Bug#805366: stfl: build-depends on spl-dev which is gone from the archive

2015-11-17 Thread Nico Golde
4 Too bad. I have an RFA open for stfl. I'm CC'ing this so if a person is interested in adopting it can consider adopting spl as well. I have no intentions of doing another upload for this. Cheers, Nico -- Nico Golde - XMPP: n...@jabber.ccc.de - GPG: 0xA0A0 pgpQ8tsD_OtP4.pgp Description: PGP signature

Bug#775255: [pkg-fetchmail-maint] Bug#775255: fetchmail: Fails to start when libssl has SSLv3 disabled

2015-01-13 Thread Nico Golde
by default, unless a user explicitly requests to do so. As such I'm not sure how useful this patch is as well. Matthias, do you mind weighing in on this? Thanks Nico -- Nico Golde - XMPP: n...@jabber.ccc.de - GPG: 0xA0A0 pgpm4RkxJdrGf.pgp Description: PGP signature

Bug#754073: [pkg-fetchmail-maint] Bug#754073: fetchmailconf: Fetchmail does not start -- libBLT.2.4.so.8.6

2014-07-12 Thread Nico Golde
-fetchmail-ma...@lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-fetchmail-maint -- Nico Golde - XMPP: n...@jabber.ccc.de - GPG: 0xA0A0 pgpyIubufqoBa.pgp Description: PGP signature

Bug#722382: Updating the Ruby packaging policy for your package «libstfl-ruby»

2014-01-16 Thread Nico Golde
include the patch to fix your package. Otherwise we can't remove ruby 1.8 from the archive. Will include in the next upload. Thanks! Nico -- Nico Golde - XMPP: n...@jabber.ccc.de - GPG: 0xA0A0 -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe

Bug#724837: apt-xapian-index: unsafe polkit usage

2013-09-28 Thread Nico Golde
-2013-1064 http://security-tracker.debian.org/tracker/CVE-2013-1064 Please adjust the affected versions in the BTS as needed. -- Nico Golde - XMPP: n...@jabber.ccc.de - GPG: 0xA0A0 Description: fix possible privilege escalation via policykit UID lookup race. Author: Marc Deslauriers

Bug#724545: vino: CVE-2013-5745 denial of service via infinite loop

2013-09-24 Thread Nico Golde
-bin/cvename.cgi?name=CVE-2013-5745 http://security-tracker.debian.org/tracker/CVE-2013-5745 https://bugzilla.gnome.org/show_bug.cgi?id=641811 Please adjust the affected versions in the BTS as needed. -- Nico Golde - XMPP: n...@jabber.ccc.de - GPG: 0xA0A0 pgpmDlABSWY0j.pgp

Bug#708515: keystone: CVE-2013-2014 DoS via large POST requests

2013-05-16 Thread Nico Golde
/cvename.cgi?name=CVE-2013-2014 http://security-tracker.debian.org/tracker/CVE-2013-2014 -- Nico Golde - XMPP: n...@jabber.ccc.de - GPG: 0xA0A0 pgpHdX9ExAZ3O.pgp Description: PGP signature

Bug#706644: untrusted input file might be harmful

2013-05-02 Thread Nico Golde
and there are no reverse dependencies. I therefore suggest removing the package from testing due to it's bad shape. FWIF, I'm fine with that. The stuff is easy to address, but I lost interest in doing so. Cheers Nico -- Nico Golde - XMPP: n...@jabber.ccc.de - GPG: 0xA0A0 pgprEBSyMOkfA.pgp

Bug#706045: [pkg-fetchmail-maint] Bug#706045: help?

