Your message dated Thu, 09 Apr 2009 16:40:54 +0000
with message-id <e1lrxj8-0001mg...@ries.debian.org>
and subject line Bug#520046: fixed in glib2.0 2.12.4-2+etch1
has caused the Debian Bug report #520046,
regarding glib2.0: CVE-2008-4316 large string vulnerability
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
520046: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=520046
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
package: glib2.0
severity: grave
tags: security

it has been found that libsoup is vulnerable to an integer overflow
attack, see CVE-2008-4316 [1].  details are:

  Multiple integer overflows in glib/gbase64.c in GLib before 2.20 allow
  context-dependent attackers to execute arbitrary code via a long
  string that is converted either (1) from or (2) to a base64
  representation.

since this potentially allows remote attackers to execute arbitrary
code, it should be treated with high urgency.

this was just fixed in ubuntu, so it may be possible to adopt their
patch [2].

note that bug #520039 in libsoup is related (an exact code copy).

if you fix these vulnerabilities, please make sure to include the CVE
id in your changelog.  please contact the security team to coordinate
a fix for stable and/or if you have any questions.

regards,
mike

[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4316
[2] http://www.ubuntu.com/usn/USN-738-1



--- End Message ---
--- Begin Message ---
Source: glib2.0
Source-Version: 2.12.4-2+etch1

We believe that the bug you reported is fixed in the latest version of
glib2.0, which is due to be installed in the Debian FTP archive:

glib2.0_2.12.4-2+etch1.diff.gz
  to pool/main/g/glib2.0/glib2.0_2.12.4-2+etch1.diff.gz
glib2.0_2.12.4-2+etch1.dsc
  to pool/main/g/glib2.0/glib2.0_2.12.4-2+etch1.dsc
libglib2.0-0-dbg_2.12.4-2+etch1_amd64.deb
  to pool/main/g/glib2.0/libglib2.0-0-dbg_2.12.4-2+etch1_amd64.deb
libglib2.0-0_2.12.4-2+etch1_amd64.deb
  to pool/main/g/glib2.0/libglib2.0-0_2.12.4-2+etch1_amd64.deb
libglib2.0-data_2.12.4-2+etch1_all.deb
  to pool/main/g/glib2.0/libglib2.0-data_2.12.4-2+etch1_all.deb
libglib2.0-dev_2.12.4-2+etch1_amd64.deb
  to pool/main/g/glib2.0/libglib2.0-dev_2.12.4-2+etch1_amd64.deb
libglib2.0-doc_2.12.4-2+etch1_all.deb
  to pool/main/g/glib2.0/libglib2.0-doc_2.12.4-2+etch1_all.deb
libglib2.0-udeb_2.12.4-2+etch1_amd64.udeb
  to pool/main/g/glib2.0/libglib2.0-udeb_2.12.4-2+etch1_amd64.udeb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 520...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Sebastian Dröge <sl...@debian.org> (supplier of updated glib2.0 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue, 17 Mar 2009 13:36:50 +0100
Source: glib2.0
Binary: libglib2.0-0-dbg libglib2.0-udeb libglib2.0-data libglib2.0-dev 
libglib2.0-doc libglib2.0-0
Architecture: source amd64 all
Version: 2.12.4-2+etch1
Distribution: oldstable-security
Urgency: low
Maintainer: Sebastien Bacher <seb...@debian.org>
Changed-By: Sebastian Dröge <sl...@debian.org>
Description: 
 libglib2.0-0 - The GLib library of C routines
 libglib2.0-0-dbg - The GLib libraries and debugging symbols
 libglib2.0-data - Common files for GLib library
 libglib2.0-dev - Development files for the GLib library
 libglib2.0-doc - Documentation files for the GLib library
 libglib2.0-udeb - The GLib library of C routines (udeb)
Closes: 520046
Changes: 
 glib2.0 (2.12.4-2+etch1) oldstable-security; urgency=low
 .
   * SECURITY: 012_base64-overflow-CVE-2008-4316.patch:
     + Possible arbitrary code execution when processing large Base64 strings.
       Patch from upstream SVN, fixes CVS-2008-4316 (Closes: #520046).
Files: 
 18cae69e02a1227e09226857626c0533 1499 libs optional glib2.0_2.12.4-2+etch1.dsc
 d121999e4cdfdc68621e3eb23f66cd66 3838981 libs optional 
glib2.0_2.12.4.orig.tar.gz
 9b22fc1fa8d82aded0a08cc9a7a6f55d 18438 libs optional 
glib2.0_2.12.4-2+etch1.diff.gz
 f30d726d7a8aa293c9b4c5b864b61ce6 285378 misc optional 
libglib2.0-data_2.12.4-2+etch1_all.deb
 275321184f9ed1e0edb0a6a26f477836 737208 doc optional 
libglib2.0-doc_2.12.4-2+etch1_all.deb
 4796b12af73cbe7c18ce91cf300f9049 547570 libs optional 
libglib2.0-0_2.12.4-2+etch1_amd64.deb
 735a0b44ed7edf2eac961beae0046b43 656440 debian-installer optional 
libglib2.0-udeb_2.12.4-2+etch1_amd64.udeb
 44d3bded85806ec86c1da38350791e39 595848 libdevel optional 
libglib2.0-dev_2.12.4-2+etch1_amd64.deb
 561ab303f654edd1c3da1e854eb1c162 605210 libdevel extra 
libglib2.0-0-dbg_2.12.4-2+etch1_amd64.deb
Package-Type: udeb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkm/qI0ACgkQBsBdh1vkHyGp1QCfUjKSwZKN72IJ3ZLyuhP/smG4
UEsAnAy84Gr5A5diQRpEr2V8BDS7H00d
=afBH
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to