Your message dated Wed, 05 Nov 2008 10:02:04 +0000 with message-id <[EMAIL PROTECTED]> and subject line Bug#504429: fixed in kadu 0.6.0.2-3 has caused the Debian Bug report #504429, regarding kadu: CVE-2008-4776 remote DoS to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 504429: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504429 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems
--- Begin Message ---Package: kadu Severity: grave Tags: security patch Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for kadu. CVE-2008-4776[0]: | libgadu before 1.8.2 allows remote servers to cause a denial of | service (crash) via a contact description with a large length, which | triggers a buffer over-read. You seem to embeed libgadu and thus suffer from the same problem. The patch for gadu which applies to the sources is attached. If you fix the vulnerability please also make sure to include the CVE id in your changelog entry. For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4776 http://security-tracker.debian.net/tracker/CVE-2008-4776 -- Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted.diff -pruN libgadu-1.8.1/src/events.c libgadu-1.8.2/src/events.c --- libgadu-1.8.1/src/events.c 2008-06-17 22:29:54.000000000 +0200 +++ libgadu-1.8.2/src/events.c 2008-10-24 00:24:04.000000000 +0200 @@ -1,4 +1,4 @@ -/* $Id: events.c 610 2008-05-31 22:18:03Z wojtekka $ */ +/* $Id: events.c 639 2008-10-23 22:24:01Z wojtekka $ */ /* * (C) Copyright 2001-2006 Wojtek Kaniewski <[EMAIL PROTECTED]> @@ -621,7 +621,7 @@ static int gg_watch_fd_connected(struct if (GG_S_D(n->status)) { unsigned char descr_len = *((char*) n + sizeof(struct gg_notify_reply77)); - if (descr_len < length) { + if (sizeof(struct gg_notify_reply77) + descr_len <= length) { if (!(e->event.notify60[i].descr = malloc(descr_len + 1))) { gg_debug_session(sess, GG_DEBUG_MISC, "// gg_watch_fd_connected() not enough memory for notify data\n"); goto fail; @@ -744,7 +744,7 @@ static int gg_watch_fd_connected(struct if (GG_S_D(n->status)) { unsigned char descr_len = *((char*) n + sizeof(struct gg_notify_reply60)); - if (descr_len < length) { + if (sizeof(struct gg_notify_reply60) + descr_len <= length) { if (!(e->event.notify60[i].descr = malloc(descr_len + 1))) { gg_debug_session(sess, GG_DEBUG_MISC, "// gg_watch_fd_connected() not enough memory for notify data\n"); goto fail;pgp6vU4rwEbPz.pgp
Description: PGP signature
--- End Message ---
--- Begin Message ---Source: kadu Source-Version: 0.6.0.2-3 We believe that the bug you reported is fixed in the latest version of kadu, which is due to be installed in the Debian FTP archive: kadu-common_0.6.0.2-3_all.deb to pool/main/k/kadu/kadu-common_0.6.0.2-3_all.deb kadu-dev_0.6.0.2-3_all.deb to pool/main/k/kadu/kadu-dev_0.6.0.2-3_all.deb kadu-external-modules_0.6.0.2-3_amd64.deb to pool/main/k/kadu/kadu-external-modules_0.6.0.2-3_amd64.deb kadu-gtk-modules_0.6.0.2-3_amd64.deb to pool/main/k/kadu/kadu-gtk-modules_0.6.0.2-3_amd64.deb kadu-kde-modules_0.6.0.2-3_amd64.deb to pool/main/k/kadu/kadu-kde-modules_0.6.0.2-3_amd64.deb kadu-themes_0.6.0.2-3_all.deb to pool/main/k/kadu/kadu-themes_0.6.0.2-3_all.deb kadu_0.6.0.2-3.diff.gz to pool/main/k/kadu/kadu_0.6.0.2-3.diff.gz kadu_0.6.0.2-3.dsc to pool/main/k/kadu/kadu_0.6.0.2-3.dsc kadu_0.6.0.2-3_amd64.deb to pool/main/k/kadu/kadu_0.6.0.2-3_amd64.