2013-04-26 Thread Nico Golde
I'll probably fix it next week. Sorry I'm traveling right now... Cheers Nico -- Nico Golde - XMPP: n...@jabber.ccc.de - GPG: 0xA0A0 pgpp97JFsRRNu.pgp Description: PGP signature

Bug#702267: stunnel: CVE-2013-1762 buffer overflow in TLM authentication of the CONNECT protocol negotiation

2013-03-04 Thread Nico Golde
changelog entry. For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1762 http://security-tracker.debian.org/tracker/CVE-2013-1762 Please adjust the affected versions in the BTS as needed. -- Nico Golde - XMPP: n...@jabber.ccc.de - GPG: 0xA0A0

Bug#701838: sudo: CVE-2013-1775 authentication bypass when clock is reset

2013-02-27 Thread Nico Golde
the affected versions in the BTS as needed. Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 pgppbYwtzHCYJ.pgp Description: PGP signature

Bug#697251: gnupg2: gnupg key import memory corruption

2013-01-05 Thread Nico Golde
Hi, * Eric Dorland e...@debian.org [2013-01-05 14:02]: * Thijs Kinkhorst (th...@debian.org) wrote: On Fri, January 4, 2013 11:39, Thijs Kinkhorst wrote: On Thu, January 3, 2013 04:19, Christoph Anton Mitterer wrote: This is a follow up for #697108 and CVE-2012-6085. Eric,

Bug#693608: yui: multiple cross-site scripting issues in the flash component infrastructure

2012-11-18 Thread Nico Golde
-2012-5881 http://security-tracker.debian.org/tracker/CVE-2012-5881 http://yuilibrary.com/support/20121030-vulnerability/ Kind regards Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 pgpJzKrqok0MR.pgp Description: PGP signature

Bug#692737: suckless-tools: newer slock versions prevents unwanted exposure of passwords

2012-11-08 Thread Nico Golde
Package: suckless-tools Version: 38-2 Severity: grave Justification: user security hole Hey, this package has not updated any of the tools included since two years. Please package newer tools, especially but most important slock. The current version of slock has no indication whatsoever that a

Bug#689990: wpa: CVE-2012-4445 denial of service

2012-10-09 Thread Nico Golde
Hi, * Stefan Lippers-Hollmann s@gmx.de [2012-10-08 23:37]: On Monday 08 October 2012, Nico Golde wrote: Package: wpa Severity: grave Tags: security patch Hi, the following vulnerability was published for hostapd. CVE-2012-4445[0]: | Timo Warns discovered that the internal

Bug#689990: wpa: CVE-2012-4445 denial of service

2012-10-08 Thread Nico Golde
-2_0.6.10-2+squeeze1.patch For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4445 http://security-tracker.debian.org/tracker/CVE-2012-4445 -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 pgp8zwwyLtbOP.pgp Description: PGP

Bug#687512: please update the security team's gpg key information

2012-09-13 Thread Nico Golde
for reference. Kind regards Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 pgpRv4UnZrSnD.pgp Description: PGP signature

Bug#687274: CVE-2012-4405 integer overflow leading to heap based buffer overflow in embedded icclib

2012-09-11 Thread Nico Golde
://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4405 http://security-tracker.debian.org/tracker/CVE-2012-4405 Patch: https://bugzilla.redhat.com/attachment.cgi?id=609986 -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 pgpFiQERp8JtJ.pgp Description: PGP signature

Bug#687175: freeradius: CVE-2012-3547 stack-based buffer overflow in EAP-TLS handling

2012-09-10 Thread Nico Golde
Package: freeradius Severity: grave Tags: security Hi, the following vulnerability was published for freeradius. CVE-2012-3547[0]: | PRE-CERT Security Advisory | == | | * Advisory: PRE-SA-2012-06 | * Released on: 10 September 2012 | * Affected product: FreeRADIUS 2.1.10

Bug#682481: gnome-shell: epiphany shouldn't be the default browser

2012-07-26 Thread Nico Golde
Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. pgpGUt8PKITnO.pgp Description: PGP signature

Bug#674448: CVE-2012-2098

2012-07-18 Thread Nico Golde
6.0.6. I had prepared an upload to fix this issue in stable. Are you OK with an upload to stable then? Please notify the release team before. Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13

Bug#668038: regression on triggers

2012-05-02 Thread Nico Golde
Hi, * Julian Taylor jtaylor.deb...@googlemail.com [2012-05-02 21:17]: the patch for the code execution probably contains a regression I can't judge how severe it is or provide a testcase: /usr/share/gajim/src/notify.py:323 command = gajim.config.get_per('notifications',

Bug#668607: CVE-2012-1098 / CVE-2012-1099

2012-04-13 Thread Nico Golde
patches/series |1 3 files changed, 55 insertions(+) debdiff, dsc and debian.tar.gz attached Looks good. Please go ahead and upload this to security-master. Thank you! Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0

Bug#668397: wicd: Local privilege escalation

2012-04-11 Thread Nico Golde
. Kind regards Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. pgp3V5ltXwqMT.pgp Description: PGP signature

Bug#665923: file enumeration vulnerability via mount.cifs due to early use of chdir() and error message

2012-03-26 Thread Nico Golde
/show_bug.cgi?id=8821 Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. pgpt1urDOvq8y.pgp Description: PGP signature

Bug#661150: dropbear: CVE-2012-0920 SSH server use-after-free vulnerability]

2012-02-27 Thread Nico Golde
Hi, * Gerrit Pape p...@smarden.org [2012-02-27 15:48]: On Fri, Feb 24, 2012 at 03:54:34PM +0100, Nico Golde wrote: Source: dropbear Severity: grave Tags: security patch Hey, below is a forwarded report describing a vulnerability in dropbear. Accoring to upstream's changelog

Bug#659899: CVE-2011-0790: XSS

2012-02-24 Thread Nico Golde
Hi, * Moritz Muehlenhoff j...@debian.org [2012-02-14 18:11]: This has been assigned CVE-2011-0790: Just to make sure there is no confusion, this should've been CVE-2012-0790. Cheers Nico pgpsedVHOKbzT.pgp Description: PGP signature

Bug#661150: dropbear: CVE-2012-0920 SSH server use-after-free vulnerability]

2012-02-24 Thread Nico Golde
to Matt. - End forwarded message - -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. pgpmyvB9rRsPk.pgp Description: PGP signature

Bug#661011: backuppc: CVE-2011-5081 cross-site scripting via RestoreFile action

2012-02-23 Thread Nico Golde
-2011-5081 http://security-tracker.debian.org/tracker/CVE-2011-5081 -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. pgpFnY08su1Lj.pgp Description: PGP signature

Bug#661020: acidbase: CVE-2012-1198 security bypass and remote file inclusion

2012-02-23 Thread Nico Golde
changelog entry. For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1198 http://security-tracker.debian.org/tracker/CVE-2012-1198 -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail

Bug#661061: python-paste-script: Supplementary groups not dropped when started an application with paster serve as root

2012-02-23 Thread Nico Golde
-group-permissions-for-pastescriptserve Upstream patch: [4] https://bitbucket.org/ianb/pastescript/changeset/a19e462769b4 - End forwarded message - -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13

Bug#661061: python-paste-script: Supplementary groups not dropped when started an application with paster serve as root

2012-02-23 Thread Nico Golde
CVE-2012-0878 has been assigned to this issue. Cheers Nico pgptN7h60BSxc.pgp Description: PGP signature

Bug#660846: libxml2: CVE-2012-0841 computational DoS attack via hash collisions

2012-02-22 Thread Nico Golde
/cgi-bin/cvename.cgi?name=CVE-2012-0841 http://security-tracker.debian.org/tracker/CVE-2012-0841 -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. pgpsXzXVwN5X1.pgp Description: PGP signature

Bug#660929: systemtap: CVE-2012-0875 possibility for invalid reads resulting in kernel DoS

2012-02-22 Thread Nico Golde
Hi, * Timo Juhani Lindfors timo.lindf...@iki.fi [2012-02-23 00:01]: Nico Golde n...@debian.org writes: the following CVE (Common Vulnerabilities Exposures) id was published for systemtap. Thanks but this was already reported as #660886, merging. Thanks, I didn't see the other bug before

Bug#660621: reflected XSS in fup via id parameter

2012-02-20 Thread Nico Golde
Package: fex Severity: grave Tags: security Hi, there is a new upstream release of F*x fixing a cross-site scripting issue via the id parameter of the fup script. http://fex.rus.uni-stuttgart.de/fex.html There is no CVE id for this issue yet. Kind regards Nico pgp6OfKDBCm6v.pgp Description:

Bug#660621: Acknowledgement (reflected XSS in fup via id parameter)

2012-02-20 Thread Nico Golde
retitle 660621 multiple cross-site scripting issues in fup script thanks For the sake of being complete... other parameters such as from and to are also affected (http://www.openwall.com/lists/oss-security/2012/02/20/1). Cheers Nico pgp4amlS9OsYf.pgp Description: PGP signature

Bug#652653: python-virtualenv: insecure /tmp file handling

2011-12-20 Thread Nico Golde
generally not involved in such discussions until after the security team have decided they don't want to issue a DSA for a particular issue and someone raises it with us. We will not issue a DSA for this vulnerability. Please go ahead and fix this through spu. Kind regards Nico -- Nico Golde

Bug#652653: python-virtualenv: insecure /tmp file handling

2011-12-19 Thread Nico Golde
Package: python-virtualenv Version: 1.4.9-3 Severity: grave Tags: patch Hi, it was discovered that python-virtualenv is handling /tmp files in an insecure manner. The following patch fixed this problem: https://bitbucket.org/ianb/virtualenv/changeset/8be37c509fe5 A CVE id for this issue has

Bug#646199: libstfl-dev: Needs to depend on libstfl0

2011-10-22 Thread Nico Golde
. Will be fixed soon. Thanks! Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. pgpEqXrrFMLsy.pgp Description: PGP signature

Bug#635548: CVE-2011-2716

2011-10-05 Thread Nico Golde
Hi, * Michael Tokarev m...@tls.msk.ru [2011-10-05 20:44]: I'm Cc'ing the relevant bug# so others may see this information. Hopefully you wont object -- the bug is public for a long time. No, not at all. On 05.10.2011 16:04, Nico Golde wrote: * Nico Golde n...@ngolde.de [2011-10-05 11:21

Bug#638449: iptables-persistent: rules aren't loaded at all

2011-08-21 Thread Nico Golde
screwed. Alright makes sense. Thanks for taking the time to explain this! The user-tag imho is not correct though in this case, but doesn't really matter either. Kind regards Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail

Bug#630159: wireshark: multiple security issues

2011-06-11 Thread Nico Golde
/cgi-bin/cvename.cgi?name=CVE-2011-1959 http://security-tracker.debian.org/tracker/CVE-2011-1959 -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. pgpbXneUQkmtR.pgp Description: PGP signature

Bug#629852: Oracle Java SE Critical Patch Update Advisory - June 2011

2011-06-08 Thread Nico Golde
CVE-2011-0867 CVE-2011-0869 CVE-2011-0865 Some of the issues seem to be windows specific. http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html Kind regards Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text

Bug#622054: [pkg-fetchmail-maint] Bug#622054: PATCH: fix SSLv2_client_method-related FTBFS.

2011-04-12 Thread Nico Golde
, the build would fail. Fixes Debian Bug #622054 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622054 Thanks for the patch, will upload a new fetchmail package probably tomorrow. Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security

Bug#622091: libmodplug ReadS3M stack overflow

2011-04-10 Thread Nico Golde
and others from an end-user perspective? The code doesn't look like it was written with security in mind and I guess it's only a matter of time for new issues to popup for this lib. Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text

Bug#621866: rsync: CVE-2011-1097 DoS and possibly code execution on client side

2011-04-09 Thread Nico Golde
/?p=rsync.git;a=commitdiff;h=83b94efa6b60a3ff5eee4c5f7812c617a90a03f6;hp=c8255147b06b74dad940d32f9cef5fbe17595239 For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1097 http://security-tracker.debian.org/tracker/CVE-2011-1097 -- Nico Golde - http

Bug#616711: segfault at start with libncursesw5 5.8-1

2011-03-07 Thread Nico Golde
, at), \ OK) \ : ERR) So QWORD PTR [rdi+0x10] should correspond to win-_attrs meaning that in this case win would be null. How can this be? It is definitely no newsbeuter bug and I'm not sure if it is an stfl bug to be honest. Cheers Nico -- Nico Golde - http://www.ngolde.de - n

Bug#616711: segfault at start with libncursesw5 5.8-1

2011-03-07 Thread Nico Golde
Hi, * Sven Joachim svenj...@gmx.de [2011-03-07 17:53]: On 2011-03-07 17:35 +0100, Nico Golde wrote: * Craig Small csm...@debian.org [2011-03-07 10:49]: On Sun, Mar 06, 2011 at 09:38:09PM +0100, Stefano Zacchiroli wrote: I'm not sure if the problem is in newsbeuter (e.g. using the lib

Bug#616711: segfault at start with libncursesw5 5.8-1

2011-03-06 Thread Nico Golde
received a similar bug report today. Just by a quick glance I'm unsure if this is an ncurses problem or not. Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. pgpuwTbKEugNF.pgp

Bug#613487: krb5: kdc kpropd and ldap backend DoS vulnerabilities (CVE-2010-4022, CVE-2011-0281, CVE-2011-0282)

2011-02-15 Thread Nico Golde
Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. pgpEtMwBVIWqs.pgp Description: PGP signature

Bug#603861: [pkg-fetchmail-maint] Bug#603861: Further information

2010-12-03 Thread Nico Golde
will be removed after -2 migrated to squeeze. Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. pgpn6MJXYxwvv.pgp Description: PGP signature

Bug#559814: hamlib: stable-security fix CVE-2009-3736

2010-12-02 Thread Nico Golde
Wolf, who has kindly agreed to upload it pending approval. [...] This issue doesn't warrant a DSA. Could you please upload this to stable-proposed-updates[0]? Cheers Nico [0] http://www.debian.org/doc/developers-reference/pkgs.html#upload-stable -- Nico Golde - http://www.ngolde.de - n

Bug#598389: tagging 598389, severity of 598389 is serious

2010-11-09 Thread Nico Golde
Hi, * Paul Wise p...@debian.org [2010-11-09 07:10]: # Automatically generated email from bts, devscripts version 2.10.35lenny7 tags 598389 + security severity 598389 serious Pierre, can you ask for an unblock of this version so this fix can make it into squeeze? Thanks Nico -- Nico Golde

Bug#595728: git-core: permissions of templates too restrictive

2010-09-21 Thread Nico Golde
. Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. pgpXhIDTvTyCK.pgp Description: PGP signature

Bug#595728: git-core: permissions of templates too restrictive

2010-09-07 Thread Nico Golde
scheduled a binNMU. A quick fix is to upgrade to the version in proposed-updates when it's available there latest tomorrow evening. Thanks! Sorry for the inconvenience... Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail

Bug#595728: git-core: permissions of templates too restrictive

2010-09-07 Thread Nico Golde
Hi, * Jonathan Nieder jrnie...@gmail.com [2010-09-07 13:12]: Nico Golde wrote: I'm wondering what this was. I'm building in a clean chroot and to be honest I have no idea what went wrong. The umask in this chroot is 022. Hmm, odd. Do you unpack from within the chroot

Bug#593814: [pkg-fetchmail-maint] Bug#593814: fetchmail starts too early in init scripts

2010-08-22 Thread Nico Golde
(for ie : to enable a good antispam starting). I don't quite understand this, where would you expect this delay to be implemented? So far I don't see the bug therefore downgrading the severity. Kind regards Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0

Bug#590412: NMU

2010-08-05 Thread Nico Golde
Hi, this package was already uploaded to DELAYED/2 but it was closing the wrong bug so I canceled it and reupped the NMU. debdiff attached. Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13

