<?xml version="1.0" encoding="UTF-8" ?>

<bugzilla version="5.2"
          urlbase="https://bugzilla.altlinux.org/"
          
          maintainer="jenya@basealt.ru"
>

    <bug>
          <bug_id>22945</bug_id>
          
          <creation_ts>2010-02-11 17:55:10 +0300</creation_ts>
          <short_desc>CVE-2009-4274 netpbm: Stack-based buffer overflow by processing X PixMap image</short_desc>
          <delta_ts>2010-03-02 22:38:53 +0300</delta_ts>
          <reporter_accessible>1</reporter_accessible>
          <cclist_accessible>1</cclist_accessible>
          <classification_id>4</classification_id>
          <classification>Development</classification>
          <product>Sisyphus</product>
          <component>netpbm</component>
          <version>unstable</version>
          <rep_platform>all</rep_platform>
          <op_sys>Linux</op_sys>
          <bug_status>CLOSED</bug_status>
          <resolution>FIXED</resolution>
          
          
          <bug_file_loc>https://bugzilla.redhat.com/show_bug.cgi?id=546580</bug_file_loc>
          <status_whiteboard></status_whiteboard>
          <keywords>security</keywords>
          <priority>P3</priority>
          <bug_severity>blocker</bug_severity>
          <target_milestone>---</target_milestone>
          
          
          <everconfirmed>1</everconfirmed>
          <reporter name="Dmitry V. Levin">ldv</reporter>
          <assigned_to name="Vladimir Lettiev">crux</assigned_to>
          <cc>crux</cc>
    
    <cc>lakostis</cc>
          
          <qa_contact>qa-sisyphus</qa_contact>

      

      

      

          <comment_sort_order>oldest_to_newest</comment_sort_order>  
          <long_desc isprivate="0" >
    <commentid>106627</commentid>
    <comment_count>0</comment_count>
    <who name="Dmitry V. Levin">ldv</who>
    <bug_when>2010-02-11 17:55:10 +0300</bug_when>
    <thetext>Marc Schoenefeld found a stack-based buffer overflow in the way netpbm graphics file formats handling library used to process content of header fields of the X PixMap (XPM) image file.  A remote attacker could provide a specially-crafted XPM image file and trick the local user into processing it, which would lead to denial of service (crash of application using the netpbm library) or, potentially, to execution of arbitrary code with the privileges of that application.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>106673</commentid>
    <comment_count>1</comment_count>
    <who name="Vladimir Lettiev">crux</who>
    <bug_when>2010-02-13 22:23:29 +0300</bug_when>
    <thetext>Подготовил исправление для Sisyphus:
http://git.altlinux.org/people/crux/packages/?p=netpbm.git;a=summary
Исправление для бранчей также можно подготовить (пример в бранче M51)

Если замечаний не будет, то можно будет отправить на сборку.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>107322</commentid>
    <comment_count>2</comment_count>
    <who name="Vladimir Lettiev">crux</who>
    <bug_when>2010-03-02 22:38:53 +0300</bug_when>
    <thetext>fixed in 10.35.73-alt1</thetext>
  </long_desc>
      
      

    </bug>

</bugzilla>