Your message dated Sun, 18 Oct 2009 18:51:10 +0200 with message-id <4ADB477E.3090708@debian.org> and subject line Fixed has caused the Debian Bug report #534952, regarding CVE-2009-1698 CVE-2009-1690 CVE-2009-1687 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 534952: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534952 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: CVE-2009-1698 CVE-2009-1690 CVE-2009-1687 CVE-2009-0945
- From: Giuseppe Iuculano <giuseppe@iuculano.it>
- Date: Sun, 28 Jun 2009 15:35:54 +0200
- Message-id: <20090628133554.11860.8928.reportbug@localhost>
Package: kdelibs Severity: serious Tags: security patch -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities & Exposures) ids were published for kdelibs. CVE-2009-1698[0]: | WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and | iPhone OS for iPod touch 1.1 through 2.2.1 does not initialize a | pointer during handling of a Cascading Style Sheets (CSS) attr | function call with a large numerical argument, which allows remote | attackers to execute arbitrary code or cause a denial of service | (memory corruption and application crash) via a crafted HTML document. CVE-2009-1690[1]: | Use-after-free vulnerability in WebKit, as used in Apple Safari before | 4.0, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through | 2.2.1, Google Chrome 1.0.154.53, and possibly other products, allows | remote attackers to execute arbitrary code or cause a denial of | service (memory corruption and application crash) by setting an | unspecified property of an HTML tag that causes child elements to be | freed and later accessed when an HTML error occurs, related to | "recursion in certain DOM event handlers." CVE-2009-1687[2]: | The JavaScript garbage collector in WebKit in Apple Safari before 4.0, | iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through | 2.2.1 does not properly handle allocation failures, which allows | remote attackers to execute arbitrary code or cause a denial of | service (memory corruption and application crash) via a crafted HTML | document that triggers write access to an "offset of a NULL pointer." CVE-2009-0945[3]: | Array index error in the insertItemBefore method in WebKit, as used in | Apple Safari before 3.2.3 and 4 Public Beta, iPhone OS 1.0 through | 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Google Chrome | Stable before 1.0.154.65, and possibly other products allows remote | attackers to execute arbitrary code via a document with a SVGPathList | data structure containing a negative index in the (1) | SVGTransformList, (2) SVGStringList, (3) SVGNumberList, (4) | SVGPathSegList, (5) SVGPointList, or (6) SVGLengthList SVGList object, | which triggers memory corruption. If you fix the vulnerabilities please also make sure to include the CVE ids in your changelog entry. For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1698 http://security-tracker.debian.net/tracker/CVE-2009-1698 Upstream WebKit patch: http://trac.webkit.org/changeset/42081 [1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1690 http://security-tracker.debian.net/tracker/CVE-2009-1690 Upstream WebKit patch: http://trac.webkit.org/changeset/42532 Upstream KDE 4.2 patch: http://websvn.kde.org/?view=rev&revision=983316 [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1687 http://security-tracker.debian.net/tracker/CVE-2009-1687 Upstream WebKit patch: http://trac.webkit.org/changeset/41854 [3] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0945 http://security-tracker.debian.net/tracker/CVE-2009-0945 Upstream WebKit patch: http://trac.webkit.org/changeset/43590 Upstream KDE 4.2 patch: http://websvn.kde.org/?view=rev&revision=983302 Cheers, Giuseppe. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iEYEARECAAYFAkpHcbcACgkQNxpp46476apx5QCfeH3Pc3dP9utPPbZI0u2HjXrN /yUAnRkghXsR0jyMpxfPtZooEa8yS/RE =mO69 -----END PGP SIGNATURE-----
--- End Message ---
--- Begin Message ---
- To: 534952-done@bugs.debian.org
- Subject: Fixed
- From: Giuseppe Iuculano <iuculano@debian.org>
- Date: Sun, 18 Oct 2009 18:51:10 +0200
- Message-id: <4ADB477E.3090708@debian.org>
Source: kdelibs Source-Version: 4:3.5.10.dfsg.1-2.1Attachment: signature.asc
Description: OpenPGP digital signature
--- End Message ---