Bug#402063: marked as done (vulnerable to overflow in PS handling (CVE-2006-5864))
Your message dated Sun, 25 Mar 2007 20:52:41 +0200 with message-id [EMAIL PROTECTED] and subject line Closing for experimental version has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: evince Version: 0.4.0-2 Severity: critical Tags: security, patch This is the same vulnerability as reported against gv as bug 398292, since evince has old gv code embedded (I've updated the wiki to reflect this: http://wiki.debian.org/EmbeddedCodeCopies) Patch attached (applies to both 0.4.0 and 0.6.1). -- Kees Cook@outflux.net diff -Nur evince-0.4.0/ps/ps.c evince-0.4.0.new/ps/ps.c --- evince-0.4.0/ps/ps.c2005-06-17 06:33:00.0 -0700 +++ evince-0.4.0.new/ps/ps.c2006-12-04 12:28:32.280683848 -0800 @@ -1225,6 +1225,9 @@ quoted = 1; line++; while(*line !(*line == ')' level == 0)) { + if (cp - text = PSLINELENGTH - 2) { +return NULL; + } if(*line == '\\') { if(*(line + 1) == 'n') { *cp++ = '\n'; @@ -1295,8 +1298,12 @@ } } else { -while(*line !(*line == ' ' || *line == '\t' || *line == '\n')) +while(*line !(*line == ' ' || *line == '\t' || *line == '\n')) { + if (cp - text = PSLINELENGTH - 2) { +return NULL; + } *cp++ = *line++; +} } *cp = '\0'; if(next_char) ---End Message--- ---BeginMessage--- Version: 0.8.0-1 Package: evince Heya, This bug wasn't yet marked as closed for the version in experimental, but is in fact fixed. Marc -- BOFH #406: Bad cafeteria food landed all the sysadmins in the hospital. ---End Message---
Bug#402063: marked as done (vulnerable to overflow in PS handling (CVE-2006-5864))
Your message dated Sat, 17 Feb 2007 12:09:59 + with message-id [EMAIL PROTECTED] and subject line Bug#402063: fixed in evince 0.1.5-2sarge1 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: evince Version: 0.4.0-2 Severity: critical Tags: security, patch This is the same vulnerability as reported against gv as bug 398292, since evince has old gv code embedded (I've updated the wiki to reflect this: http://wiki.debian.org/EmbeddedCodeCopies) Patch attached (applies to both 0.4.0 and 0.6.1). -- Kees Cook@outflux.net diff -Nur evince-0.4.0/ps/ps.c evince-0.4.0.new/ps/ps.c --- evince-0.4.0/ps/ps.c2005-06-17 06:33:00.0 -0700 +++ evince-0.4.0.new/ps/ps.c2006-12-04 12:28:32.280683848 -0800 @@ -1225,6 +1225,9 @@ quoted = 1; line++; while(*line !(*line == ')' level == 0)) { + if (cp - text = PSLINELENGTH - 2) { +return NULL; + } if(*line == '\\') { if(*(line + 1) == 'n') { *cp++ = '\n'; @@ -1295,8 +1298,12 @@ } } else { -while(*line !(*line == ' ' || *line == '\t' || *line == '\n')) +while(*line !(*line == ' ' || *line == '\t' || *line == '\n')) { + if (cp - text = PSLINELENGTH - 2) { +return NULL; + } *cp++ = *line++; +} } *cp = '\0'; if(next_char) ---End Message--- ---BeginMessage--- Source: evince Source-Version: 0.1.5-2sarge1 We believe that the bug you reported is fixed in the latest version of evince, which is due to be installed in the Debian FTP archive: evince_0.1.5-2sarge1.diff.gz to pool/main/e/evince/evince_0.1.5-2sarge1.diff.gz evince_0.1.5-2sarge1.dsc to pool/main/e/evince/evince_0.1.5-2sarge1.dsc evince_0.1.5-2sarge1_i386.deb to pool/main/e/evince/evince_0.1.5-2sarge1_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Loic Minier [EMAIL PROTECTED] (supplier of updated evince package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Fri, 8 Dec 2006 10:05:51 +0100 Source: evince Binary: evince Architecture: source i386 Version: 0.1.5-2sarge1 Distribution: stable-security Urgency: high Maintainer: Sebastien Bacher [EMAIL PROTECTED] Changed-By: Loic Minier [EMAIL PROTECTED] Description: evince - Document (postscript, pdf) viewer Closes: 402063 Changes: evince (0.1.5-2sarge1) stable-security; urgency=high . * SECURITY: new patch, 10_CVE-2006-5864.patch, fixes a buffer overflow in the PostScript processor; thanks Kees Cook; CVE-2006-5864; closes: #402063. Files: 82308e07e1d4ff19d5c20bfa08a2ca4d 1627 gnome optional evince_0.1.5-2sarge1.dsc cc698ae555493976c43275894e235aa3 1005696 gnome optional evince_0.1.5.orig.tar.gz 31a28bde68dcb7d3e251f9dc1b9f88ab 35845 gnome optional evince_0.1.5-2sarge1.diff.gz 701bf1d4c90d3df689b473c5ee49a2c6 547712 gnome optional evince_0.1.5-2sarge1_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.1 (GNU/Linux) iD8DBQFFjvtbXm3vHE4uyloRAsVhAJ9KKMJnPWgeJ0Xl5vWKFzsRWb2mWQCfb6R4 Zc9dZwoDSofArx7oTzlKW80= =CwN/ -END PGP SIGNATURE- ---End Message---
Bug#402063: marked as done (vulnerable to overflow in PS handling (CVE-2006-5864))
Your message dated Thu, 07 Dec 2006 21:32:03 + with message-id [EMAIL PROTECTED] and subject line Bug#402063: fixed in evince 0.4.0-3 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) ---BeginMessage--- Package: evince Version: 0.4.0-2 Severity: critical Tags: security, patch This is the same vulnerability as reported against gv as bug 398292, since evince has old gv code embedded (I've updated the wiki to reflect this: http://wiki.debian.org/EmbeddedCodeCopies) Patch attached (applies to both 0.4.0 and 0.6.1). -- Kees Cook@outflux.net diff -Nur evince-0.4.0/ps/ps.c evince-0.4.0.new/ps/ps.c --- evince-0.4.0/ps/ps.c2005-06-17 06:33:00.0 -0700 +++ evince-0.4.0.new/ps/ps.c2006-12-04 12:28:32.280683848 -0800 @@ -1225,6 +1225,9 @@ quoted = 1; line++; while(*line !(*line == ')' level == 0)) { + if (cp - text = PSLINELENGTH - 2) { +return NULL; + } if(*line == '\\') { if(*(line + 1) == 'n') { *cp++ = '\n'; @@ -1295,8 +1298,12 @@ } } else { -while(*line !(*line == ' ' || *line == '\t' || *line == '\n')) +while(*line !(*line == ' ' || *line == '\t' || *line == '\n')) { + if (cp - text = PSLINELENGTH - 2) { +return NULL; + } *cp++ = *line++; +} } *cp = '\0'; if(next_char) ---End Message--- ---BeginMessage--- Source: evince Source-Version: 0.4.0-3 We believe that the bug you reported is fixed in the latest version of evince, which is due to be installed in the Debian FTP archive: evince_0.4.0-3.diff.gz to pool/main/e/evince/evince_0.4.0-3.diff.gz evince_0.4.0-3.dsc to pool/main/e/evince/evince_0.4.0-3.dsc evince_0.4.0-3_i386.deb to pool/main/e/evince/evince_0.4.0-3_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Loic Minier [EMAIL PROTECTED] (supplier of updated evince package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Thu, 7 Dec 2006 22:09:17 +0100 Source: evince Binary: evince Architecture: source i386 Version: 0.4.0-3 Distribution: unstable Urgency: high Maintainer: Sebastien Bacher [EMAIL PROTECTED] Changed-By: Loic Minier [EMAIL PROTECTED] Description: evince - Document (postscript, pdf) viewer Closes: 402063 Changes: evince (0.4.0-3) unstable; urgency=high . * SECURITY: new patch, 10_CVE-2006-5864.patch, fixes a buffer overflow in the PostScript processor; thanks Kees Cook; CVE-2006-5864; closes: #402063. Files: 130c97c29e463898fc248dd3fd47bea0 1631 gnome optional evince_0.4.0-3.dsc 1bd996db4037b6f158b397535f180a58 4745 gnome optional evince_0.4.0-3.diff.gz aef4ca7cb493d5c1d55063f939e29530 814298 gnome optional evince_0.4.0-3_i386.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.5 (GNU/Linux) iD8DBQFFeISQ4VUX8isJIMARAqe6AJ9t1CvGnDxMw0eWO58XMJxf5QkmbQCeKkxr BgrkSDiCBbwFOVkjpwL8z0A= =jyAI -END PGP SIGNATURE- ---End Message---