CVE-2008-1373: CUPS GIF image filter overflow
Bug #210718 reported by
Martin Pitt
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
cupsys (Fedora) |
Fix Released
|
Medium
|
|||
cupsys (Gentoo Linux) |
Fix Released
|
High
|
|||
cupsys (Ubuntu) |
Fix Released
|
High
|
Martin Pitt | ||
Dapper |
Fix Released
|
Undecided
|
Jamie Strandboge | ||
Edgy |
Fix Released
|
Undecided
|
Jamie Strandboge | ||
Feisty |
Fix Released
|
Undecided
|
Jamie Strandboge | ||
Gutsy |
Fix Released
|
Undecided
|
Jamie Strandboge | ||
Hardy |
Fix Released
|
High
|
Martin Pitt |
Bug Description
Binary package hint: cupsys
cupsys 1.3.7 fixes a security vulnerability in cupsd, which applies to stables as well. Please see http://
Changed in cupsys: | |
status: | Unknown → Fix Released |
Changed in cupsys: | |
status: | Unknown → Invalid |
Changed in cupsys: | |
assignee: | nobody → jamie-strandboge |
status: | New → Fix Committed |
assignee: | nobody → jamie-strandboge |
status: | New → Fix Committed |
assignee: | nobody → jamie-strandboge |
status: | New → Fix Committed |
assignee: | nobody → jamie-strandboge |
status: | New → Fix Committed |
Changed in cupsys: | |
status: | Invalid → Fix Released |
Changed in cupsys (Gentoo Linux): | |
importance: | Unknown → High |
Changed in cupsys (Fedora): | |
importance: | Unknown → Medium |
To post a comment you must log in.
It was discovered that GIF parsing code used by CUPS printing system is affected
by similar issue as GIF parsers used by gd / netpbm / tk / SDL_image.
Value of code_size read from GIF image is not properly validate before being
used to initialize table array in gif_read_lzw(), causing a static buffer overflow.
Issue is similar to:
CVE-2006-4484 (gd), CVE-2007-6697 (SDL_image), CVE-2008-0553 (tk), CVE-2008-0554
(netpbm)