Bug#590762: intent to NMU

2010-08-05 Thread Nico Golde
Hi, I uploaded an NMU to DELAYED/2 to fix this bug. Please let me know if I should delay it any further. debdiff attached. Kind regards Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. diff

Bug#590762: intent to NMU

2010-08-05 Thread Nico Golde
/usr/bin/dh_numpy ] dh_numpy so we could backport without hassle. What do you think? Sounds good, replaced the version in DELAYED with attached debdiff. Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail

Bug#590762: intent to NMU

2010-08-05 Thread Nico Golde
worked. Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. pgpMyRhVuNdQM.pgp Description: PGP signature

Bug#590404: intent to NMU

2010-08-04 Thread Nico Golde
Hi, I uploaded an NMU to fix this bug to DELAYED/2. Please let me know if I should delay this any further. debdiff attached. Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. diff -u

Bug#587391: pure-ftpd-postgresql: spontanous crash

2010-08-02 Thread Nico Golde
Hi, can you provide the configuration that is causing this as well as details on how to reproduce? Cheers Nico -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Bug#559827: What's the current status of this bug?

2010-08-01 Thread Nico Golde
Hi, this bug has been marked as pending quite a while ago. What is the current status of the upload? Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. pgpRLkQI3JvBF.pgp Description

Bug#588036: intent to NMU

2010-07-31 Thread Nico Golde
(CVE-2010-1738) with this patch since I believe this to be a duplicate of CVE-2010-1448. I checked back with mitre on this one. Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted

Bug#588138: RM: lxr -- RoQA; security bugs, oooold upstream version, not properly maintained

2010-07-31 Thread Nico Golde
an impact on many users. Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. pgpWFwKyV3YIr.pgp Description: PGP signature

Bug#588138: Bug#585411: RM: lxr -- RoQA; security bugs, oooold upstream version, not properly maintained

2010-07-31 Thread Nico Golde
Hi, * Giacomo Catenazzi c...@debian.org [2010-07-31 17:52]: On 07/31/2010 04:38 PM, Nico Golde wrote: Package: ftp.debian.org Severity: normal I hereby request the removal of lxr from the archive, it should not be included in squeeze as well. The version that our package is currently

Bug#587481: intent to NMU

2010-07-30 Thread Nico Golde
Hi, * Jan Hauke Rahm j...@debian.org [2010-07-30 12:00]: On Sun, Jul 25, 2010 at 07:27:27PM +0200, Nico Golde wrote: Hi, I intent to upload a 0day NMU to fix this bug. The debdiff is available at: http://people.debian.org/~nion/nmu-diff/syscp-1.4.2.1-2_1.4.2.1-2.1.patch if you consider

Bug#560561: NMU

2010-07-30 Thread Nico Golde
Hi, I uploaded the attached debdiff to DELAYED/2, please let me know if you want me to delay this further. Kind regards Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. diff -u cernlib-2006

Bug#589015: intent to NMU

2010-07-28 Thread Nico Golde
Hi, I will upload a fix for this to DELAYED/2. The patch for the NMU is attached. Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. diff -Nru ntfs-config-1.0.1/debian/changelog ntfs

Bug#590303: intent to NMU

2010-07-28 Thread Nico Golde
Hi, I intent to NMU this package to fix this security issue. I uploaded a fix to DELAYED/2. Let me know if you need to delay this longer. debdiff available at: http://people.debian.org/~nion/nmu-diff/xemacs21-21.4.22-3_21.4.22-3.1.patch Cheers Nico -- Nico Golde - http://www.ngolde.de - n

Bug#587536: intent to NMU

2010-07-27 Thread Nico Golde
Hi, I uploaded the attached debdiff to DELAYED/2 to fix this RC bug. The regeneration of the po files was unfortunately a side-effect of the build process. Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail

Bug#560476: singular: [PATCH] FTBFS: febase.cc:752: error: invalid conversion from 'const char*' to 'char*'

