Bug#826429: jessie-pu: package quassel/1:0.10.0-2.3+deb8u2

2016-06-05 Thread Pierre Schweitzer
with invalid handshake data. +(Closes: #826402) +- Add debian/patches/CVE-2016-4414.patch, cherry-picked from upstream. + + -- Pierre Schweitzer <pie...@reactos.org> Sun, 05 Jun 2016 12:41:35 +0200 + quassel (1:0.10.0-2.3+deb8u2) jessie; urgency=high * Non-maintainer upload. dif

Bug#826402: CVE-2016-4414: remote DoSdue to invalid handshake data

2016-06-05 Thread Pierre Schweitzer
Package: quasselcore Version: 1:0.10.0-2.3+deb8u2 Severity: normal Tags: security Hi, The following vulnerability was published for quassel. CVE-2016-4414: remote DoSdue to invalid handshake data This is fixed in this commit:

Bug#809200: jessie-pu: package quassel/1:0.10.0-2.3+deb8u1

2015-12-28 Thread Pierre Schweitzer
, using /op * command. +(Closes: #807801) +- Add debian/patches/CVE-2015-8547.patch, cherry-picked from upstream. + + -- Pierre Schweitzer <pie...@reactos.org> Sun, 13 Dec 2015 11:04:05 +0100 + quassel (1:0.10.0-2.3+deb8u1) jessie-security; urgency=high * Fix CVE-2015-3427: SQL inj

Bug#807801: Sponsoring for upload CVE-2015-8547

2015-12-27 Thread Pierre Schweitzer
Hi Salvatore, On 27/12/2015 09:09, Salvatore Bonaccorso wrote: > Hi Pierre, > > On Mon, Dec 14, 2015 at 10:28:26PM +0100, Pierre Schweitzer wrote: >> Dear all, >> >> After having asked for a CVE[0] for this Quassel issue [1], I've >> uploaded you (attached)

Bug#807801: Patch

2015-12-13 Thread Pierre Schweitzer
Hi, Please find attached a debdiff for Jessie backporting the fix for this vulnerability. Cheers, -- Pierre Schweitzer System & Network Administrator Senior Kernel Developer ReactOS Deutschland e.V. diff -Nru quassel-0.10.0/debian/changelog quassel-0.10.0/debian/changelog --- quassel-0.

Bug#794070: Add support for self-extracting

2015-07-30 Thread Pierre Schweitzer
Package: care Version: 2.2.1-1 Severity: wishlist Dear maintainer, So far the package shipped with Debian doesn't provide self-extracting support. When attempting to create such an archive, care outputs: care error: This version of CARE was built without self-extracting (.bin) support care

Bug#791686: With grep upgrade (to 2.21-2), GREP_OPTIONS used by fish is deprecated

2015-07-07 Thread Pierre Schweitzer
Package: fish Version: 2.1.2+dfsg1-2 Severity: normal Recently, grep was upgraded in stretch/sid: [UPGRADE] grep:amd64 2.20-4.1 - 2.21-2 This bring an unwanted behavior, fish is using GREP_OPTIONS to control grep: $ echo $GREP_OPTIONS --color=auto Any usage of grep will lead to this warning to

Bug#779872: (no subject)

2015-03-06 Thread Pierre Schweitzer
More information again for this bug. It also affects Sid with (31.5.0esr-1). On the other hand, Firefox in Ubuntu Trusty (LTS) isn't affected (36.0+build2-0ubuntu0.14.04.4). Regarding my proposal, I've proposed it upstream at: https://bugzilla.mozilla.org/show_bug.cgi?id=1140159 -- Pierre

Bug#779872: Iceweasel incorrectly uses /tmp for temporary files

2015-03-05 Thread Pierre Schweitzer
Package: iceweasel Version: 31.5.0esr-1~deb7u1 Severity: important Tags: security Dear all, Iceweasel offers the possibility to open a file instead of downloading it. In such situation, the file is downloaded into /tmp directory and then opened. The permissions set on the downloaded temporary

Bug#779872: (no subject)

2015-03-05 Thread Pierre Schweitzer
As a side note, as a better fix it would be interesting to move all the temporary files from Iceweasel to a directory such as /tmp/iceweasel-user-random/ to prevent any information leak regarding the metadata of the temporary files. Will report this to upstream. -- Pierre Schweitzer pierre

