Bug#291118: vulnerable to CAN-2005-0005, buffer overflow in PSD decoder

2005-01-18 Thread Daniel Kobras
tag 291033 - woody
tag 291033 + patch
tag 291033 - fixed
merge 291033 291118
tag 291033 + sarge
thanks

On Tue, Jan 18, 2005 at 04:24:28PM -0500, Joey Hess wrote:
> Our imagemagick package has a buffer overflow security hole, as
> described here:
> 
> http://www.idefense.com/application/poi/display?id=184&type=vulnerabilities

This is a duplicate of #291033. Sid has already been fixed earlier
today, and a woody update is being prepared. But okay, let's keep the
bugs open until the fix has migrated to sarge. I've tweaked the tags
accordingly.

Regards,

Daniel.



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Bug#291118: vulnerable to CAN-2005-0005, buffer overflow in PSD decoder

2005-01-18 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> tag 291033 - woody
Bug#291033: Multiple Vendor ImageMagick .psd Image File Decode Heap Overflow 
Vulnerability
Tags were: fixed security woody
Tags removed: woody

> tag 291033 + patch
Bug#291033: Multiple Vendor ImageMagick .psd Image File Decode Heap Overflow 
Vulnerability
Tags were: fixed security
Tags added: patch

> tag 291033 - fixed
Bug#291033: Multiple Vendor ImageMagick .psd Image File Decode Heap Overflow 
Vulnerability
Tags were: patch fixed security
Tags removed: fixed

> merge 291033 291118
Bug#291033: Multiple Vendor ImageMagick .psd Image File Decode Heap Overflow 
Vulnerability
Bug#291118: vulnerable to CAN-2005-0005, buffer overflow in PSD decoder
Merged 291033 291118.

> tag 291033 + sarge
Bug#291033: Multiple Vendor ImageMagick .psd Image File Decode Heap Overflow 
Vulnerability
Tags were: security patch
Bug#291118: vulnerable to CAN-2005-0005, buffer overflow in PSD decoder
Tags added: sarge

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#291118: vulnerable to CAN-2005-0005, buffer overflow in PSD decoder

2005-01-18 Thread Joey Hess
Package: imagemagick
Version: 6:6.0.6.2-1.6
Severity: grave
Tags: security patch

Our imagemagick package has a buffer overflow security hole, as
described here:

http://www.idefense.com/application/poi/display?id=184&type=vulnerabilities

I've attached a patch sideported from Ubuntu.

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.4.27
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)

Versions of packages imagemagick depends on:
ii  libmagick6 6:6.0.6.2-1.6 Image manipulation library

-- no debconf information

-- 
see shy jo
--- imagemagick-6.0.2.5.orig/coders/psd.c
+++ imagemagick-6.0.2.5/coders/psd.c
@@ -672,6 +672,8 @@
   }
   (void) ReadBlob(image,6,psd_info.reserved);
   psd_info.channels=ReadBlobMSBShort(image);
+  if (psd_info.channels > 24)
+ThrowReaderException(CorruptImageError,"MaximumChannelsExceeded");
   psd_info.rows=ReadBlobMSBLong(image);
   psd_info.columns=ReadBlobMSBLong(image);
   psd_info.depth=ReadBlobMSBShort(image);
@@ -853,6 +855,8 @@
 
layer_info[i].page.height=(ReadBlobMSBLong(image)-layer_info[i].page.y);
 
layer_info[i].page.width=(ReadBlobMSBLong(image)-layer_info[i].page.x);
 layer_info[i].channels=ReadBlobMSBShort(image);
+if (layer_info[i].channels > 24)
+  
ThrowReaderException(CorruptImageError,"MaximumChannelsExceeded");
   if (image->debug != MagickFalse)
 (void) LogMagickEvent(CoderEvent,GetMagickModule(),"
offset(%ld,%ld), size(%ld,%ld), channels=%d",
   layer_info[i].page.x, layer_info[i].page.y,


signature.asc
Description: Digital signature