From rea-fbsd@codelabs.ru  Tue May  5 21:51:43 2009
Return-Path: <rea-fbsd@codelabs.ru>
Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34])
	by hub.freebsd.org (Postfix) with ESMTP id D4F64106566C
	for <FreeBSD-gnats-submit@freebsd.org>; Tue,  5 May 2009 21:51:43 +0000 (UTC)
	(envelope-from rea-fbsd@codelabs.ru)
Received: from 0.mx.codelabs.ru (0.mx.codelabs.ru [144.206.177.45])
	by mx1.freebsd.org (Postfix) with ESMTP id 7F2DD8FC13
	for <FreeBSD-gnats-submit@freebsd.org>; Tue,  5 May 2009 21:51:43 +0000 (UTC)
	(envelope-from rea-fbsd@codelabs.ru)
Received: from amnesiac.at.no.dns ([91.78.118.163])
	by 0.mx.codelabs.ru with esmtps (TLSv1:CAMELLIA256-SHA:256)
	id 1M1SYA-000HKm-Dg for FreeBSD-gnats-submit@freebsd.org; Wed, 06 May 2009 01:51:42 +0400
Message-Id: <20090505214602.389341725F@amnesiac.at.no.dns>
Date: Wed,  6 May 2009 01:46:02 +0400 (MSD)
From: Eygene Ryabinkin <rea-fbsd@codelabs.ru>
Reply-To: Eygene Ryabinkin <rea-fbsd@codelabs.ru>
To: FreeBSD-gnats-submit@freebsd.org
Cc:
Subject: [vuxml] print/cups-base: document vulnerabilities fixed in 1.3.10
X-Send-Pr-Version: 3.113
X-GNATS-Notify: rea-fbsd@codelabs.ru, dinoex@freebsd.org

>Number:         134247
>Category:       ports
>Synopsis:       [vuxml] print/cups-base: document vulnerabilities fixed in 1.3.10
>Confidential:   no
>Severity:       serious
>Priority:       medium
>Responsible:    dinoex
>State:          closed
>Quarter:        
>Keywords:       
>Date-Required:  
>Class:          sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Tue May 05 22:00:06 UTC 2009
>Closed-Date:    Thu May 07 10:08:35 CEST 2009
>Last-Modified:  Thu May  7 12:10:02 UTC 2009
>Originator:     Eygene Ryabinkin
>Release:        FreeBSD 8.0-CURRENT amd64
>Organization:
Code Labs
>Environment:

System: FreeBSD 8.0-CURRENT amd64

>Description:

Some vulnerabilities were fixed in CUPS 1.3.10: [1]

>How-To-Repeat:

[1] http://www.gentoo.org/security/en/glsa/glsa-200904-20.xml

>Fix:

The following VuXML entry should be evaluated and added:
--- vuln.xml begins here ---
  <vuln vid="736e55bc-39bb-11de-a493-001b77d09812">
    <topic>cups -- remote code execution and DNS rebinding</topic>
    <affects>
      <package>
        <name>cups-base</name>
        <range><lt>1.3.10</lt></range>
      </package>
    </affects>
    <description>
      <body xmlns="http://www.w3.org/1999/xhtml">
        <p>Gentoo security team summarizes:</p>
        <blockquote
          cite="http://www.gentoo.org/security/en/glsa/glsa-200904-20.xml">
          <p>The following issues were reported in CUPS:</p>
          <ul>
            <li>iDefense reported an integer overflow in the
            _cupsImageReadTIFF() function in the "imagetops" filter,
            leading to a heap-based buffer overflow (CVE-2009-0163).</li>
            <li>Aaron Siegel of Apple Product Security reported that the
            CUPS web interface does not verify the content of the "Host"
            HTTP header properly (CVE-2009-0164).</li>
            <li>Braden Thomas and Drew Yao of Apple Product Security
            reported that CUPS is vulnerable to CVE-2009-0146,
            CVE-2009-0147 and CVE-2009-0166, found earlier in xpdf and
            poppler.</li>
          </ul>
          <p>A remote attacker might send or entice a user to send a
          specially crafted print job to CUPS, possibly resulting in the
          execution of arbitrary code with the privileges of the
          configured CUPS user -- by default this is "lp", or a Denial
          of Service. Furthermore, the web interface could be used to
          conduct DNS rebinding attacks.</p>
        </blockquote>
      </body>
    </description>
    <references>
      <cvename>CVE-2009-0163</cvename>
      <cvename>CVE-2009-0164</cvename>
      <cvename>CVE-2009-0146</cvename>
      <cvename>CVE-2009-0147</cvename>
      <cvename>CVE-2009-0166</cvename>
      <bid>34571</bid>
      <bid>34665</bid>
      <bid>34568</bid>
      <url>http://www.cups.org/articles.php?L582</url>
    </references>
    <dates>
      <discovery>2009-05-05</discovery>
      <entry>TODAY</entry>
    </dates>
  </vuln>
--- vuln.xml ends here ---
>Release-Note:
>Audit-Trail:
Responsible-Changed-From-To: freebsd-ports-bugs->dinoex 
Responsible-Changed-By: edwin 
Responsible-Changed-When: Tue May 5 22:00:19 UTC 2009 
Responsible-Changed-Why:  
Over to maintainer (via the GNATS Auto Assign Tool) 

http://www.freebsd.org/cgi/query-pr.cgi?pr=134247 

From: dfilter@FreeBSD.ORG (dfilter service)
To: bug-followup@FreeBSD.org
Cc:  
Subject: Re: ports/134247: commit references a PR
Date: Thu,  7 May 2009 07:57:19 +0000 (UTC)

 dinoex      2009-05-07 07:57:05 UTC
 
   FreeBSD ports repository
 
   Modified files:
     security/vuxml       vuln.xml 
   Log:
   - add CUPS 1.3.10
   PR:             134247
   
   Revision  Changes    Path
   1.1925    +53 -1     ports/security/vuxml/vuln.xml
 _______________________________________________
 cvs-all@freebsd.org mailing list
 http://lists.freebsd.org/mailman/listinfo/cvs-all
 To unsubscribe, send any mail to "cvs-all-unsubscribe@freebsd.org"
 
State-Changed-From-To: open->closed 
State-Changed-By: dinoex 
State-Changed-When: Thu May 7 10:08:22 CEST 2009 
State-Changed-Why:  
committed, thanks. 

http://www.freebsd.org/cgi/query-pr.cgi?pr=134247 

From: dirk.meyer@dinoex.sub.org (Dirk Meyer)
To: FreeBSD-gnats-submit@FreeBSD.org
Cc:  
Subject: Re: ports/134247: [vuxml] print/cups-base: document	vulnerabilities
	fixed in 1.3.10
Date: Thu, 07 May 2009 14:00:57 +0200

 Eygene Ryabinkin schrieb:,
 
 > About the patch for bsd.openssl.mk: to minimize code duplication,
 > the added 'else' clause can be changed to
 > -----
 > .undef                  OPENSSL_PORT
 > .undef                  OPENSSL_SHLIBVER
 > -----
 > This will minimize the effort to change the defaults in future.
 
 But it will fail to create a correct dependency in other cases.
 
 kind regards Dirk
 
 - Dirk Meyer, Im Grund 4, 34317 Habichtswald, Germany
 - [dirk.meyer@dinoex.sub.org],[dirk.meyer@guug.de],[dinoex@FreeBSD.org]
 http://people.freebsd.org/~dinoex/errorlogs/
>Unformatted:
