Your message dated Wed, 22 Apr 2009 06:18:33 +0200
with message-id <20090422041833.ga30...@ngolde.de>
and subject line CVE-2009-1274 is fixed
has caused the Debian Bug report #522811,
regarding xine-lib: heap-based buffer overflow due to integer overflow in 
quicktime atom parsing
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
522811: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=522811
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: xine-lib
Severity: grave
Tags: security patch

Hi,
Tobias Klein discovered an integer overflow in the quicktime 
STTS atom processing that leads to a heap-based buffer 
overflow probably resulting in arbitrary code execution.

As you are also upstream of xine I expect you are aware of:
http://trapkit.de/advisories/TKADV2009-005.txt.

You fixed this bug in 1.1.16.3.

A few words from my side, I expect you to contact the 
security team in case you get notified of a security issue 
in xine in the future as it's not nice to see other people 
notifying us while we our Debian maintainer is also the 
upstream. Sorry but this workflow sucks! Debian can allocate 
CVE ids if you need them and I see no reason why a fixed 
package is not already in unstable.

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry if we get one in time.

Cheers
Nico

-- 
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpI18sjjgPMb.pgp
Description: PGP signature


--- End Message ---
--- Begin Message ---
Version: 1.1.16.3-1

Darren,
you were neither able to reply on #522811, nor to notify the 
security team of a security issue in xine-lib and you even 
didn't comment on the bug afterwards that it is already 
fixed in the version you uploaded nearly at the same time. 
The bug was still open until now.

This wastes a lot of time which you as the maintainer should 
spend. This is nothing personal but either you as upstream
are able to produce secure code or you are able to properly 
communicate with your security team.

I talked with you about this problem in IRC and I would have 
expected at least a notice that you uploaded a fixed version 
if you are not able to close the bug by yourself.

This is nothing personal but on the next security related 
bug of xine without maintainer reaction or coordination with 
the security team I will file a removal bug for xine.

Cheers
Nico

-- 
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpMHDFYUaiW2.pgp
Description: PGP signature


--- End Message ---

Reply via email to