------------------------------------------------
On 2008-04-02T11:52:25+00:00 pva wrote:

Stable on ia64 by armin76.
Fixed in release snapshot.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/37

------------------------------------------------------------------------
On 2008-04-02T12:55:07+00:00 rbu wrote:

*** Bug 215863 has been marked as a duplicate of this bug. ***

Reply at:
https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/comments/38


** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2007-4045

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-0053

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/210718

Title:
  CVE-2008-1373: CUPS GIF image filter overflow

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cupsys/+bug/210718/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to