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Patryk Cisek <[EMAIL PROTECTED]> (supplier of updated kadu package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.8 Date: Tue, 04 Nov 2008 15:37:05 +0100 Source: kadu Binary: kadu kadu-common kadu-dev kadu-external-modules kadu-gtk-modules kadu-kde-modules kadu-themes Architecture: source all amd64 Version: 0.6.0.2-3 Distribution: unstable Urgency: high Maintainer: Patryk Cisek <[EMAIL PROTECTED]> Changed-By: Patryk Cisek <[EMAIL PROTECTED]> Description: kadu - Gadu-Gadu client for X11 kadu-common - Gadu-Gadu client for X11 kadu-dev - Development files for Kadu kadu-external-modules - Additional modules for Kadu kadu-gtk-modules - Additional modules for Kadu kadu-kde-modules - Modules dependent on kdelibs kadu-themes - Additional icons and emoticons for Kadu Closes: 504429 504430 Changes: kadu (0.6.0.2-3) unstable; urgency=high . * Now Kadu is linked against libgadu provided by libgadu3 package, instead of the one shipped in Kadu's tarball. This fixes CVE-2008-4776 (Closes: #504429, #504430) Checksums-Sha1: 05dff9e9dc4344032b21dbd1f30b43ec6228d807 1308 kadu_0.6.0.2-3.dsc bef67e4fbb762532b3f5157f98c160bc40a825cd 18531 kadu_0.6.0.2-3.diff.gz e006e65ae55fd9d992163b174549a3dd50878490 756290 kadu-common_0.6.0.2-3_all.deb 5e978e40e39a88efa9d40772274d267f2a21d2ac 213428 kadu-dev_0.6.0.2-3_all.deb 49326daf6293e8d2c1df239f96ddc784a19746a8 1302352 kadu-themes_0.6.0.2-3_all.deb ffffadc1b45f1bfb20ed0793ad663f2dd9611684 1461240 kadu_0.6.0.2-3_amd64.deb ab66b06db2e50b78f05b65f5b6efbf818088b988 1387640 kadu-external-modules_0.6.0.2-3_amd64.deb 007849d7c3994b9dad1544a2950df112c93e4e65 120798 kadu-gtk-modules_0.6.0.2-3_amd64.deb 040e4beed30b8cc2a4376bb1461fbf90e3c639de 119272 kadu-kde-modules_0.6.0.2-3_amd64.deb Checksums-Sha256: 7fc21d1624cdfc041ec82ad59b5cd8831be17e8da85a27348be917ac0fc115e3 1308 kadu_0.6.0.2-3.dsc bdde0114529be01f10f539e4ccae41ce442775fd1d99941161f5159a0788090c 18531 kadu_0.6.0.2-3.diff.gz b9075a2054d2deb34565fd1b55da9684fbf39beaea87394f1e66dff454c5b021 756290 kadu-common_0.6.0.2-3_all.deb 0dd5fb199d2a22c6ce741e33bdb3ebf19ecea3edefa4e3b0a79edb169ebba08c 213428 kadu-dev_0.6.0.2-3_all.deb e3380518f47ace109b92ab3e2b4ef18cc93631bc22cb8817ac4e43ffdda3e77d 1302352 kadu-themes_0.6.0.2-3_all.deb 9becf544e8550823a1678178d5e26248856649f34c3fcaa44509e0b9df4d7080 1461240 kadu_0.6.0.2-3_amd64.deb 454daa8d53961018688b1d955662747bc990935a868c7265dd6fd4e7b0959368 1387640 kadu-external-modules_0.6.0.2-3_amd64.deb 88ee7e8516467d911b5459b9f5fd7d98901d42ad19d1326ef3696556ec48286a 120798 kadu-gtk-modules_0.6.0.2-3_amd64.deb 1d6b43d2cf09dbcb0d4c2b6b7a9177d85eefd862ddd7b75f9474dd83f0224bd9 119272 kadu-kde-modules_0.6.0.2-3_amd64.deb Files: 11f747c9a5cef8cd70a1a54ec0509155 1308 net optional kadu_0.6.0.2-3.dsc cd97c1bae164503c83ba06470191b08d 18531 net optional kadu_0.6.0.2-3.diff.gz a6b98dda7cea53d1b870289bfb40e3bd 756290 net optional kadu-common_0.6.0.2-3_all.deb 38a340d49bf5dc065e019891195475a2 213428 libdevel optional kadu-dev_0.6.0.2-3_all.deb a20bc5d30df18e273b332acd18540c2a 1302352 net optional kadu-themes_0.6.0.2-3_all.deb b83e4109f4725f535b3a4f3eb9a8bbad 1461240 net optional kadu_0.6.0.2-3_amd64.deb f6c960d1ff73fa025a2698770512c521 1387640 net optional kadu-external-modules_0.6.0.2-3_amd64.deb 8eed8abcdf6c978542a10600322b8e58 120798 net optional kadu-gtk-modules_0.6.0.2-3_amd64.deb de09855fedbc614f147e9d78ae8bfd70 119272 net optional kadu-kde-modules_0.6.0.2-3_amd64.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iEYEARECAAYFAkkRblQACgkQB01zfu119ZlD1wCgzzr//ApV6kSyPshVVFb5WuGd gCMAniYEJjUJ0+Lo/fM19ZDdHE9g/5OE =Dvr9 -----END PGP SIGNATURE-----
--- End Message ---