Your message dated Sat, 28 May 2005 01:02:26 -0400
with message-id <[EMAIL PROTECTED]>
and subject line Bug#310803: fixed in bzip2 1.0.2-7
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 26 May 2005 05:59:53 +0000
>From [EMAIL PROTECTED] Wed May 25 22:59:53 2005
Return-path: <[EMAIL PROTECTED]>
Received: from sdcarl02.strategicdata.com.au (sd01.mel.strategicdata.com.au) 
[203.214.67.82] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DbBPN-000219-00; Wed, 25 May 2005 22:59:53 -0700
Received: from sd01 (localhost [127.0.0.1])
        by mail-int.strategicdata.com.au (Postfix) with ESMTP id B873CC00150D
        for <[EMAIL PROTECTED]>; Thu, 26 May 2005 15:59:50 +1000 (EST)
Received: 
        from sd01.mel.strategicdata.com.au (localhost [])
        by localhost ([127.0.0.1]);
        Thu, 26 May 2005 05:59:50 +0000
Received: from carthanach.mel.strategicdata.com.au 
(carthanach.mel.strategicdata.com.au [192.168.1.64])
        by sd01.mel.strategicdata.com.au (Postfix) with ESMTP id 95B6CC00150D
        for <[EMAIL PROTECTED]>; Thu, 26 May 2005 15:59:50 +1000 (EST)
Received: by carthanach.mel.strategicdata.com.au (Postfix, from userid 1188)
        id 28A6C390001; Thu, 26 May 2005 15:59:50 +1000 (EST)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Geoff Crompton <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: bzip2: CAN-2005-1260 decompression bomb vulnerability
X-Mailer: reportbug 3.8
Date: Thu, 26 May 2005 15:59:50 +1000
Message-Id: <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_20,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: bzip2
Version: 1.0.2-6
Severity: critical
Justification: breaks the whole system

See http://www.securityfocus.com/bid/13657 for more info. Quoting from
MDKSA-2005:091
>A vulnerability was found where specially crafted bzip2 archives would
> cause an infinite loop in the decompressor, resulting in an
> indefinitively large output file (also known as a "decompression
> bomb").  This could be exploited to cause a Denial of Service attack
> on the host computer due to disk space exhaustion (CAN-2005-1260).

Ubuntu have released advisory USN-127-1. I had a look through the patch
that this cited, but I couldn't tell which parts of it were related to
this, which were related to CAN-2005-0953, and which were other mods.
I pulled this patch from
http://security.ubuntu.com/ubuntu/pool/main/b/bzip2/bzip2_1.0.2-1ubuntu0.1.diff.gz

I've also not been able to find a diff between 1.0.2 and 1.0.3 from
upsteam.

I've marked this RC as it can hose a system, but if others think the
likely hood of exploit is fairly small, I've no problems with it being
reclassified.

--
Geoff Crompton

---------------------------------------
Received: (at 310803-close) by bugs.debian.org; 28 May 2005 05:09:01 +0000
>From [EMAIL PROTECTED] Fri May 27 22:09:01 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DbtZF-0007in-00; Fri, 27 May 2005 22:09:01 -0700
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
        id 1DbtSs-0007Zy-00; Sat, 28 May 2005 01:02:26 -0400
From: Anibal Monsalve Salazar <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#310803: fixed in bzip2 1.0.2-7
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Sat, 28 May 2005 01:02:26 -0400
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 
X-CrossAssassin-Score: 2

Source: bzip2
Source-Version: 1.0.2-7

We believe that the bug you reported is fixed in the latest version of
bzip2, which is due to be installed in the Debian FTP archive:

bzip2_1.0.2-7.diff.gz
  to pool/main/b/bzip2/bzip2_1.0.2-7.diff.gz
bzip2_1.0.2-7.dsc
  to pool/main/b/bzip2/bzip2_1.0.2-7.dsc
bzip2_1.0.2-7_i386.deb
  to pool/main/b/bzip2/bzip2_1.0.2-7_i386.deb
libbz2-1.0_1.0.2-7_i386.deb
  to pool/main/b/bzip2/libbz2-1.0_1.0.2-7_i386.deb
libbz2-dev_1.0.2-7_i386.deb
  to pool/main/b/bzip2/libbz2-dev_1.0.2-7_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Anibal Monsalve Salazar <[EMAIL PROTECTED]> (supplier of updated bzip2 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Sat, 28 May 2005 14:05:46 +1000
Source: bzip2
Binary: libbz2-1.0 bzip2 libbz2-dev
Architecture: source i386
Version: 1.0.2-7
Distribution: unstable
Urgency: high
Maintainer: Anibal Monsalve Salazar <[EMAIL PROTECTED]>
Changed-By: Anibal Monsalve Salazar <[EMAIL PROTECTED]>
Description: 
 bzip2      - high-quality block-sorting file compressor - utilities
 libbz2-1.0 - high-quality block-sorting file compressor library - runtime
 libbz2-dev - high-quality block-sorting file compressor library - development
Closes: 293581 310803
Changes: 
 bzip2 (1.0.2-7) unstable; urgency=high
 .
   * Fixed "CAN-2005-1260 decompression bomb vulnerability", closes: #310803.
     Patch by Martin Pitt <[EMAIL PROTECTED]>.
   * Fixed "Example provided in documentation causes data loss", closes:
     #293581. Patch by Adam Borowski <[EMAIL PROTECTED]>.
Files: 
 6e0e0ccfea94e3f194fa24d413ebc87f 577 utils standard bzip2_1.0.2-7.dsc
 444ffa10d91ca582f63a75dd8908c994 16264 utils standard bzip2_1.0.2-7.diff.gz
 ff6d4aa0fc45cb62949b564ee4a4a7fb 38682 libs standard 
libbz2-1.0_1.0.2-7_i386.deb
 524000f103f5f03ac835bfe2991d8c05 30308 libdevel optional 
libbz2-dev_1.0.2-7_i386.deb
 4c5ed64e1e60d63f0acb9c5f7df05445 233356 utils optional bzip2_1.0.2-7_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (GNU/Linux)

iD8DBQFCl/aTgY5NIXPNpFURAnWkAKDGuKmt9+4pkai5sqJr6oFyV1uACACgtTLl
n4tCRKKXaa77D9VN5z6DZDo=
=IuJj
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to