Your message dated Wed, 16 Mar 2005 21:47:30 -0500
with message-id <[EMAIL PROTECTED]>
and subject line Bug#298039: fixed in xli 1.17.0-17
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 4 Mar 2005 08:53:15 +0000
>From [EMAIL PROTECTED] Fri Mar 04 00:53:15 2005
Return-path: <[EMAIL PROTECTED]>
Received: from moutng.kundenserver.de [212.227.126.186] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1D78Yd-00089v-00; Fri, 04 Mar 2005 00:53:15 -0800
Received: from bitz8.bitz.briteline.de[195.90.9.8] (helo=anton)
        by mrelayeu.kundenserver.de with ESMTP (Nemesis),
        id 0MKwpI-1D78Yc17fi-0006L6; Fri, 04 Mar 2005 09:53:14 +0100
Received: by anton (Postfix, from userid 2028)
        id C6C4FB6EC4; Fri,  4 Mar 2005 09:53:13 +0100 (CET)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: =?iso-8859-15?q?Moritz_M=C3=BChlenhoff?= <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: xli: Multiple security problems in xli
X-Mailer: reportbug 2.26.1.1.200308291454
Date: Fri, 04 Mar 2005 09:53:13 +0100
Message-Id: <[EMAIL PROTECTED]>
X-Provags-ID: kundenserver.de [EMAIL PROTECTED] 
login:4ad79d65ac46f2345c6ef2e856c1d9ef
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: xli
Version: 1.17.0-16 (not installed)
Severity: grave
Justification: user security hole

[Cc:ing security, as Woody should be affected as well]

Multiple security problems in xli have been found by the Gentoo Security folks:

1. Shell meta characters are inaccurately escaped in compressed images
2. A buffer overflow in "Faces Project images" parsing allows execution of
   arbitrary code.
3. Insufficient validation of image properties in xli could potentially result
   in buffer management errors (no further information given wrt the impact of
   this vulnerability)

Fixes: All problems have been fixed in the latest xli (which doesn't have
overly many differences to the version in sid):
>Sun Feb 27 15:16:08 PST 2005
>
>Fix a security problem in the faces loader, a security problem when
>opening compressed files, and check for integer overflows in image data
>size calculations.

Note: There does only seem to be a CAN assignment for the faces overflow,
(CAN-2001-0775), not for the remaining issues. Could anyone from the
security team please request one?

Cheers,
         Moritz
-- 
Moritz Muehlenhoff [EMAIL PROTECTED]     fon: +49 421 22 232- 0
Development        Linux for Your Business       fax: +49 421 22 232-99
Univention GmbH    http://www.univention.de/   mobil: +49 175 22 999 23

-- System Information:
Debian Release: 3.0
Architecture: i386
Kernel: Linux anton 2.4.29-univention.1 #1 SMP Thu Jan 27 17:08:46 CET 2005 i686
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED]


---------------------------------------
Received: (at 298039-close) by bugs.debian.org; 17 Mar 2005 03:10:13 +0000
>From [EMAIL PROTECTED] Wed Mar 16 19:10:13 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DBlMI-0007kK-00; Wed, 16 Mar 2005 19:07:38 -0800
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
        id 1DBl2o-00070m-00; Wed, 16 Mar 2005 21:47:30 -0500
From: Graham Wilson <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#298039: fixed in xli 1.17.0-17
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Wed, 16 Mar 2005 21:47:30 -0500
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Source: xli
Source-Version: 1.17.0-17

We believe that the bug you reported is fixed in the latest version of
xli, which is due to be installed in the Debian FTP archive:

xli_1.17.0-17.diff.gz
  to pool/main/x/xli/xli_1.17.0-17.diff.gz
xli_1.17.0-17.dsc
  to pool/main/x/xli/xli_1.17.0-17.dsc
xli_1.17.0-17_powerpc.deb
  to pool/main/x/xli/xli_1.17.0-17_powerpc.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Graham Wilson <[EMAIL PROTECTED]> (supplier of updated xli package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue, 08 Mar 2005 06:04:31 +0000
Source: xli
Binary: xli
Architecture: source powerpc
Version: 1.17.0-17
Distribution: unstable
Urgency: high
Maintainer: Graham Wilson <[EMAIL PROTECTED]>
Changed-By: Graham Wilson <[EMAIL PROTECTED]>
Description: 
 xli        - view images under X11
Closes: 298039
Changes: 
 xli (1.17.0-17) unstable; urgency=high
 .
   * Fix some old and new security bugs. (closes: #298039)
 .
   * In face.c, use strncat instead of strcat, which won't overflow the image
     name buffer in case the first and last names are too long. Addresses
     CAN-2001-0775.
 .
   * In new.c, check that new*Image functions don't overflow when determining
     how much memory to allocate for images.
 .
   * Use upstream's code to avoid an overflow in buildIndex, rather than the
     code I wrote to fix #274310.
Files: 
 10f275b748124f5edd3ce8afe84c43f3 914 graphics optional xli_1.17.0-17.dsc
 fdea256ca3de8a54f23cba8bce0d29da 19199 graphics optional xli_1.17.0-17.diff.gz
 dd51c76c38b0a493d8c35ad9c3d23b39 152512 graphics optional 
xli_1.17.0-17_powerpc.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (GNU/Linux)

iQEVAwUBQjjtsC6fnYH5E4SWAQLd1AgAg1Ne3eXu1Fnk9MojDPAgGSmcGkKw5EuZ
vT+luO9g+mdr8Kg2R/meZuzmnhdk0+r33gIr9NPthH3Eu/OYDyL42Zcu91kw6TA2
WHtqcoQFU1YVl/CONSaGR8DNtNc88dxvU+dm9KKozKIcLKFnMZgkYL0kc9oFJ0il
qi1KbpZQ35DaSy2zwJQ9AkAT50h+FJHngz1INMnytDHkIqnDrGvFS8HXU6XE7zvi
yfOSRN3UJoOkXDTvfc3tbcKTtIlAjLg3T2dxcGs6XQNTpBI7jKZUeAPFLBguoYHO
d7DR2+2EpvQ565jsVk8yeMmnpkZtnoQYr7vZsMcyt5hYUuuURER8nw==
=szIM
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to