Your message dated Tue, 18 Jan 2005 12:47:05 -0500
with message-id <[EMAIL PROTECTED]>
and subject line Bug#290731: fixed in gpdf 2.8.2-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 16 Jan 2005 10:09:30 +0000
>From [EMAIL PROTECTED] Sun Jan 16 02:09:30 2005
Return-path: <[EMAIL PROTECTED]>
Received: from mail.o2w.nl [213.227.141.209] (postfix)
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1Cq7Le-0000PB-00; Sun, 16 Jan 2005 02:09:30 -0800
Received: from zensunni.xinara.org (node-072-048.dsl.active24.nl [217.22.72.48])
	(using TLSv1 with cipher RC4-SHA (128/128 bits))
	(Client did not present a certificate)
	by mail.o2w.nl (Postfix) with ESMTP id 841F2359D1
	for <[EMAIL PROTECTED]>; Sun, 16 Jan 2005 11:09:27 +0100 (CET)
Received: from ray by zensunni.xinara.org with local (Exim 4.34)
	id 1Cq7LQ-0000QA-6C; Sun, 16 Jan 2005 11:09:16 +0100
Date: Sun, 16 Jan 2005 11:09:16 +0100
From: "J.H.M. Dassen (Ray)" <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: CAN-2004-1125: Buffer overflow with DoS and possible artbitrary code execution vulnerability
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
X-Reportbug-Version: 3.5
Organization: Ray at home
X-System: Debian GNU/Linux 3.1, kernel 2.4.29-rc2
User-Agent: Mutt/1.5.6+20040907i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
	autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: gpdf
Version: 2.8.1-1
Severity: grave
Tags: security patch upstream fixed-upstream

The NEWS file for the new upstream release (2.8.2) says:
	* Fix potential buffer overflow in xpdf colorspace handling code.
	  (Derek Noonburg) - CAN 2004-1125

Here's that issue:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1125 :
+-----------------------------------------------------------------------------+
|Name       |CAN-2004-1125 (under review)                                     |
|-----------+-----------------------------------------------------------------|
|           |Buffer overflow in the Gfx::doImage function in Gfx.cc for xpdf  |
|           |3.00, and other products that share code such as tetex-bin and   |
|Description|kpdf in KDE 3.2.x to 3.2.3 and 3.3.x to 3.3.2, allows remote     |
|           |attackers to cause a denial of service (application crash) and   |
|           |possibly execute arbitrary code via a crafted PDF file that      |
|           |causes the boundaries of a maskColors array to be exceeded.      |
|-----------+-----------------------------------------------------------------|
|           |  * IDEFENSE:20041221 Multiple Vendor xpdf PDF Viewer Buffer     |
|           |    Overflow Vulnerability                                       |
|           |  * URL:http://http://www.idefense.com/application/poi/display?id|
|           |    =172&type=vulnerabilities                                    |
|           |  * CONFIRM:ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.00pl2.patch    |
|           |  * CONFIRM:http://www.kde.org/info/security/                    |
|           |    advisory-20041223-1.txt                                      |
|           |  * BUGTRAQ:20041228 KDE Security Advisory: kpdf Buffer Overflow |
|References |    Vulnerability                                                |
|           |  * URL:http://marc.theaimsgroup.com/?t=110378596500001&r=1&w=2  |
|           |  * FULLDISC:20041223 [USN-48-1] xpdf, tetex-bin vulnerabilities |
|           |  * URL:http://lists.netsys.com/pipermail/full-disclosure/       |
|           |    2004-December/030241.html                                    |
|           |  * BUGTRAQ:20041223 [USN-50-1] CUPS vulnerabilities             |
|           |  * URL:http://marc.theaimsgroup.com/?l=bugtraq&m=110384680309105|
|           |    &w=2                                                         |
|           |  * XF:xpdf-gfx-doimage-bo(18641)                                |
|           |  * URL:http://xforce.iss.net/xforce/xfdb/18641                  |
|-----------+-----------------------------------------------------------------|
|Phase      |Assigned (20041202)                                              |
|-----------+-----------------------------------------------------------------|
|Votes      |                                                                 |
|-----------+-----------------------------------------------------------------|
|Comments   |                                                                 |
+-----------------------------------------------------------------------------+

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (800, 'unstable'), (750, 'experimental'), (500, 'testing')
Architecture: i386 (i686)
Kernel: Linux 2.4.29-rc2
Locale: LANG=C, LC_CTYPE=en_US.ISO8859-1 (charmap=ISO-8859-1)

