Bug#402063: marked as done (vulnerable to overflow in PS handling (CVE-2006-5864))

2007-03-25 Thread Debian Bug Tracking System
Your message dated Sun, 25 Mar 2007 20:52:41 +0200
with message-id [EMAIL PROTECTED]
and subject line Closing for experimental version
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: evince
Version: 0.4.0-2
Severity: critical
Tags: security, patch

This is the same vulnerability as reported against gv as bug 398292, 
since evince has old gv code embedded (I've updated the wiki to reflect 
this: http://wiki.debian.org/EmbeddedCodeCopies)

Patch attached (applies to both 0.4.0 and 0.6.1).

-- 
Kees Cook@outflux.net
diff -Nur evince-0.4.0/ps/ps.c evince-0.4.0.new/ps/ps.c
--- evince-0.4.0/ps/ps.c2005-06-17 06:33:00.0 -0700
+++ evince-0.4.0.new/ps/ps.c2006-12-04 12:28:32.280683848 -0800
@@ -1225,6 +1225,9 @@
 quoted = 1;
 line++;
 while(*line  !(*line == ')'  level == 0)) {
+  if (cp - text = PSLINELENGTH - 2) {
+return NULL;
+  }
   if(*line == '\\') {
 if(*(line + 1) == 'n') {
   *cp++ = '\n';
@@ -1295,8 +1298,12 @@
 }
   }
   else {
-while(*line  !(*line == ' ' || *line == '\t' || *line == '\n'))
+while(*line  !(*line == ' ' || *line == '\t' || *line == '\n')) {
+  if (cp - text = PSLINELENGTH - 2) {
+return NULL;
+  }
   *cp++ = *line++;
+}
   }
   *cp = '\0';
   if(next_char)
---End Message---
---BeginMessage---
Version: 0.8.0-1
Package: evince

Heya,

This bug wasn't yet marked as closed for the version in experimental,
but is in fact fixed.

Marc
-- 
BOFH #406:
Bad cafeteria food landed all the sysadmins in the hospital.
---End Message---


Bug#402063: marked as done (vulnerable to overflow in PS handling (CVE-2006-5864))

2007-02-17 Thread Debian Bug Tracking System
Your message dated Sat, 17 Feb 2007 12:09:59 +
with message-id [EMAIL PROTECTED]
and subject line Bug#402063: fixed in evince 0.1.5-2sarge1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: evince
Version: 0.4.0-2
Severity: critical
Tags: security, patch

This is the same vulnerability as reported against gv as bug 398292, 
since evince has old gv code embedded (I've updated the wiki to reflect 
this: http://wiki.debian.org/EmbeddedCodeCopies)

Patch attached (applies to both 0.4.0 and 0.6.1).

-- 
Kees Cook@outflux.net
diff -Nur evince-0.4.0/ps/ps.c evince-0.4.0.new/ps/ps.c
--- evince-0.4.0/ps/ps.c2005-06-17 06:33:00.0 -0700
+++ evince-0.4.0.new/ps/ps.c2006-12-04 12:28:32.280683848 -0800
@@ -1225,6 +1225,9 @@
 quoted = 1;
 line++;
 while(*line  !(*line == ')'  level == 0)) {
+  if (cp - text = PSLINELENGTH - 2) {
+return NULL;
+  }
   if(*line == '\\') {
 if(*(line + 1) == 'n') {
   *cp++ = '\n';
@@ -1295,8 +1298,12 @@
 }
   }
   else {
-while(*line  !(*line == ' ' || *line == '\t' || *line == '\n'))
+while(*line  !(*line == ' ' || *line == '\t' || *line == '\n')) {
+  if (cp - text = PSLINELENGTH - 2) {
+return NULL;
+  }
   *cp++ = *line++;
+}
   }
   *cp = '\0';
   if(next_char)
---End Message---
---BeginMessage---
Source: evince
Source-Version: 0.1.5-2sarge1

We believe that the bug you reported is fixed in the latest version of
evince, which is due to be installed in the Debian FTP archive:

evince_0.1.5-2sarge1.diff.gz
  to pool/main/e/evince/evince_0.1.5-2sarge1.diff.gz
evince_0.1.5-2sarge1.dsc
  to pool/main/e/evince/evince_0.1.5-2sarge1.dsc
evince_0.1.5-2sarge1_i386.deb
  to pool/main/e/evince/evince_0.1.5-2sarge1_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Loic Minier [EMAIL PROTECTED] (supplier of updated evince package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Fri,  8 Dec 2006 10:05:51 +0100
Source: evince
Binary: evince
Architecture: source i386
Version: 0.1.5-2sarge1
Distribution: stable-security
Urgency: high
Maintainer: Sebastien Bacher [EMAIL PROTECTED]
Changed-By: Loic Minier [EMAIL PROTECTED]
Description: 
 evince - Document (postscript, pdf) viewer
Closes: 402063
Changes: 
 evince (0.1.5-2sarge1) stable-security; urgency=high
 .
   * SECURITY: new patch, 10_CVE-2006-5864.patch, fixes a buffer overflow in
 the PostScript processor; thanks Kees Cook; CVE-2006-5864;
 closes: #402063.
Files: 
 82308e07e1d4ff19d5c20bfa08a2ca4d 1627 gnome optional evince_0.1.5-2sarge1.dsc
 cc698ae555493976c43275894e235aa3 1005696 gnome optional 
evince_0.1.5.orig.tar.gz
 31a28bde68dcb7d3e251f9dc1b9f88ab 35845 gnome optional 
evince_0.1.5-2sarge1.diff.gz
 701bf1d4c90d3df689b473c5ee49a2c6 547712 gnome optional 
evince_0.1.5-2sarge1_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFFjvtbXm3vHE4uyloRAsVhAJ9KKMJnPWgeJ0Xl5vWKFzsRWb2mWQCfb6R4
Zc9dZwoDSofArx7oTzlKW80=
=CwN/
-END PGP SIGNATURE-

---End Message---


Bug#402063: marked as done (vulnerable to overflow in PS handling (CVE-2006-5864))

2006-12-07 Thread Debian Bug Tracking System
Your message dated Thu, 07 Dec 2006 21:32:03 +
with message-id [EMAIL PROTECTED]
and subject line Bug#402063: fixed in evince 0.4.0-3
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---BeginMessage---
Package: evince
Version: 0.4.0-2
Severity: critical
Tags: security, patch

This is the same vulnerability as reported against gv as bug 398292, 
since evince has old gv code embedded (I've updated the wiki to reflect 
this: http://wiki.debian.org/EmbeddedCodeCopies)

Patch attached (applies to both 0.4.0 and 0.6.1).

-- 
Kees Cook@outflux.net
diff -Nur evince-0.4.0/ps/ps.c evince-0.4.0.new/ps/ps.c
--- evince-0.4.0/ps/ps.c2005-06-17 06:33:00.0 -0700
+++ evince-0.4.0.new/ps/ps.c2006-12-04 12:28:32.280683848 -0800
@@ -1225,6 +1225,9 @@
 quoted = 1;
 line++;
 while(*line  !(*line == ')'  level == 0)) {
+  if (cp - text = PSLINELENGTH - 2) {
+return NULL;
+  }
   if(*line == '\\') {
 if(*(line + 1) == 'n') {
   *cp++ = '\n';
@@ -1295,8 +1298,12 @@
 }
   }
   else {
-while(*line  !(*line == ' ' || *line == '\t' || *line == '\n'))
+while(*line  !(*line == ' ' || *line == '\t' || *line == '\n')) {
+  if (cp - text = PSLINELENGTH - 2) {
+return NULL;
+  }
   *cp++ = *line++;
+}
   }
   *cp = '\0';
   if(next_char)
---End Message---
---BeginMessage---
Source: evince
Source-Version: 0.4.0-3

We believe that the bug you reported is fixed in the latest version of
evince, which is due to be installed in the Debian FTP archive:

evince_0.4.0-3.diff.gz
  to pool/main/e/evince/evince_0.4.0-3.diff.gz
evince_0.4.0-3.dsc
  to pool/main/e/evince/evince_0.4.0-3.dsc
evince_0.4.0-3_i386.deb
  to pool/main/e/evince/evince_0.4.0-3_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Loic Minier [EMAIL PROTECTED] (supplier of updated evince package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu,  7 Dec 2006 22:09:17 +0100
Source: evince
Binary: evince
Architecture: source i386
Version: 0.4.0-3
Distribution: unstable
Urgency: high
Maintainer: Sebastien Bacher [EMAIL PROTECTED]
Changed-By: Loic Minier [EMAIL PROTECTED]
Description: 
 evince - Document (postscript, pdf) viewer
Closes: 402063
Changes: 
 evince (0.4.0-3) unstable; urgency=high
 .
   * SECURITY: new patch, 10_CVE-2006-5864.patch, fixes a buffer overflow in
 the PostScript processor; thanks Kees Cook; CVE-2006-5864;
 closes: #402063.
Files: 
 130c97c29e463898fc248dd3fd47bea0 1631 gnome optional evince_0.4.0-3.dsc
 1bd996db4037b6f158b397535f180a58 4745 gnome optional evince_0.4.0-3.diff.gz
 aef4ca7cb493d5c1d55063f939e29530 814298 gnome optional evince_0.4.0-3_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFFeISQ4VUX8isJIMARAqe6AJ9t1CvGnDxMw0eWO58XMJxf5QkmbQCeKkxr
BgrkSDiCBbwFOVkjpwL8z0A=
=jyAI
-END PGP SIGNATURE-

---End Message---