Bug#778646: Multiple issues

2015-04-11 Thread Salvatore Bonaccorso
Hi Bartosz, On Sun, Mar 29, 2015 at 09:56:41PM +0200, Moritz Muehlenhoff wrote: > On Thu, Mar 26, 2015 at 09:24:39AM +0100, Tomasz Buchert wrote: > > Hi, > > there is 1.12 available (but the patch above solves > > the problem as well). > > This has been assigned CVE-2013-7437. > > Bartosz, can y

Bug#778646: Multiple issues

2015-03-29 Thread Moritz Muehlenhoff
On Thu, Mar 26, 2015 at 09:24:39AM +0100, Tomasz Buchert wrote: > Hi, > there is 1.12 available (but the patch above solves > the problem as well). This has been assigned CVE-2013-7437. Bartosz, can you please upload a fixed package to unstable? Cheers, Moritz -- To UNSUBSCRIBE, email

Bug#778646: Multiple issues

2015-03-26 Thread Tomasz Buchert
Hi, there is 1.12 available (but the patch above solves the problem as well). Tomasz signature.asc Description: Digital signature

Bug#778646: Multiple issues

2015-03-23 Thread Bartosz Fenski
Hey Peter, I'm fine with your version of patch and noone else had objections so I believe we can patch it your way. Did you fix it upstream? I'm still seeing 1.11 as the latest release. I can patch it only for Debian but I believe we should have it fixed for every other distros / ways of distribu

Bug#778646: Multiple issues

2015-03-20 Thread Peter Selinger
Here's the patch that I am planning to apply upstream. Please comment if you see anything wrong with it. While the general idea is similar to Tomasz's patch, I've solved the details a bit differently. * I prefer to use ssize_t instead of unsigned long long int for memory manipulations. Since s

Bug#778646: Multiple issues

2015-03-17 Thread Bartosz Fenski
I contacted upstream and he's willing to fix it in a different way. He said that he should be able to work on it later this week. regards Bartek W dniu 3/17/2015 o 8:24 AM, Tomasz Buchert pisze: > Hi all, Moritz - did you take a look at my patch? I'd really like > to have a second opinion on that

Bug#778646: Multiple issues

2015-03-17 Thread Tomasz Buchert
Hi all, Moritz - did you take a look at my patch? I'd really like to have a second opinion on that since it is fairly large for an NMU. I attach NMU patch. Shall I upload it to DELAYED/5 or something like that? Cheers, Tomasz diff -Nru potrace-1.11/debian/changelog potrace-1.11/debian/changelog -

Bug#778646: Multiple issues

2015-03-15 Thread Moritz Mühlenhoff
On Tue, Feb 17, 2015 at 10:02:37PM +0100, Moritz Muehlenhoff wrote: > Package: potrace > Version: 1.11-2 > Severity: grave > Tags: security > > Hi, > please see https://bugzilla.redhat.com/show_bug.cgi?id=955808 > Could you report this upstream? > > A CVE ID has been requested, but not yet assign

Bug#778646: Multiple issues

2015-03-01 Thread Tomasz Buchert
Hi again (!), I figured out that this will not work on architectures where sizeof(long int) != 8 and/or sizeof(size_t) != 8, i386 for example. The *next* patch makes sure that numbers passed to malloc() are not overflowing size_t, and also uses *unsigned long long int* everywhere which is guarant

Bug#778646: Multiple issues

2015-03-01 Thread Tomasz Buchert
Hi again, here is slightly better patch. Cheers, Tomasz From: Tomasz Buchert Date: Sun, 1 Mar 2015 20:27:29 +0100 Subject: Fix multiple integer overflows. Dimensions of a BMP file are signed, 4-byte integers. Therefore the size of the image may be bigger than range of (int). This is fixed in bi

Bug#778646: Multiple issues

2015-03-01 Thread Tomasz Buchert
On 17/02/15 22:02, Moritz Muehlenhoff wrote: > Package: potrace > Version: 1.11-2 > Severity: grave > Tags: security > > Hi, > please see https://bugzilla.redhat.com/show_bug.cgi?id=955808 > Could you report this upstream? > > A CVE ID has been requested, but not yet assigned: > http://www.openwa

Bug#778646: Multiple issues

2015-02-17 Thread Moritz Muehlenhoff
Package: potrace Version: 1.11-2 Severity: grave Tags: security Hi, please see https://bugzilla.redhat.com/show_bug.cgi?id=955808 Could you report this upstream? A CVE ID has been requested, but not yet assigned: http://www.openwall.com/lists/oss-security/2015/02/06/12 Cheers, Moritz -