Bug#776060: Bind listens on any for IPv6 and localhost for IPv4

2015-01-23 Thread Pierre Schweitzer
Package: bind9 Version: 1:9.9.5.dfsg-8 Severity: normal Tags: ipv6 When installed with default configuration, bind will only listen on 127.0.0.1 for IPv4 connections while it will listen on :: for IPv6 connections. This a not consistent behavior, and exposes bind9 without much reasons. A quick

Bug#772735: kgb-client hits an assert on SVN repo path with a tailing /

2014-12-10 Thread Pierre Schweitzer
Package: kgb-client Severity: important Tags: upstream This report follows the report on Ubuntu LP: https://bugs.launchpad.net/ubuntu/+source/kgb-bot/+bug/1400453 When calling the kgb-client on a SVN repo with a tailing /, the client will hit an assert: perl:

Bug#772735: [kgb-maintainers] Bug#772735: kgb-client hits an assert on SVN repo path with a tailing /

2014-12-10 Thread Pierre Schweitzer
for the confusion. On 10/12/2014 18:43, gregor herrmann wrote: On Wed, 10 Dec 2014 17:04:56 +0100, Pierre Schweitzer wrote: Package: kgb-client Severity: important Tags: upstream This report follows the report on Ubuntu LP: https://bugs.launchpad.net/ubuntu/+source/kgb-bot/+bug/1400453 When calling

Bug#772735: (no subject)

2014-12-10 Thread Pierre Schweitzer
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Please find attached a patch to resolve the issue. When in SVN context, it just chomp any trailing /. Tested fixing the issue here. - -- Pierre Schweitzer pierre at reactos.org System Network Administrator Senior Kernel Developer ReactOS

Bug#772747: Don't fail to display user name in case user is not local

2014-12-10 Thread Pierre Schweitzer
: systemd (via /run/systemd/system) From 69053894a842e530fb7c40ed0dc62026ce6d8dee Mon Sep 17 00:00:00 2001 From: Pierre Schweitzer pie...@reactos.org Date: Wed, 10 Dec 2014 19:36:42 +0100 Subject: [PATCH] In case the commiter isn't a local user, don't attempt to use $user which won't be defined

Bug#772749: Reflect commit f77c3ea on multiline message template

2014-12-10 Thread Pierre Schweitzer
3.16.0-4-amd64 (SMP w/8 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) From 1527c958c5a11f7ebcd5107bfac43bbe398c7217 Mon Sep 17 00:00:00 2001 From: Pierre Schweitzer pie...@reactos.org Date: Wed, 10

Bug#772750: Fix multiline display in its message template

2014-12-10 Thread Pierre Schweitzer
/systemd/system) From a355271901e2b6aa2fc6a3982426a40055346446 Mon Sep 17 00:00:00 2001 From: Pierre Schweitzer pie...@reactos.org Date: Wed, 10 Dec 2014 19:57:36 +0100 Subject: [PATCH] The char \n will be displayed that way on IRC instead of going to the next line. Just going to the next line work

Bug#578595: (no subject)

2014-12-03 Thread Pierre Schweitzer
://wiki.strongswan.org/projects/strongswan/wiki/NetworkManager - -- Pierre Schweitzer pie...@reactos.org System Network Administrator Senior Kernel Developer ReactOS Deutschland e.V. -BEGIN PGP SIGNATURE- Version: GnuPG v1 iQIcBAEBAgAGBQJUfwDfAAoJEHVFVWw9WFsLD8gQAJN1mNeoR34eqBzEmHVtePMQ

Bug#771048: check_http doesn't support TLSv1.2 in Wheezy

2014-11-26 Thread Pierre Schweitzer
: HTTP/1.1 200 OK - 365 bytes in 0.115 second response time |time=0.114707s;;;0.00 size=365B;;;0 May the support be backported to Wheezy? Cheers, Pierre Schweitzer -- System Information: Debian Release: 7.7 APT prefers stable APT policy: (500, 'stable') Architecture: amd64 (x86_64) Kernel

Bug#771048: (no subject)

2014-11-26 Thread Pierre Schweitzer
) TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (0xc030) TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (0x9e) When allowing more ciphers, it works also in Wheezy (and still works in sid, obviously ;-)). - -- Pierre Schweitzer pie...@reactos.org System Network Administrator Senior Kernel Developer ReactOS

Bug#770332: pu: package dhcpcd5/5.5.6-1

2014-11-20 Thread Pierre Schweitzer
by the Security Team. + * Fix denial of service (CVE-2014-6060) in dhcpcd5: +- backport fix from debian unstable dhcpcd5/6.0.5-2 + + -- Pierre Schweitzer pie...@reactos.org Thu, 20 Nov 2014 13:29:49 +0100 + dhcpcd5 (5.5.6-1) unstable; urgency=medium * New upstream release diff -Nru dhcpcd5-5.5.6

Bug#770332: pu: package dhcpcd5/5.5.6-1

2014-11-20 Thread Pierre Schweitzer
can later upload your package. Regards, Salvatore - -- Pierre Schweitzer pierre at reactos.org System Network Administrator Senior Kernel Developer ReactOS Deutschland e.V. -BEGIN PGP SIGNATURE- Version: GnuPG v1 iQIcBAEBAgAGBQJUblRnAAoJEHVFVWw9WFsLKugP/jRvLGIStclzdN2lmjmr2n4

Bug#770043: Denial of Service in dhcpd5: CVE-2014-6060

2014-11-18 Thread Pierre Schweitzer
Package: dhcpcd5 Severity: important Tags: security patch dhcpd5 is vulnerable to the CVE-2014-6060 which can cause a denial of service: https://security-tracker.debian.org/tracker/CVE-2014-6060 Please find attached the debdiff dsc for NMU upload which fixes the vulnerability in unstable. --

Bug#770043: Denial of Service in dhcpd5: CVE-2014-6060

2014-11-18 Thread Pierre Schweitzer
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi Salvatore, Thanks for your feedback. Here are the fixed files, taking into account your comments. Cheers, Pierre On 11/18/2014 05:47 PM, Salvatore Bonaccorso wrote: Hi Pierre, On Tue, Nov 18, 2014 at 03:58:45PM +0100, Pierre Schweitzer

Bug#766962: (no subject)

2014-11-01 Thread Pierre Schweitzer
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Tested the quassel-core_0.8.0-1+deb7u3_amd64.deb matching the debdiff from Salvatore. It's working fine. - -- Pierre Schweitzer pierre at reactos.org System Network Administrator Senior Kernel Developer ReactOS Deutschland e.V. -BEGIN PGP

Bug#764718: (no subject)

2014-10-24 Thread Pierre Schweitzer
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Dear Rapahel, How did you reproduce without wireshark? I'd be interested in trying as well this method. And for my method: I was running a wireshark on ethernet and nmap on ethernet while my default gateway was on wifi. Both media used so. Cheers,

Bug#764718: Kernel panic when running nmap in early_efi_write

2014-10-10 Thread Pierre Schweitzer
Package: src:linux Version: 3.16.3-2 Severity: important Dear Maintainer, I'm encountering a fully reproducible kernel panic when running specific actions I will comment below. I didn't report this bug to kernel.org looking for your kind review first and for potential information you may need.

Bug#762455: libc6: SIGSEV in _dl_signal_error() (dl-error.c:94)

2014-09-22 Thread Pierre Schweitzer
Package: libc6 Version: 2.19-11 Severity: important Dear Maintainer, When trying to install the latest release of Intel Parallel Studio 2015 onto Debian testing, I'm facing a segfault. Using GDB, I could isolate the segfault in: _dl_signal_error (errcode=errcode@entry=0,

Bug#745536: Time picker format is 12h while cgi expects 24h

2014-04-22 Thread Pierre Schweitzer
Source: icinga-cgi Version: 1.11.0-1 Severity: normal Tags: patch The time picker table while scheduling downtime (for instance) is set to use 12h format while CGI expects 24h format. It makes impossible to schedule downtime after 12h. This is a bug already reported upstream:

Bug#642357: Downgrade on Wheezy

2013-08-08 Thread Pierre Schweitzer
, please ask. With my best regards, -- Pierre Schweitzer pie...@reactos.org System Administrator ReactOS Foundation smime.p7s Description: S/MIME Cryptographic Signature

Bug#642357: Any backport in sight?

2013-08-07 Thread Pierre Schweitzer
Hi, now I've upgraded to Wheezy, I'm also hitting that bug which is kind of blocking. Is it possible to at least backport the fix? This bug is pretty old, as the latest release of GnuTLS... With my best regards, -- Pierre Schweitzer pie...@reactos.org System Administrator ReactOS Foundation