Steve Langasek <[EMAIL PROTECTED]> wrote:

> On Sat, Feb 18, 2006 at 07:17:43PM -0500, Jay Berkenbilt wrote:
>
>> This bug, reporting that tiff2pdf segfaults on a particular image, was
>> listed as grave but is not grave.  It does not render the software
>> unusable to a majority of users, and it has an easy workaround (use
>> some other program, like convert from imagemagick, to convert the
>> file).
>
> Is there any way that this bug could constitute a security hole?

It's conceivable, and this is something I will look into when I
investigate the problem.  Certainly a reliable way to cause a segfault
could be used as the basis for a DoS attack.  Since the segfault was
reported against the sarge version and is not reproducible in sid, I
don't think the severity of the bug should be RC, but if you disagree,
please re-upgrade and I'll leave it alone.  It's possible that the bug
is actually tiff2pdf (as reported) and not in libtiff as well.
(Actually, I just tested this in sarge, and I am not able to reproduce
the problem in the sarge version either.)

If the problem does turn out to be a security problem (which it may be
for the reasons above), I will attempt to prepare a fix for the sarge
version and notify the security team.  I won't close the bug until I
can come to a reasonable resolution on that.

If you think I should leave the bug RC pending a reliable way to
reproduce the problem in sid, please upgrade.  Note also that the
current sid version contains a security fix that is not in etch, but
as far as I know, the etch version does not contain the bug.

--Jay


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to