Hi Hugo

I do not have any objection on marking it as no-dsa, especially since it is
that already for jessie.

However I thought I should have a check but I can not find a patch. The
patch mentioned here, gives a 404.
https://blogs.gentoo.org/ago/2016/08/29/potrace-invalid-memory-access-in-findnext-decompose-c/

Q1: What is the patch you have used?

Q2: Is the problem still there for Stretch as well?

Best regards

// Ola

On 30 March 2017 at 16:29, Hugo Lefeuvre <h...@debian.org> wrote:

> Hi,
>
> potrace is affected by CVE-2016-8685 causing invalid memory
> access and crash via crafted BMP images. This issue has already been
> fixed since January in Stretch, and I wanted to backport the patch
> for wheezy, but it turned out to be harder than excepted.
>
> In fact the patch applies well, but it doesn't solve the issue when
> potrace is built with optimization flags -O2 and above.
>
> I tried to debug it, but debugging with optimization flags >2 is not very
> handy. I also asked potrace's maintainer Bartosz Fenski, but he did not
> answer yet.
>
> Any advice about how to solve this kind of problems ?
>
> Otherwise, if nobody is against it, I'd mark the issue no-dsa (the
> issue is already no-dsa for Jessie).
>
> Cheers,
>  Hugo
>
> --
>              Hugo Lefeuvre (hle)    |    www.owl.eu.com
> 4096/ ACB7 B67F 197F 9B32 1533 431C AC90 AC3E C524 065E
>



-- 
 --- Inguza Technology AB --- MSc in Information Technology ----
/  o...@inguza.com                    Folkebogatan 26            \
|  o...@debian.org                   654 68 KARLSTAD            |
|  http://inguza.com/                Mobile: +46 (0)70-332 1551 |
\  gpg/f.p.: 7090 A92B 18FE 7994 0C36 4FE4 18A1 B1CF 0FE5 3DD9  /
 ---------------------------------------------------------------

Reply via email to