[Bug 820497] Re: vulnerable to symlink attack via insecure /tmp directory or file

2012-02-09 Thread Zubin Mithra
Hi! The changes I had made were based on a patch that was sent to the mailing list thread at [1], aand here's a link to the patch[2]. [1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622794 [2] http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=24;filename=nmudiff.atop;att=1;bug=622794 --

[Bug 820497] Re: vulnerable to symlink attack via insecure /tmp directory or file

2012-02-10 Thread Zubin Mithra
Hi, I'm uploading a second debdiff file with changes as in the above link and a corrected changelog. ** Patch added: updated patch for maverick https://bugs.launchpad.net/ubuntu/+source/atop/+bug/820497/+attachment/2729207/+files/atop_1.23-1ubuntu1.debdiff ** Changed in: atop (Ubuntu

[Bug 930854] [NEW] gnome-shell in GNOME Shell 2.31.5 places a zero-length directory name in the LD_LIBRARY_PATH

2012-02-11 Thread Zubin Mithra
Public bug reported: gnome-shell in GNOME Shell 2.31.5 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. The bug exists in src/gnome-shell.in in the following snippet. 232

[Bug 930854] Re: gnome-shell in GNOME Shell 2.31.5 places a zero-length directory name in the LD_LIBRARY_PATH

2012-02-11 Thread Zubin Mithra
The patch for the same would be as follows :- LD_LIBRARY_PATH = os.environ.get('LD_LIBRARY_PATH') if LD_LIBRARY_PATH: env['LD_LIBRARY_PATH'] = os.environ.get('LD_LIBRARY_PATH', '') + ':' + mozjs_libdir else: env['LD_LIBRARY_PATH'] = mozjs_libdir ** CVE added:

[Bug 930854] Re: gnome-shell in GNOME Shell 2.31.5 places a zero-length directory name in the LD_LIBRARY_PATH

2012-02-11 Thread Zubin Mithra
For some reason I'm not able to build the source I get via apt-get source, so I'm attaching the patch instead of the debdiff. Please find attached a file which is to be patched against src/gnome-shell.in Hope this helps, Cheers! ** Patch added: cve-2010-4000.patch

[Bug 931036] [NEW] dhcpcd before 5.2.12 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message.

2012-02-12 Thread Zubin Mithra
Public bug reported: dhcpcd before 5.2.12 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message. CVE-2011-0996. This is how opensuse patches it(check out dhcpcd-3.2.3-option- checks.diff) in the following link :-

[Bug 931036] Re: dhcpcd before 5.2.12 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message.

2012-02-13 Thread Zubin Mithra
** Changed in: dhcpcd (Ubuntu) Status: New = Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/931036 Title: dhcpcd before 5.2.12 allows remote attackers to execute arbitrary

[Bug 931036] Re: dhcpcd before 5.2.12 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message.

2012-02-13 Thread Zubin Mithra
Please find attached a debdiff for maverick based on the patch used for opensuse(linked above). The netbios message related stuff has been omitted. ** Patch added: dhcpcd_3.2.3-7ubuntu1.debdiff

[Bug 930700] Re: vdrleaktest in Video Disk Recorder (VDR) 1.6.0 places a zero-length directory name in the LD_LIBRARY_PATH

2012-02-13 Thread Zubin Mithra
Oh, as they were not included in any formal released version I too think now that a CVE would be unnecessary. I'll attach a debdiff for the same asap. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 931036] Re: dhcpcd before 5.2.12 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message.

2012-02-14 Thread Zubin Mithra
My apologies, the patch I had attached were from another testing directory I had and not the final one. Please find attached the correct defdiff file. As part of testing :- = I tried building the deb file debuild = installing it dpkg -i debfile =I tried running the it as sudo dhcpcd eth0 and the

[Bug 930700] Re: vdrleaktest in Video Disk Recorder (VDR) 1.6.0 places a zero-length directory name in the LD_LIBRARY_PATH

2012-02-14 Thread Zubin Mithra
Please find attached the debdiff for the same. ** Patch added: vdr_1.6.0-18ubuntu2.debdiff https://bugs.launchpad.net/ubuntu/+source/vdr/+bug/930700/+attachment/2739154/+files/vdr_1.6.0-18ubuntu2.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is

[Bug 931036] Re: dhcpcd before 5.2.12 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message.

