<?xml version="1.0" encoding="UTF-8" ?>

<bugzilla version="5.2"
          urlbase="https://bugzilla.altlinux.org/"
          
          maintainer="jenya@basealt.ru"
>

    <bug>
          <bug_id>19666</bug_id>
          
          <creation_ts>2009-04-18 14:54:59 +0400</creation_ts>
          <short_desc>Multiple Security Vulnerabilities</short_desc>
          <delta_ts>2009-05-25 20:12:49 +0400</delta_ts>
          <reporter_accessible>1</reporter_accessible>
          <cclist_accessible>1</cclist_accessible>
          <classification_id>4</classification_id>
          <classification>Development</classification>
          <product>Sisyphus</product>
          <component>cups</component>
          <version>unstable</version>
          <rep_platform>all</rep_platform>
          <op_sys>Linux</op_sys>
          <bug_status>CLOSED</bug_status>
          <resolution>FIXED</resolution>
          
          
          <bug_file_loc>https://rhn.redhat.com/errata/RHSA-2009-0429.html</bug_file_loc>
          <status_whiteboard></status_whiteboard>
          <keywords>security</keywords>
          <priority>P3</priority>
          <bug_severity>blocker</bug_severity>
          <target_milestone>---</target_milestone>
          
          
          <everconfirmed>1</everconfirmed>
          <reporter name="Vladimir Lettiev">crux</reporter>
          <assigned_to name="Anton Farygin">rider</assigned_to>
          <cc>dottedmag</cc>
    
    <cc>george</cc>
    
    <cc>rider</cc>
          
          <qa_contact>qa-sisyphus</qa_contact>

      

      

      

          <comment_sort_order>oldest_to_newest</comment_sort_order>  
          <long_desc isprivate="0" >
    <commentid>89665</commentid>
    <comment_count>0</comment_count>
    <who name="Vladimir Lettiev">crux</who>
    <bug_when>2009-04-18 14:54:59 +0400</bug_when>
    <thetext>Обнаружено множество уязвимостей в cups:

CVE-2009-0163 cups: Integer overflow in the TIFF image filter
CVE-2009-0146 xpdf: Multiple buffer overflows in JBIG2 decoder (setBitmap,
readSymbolDictSeg)
CVE-2009-0147 xpdf: Multiple integer overflows in JBIG2 decoder
CVE-2009-0166 xpdf: Freeing of potentially uninitialized memory in JBIG2 decoder
CVE-2009-0799 PDF JBIG2 decoder OOB read
CVE-2009-0800 PDF JBIG2 multiple input validation flaws
CVE-2009-1179 PDF JBIG2 integer overflow
CVE-2009-1180 PDF JBIG2 invalid free()
CVE-2009-1181 PDF JBIG2 NULL dereference
CVE-2009-1182 PDF JBIG2 MMR decoder buffer overflows
CVE-2009-1183 PDF JBIG2 MMR infinite loop DoS

Апстрим выпустил версию 1.3.10, где пофикшены часть этих проблем. Теперь для конвертации из PDF в PostScript будет использоваться не встроенный код, базированый на xpdf, а врапер на xpdf/poppler.
http://www.cups.org/articles.php?L582</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>89666</commentid>
    <comment_count>1</comment_count>
    <who name="Mikhail Gusarov">dottedmag</who>
    <bug_when>2009-04-18 14:56:09 +0400</bug_when>
    <thetext>security -&gt; blocker</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>89744</commentid>
    <comment_count>2</comment_count>
    <who name="inger@altlinux.org">inger</who>
    <bug_when>2009-04-20 09:57:29 +0400</bug_when>
    <thetext>* Fri Apr 17 16:00:00 2009 Stanislav Ievlev &lt;inger@altlinux.org&gt; 1.3.10-alt1
- 1.3.10 (security update)
- add support for PidFile option (closes: #19477)

Следите за Сизифом ;)</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>89772</commentid>
    <comment_count>3</comment_count>
    <who name="Vladimir Lettiev">crux</who>
    <bug_when>2009-04-20 17:31:51 +0400</bug_when>
    <thetext>с cups вроде бы всё ок, но при обновлении вытянулись &quot;дырявые&quot; xpdf-utils-3.02-alt4 и xpdf-common-3.02-alt4...</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>91800</commentid>
    <comment_count>4</comment_count>
    <who name="Vladimir Lettiev">crux</who>
    <bug_when>2009-05-25 20:12:49 +0400</bug_when>
    <thetext>closed</thetext>
  </long_desc>
      
      

    </bug>

</bugzilla>