Versions of packages gpdf depends on:
ii  libart-2.0-2             2.3.16-6        Library of functions for 2D graphi
ii  libatk1.0-0              1.8.0-4         The ATK accessibility toolkit
ii  libbonobo2-0             2.8.0-4         Bonobo CORBA interfaces library
ii  libbonoboui2-0           2.8.0-2         The Bonobo UI library
ii  libc6                    2.3.2.ds1-20    GNU C Library: Shared libraries an
ii  libfreetype6             2.1.7-2.3       FreeType 2 font engine, shared lib
ii  libgcc1                  1:3.4.3-7       GCC support library
ii  libgconf2-4              2.8.1-4         GNOME configuration database syste
ii  libglade2-0              1:2.4.1-1       Library to load .glade files at ru
ii  libglib2.0-0             2.4.8-1         The GLib library of C routines
ii  libgnome2-0              2.8.0-6         The GNOME 2 library - runtime file
ii  libgnomecanvas2-0        2.8.0-1         A powerful object-oriented display
ii  libgnomeprint2.2-0       2.8.2-1         The GNOME 2.2 print architecture -
ii  libgnomeprintui2.2-0     2.8.2-1         The GNOME 2.2 print architecture U
ii  libgnomeui-0             2.8.0-3         The GNOME 2 libraries (User Interf
ii  libgnomevfs2-0           2.8.3-8         The GNOME virtual file-system libr
ii  libgtk2.0-0              2.4.14-2        The GTK+ graphical user interface 
ii  libice6                  4.3.0.dfsg.1-10 Inter-Client Exchange library
ii  liborbit2                1:2.10.2-1.1    libraries for ORBit2 - a CORBA ORB
ii  libpango1.0-0            1.6.0-3         Layout and rendering of internatio
ii  libpaper1                1.1.14-3        Library for handling paper charact
ii  libpopt0                 1.7-5           lib for parsing cmdline parameters
ii  libsm6                   4.3.0.dfsg.1-10 X Window System Session Management
ii  libstdc++5               1:3.3.5-6       The GNU Standard C++ Library v3
ii  libxml2                  2.6.11-5        GNOME XML library
ii  xlibs                    4.3.0.dfsg.1-10 X Keyboard Extension (XKB) configu
ii  zlib1g                   1:1.2.2-4       compression library - runtime

-- no debconf information
-- 
Obsig: developing a new sig

---------------------------------------
Received: (at 290731-close) by bugs.debian.org; 18 Jan 2005 17:53:06 +0000
>From [EMAIL PROTECTED] Tue Jan 18 09:53:06 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1CqxXO-0001hV-00; Tue, 18 Jan 2005 09:53:06 -0800
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
	id 1CqxRZ-0001hK-00; Tue, 18 Jan 2005 12:47:05 -0500
From: Filip Van Raemdonck <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#290731: fixed in gpdf 2.8.2-1
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Tue, 18 Jan 2005 12:47:05 -0500
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
	autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 
X-CrossAssassin-Score: 2

Source: gpdf
Source-Version: 2.8.2-1

We believe that the bug you reported is fixed in the latest version of
gpdf, which is due to be installed in the Debian FTP archive:

gpdf_2.8.2-1.diff.gz
  to pool/main/g/gpdf/gpdf_2.8.2-1.diff.gz
gpdf_2.8.2-1.dsc
  to pool/main/g/gpdf/gpdf_2.8.2-1.dsc
gpdf_2.8.2-1_i386.deb
  to pool/main/g/gpdf/gpdf_2.8.2-1_i386.deb
gpdf_2.8.2.orig.tar.gz
  to pool/main/g/gpdf/gpdf_2.8.2.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Filip Van Raemdonck <[EMAIL PROTECTED]> (supplier of updated gpdf package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Mon, 17 Jan 2005 19:51:28 +0100
Source: gpdf
Binary: gpdf
Architecture: source i386
Version: 2.8.2-1
Distribution: unstable
Urgency: high
Maintainer: Filip Van Raemdonck <[EMAIL PROTECTED]>
Changed-By: Filip Van Raemdonck <[EMAIL PROTECTED]>
Description: 
 gpdf       - Portable Document Format (PDF) viewer
Closes: 282241 290731 290969
Changes: 
 gpdf (2.8.2-1) unstable; urgency=high
 .
   * New upstream version. Fixed upstream:
     - CAN-2004-1125: colorspace handling buffer overflows. (Closes: #290731)
     - Bookmarks work now. (Closes: #282241, #290969)
Files: 
 2858f288d998f39e66bc9a305352fb6d 1585 text optional gpdf_2.8.2-1.dsc
 5ceb66aa95e51c4e1d6e10cb29560ff9 1245535 text optional gpdf_2.8.2.orig.tar.gz
 dba84b5d912166329d59be440dc8ec83 10064 text optional gpdf_2.8.2-1.diff.gz
 4fd60d03dc4bda0be8d387a08bd1107b 785216 text optional gpdf_2.8.2-1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)

iD8DBQFB7UnpEjn3CY6VDgARApEiAJ9aZXUKXuA3LfvK9+NYcjinRQWqhwCfX5X+
WfShxlfaxSx4Z5Wts3157mo=
=xts2
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to