Your message dated Thu, 19 May 2005 11:32:20 -0400 with message-id <[EMAIL PROTECTED]> and subject line Bug#309739: fixed in tiff 3.7.2-3 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 19 May 2005 08:17:40 +0000 >From [EMAIL PROTECTED] Thu May 19 01:17:40 2005 Return-path: <[EMAIL PROTECTED]> Received: from mail01.pironet-ndh.com (mail02.pironet-ndh.com) [194.64.31.10] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DYgDs-000500-00; Thu, 19 May 2005 01:17:40 -0700 Received: from mail.fbn-dd.de (mail.fbn-dd.de [195.227.105.178]) by mail02.pironet-ndh.com (Postfix) with ESMTP id 752D834258 for <[EMAIL PROTECTED]>; Thu, 19 May 2005 10:17:07 +0200 (CEST) Received: from sonne.intranet.fbn-dd.de (192-168-0-1.transfer-000.intranet.fbn-dd.de [192.168.0.1]) by mail.fbn-dd.de (Postfix) with ESMTP id 243A81F950 for <[EMAIL PROTECTED]>; Thu, 19 May 2005 10:17:07 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by sonne.intranet.fbn-dd.de (Postfix) with ESMTP id 11E521E6B9 for <[EMAIL PROTECTED]>; Thu, 19 May 2005 10:17:07 +0200 (CEST) Received: from sonne.intranet.fbn-dd.de (localhost [127.0.0.1]) by localhost (AvMailGate-2.0.1.16) id 14901-488D7C00; Thu, 19 May 2005 10:17:06 +0200 Received: from localhost.localdomain (10-28-130-200.intranet-28-130.fbn-dd.de [10.28.130.200]) by sonne.intranet.fbn-dd.de (Postfix) with ESMTP id E42E51E6B9 for <[EMAIL PROTECTED]>; Thu, 19 May 2005 10:17:06 +0200 (CEST) Received: by localhost.localdomain (Postfix, from userid 1000) id 8E90642F; Thu, 19 May 2005 10:17:07 +0200 (CEST) Date: Thu, 19 May 2005 10:17:07 +0200 From: Martin Pitt <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Subject: libtiff4: vulnerable to CAN-2005-1544 Message-ID: <[EMAIL PROTECTED]> Mime-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="qDbXVdCdHGoSgWSk" Content-Disposition: inline User-Agent: Mutt/1.5.9i X-AntiVirus: checked by AntiVir MailGate (version: 2.0.1.16; AVE: 6.30.0.12; VDF: 6.30.0.184; host: sonne) Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: --qDbXVdCdHGoSgWSk Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Package: libtiff4 Version: 3.7.2-2 Severity: critical Tags: security Hi! Libtiff is vulnerable to another exploitable segfault, see http://bugzilla.remotesensing.org/show_bug.cgi?id=3D843 for details. However, please don't take the patch attached to that bug report, it's incomplete. Upstream CVS has the complete patch, you can also grab it =66rom http://bugs.gentoo.org/attachment.cgi?id=3D58276 For Sid you should probably just package the new upstream version, but for Sarge the patch is fine (I already ported it to 3.6.1 for Ubuntu's releases and tested it). Thanks, Martin --=20 Martin Pitt http://www.piware.de Ubuntu Developer http://www.ubuntulinux.org Debian Developer http://www.debian.org --qDbXVdCdHGoSgWSk Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.0 (GNU/Linux) iD8DBQFCjEuDDecnbV4Fd/IRApvUAKDzo3ddG99ogHlVDvfMluSmviXEFgCffvko iK3dMiMNuQ7Vy5nzAyjV1Lo= =qyC1 -----END PGP SIGNATURE----- --qDbXVdCdHGoSgWSk-- --------------------------------------- Received: (at 309739-close) by bugs.debian.org; 19 May 2005 15:41:41 +0000 >From [EMAIL PROTECTED] Thu May 19 08:41:41 2005 Return-path: <[EMAIL PROTECTED]> Received: from newraff.debian.org [208.185.25.31] (mail) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DYn9Z-0005NA-00; Thu, 19 May 2005 08:41:41 -0700 Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian)) id 1DYn0W-0003dA-00; Thu, 19 May 2005 11:32:20 -0400 From: Jay Berkenbilt <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] X-Katie: $Revision: 1.55 $ Subject: Bug#309739: fixed in tiff 3.7.2-3 Message-Id: <[EMAIL PROTECTED]> Sender: Archive Administrator <[EMAIL PROTECTED]> Date: Thu, 19 May 2005 11:32:20 -0400 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Source: tiff Source-Version: 3.7.2-3 We believe that the bug you reported is fixed in the latest version of tiff, which is due to be installed in the Debian FTP archive: libtiff-opengl_3.7.2-3_i386.deb to pool/main/t/tiff/libtiff-opengl_3.7.2-3_i386.deb libtiff-tools_3.7.2-3_i386.deb to pool/main/t/tiff/libtiff-tools_3.7.2-3_i386.deb libtiff4-dev_3.7.2-3_i386.deb to pool/main/t/tiff/libtiff4-dev_3.7.2-3_i386.deb libtiff4_3.7.2-3_i386.deb to pool/main/t/tiff/libtiff4_3.7.2-3_i386.deb libtiffxx0_3.7.2-3_i386.deb to pool/main/t/tiff/libtiffxx0_3.7.2-3_i386.deb tiff_3.7.2-3.diff.gz to pool/main/t/tiff/tiff_3.7.2-3.diff.gz tiff_3.7.2-3.dsc to pool/main/t/tiff/tiff_3.7.2-3.dsc A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Jay Berkenbilt <[EMAIL PROTECTED]> (supplier of updated tiff package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Thu, 19 May 2005 05:41:28 -0400 Source: tiff Binary: libtiff-opengl libtiffxx0 libtiff4 libtiff-tools libtiff4-dev Architecture: source i386 Version: 3.7.2-3 Distribution: unstable Urgency: high Maintainer: Jay Berkenbilt <[EMAIL PROTECTED]> Changed-By: Jay Berkenbilt <[EMAIL PROTECTED]> Description: libtiff-opengl - TIFF manipulation and conversion tools libtiff-tools - TIFF manipulation and conversion tools libtiff4 - Tag Image File Format (TIFF) library libtiff4-dev - Tag Image File Format library (TIFF), development files libtiffxx0 - Tag Image File Format (TIFF) library -- C++ interface Closes: 309739 Changes: tiff (3.7.2-3) unstable; urgency=high . * Fix for exploitable segmentation fault on files with bad BitsPerSample values. (Closes: #309739) [libtiff/tif_dirread.c, CAN-2005-1544] Thanks to Martin Pitt for the report. Files: 14ed5f799c0d34b3f4d258abb76b448a 735 libs optional tiff_3.7.2-3.dsc 1fc94f29d3a15165419a247d700ccbdd 9149 libs optional tiff_3.7.2-3.diff.gz 1e41dddfdcc5e433282e3594dd7487da 451754 libs optional libtiff4_3.7.2-3_i386.deb eba84b0e5ed28fe006e21966d1617cc5 40262 libs optional libtiffxx0_3.7.2-3_i386.deb 13272b256ec7ab7c7d3db0cbc388cfcf 250716 libdevel optional libtiff4-dev_3.7.2-3_i386.deb 3d369fa5c93aa1e456c1832e7f94eb25 205830 graphics optional libtiff-tools_3.7.2-3_i386.deb 936dddcc6265d3468c14bfbcb4a9b9b6 44828 graphics optional libtiff-opengl_3.7.2-3_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.0 (GNU/Linux) iD8DBQFCjK2REBVk6taI4KcRAuGHAKC9rmUracGLJutKXObvOGWy1cE3oQCgnQi6 uS13arrWpS1oW5y1TjRBTd0= =SR9K -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]