2010-07-26 Thread Nico Golde
it seems we require a bit more work to fix this bug :/ [0] https://www.redhat.com/archives/fedora-devel-list/2009-January/msg02248.html Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted

Bug#581308: intent to NMU

2010-07-26 Thread Nico Golde
Hi, I intent to upload a 0-day NMU to fix this bug. Attached is the debdiff. Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. diff -u codeville-0.8.0/debian/changelog codeville-0.8.0

Bug#590298: bozohttpd: CVE-2010-2320,CVE-2010-2195 multiple security issues

2010-07-25 Thread Nico Golde
/CVE-2010-2195 [1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2320 http://security-tracker.debian.org/tracker/CVE-2010-2320 -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted

Bug#587481: intent to NMU

2010-07-25 Thread Nico Golde
Hi, I intent to upload a 0day NMU to fix this bug. The debdiff is available at: http://people.debian.org/~nion/nmu-diff/syscp-1.4.2.1-2_1.4.2.1-2.1.patch Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double

Bug#569097: RM: camserv; -- RoQA; dead upstream, security issue, not properly maintained

2010-07-25 Thread Nico Golde
Hi, I hereby request the removal of camserv from the archive. It's upstream is not active anymore, it's using an old v4l API and tools like camstream look like a good replacement. Please remove camserv. Kind regards Nico signature.asc Description: Digital signature

Bug#590301: emacs22: CVE-2010-0825 movemail vulnerable to symlink attacks due to race condition

2010-07-25 Thread Nico Golde
-0825 -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. pgp2PYcZqyuvs.pgp Description: PGP signature

Bug#581637: intent to NMU

2010-07-25 Thread Nico Golde
Hi, since nothing has happened with this bug anymore I am uploading a 0day NMU now to fix it. Patch attached but is pretty much the one from Jens. Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13

Bug#588090: heap corruption overrun in bogofilter/bogolexer

2010-07-05 Thread Nico Golde
to an invalid pointer. Nice catch by Julius! Patch looks fine for me even though patching it should be not too urgent, I don't see much space for code execution. Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail

Bug#587481: CVE id assigned

2010-07-01 Thread Nico Golde
Hi, CVE-2010-2476 has been assigned to this issue. Please reference this id in the changelog when fixing this bug. Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. pgpScU5c7QFAQ.pgp

Bug#457947: Fwd: [Bug 217485] Re: stack smashing detected

2010-06-20 Thread Nico Golde
Hi, nothing happens with this bug for quite some time now and looking at the source code of this package it is very likely to include further security issues, the source code is a mess. I will request a removal of this package now. Cheers Nico -- Nico Golde - http://www.ngolde.de - n

Bug#586547: webkit: CVE-2010-2304 memory corruption in rendering of list markers

2010-06-20 Thread Nico Golde
-tracker.debian.org/tracker/CVE-2010-2304 -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. pgpQPN1BonlKW.pgp Description: PGP signature

Bug#574757: [moodle-packaging] Bug#574757: phpCAS XSS vulnerablity PHPCAS-52

2010-06-10 Thread Nico Golde
Hi, any news on this bug? Cheers Nico -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Bug#585425: moodle: CVE-2010-1619 cross-site scripting in KSES HTML text cleaning library

2010-06-10 Thread Nico Golde
of the patch is attached. If you fix the vulnerability please also make sure to include the CVE id in your changelog entry. For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1619 http://security-tracker.debian.org/tracker/CVE-2010-1619 -- Nico Golde - http

Bug#584469: intent to NMU

2010-06-10 Thread Nico Golde
Hi, I intent do upload a 0-day NMU to fix this vulnerability. debdiff is at: http://people.debian.org/~nion/nmu-diff/prewikka-1.0.0-1_1.0.0-1.1.patch Cheers Nico -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact

Bug#585440: mono: CVE-2010-1459 insecure default configuration of EnableViewStateMac property might lead to XSS

2010-06-10 Thread Nico Golde
be used without real modifications. If you fix the vulnerability please also make sure to include the CVE id in your changelog entry. For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1459 http://security-tracker.debian.org/tracker/CVE-2010-1459 -- Nico

