Your message dated Wed, 01 Feb 2006 02:32:12 -0800
with message-id <[EMAIL PROTECTED]>
and subject line Bug#350785: fixed in xpdf 3.01-6
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 31 Jan 2006 20:22:48 +0000
>From [EMAIL PROTECTED] Tue Jan 31 12:22:47 2006
Return-path: <[EMAIL PROTECTED]>
Received: from dsl01.83.171.166.64.nefkom.net ([83.171.166.64] 
helo=Arkelon.TRAUBE)
        by spohr.debian.org with esmtp (Exim 4.50)
        id 1F421X-00013t-9y
        for [EMAIL PROTECTED]; Tue, 31 Jan 2006 12:22:47 -0800
Received: from stefan by Arkelon.TRAUBE with local (Exim 4.60)
        (envelope-from <[EMAIL PROTECTED]>)
        id 1F421D-0005eI-RQ; Tue, 31 Jan 2006 21:22:27 +0100
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Stefan Potyra <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: xpdf: CVE-2006-0301 PDF splash handling heap overflow
Message-ID: <[EMAIL PROTECTED]>
X-Mailer: reportbug 3.18
Date: Tue, 31 Jan 2006 21:22:26 +0100
X-Debbugs-Cc: Debian Security Team <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-11.0 required=4.0 tests=BAYES_00,HAS_PACKAGE,
        X_DEBBUGS_CC autolearn=ham version=2.60-bugs.debian.org_2005_01_02

Package: xpdf-reader
Version: 3.01-5
Severity: grave
Tags: security patch
Justification: user security hole

Hi,

thanks for maintaining this package.

Just read about the security issue...

References:
CVE-2006-0301
http://www.frsirt.com/english/advisories/2006/0389
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=179046

Patch available:
https://bugzilla.redhat.com/bugzilla/attachment.cgi?id=123745

(I haven't tested, if the patch solves the issue though, but it looks
sane to me).

Cheers,
        Stefan.

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.15-14-k7
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15)

Versions of packages xpdf depends on:
ii  xpdf-common                   3.01-5     Portable Document Format (PDF) sui
ii  xpdf-reader                   3.01-5     Portable Document Format (PDF) sui
ii  xpdf-utils                    3.01-5     Portable Document Format (PDF) sui

xpdf recommends no packages.

Versions of packages xpdf-reader depends on:
ii  gsfonts               8.14+v8.11+urw-0.2 Fonts for the Ghostscript interpre
ii  lesstif2              1:0.94.4-1.1       OSF/Motif 2.1 implementation relea
ii  libc6                 2.3.5-12           GNU C Library: Shared libraries an
ii  libfreetype6          2.1.10-1           FreeType 2 font engine, shared lib
ii  libgcc1               1:4.0.2-7          GCC support library
ii  libice6               6.9.0.dfsg.1-4     Inter-Client Exchange library
ii  libpaper1             1.1.14-5           Library for handling paper charact
ii  libsm6                6.9.0.dfsg.1-4     X Window System Session Management
ii  libstdc++6            4.0.2-7            The GNU Standard C++ Library v3
ii  libt1-5               5.1.0-2            Type 1 font rasterizer library - r
ii  libx11-6              6.9.0.dfsg.1-4     X Window System protocol client li
ii  libxext6              6.9.0.dfsg.1-4     X Window System miscellaneous exte
ii  libxp6                6.9.0.dfsg.1-4     X Window System printing extension
ii  libxpm4               6.9.0.dfsg.1-4     X pixmap library
ii  libxt6                6.9.0.dfsg.1-4     X Toolkit Intrinsics
ii  xpdf-common           3.01-5             Portable Document Format (PDF) sui
ii  zlib1g                1:1.2.3-9          compression library - runtime

-- no debconf information

---------------------------------------
Received: (at 350785-close) by bugs.debian.org; 1 Feb 2006 10:40:24 +0000
>From [EMAIL PROTECTED] Wed Feb 01 02:40:24 2006
Return-path: <[EMAIL PROTECTED]>
Received: from katie by spohr.debian.org with local (Exim 4.50)
        id 1F4FHY-0007ic-QU; Wed, 01 Feb 2006 02:32:12 -0800
From: Hamish Moffatt <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.65 $
Subject: Bug#350785: fixed in xpdf 3.01-6
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Wed, 01 Feb 2006 02:32:12 -0800
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02

Source: xpdf
Source-Version: 3.01-6

We believe that the bug you reported is fixed in the latest version of
xpdf, which is due to be installed in the Debian FTP archive:

xpdf-common_3.01-6_all.deb
  to pool/main/x/xpdf/xpdf-common_3.01-6_all.deb
xpdf-reader_3.01-6_i386.deb
  to pool/main/x/xpdf/xpdf-reader_3.01-6_i386.deb
xpdf-utils_3.01-6_i386.deb
  to pool/main/x/xpdf/xpdf-utils_3.01-6_i386.deb
xpdf_3.01-6.diff.gz
  to pool/main/x/xpdf/xpdf_3.01-6.diff.gz
xpdf_3.01-6.dsc
  to pool/main/x/xpdf/xpdf_3.01-6.dsc
xpdf_3.01-6_all.deb
  to pool/main/x/xpdf/xpdf_3.01-6_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Hamish Moffatt <[EMAIL PROTECTED]> (supplier of updated xpdf package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Wed,  1 Feb 2006 22:42:42 +1300
Source: xpdf
Binary: xpdf-utils xpdf xpdf-reader xpdf-common
Architecture: source i386 all
Version: 3.01-6
Distribution: unstable
Urgency: high
Maintainer: Hamish Moffatt <[EMAIL PROTECTED]>
Changed-By: Hamish Moffatt <[EMAIL PROTECTED]>
Description: 
 xpdf       - Portable Document Format (PDF) suite
 xpdf-common - Portable Document Format (PDF) suite -- common files
 xpdf-reader - Portable Document Format (PDF) suite -- viewer for X11
 xpdf-utils - Portable Document Format (PDF) suite -- utilities
Closes: 350783 350785
Changes: 
 xpdf (3.01-6) unstable; urgency=high
 .
   * SECURITY UPDATE: fixed buffer overflow in splash image handling
     (Splash/splash.cc) using patch supplied by Red Hat:
     https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=179046
     (closes: #350785, #350783)
   * References: CVE-2006-0301
   * My first upload from the side of the road on borrowed wifi
     in a foreign country...
Files: 
 4f1e328b54761f3341951033632dbf0c 1096 text optional xpdf_3.01-6.dsc
 99c84b07a0dba4ddf757b5f5624d0f8b 31276 text optional xpdf_3.01-6.diff.gz
 0500b4aac7c4643c9027ccecc00750f8 1268 text optional xpdf_3.01-6_all.deb
 c76392b45d3938bac1d2ee071d6ad5da 60400 text optional xpdf-common_3.01-6_all.deb
 128f26ff7d538eb0d1c9acbf68ec62d0 770348 text optional 
xpdf-reader_3.01-6_i386.deb
 aa57363855941790ec8941073ae18655 1400174 text optional 
xpdf-utils_3.01-6_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iQCVAwUBQ+CJ5tiYIdPvprnVAQJOfQQAmSgPRY+DO5lSzw7IGGqeTAyakRlN+ska
1aJYVO63AcEmySwgrpbvewgct4gav8GZ4Exh3Xfojis+DPMtveDdgPZ2mEZjCGdZ
Rjeqo2BUYlWUBqfDZQ5mBbX1V35oviuvZrEEgsz2TzSFxEChdWfcJW71GUD2V4wp
1P3SIiFrO4w=
=2J4a
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to