Your message dated Fri, 17 Aug 2018 17:05:09 +0000
with message-id <[email protected]>
and subject line Bug#865505: fixed in php-horde-image 2.3.6-1+deb9u1
has caused the Debian Bug report #865505,
regarding php-horde-image: CVE-2017-9774: RCE via crafted GET request for 
authenticated users
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
865505: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=865505
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: php-horde-image
Version: 2.1.0-4
Severity: grave
Tags: upstream security

Hi,

the following vulnerability was published for php-horde-image.

CVE-2017-9774[0]:
| Remote Code Execution was found in Horde_Image 2.x before 2.5.0 via a
| crafted GET request. Exploitation requires authentication.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-9774
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9774

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: php-horde-image
Source-Version: 2.3.6-1+deb9u1

We believe that the bug you reported is fixed in the latest version of
php-horde-image, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Chris Lamb <[email protected]> (supplier of updated php-horde-image package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Sat, 23 Jun 2018 11:09:57 +0100
Source: php-horde-image
Binary: php-horde-image
Architecture: source all
Version: 2.3.6-1+deb9u1
Distribution: stretch-security
Urgency: high
Maintainer: Horde Maintainers <[email protected]>
Changed-By: Chris Lamb <[email protected]>
Description:
 php-horde-image - ${phppear:summary}
Closes: 865504 865505 876400
Changes:
 php-horde-image (2.3.6-1+deb9u1) stretch-security; urgency=high
 .
   * CVE-2017-9773: Prevent a denial of service attack by ensuring an infinite
     loop cannot be triggered by a malicious request. (Closes: #865504)
   * CVE-2017-9774: Prevent a remote code execution vulnerability (RCE) that was
     exploitable by a logged-in user sending a maliciously crafted HTTP GET
     request to the image backends. Note that the fix applied upstream has a
     regression in that it ignores the "force aspect ratio" option; see
     <https://github.com/horde/Image/pull/1>. This has been remedied in this
     fix. (Closes: #865505)
   * CVE-2017-14650: Prevent another RCE that was exploitable by a logged-in
     user sending a maliciously crafted GET request specifically to the "im"
     image backend. (Closes: #876400)
Checksums-Sha1:
 47d78aaa68d3afd9fc0deb5c4c12419d1eeec577 2112 
php-horde-image_2.3.6-1+deb9u1.dsc
 3c2e1237dc532c1e40cf46d7bc59cd75d5794a3f 769650 
php-horde-image_2.3.6.orig.tar.gz
 7f35c6186f0e8c24c87374427c06cd9a74c56631 4816 
php-horde-image_2.3.6-1+deb9u1.debian.tar.xz
 967e0e206efe2b61cea3064fd29306405567fa26 165020 
php-horde-image_2.3.6-1+deb9u1_all.deb
 95df2167f336e96b8218cb2f132ab205d9044116 6343 
php-horde-image_2.3.6-1+deb9u1_amd64.buildinfo
Checksums-Sha256:
 fedd93b4e0580e98abc1fa9343d06c8dc29c7a8b93e8478b17424b3d9047196b 2112 
php-horde-image_2.3.6-1+deb9u1.dsc
 d5c8953df1a7d4bef9fa65e33f4e6945c554eaa261a4233fab08593de5f82b60 769650 
php-horde-image_2.3.6.orig.tar.gz
 a5eba44a63a43b178a1df042e9e6e27fa5d0ddbfbd7599a4adae1ddeaf40ce57 4816 
php-horde-image_2.3.6-1+deb9u1.debian.tar.xz
 da869c96cd620231c697a9b02584efea9f01a37d134fc8e2309978a1b8fc256d 165020 
php-horde-image_2.3.6-1+deb9u1_all.deb
 07c7575bc25b2779acfb624828bc59081a88dbd011bf49f555e6797600343c30 6343 
php-horde-image_2.3.6-1+deb9u1_amd64.buildinfo
Files:
 38e2ebfcc1c58e581c31a81e6a5dcb17 2112 php extra 
php-horde-image_2.3.6-1+deb9u1.dsc
 3314aa612d97ee9c92ec47652601bba0 769650 php extra 
php-horde-image_2.3.6.orig.tar.gz
 ab94d6f57be315863bd3a9ee8944e290 4816 php extra 
php-horde-image_2.3.6-1+deb9u1.debian.tar.xz
 ac03f6dd0d26d05d93c12831bf95aece 165020 php extra 
php-horde-image_2.3.6-1+deb9u1_all.deb
 e4b9f653e06e706d60e8b86749900a55 6343 php extra 
php-horde-image_2.3.6-1+deb9u1_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCAAdFiEEwv5L0nHBObhsUz5GHpU+J9QxHlgFAlt1lf4ACgkQHpU+J9Qx
HlgYwQ//RKHjOa0CY6A7pdzjrOheIAfx6+SB+N1AHPh2BV8v9tnZFrmTBzNk7G6A
5xXBhDdQT0pSQpB3hWteFF7zmZvGGrnXcgJQI0mjWAasNyqHO+XE4w2LkN8KLZA5
NLoZx1pWhHiUgUryMv4l6ivpbAK1aeFYB8/KFuhD11/1FeXsFkRl/ctV0yY1is78
4mybxkT1jWXBEdTLOoyFwu8dMXlgtKSZS6cR4JoBVJcAOxTwkFqC6moNnkEg7V4f
xKhygvVfWbZN+Xwf4tEJ/GkkUvmffiACSX2jdG6vEb1aaCLJMooS8dundLwer9O/
6ocpBGrT/VkAGehpCKSC0cic9k8byyuQD2XvkHEfD7Jue76CZDOGnECbUK90aVkB
7SqQbGPcmGg8ZAW8lVsj+iWp2y35OjSB/z426D74AgsenMIG6qKZ7mtjgN6ub04A
iZrsrIw6VvCq4uxDaSW2MlKSCaVdcbs1OwWNk18hysZ7VAInXcNop0npxNlbuvDW
lPHv9KvCFHKMKD8a4SgrxNiRBs713cv2V5WwAYH87O2hvoRwA7f9GMjtfaRqMpne
l7kKrM/gj39//T9cbWNzAoKjDyXG9MzRHN8SpzaFIltFGuZVvs+gSvNLrqL/m6ny
haecT1LVZxsMVafMIFg8VIY1iFzoP7NPGNxMeJPJwFS0RjOprHk=
=8w3R
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to