Bug#582691: patch for sql injection

2010-06-10 Thread Nico Golde
Hi, attached is a patch for CVE-2010-2092. Cheers Nico --- graph.php 2009-06-28 18:07:11.0 +0200 +++ graph.php.new 2010-06-10 17:41:07.0 +0200 @@ -33,7 +33,7 @@ include_once(./include/top_graph_header.php); /* = input validation = */

Bug#576796: xtrlock can be bypassed using TTY's

2010-04-07 Thread Nico Golde
at xtrlock but this sounds like you are starting your xsession with startx rather than exec startx and not like a bug in xtrlock. Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted

Bug#575596: skipfish: manual page missing

2010-03-27 Thread Nico Golde
Package: skipfish Version: 1.19b-1 Severity: serious Tags: sid Justification: Policy 12.1 Hey, your package doesn't provide a manual page. Sorry to nitpick about this one but to be honest this was one of the reasons I didn't package this myself, as I had really no motivation to write one. But

Bug#575596: man page for skipfish

2010-03-27 Thread Nico Golde
. Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. pgpw57Tw7b5IL.pgp Description: PGP signature

Bug#575310: hydrogen: segfaults right after start-up

2010-03-24 Thread Nico Golde
Package: hydrogen Severity: serious Version: 0.9.4-3 Hi, I just wanted to try out hydrogen and it instantly results in a segfault before I see anything of the GUI. I run this on: Linux pagefault 2.6.32-trunk-amd64 #1 SMP Sun Jan 10 22:40:40 UTC 2010 x86_64 GNU/Linux I built a package with

Bug#574832: [security] possible symlink attack against /tmp/ddclient.cache

2010-03-21 Thread Nico Golde
temporary file. The first solution seem to be the best as it avoids the complexity of working with non-predictable temporary files (create, find, update, close). From what I see it is using /var/cache/ddclient/ddclient.cache. Can you elaborate why you think it's using /tmp/? Cheers Nico -- Nico

Bug#574832: [security] possible symlink attack against /tmp/ddclient.cache

2010-03-21 Thread Nico Golde
Hey, * Teodor MICU mteo...@gmail.com [2010-03-21 19:23]: On Sun, Mar 21, 2010 at 6:43 PM, Nico Golde n...@debian.org wrote: From what I see it is using /var/cache/ddclient/ddclient.cache. Can you elaborate why you think it's using /tmp/? It doesn't apper to be using that directory

Bug#569658: ModSecurity Detection Bypass and Denial of Service Vulnerabilities

2010-03-11 Thread Nico Golde
Hi Alberto, what is the status of this bug? Kind regards Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. pgpWeqhlTqLrq.pgp Description: PGP signature

Bug#568383: ejabberd: CVE-2010-0305 remote denial of service via too many client2server messages

2010-02-04 Thread Nico Golde
. Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. signature.asc Description: Digital signature

Bug#564079: Is this really a screensaver issue?

2010-01-26 Thread Nico Golde
some input from the kernel maintainers. Someone with access to the console have several attack vectors available. True, but this one is trivial to exploit and is also fairly easy to prevent so why stick with it? Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG

Bug#566685: openbox: GNOME/Openbox session doesn't start

2010-01-24 Thread Nico Golde
you strace the process to see? Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. pgphpR9uGTDBo.pgp Description: PGP signature

Bug#562884: xscreensaver can be killed with Alt+SysRq+F

2009-12-28 Thread Nico Golde
perspective this needs to be solved. Cced the rest of the team to get some more input. Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. pgphQc8NLdiIV.pgp Description: PGP signature

Bug#561706: obconf: ObConf Error: An error occured while saving the config file '/openbox/lxde-rc.xml'

2009-12-19 Thread Nico Golde
: I/O error : No such file or directory I/O error : No such file or directory This is no obconf bug but an lxde bug: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534804 Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text

  1   2   3   4   5   6   7   8   9   10   >