Your message dated Sat, 17 Feb 2007 12:09:59 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#402063: fixed in evince 0.1.5-2sarge1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: evince
Version: 0.4.0-2
Severity: critical
Tags: security, patch

This is the same vulnerability as reported against gv as bug 398292, 
since evince has old gv code embedded (I've updated the wiki to reflect 
this: http://wiki.debian.org/EmbeddedCodeCopies)

Patch attached (applies to both 0.4.0 and 0.6.1).

-- 
Kees Cook                                            @outflux.net
diff -Nur evince-0.4.0/ps/ps.c evince-0.4.0.new/ps/ps.c
--- evince-0.4.0/ps/ps.c        2005-06-17 06:33:00.000000000 -0700
+++ evince-0.4.0.new/ps/ps.c    2006-12-04 12:28:32.280683848 -0800
@@ -1225,6 +1225,9 @@
     quoted = 1;
     line++;
     while(*line && !(*line == ')' && level == 0)) {
+      if (cp - text >= PSLINELENGTH - 2) {
+        return NULL;
+      }
       if(*line == '\\') {
         if(*(line + 1) == 'n') {
           *cp++ = '\n';
@@ -1295,8 +1298,12 @@
     }
   }
   else {
-    while(*line && !(*line == ' ' || *line == '\t' || *line == '\n'))
+    while(*line && !(*line == ' ' || *line == '\t' || *line == '\n')) {
+      if (cp - text >= PSLINELENGTH - 2) {
+        return NULL;
+      }
       *cp++ = *line++;
+    }
   }
   *cp = '\0';
   if(next_char)

--- End Message ---
--- Begin Message ---
Source: evince
Source-Version: 0.1.5-2sarge1

We believe that the bug you reported is fixed in the latest version of
evince, which is due to be installed in the Debian FTP archive:

evince_0.1.5-2sarge1.diff.gz
  to pool/main/e/evince/evince_0.1.5-2sarge1.diff.gz
evince_0.1.5-2sarge1.dsc
  to pool/main/e/evince/evince_0.1.5-2sarge1.dsc
evince_0.1.5-2sarge1_i386.deb
  to pool/main/e/evince/evince_0.1.5-2sarge1_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Loic Minier <[EMAIL PROTECTED]> (supplier of updated evince package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Fri,  8 Dec 2006 10:05:51 +0100
Source: evince
Binary: evince
Architecture: source i386
Version: 0.1.5-2sarge1
Distribution: stable-security
Urgency: high
Maintainer: Sebastien Bacher <[EMAIL PROTECTED]>
Changed-By: Loic Minier <[EMAIL PROTECTED]>
Description: 
 evince     - Document (postscript, pdf) viewer
Closes: 402063
Changes: 
 evince (0.1.5-2sarge1) stable-security; urgency=high
 .
   * SECURITY: new patch, 10_CVE-2006-5864.patch, fixes a buffer overflow in
     the PostScript processor; thanks Kees Cook; CVE-2006-5864;
     closes: #402063.
Files: 
 82308e07e1d4ff19d5c20bfa08a2ca4d 1627 gnome optional evince_0.1.5-2sarge1.dsc
 cc698ae555493976c43275894e235aa3 1005696 gnome optional 
evince_0.1.5.orig.tar.gz
 31a28bde68dcb7d3e251f9dc1b9f88ab 35845 gnome optional 
evince_0.1.5-2sarge1.diff.gz
 701bf1d4c90d3df689b473c5ee49a2c6 547712 gnome optional 
evince_0.1.5-2sarge1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFFjvtbXm3vHE4uyloRAsVhAJ9KKMJnPWgeJ0Xl5vWKFzsRWb2mWQCfb6R4
Zc9dZwoDSofArx7oTzlKW80=
=CwN/
-----END PGP SIGNATURE-----


--- End Message ---

Reply via email to