[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#697160: marked as done (unblock: snack/2.2.10-dfsg1-12.1)



Your message dated Wed, 02 Jan 2013 06:19:43 +0000
with message-id <1357107583.15480.41.camel@jacala.jungle.funky-badger.org>
and subject line Re: Bug#697160: unblock: snack/2.2.10-dfsg1-12.1
has caused the Debian Bug report #697160,
regarding unblock: snack/2.2.10-dfsg1-12.1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
697160: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697160
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian.org@packages.debian.org
Usertags: unblock

Please unblock package snack

snack/2.2.10-dfsg1-12.1 contains just one patch by Michael Karcher
which fixes the vulnerability CVE-2012-6303 [1]. The package is
otherwise unchanged. As reported in [1], I have verified Michael
Karcher's patch to fix the issue.

As this is a release-critical issue for Wheezy, I am asking the
release team to unblock snack/2.2.10-dfsg1-12.1.

I am attaching the debdiff between the versions of snack in testing
and unstable.

Cheers,

Adrian

unblock snack/2.2.10-dfsg1-12.1

> [1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695614

-- System Information:
Debian Release: 7.0
  APT prefers testing
  APT policy: (500, 'testing'), (100, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.6-trunk-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) (ignored: LC_ALL set to en_US.UTF-8)
Shell: /bin/sh linked to /bin/dash
diff -Nru snack-2.2.10-dfsg1-testing/debian/changelog snack-2.2.10-dfsg1-unstable/debian/changelog
--- snack-2.2.10-dfsg1-testing/debian/changelog	2013-01-02 01:24:55.000000000 +0100
+++ snack-2.2.10-dfsg1-unstable/debian/changelog	2013-01-02 00:58:23.861689141 +0100
@@ -1,3 +1,10 @@
+snack (2.2.10-dfsg1-12.1) unstable; urgency=low
+
+  * Non-maintainer upload.
+  * Include patch by Michael Karcher to fix CVE-2012-6303 (Closes: #695614).
+
+ -- John Paul Adrian Glaubitz <glaubitz@physik.fu-berlin.de>  Wed, 02 Jan 2013 00:56:47 +0100
+
 snack (2.2.10-dfsg1-12) unstable; urgency=low
 
   * Fixed FTBFS for non-linux architectures.
diff -Nru snack-2.2.10-dfsg1-testing/debian/patches/CVE-2012-6303.patch snack-2.2.10-dfsg1-unstable/debian/patches/CVE-2012-6303.patch
--- snack-2.2.10-dfsg1-testing/debian/patches/CVE-2012-6303.patch	1970-01-01 01:00:00.000000000 +0100
+++ snack-2.2.10-dfsg1-unstable/debian/patches/CVE-2012-6303.patch	2013-01-02 00:44:31.635174146 +0100
@@ -0,0 +1,18 @@
+--- snack-2.2.10-dfsg1/generic/jkSoundFile.c	2005-12-14 12:29:38.000000000 +0100
++++ snack-2.2.10-dfsg1+karcher/generic/jkSoundFile.c	2013-01-02 00:29:56.836287036 +0100
+@@ -1796,7 +1796,14 @@
+ GetHeaderBytes(Sound *s, Tcl_Interp *interp, Tcl_Channel ch, char *buf, 
+ 	       int len)
+ {
+-  int rlen = Tcl_Read(ch, &buf[s->firstNRead], len - s->firstNRead);
++  int rlen;
++
++  if (len > max(CHANNEL_HEADER_BUFFER, HEADBUF)){
++    Tcl_AppendResult(interp, "Excessive header size", NULL);
++    return TCL_ERROR;
++  }
++
++  rlen = Tcl_Read(ch, &buf[s->firstNRead], len - s->firstNRead);
+ 
+   if (rlen < len - s->firstNRead){
+     Tcl_AppendResult(interp, "Failed reading header bytes", NULL);
diff -Nru snack-2.2.10-dfsg1-testing/debian/patches/series snack-2.2.10-dfsg1-unstable/debian/patches/series
--- snack-2.2.10-dfsg1-testing/debian/patches/series	2013-01-02 01:24:55.000000000 +0100
+++ snack-2.2.10-dfsg1-unstable/debian/patches/series	2013-01-02 00:48:03.661699215 +0100
@@ -2,3 +2,4 @@
 glibc2.10.patch
 args.patch
 libs.patch
+CVE-2012-6303.patch

--- End Message ---
--- Begin Message ---
On Wed, 2013-01-02 at 01:35 +0100, John Paul Adrian Glaubitz wrote:
> snack/2.2.10-dfsg1-12.1 contains just one patch by Michael Karcher
> which fixes the vulnerability CVE-2012-6303 [1]. The package is
> otherwise unchanged. As reported in [1], I have verified Michael
> Karcher's patch to fix the issue.

Unblocked, thanks.

Regards,

Adam

--- End Message ---

Reply to: