Hi,
* Daniel Kobras <[EMAIL PROTECTED]> [2007-09-30 13:28]:
> On Sun, Sep 30, 2007 at 01:54:12AM +0200, Nico Golde wrote:
> > I intend to NMU this bug on behalf of the testing security 
> > team.
> 
> Next time, please leave the maintainers more than 12 hours to respond
> when you NMU for a bug that's open for less than three days. It also
> helps to drop the maintainers a note before you start doing some work to
> avoid duplication.

Alright.

> > I ported the patches to 6.2.4.5. The attached patch fixes 
> > the 4 CVE ids.
> 
> Yes, and it break the package on 64bit archs

Why?

> , and introduces a new security hole in the DCM coders.

Ah I see, do you mean this one?
-        AcquireMagickMemory((size_t) (max_value+1)*sizeof(*scale));
+      scale=(Quantum *) AcquireQuantumMemory(length,sizeof(*scale));

> Nico, I appreciate your intent to help
> with these bugs, but please don't blindly apply some random, unchecked
> patches and call it a security upload.

They weren't unchecked, I checked them (well I can make 
failures too ;). Since they don't apply with imagemagick 
sources in Debian there were also no blind applying here.

> I'll fixup this mess with a
> maintainer upload later on. It's currently test-building.

Sorry for everything I broke, if you tell me what I exactly 
break I also can fix this. The reason for doing this NMU 
fairly fast is that there was no reaction in the BTS so I 
thought there is noone working on this.
Any help I can give, please let me know and sorry again...

Kind regards
Nico
-- 
Nico Golde - http://ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpZDNndCTAJ1.pgp
Description: PGP signature

Reply via email to