Bug 250161 (CVE-2007-4045)
Summary: | CVE-2007-4045 Incomplete fix for CVE-2007-0720 CUPS denial of service | ||||||
---|---|---|---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Lubomir Kundrak <lkundrak> | ||||
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||
Status: | CLOSED ERRATA | QA Contact: | |||||
Severity: | low | Docs Contact: | |||||
Priority: | low | ||||||
Version: | unspecified | CC: | twaugh | ||||
Target Milestone: | --- | Keywords: | Regression, Security | ||||
Target Release: | --- | ||||||
Hardware: | All | ||||||
OS: | Linux | ||||||
URL: | http://www.novell.com/linux/security/advisories/2007_14_sr.html | ||||||
Whiteboard: | |||||||
Fixed In Version: | 1.3.4-2.fc8 | Doc Type: | Bug Fix | ||||
Doc Text: | Story Points: | --- | |||||
Clone Of: | Environment: | ||||||
Last Closed: | 2007-11-08 06:03:41 UTC | Type: | --- | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | 356541, 356551, 356561 | ||||||
Bug Blocks: | |||||||
Attachments: |
|
Description
Lubomir Kundrak
2007-07-30 19:34:22 UTC
Created attachment 160266 [details] Patch for CVE-2007-4045 CUPS DoS sucked from SUSE package cups-1.3.4-2.fc8 has been pushed to the Fedora 8 stable repository. If problems still persist, please make note of it in this bug report. cups-1.2.12-7.fc7 has been pushed to the Fedora 7 stable repository. If problems still persist, please make note of it in this bug report. This issue only affected CUPS versions prior to 1.2.x and was addressed in CUPS packages in Red Hat Enterprise Linux 3 and 4. Patches applied to Fedora packages were not needed and were dropped few weeks later: * Fri Nov 30 2007 Tim Waugh <twaugh-at-redhat.com> - CVE-2007-4045 patch is not necessarily because cupsd_client_t objects are not moved in array operations, only pointers to them. Also noted by upstream in http://www.cups.org/str.php?L2725: This patch is not valid or needed for any version of CUPS since 1.2. The problem in 1.1.x was that the Clients array was allocated as a contiguous array, so when a client went away the user data pointer for OpenSSL needed to be updated to point to the correct http_t structure. In 1.2 we changed the Clients array to use individually-allocated cupsd_client_t structures managed by the CUPS array API. This means that the address of the http_t structure won't change when a client is removed or added. This issue was addressed in: Red Hat Enterprise Linux: http://rhn.redhat.com/errata/RHSA-2007-1022.html http://rhn.redhat.com/errata/RHSA-2007-1023.html |