Bug#395382: giflib3g: Vulnerable to CVE-2005-2974 and CVE-2005-3350

2006-11-03 Thread Kevin B. McCarty
Daniel Baumann wrote:
 giflib 4.x uploaded, replacing giflib 3.x.
 Due to changed binary names, the package has to go through NEW.
 
 For the impatients, the package is also available at
 http://archive.daniel-baumann.ch/debian/packages/giflib/

Hi Daniel,

Do you plan to add dpatch patches 02 and 03 from libungif4 into the
giflib v4 package?  It looks like they could be needed...

I noticed that it's non-trivial to install the libgif4 .deb at the
moment.  It conflicts with libungif4g since the latter ships symlinks of
libgif.so.4 and libgif.so.4.1.4, and just about everything using
libungif.so.4 has a versioned dependency so the Provides doesn't help.
:-(  Guess this won't be possible to fix till after Etch though.  Unless
you're planning to upload a new libungif4g package with those symlinks
removed soon?

best regards,

-- 
Kevin B. McCarty [EMAIL PROTECTED]   Physics Department
WWW: http://www.princeton.edu/~kmccarty/Princeton University
GPG: public key ID 4F83C751 Princeton, NJ 08544


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#395382: giflib3g: Vulnerable to CVE-2005-2974 and CVE-2005-3350

2006-11-03 Thread Daniel Baumann
Kevin B. McCarty wrote:
 I noticed that it's non-trivial to install the libgif4 .deb at the
 moment.  It conflicts with libungif4g since the latter ships symlinks of
 libgif.so.4 and libgif.so.4.1.4, and just about everything using
 libungif.so.4 has a versioned dependency so the Provides doesn't help.
 :-(  Guess this won't be possible to fix till after Etch though.  Unless
 you're planning to upload a new libungif4g package with those symlinks
 removed soon?

the bottleneck is NEW processing. once libgif4 is accepted, I'll adjust
both package to match optimally against each other.

-- 
Address:Daniel Baumann, Burgunderstrasse 3, CH-4562 Biberist
Email:  [EMAIL PROTECTED]
Internet:   http://people.panthera-systems.net/~daniel-baumann/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#395382: giflib3g: Vulnerable to CVE-2005-2974 and CVE-2005-3350

2006-11-02 Thread Daniel Baumann
giflib 4.x uploaded, replacing giflib 3.x.
Due to changed binary names, the package has to go through NEW.

For the impatients, the package is also available at
http://archive.daniel-baumann.ch/debian/packages/giflib/

-- 
Address:Daniel Baumann, Burgunderstrasse 3, CH-4562 Biberist
Email:  [EMAIL PROTECTED]
Internet:   http://people.panthera-systems.net/~daniel-baumann/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#395382: giflib3g: Vulnerable to CVE-2005-2974 and CVE-2005-3350

2006-10-26 Thread Kevin B. McCarty
Package: giflib3g
Version: 3.0-11
Severity: grave
Justification: user security hole

Hello,

It appears that all versions of giflib in Debian (3.0-11 in Sarge,
3.0-12 in Etch/Sid) are vulnerable to CVE-2005-2974 and CVE-2005-3350,
which were fixed for giflib and libungif in version 4.1.4 upstream.
See:

http://packages.debian.org/changelogs/pool/main/libu/libungif4/current/changelog#year2005

I will submit a diff against 3.0-12 for a proposed NMU to this bug as
soon as the BTS gives me a bug number back.

-- System Information:
Debian Release: 3.1
Architecture: i386 (i686)
Kernel: Linux 2.6.8-3-k7
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)

regards,

-- 
Kevin B. McCarty [EMAIL PROTECTED]   Physics Department
WWW: http://www.princeton.edu/~kmccarty/Princeton University
GPG: public key ID 4F83C751 Princeton, NJ 08544


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]