Your message dated Sat, 05 Dec 2009 22:15:03 +0000
with message-id <e1nh2u7-0001n3...@ries.debian.org>
and subject line Bug#552534: fixed in libgd2 2.0.33-5.2etch2
has caused the Debian Bug report #552534,
regarding libgd2: CVE-2009-3546: possible buffer overflow or buffer over-read 
attacks via crafted files
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
552534: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=552534
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: libgd2
Version: 2.0.36~rc1~dfsg-3
Severity: grave
Tags: security

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for libgd2.

CVE-2009-3546[0]:
| The _gdGetColors function in gd_gd.c in PHP 5.2.11 and 5.3.0, and the
| GD Graphics Library 2.x, does not properly verify a certain
| colorsTotal structure member, which might allow remote attackers to
| conduct buffer overflow or buffer over-read attacks via a crafted GD
| file, a different vulnerability than CVE-2009-3293.  NOTE: some of
| these details are obtained from third party information.

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3546
    http://security-tracker.debian.org/tracker/CVE-2009-3546

Cheers,
-- 
Raphael Geissert - Debian Developer
www.debian.org - get.debian.net



--- End Message ---
--- Begin Message ---
Source: libgd2
Source-Version: 2.0.33-5.2etch2

We believe that the bug you reported is fixed in the latest version of
libgd2, which is due to be installed in the Debian FTP archive:

libgd-tools_2.0.33-5.2etch2_i386.deb
  to main/libg/libgd2/libgd-tools_2.0.33-5.2etch2_i386.deb
libgd2-noxpm-dev_2.0.33-5.2etch2_i386.deb
  to main/libg/libgd2/libgd2-noxpm-dev_2.0.33-5.2etch2_i386.deb
libgd2-noxpm_2.0.33-5.2etch2_i386.deb
  to main/libg/libgd2/libgd2-noxpm_2.0.33-5.2etch2_i386.deb
libgd2-xpm-dev_2.0.33-5.2etch2_i386.deb
  to main/libg/libgd2/libgd2-xpm-dev_2.0.33-5.2etch2_i386.deb
libgd2-xpm_2.0.33-5.2etch2_i386.deb
  to main/libg/libgd2/libgd2-xpm_2.0.33-5.2etch2_i386.deb
libgd2_2.0.33-5.2etch2.diff.gz
  to main/libg/libgd2/libgd2_2.0.33-5.2etch2.diff.gz
libgd2_2.0.33-5.2etch2.dsc
  to main/libg/libgd2/libgd2_2.0.33-5.2etch2.dsc



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 552...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Giuseppe Iuculano <iucul...@debian.org> (supplier of updated libgd2 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue, 10 Nov 2009 10:15:53 +0100
Source: libgd2
Binary: libgd2-noxpm-dev libgd2-noxpm libgd2-xpm libgd2-xpm-dev libgd-tools
Architecture: source i386
Version: 2.0.33-5.2etch2
Distribution: oldstable-security
Urgency: high
Maintainer: Jonas Smedegaard <d...@jones.dk>
Changed-By: Giuseppe Iuculano <iucul...@debian.org>
Description: 
 libgd-tools - GD command line tools and example code
 libgd2-noxpm - GD Graphics Library version 2 (without XPM support)
 libgd2-noxpm-dev - GD Graphics Library version 2 (development version)
 libgd2-xpm - GD Graphics Library version 2
 libgd2-xpm-dev - GD Graphics Library version 2 (development version)
Closes: 408982 552534
Changes: 
 libgd2 (2.0.33-5.2etch2) oldstable-security; urgency=high
 .
   * Non-maintainer upload by the Security Team.
   * Fixed CVE-2009-3546: possible buffer overflow or buffer over-read attacks
     via crafted files (Closes: #552534)
   * Fixed CVE-2007-0455: Buffer overflow in the gdImageStringFTEx function in
     gdft.c (Closes: #408982)
Files: 
 c143f788dec8bc93ba7d80532600e09c 988 libs optional libgd2_2.0.33-5.2etch2.dsc
 d2f4b2221cb0e05063f85157711638c7 301479 libs optional 
libgd2_2.0.33-5.2etch2.diff.gz
 be7a5db664baec27428b8092acd942a9 143160 graphics optional 
libgd-tools_2.0.33-5.2etch2_i386.deb
 c6374428f8f2fc3c56cca141fda12267 335496 libdevel optional 
libgd2-xpm-dev_2.0.33-5.2etch2_i386.deb
 16b228575857c08de542a1679bcde839 333956 libdevel optional 
libgd2-noxpm-dev_2.0.33-5.2etch2_i386.deb
 faa4e27f258d87a2d6716a1c7522ae96 198922 libs optional 
libgd2-xpm_2.0.33-5.2etch2_i386.deb
 70de99f091a5ca73c3a9e14735a7f715 197048 libs optional 
libgd2-noxpm_2.0.33-5.2etch2_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAkr5MsYACgkQNxpp46476aqq6wCaAl5wT78dAZwx3hpBD7SrY2pJ
IuoAnA4gD0PWKDsmW3xLehwzm9CMT+Iz
=FrTS
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to