Your message dated Sat, 21 May 2005 16:32:25 -0400
with message-id <[EMAIL PROTECTED]>
and subject line Bug#308625: fixed in binutils 2.15-6
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 11 May 2005 14:33:22 +0000
>From [EMAIL PROTECTED] Wed May 11 07:33:22 2005
Return-path: <[EMAIL PROTECTED]>
Received: from inutil.org (vserver151.vserver151.serverflex.de) 
[193.22.164.111] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DVsH4-0002WA-00; Wed, 11 May 2005 07:33:22 -0700
Received: from p5489718a.dip.t-dialin.net ([84.137.113.138] 
helo=localhost.localdomain)
        by vserver151.vserver151.serverflex.de with esmtpsa 
(TLS-1.0:RSA_AES_256_CBC_SHA:32)
        (Exim 4.50)
        id 1DVsGB-0003KC-Oo
        for [EMAIL PROTECTED]; Wed, 11 May 2005 16:32:28 +0200
Received: from jmm by localhost.localdomain with local (Exim 4.50)
        id 1DVsH0-0001eV-7h; Wed, 11 May 2005 16:33:18 +0200
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Moritz Muehlenhoff <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: binutils: Integer overflow in ELF segment parsing
X-Mailer: reportbug 3.11
Date: Wed, 11 May 2005 16:33:17 +0200
X-Debbugs-Cc: [EMAIL PROTECTED]
Message-Id: <[EMAIL PROTECTED]>
X-SA-Exim-Connect-IP: 84.137.113.138
X-SA-Exim-Mail-From: [EMAIL PROTECTED]
X-SA-Exim-Scanned: No (on vserver151.vserver151.serverflex.de); SAEximRunCond 
expanded to false
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-11.0 required=4.0 tests=BAYES_00,HAS_PACKAGE,
        X_DEBBUGS_CC autolearn=ham version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: binutils
Version: 2.15-5
Severity: grave
Tags: security
Justification: user security hole

An integer overflow in parsing ELF segment headers has been found that
affects several of binutil's binaries, such as nm, strings or objdump and
can potentially be exploited to corrupt the heap and execute arbitrary
code. See http://bugs.gentoo.org/show_bug.cgi?id=91398 for a crafted
test binary (without malicious effects) and pointers to more information.
The bug log contains a patch by SuSE's Sebastian Krahmer, which has been
applied upstream.

Cheers,
        Moritz

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.11
Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15)

Versions of packages binutils depends on:
ii  libc6                       2.3.2.ds1-21 GNU C Library: Shared libraries an

-- no debconf information

---------------------------------------
Received: (at 308625-close) by bugs.debian.org; 21 May 2005 20:39:42 +0000
>From [EMAIL PROTECTED] Sat May 21 13:39:42 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DZal3-0005U4-00; Sat, 21 May 2005 13:39:41 -0700
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
        id 1DZae1-0004pl-00; Sat, 21 May 2005 16:32:25 -0400
From: James Troup <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#308625: fixed in binutils 2.15-6
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Sat, 21 May 2005 16:32:25 -0400
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Source: binutils
Source-Version: 2.15-6

We believe that the bug you reported is fixed in the latest version of
binutils, which is due to be installed in the Debian FTP archive:

binutils-dev_2.15-6_i386.deb
  to pool/main/b/binutils/binutils-dev_2.15-6_i386.deb
binutils-doc_2.15-6_all.deb
  to pool/main/b/binutils/binutils-doc_2.15-6_all.deb
binutils-multiarch_2.15-6_i386.deb
  to pool/main/b/binutils/binutils-multiarch_2.15-6_i386.deb
binutils_2.15-6.diff.gz
  to pool/main/b/binutils/binutils_2.15-6.diff.gz
binutils_2.15-6.dsc
  to pool/main/b/binutils/binutils_2.15-6.dsc
binutils_2.15-6_i386.deb
  to pool/main/b/binutils/binutils_2.15-6_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
James Troup <[EMAIL PROTECTED]> (supplier of updated binutils package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Sat, 21 May 2005 20:20:01 +0100
Source: binutils
Binary: binutils-dev binutils-hppa64 binutils-multiarch binutils binutils-doc
Architecture: source i386 all
Version: 2.15-6
Distribution: unstable
Urgency: low
Maintainer: James Troup <[EMAIL PROTECTED]>
Changed-By: James Troup <[EMAIL PROTECTED]>
Description: 
 binutils   - The GNU assembler, linker and binary utilities
 binutils-dev - The GNU binary utilities (BFD development files)
 binutils-doc - Documentation for the GNU assembler, linker and binary utilities
 binutils-multiarch - Binary utilities that support multi-arch targets
Closes: 308625
Changes: 
 binutils (2.15-6) unstable; urgency=low
 .
   * 123_bfd_overflow_fix.dpatch: new patch from Alan Modra to fix BFD
     overflows.  Closes: #308625
Files: 
 e25d40c0a57ad00fcaf947ea72ed6412 1401 devel standard binutils_2.15-6.dsc
 d7d3502acef87b3210e2db9739723972 38992 devel standard binutils_2.15-6.diff.gz
 1d4311dc8817ac0d0490a678a9ec5832 433520 doc optional 
binutils-doc_2.15-6_all.deb
 e76056eb0d6a0f14bc267bd7d0f628a5 2221396 devel standard 
binutils_2.15-6_i386.deb
 2f366cb8670d2a958e4d6597ea976f03 2812454 devel extra 
binutils-dev_2.15-6_i386.deb
 57f78dce76c9b99b6915fb5027c63264 7952134 devel extra 
binutils-multiarch_2.15-6_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)
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=k1c+
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to