Back to bug 530111

Who When What Removed Added
Tim Waugh 2009-10-21 15:29:40 UTC Status NEW ASSIGNED
Jan Lieskovsky 2009-10-21 16:08:24 UTC Priority low medium
Group qe_staff
Version 5.4 unspecified
URL http://www.cups.org/str.php?L3200
CC jlieskov
Component cups vulnerability
Assignee twaugh security-response-team
Product Red Hat Enterprise Linux 5 Security Response
Target Milestone rc ---
QA Contact qe-baseos-daemons
Summary Use-after-free crash in cupsd Use-after-free (crash) due improper reference counting in abstract file descriptors handling interface
Whiteboard impact=moderate,source=upstream,public=20090515,reported=20090605,cvss2=5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P
Severity urgent medium
Jan Lieskovsky 2009-11-10 20:17:31 UTC Summary Use-after-free (crash) due improper reference counting in abstract file descriptors handling interface cups: Use-after-free (crash) due improper reference counting in abstract file descriptors handling interface
Jan Lieskovsky 2009-11-10 20:34:11 UTC Summary cups: Use-after-free (crash) due improper reference counting in abstract file descriptors handling interface CVE-2009-3553 cups: Use-after-free (crash) due improper reference counting in abstract file descriptors handling interface
Alias CVE-2009-3553
Jan Lieskovsky 2009-11-11 11:38:55 UTC Depends On 536787
Jan Lieskovsky 2009-11-11 11:39:02 UTC Depends On 536788
Jan Lieskovsky 2009-11-11 11:39:16 UTC CC kreilly
Jan Lieskovsky 2009-11-13 13:16:33 UTC CC ykopkova
Jan Lieskovsky 2009-11-18 12:19:22 UTC Group security, qe_staff
Mark J. Cox 2009-11-20 12:38:17 UTC CC mjc
Whiteboard impact=moderate,source=upstream,public=20090515,reported=20090605,cvss2=5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P impact=moderate,source=upstream,public=20090515,reported=20090605,cvss2=3.3/AV:A/AC:L/Au:N/C:N/I:N/A:P
Ján Rusnačko 2016-03-04 10:53:20 UTC Whiteboard impact=moderate,source=upstream,public=20090515,reported=20090605,cvss2=3.3/AV:A/AC:L/Au:N/C:N/I:N/A:P impact=moderate,source=upstream,public=20090515,reported=20090605,cvss2=3.3/AV:A/AC:L/Au:N/C:N/I:N/A:P,cwe=CWE-416[auto]
Stephen Herr 2017-01-31 21:20:19 UTC Whiteboard impact=moderate,source=upstream,public=20090515,reported=20090605,cvss2=3.3/AV:A/AC:L/Au:N/C:N/I:N/A:P,cwe=CWE-416[auto] impact=moderate,source=upstream,public=20090515,reported=20090605,cvss2=5.0/AV:A/AC:L/Au:N/C:N/I:N/A:P,cwe=CWE-416[auto]
Stephen Herr 2017-01-31 21:38:31 UTC Whiteboard impact=moderate,source=upstream,public=20090515,reported=20090605,cvss2=5.0/AV:A/AC:L/Au:N/C:N/I:N/A:P,cwe=CWE-416[auto] impact=moderate,source=upstream,public=20090515,reported=20090605,cvss2=3.3/AV:A/AC:L/Au:N/C:N/I:N/A:P,cwe=CWE-416[auto]
PnT Account Manager 2018-04-17 18:25:58 UTC CC kreilly
Product Security DevOps Team 2019-09-29 12:33:07 UTC Whiteboard impact=moderate,source=upstream,public=20090515,reported=20090605,cvss2=3.3/AV:A/AC:L/Au:N/C:N/I:N/A:P,cwe=CWE-416[auto]
Red Hat Bugzilla 2022-12-01 00:24:05 UTC CC mjc
Red Hat Bugzilla 2023-06-30 22:37:41 UTC CC jlieskov
Red Hat Bugzilla 2023-07-07 08:30:22 UTC Assignee security-response-team nobody
CC security-response-team

Back to bug 530111