2012-02-14 Thread Zubin Mithra
I just attached another debdiff in which I've corrected maverick to maverick-security. ** Patch added: dhcpcd_3.2.3-7ubuntu1.debdiff https://bugs.launchpad.net/ubuntu/+source/dhcpcd/+bug/931036/+attachment/2740798/+files/dhcpcd_3.2.3-7ubuntu1.debdiff -- You received this bug notification

[Bug 931036] Re: dhcpcd before 5.2.12 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message.

2012-02-14 Thread Zubin Mithra
A minor update on the patch, with maverick changed to maverick- security. ** Patch added: ktsuss_1.4-1ubuntu1.debdiff https://bugs.launchpad.net/ubuntu/+source/dhcpcd/+bug/931036/+attachment/2740805/+files/ktsuss_1.4-1ubuntu1.debdiff -- You received this bug notification because you are a

[Bug 931036] Re: dhcpcd before 5.2.12 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message.

2012-02-14 Thread Zubin Mithra
** Patch removed: ktsuss_1.4-1ubuntu1.debdiff https://bugs.launchpad.net/ubuntu/+source/dhcpcd/+bug/931036/+attachment/2740805/+files/ktsuss_1.4-1ubuntu1.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 820497] Re: vulnerable to symlink attack via insecure /tmp directory or file

2012-02-08 Thread Zubin Mithra
** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-3618 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/820497 Title: vulnerable to symlink attack via insecure /tmp directory or

[Bug 820497] Re: vulnerable to symlink attack via insecure /tmp directory or file

2012-02-09 Thread Zubin Mithra
Please find attached, debdiff for 10.10 Maverick. ** Patch added: atop_1.23-1ubuntu1.debdiff https://bugs.launchpad.net/ubuntu/+source/atop/+bug/820497/+attachment/2725991/+files/atop_1.23-1ubuntu1.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which

[Bug 894782] Re: Newline injection in error.log

2012-02-27 Thread Zubin Mithra
Hi Steve, I've corrected the above mentioned issues; please find attached a patch for lucid; I'll attach a patch for maverick and pass it over upstream asap. Cheers! ** Patch added: icecast2_2.3.2-5ubuntu1.10.04.1.debdiff

[Bug 894782] Re: Newline injection in error.log

2012-02-27 Thread Zubin Mithra
Hi, I've attached the patch for maverick along. ** Patch added: icecast2_2.3.2-5ubuntu1.10.10.1.debdiff https://bugs.launchpad.net/ubuntu/+source/icecast2/+bug/894782/+attachment/2787444/+files/icecast2_2.3.2-5ubuntu1.10.10.1.debdiff -- You received this bug notification because you are a

[Bug 894782] Re: Newline injection in error.log

2012-02-20 Thread Zubin Mithra
Please find attached, a debdiff that patches the issue by trimming at occurances of \r or \n. Tested on lenny. After applying the, you have :- $ echo -ne GET /non-existent''%20No%20such%20file%20or%20directory%0d%0a[1970-01-01%20%2000:00:00]%20PHUN%20I'm%20feeling%20phunny%0d%0a[`date

[Bug 894782] Re: Newline injection in error.log

2012-02-21 Thread Zubin Mithra
Please find attached a new debdiff which replaces \r and \n with '_', rather than trim the string. ** Patch added: icecast2_2.3.2-5ubuntu2.debdiff https://bugs.launchpad.net/ubuntu/+source/icecast2/+bug/894782/+attachment/2767108/+files/icecast2_2.3.2-5ubuntu2.debdiff -- You received this

[Bug 745129] [NEW] buffer overflow in avra1.2.3a

2011-03-29 Thread Zubin Mithra
*** This bug is a security vulnerability *** Public security bug reported: Binary package hint: avra There is a buffer overflow bug in avra1.2.3a which might lead to memory corruption, at the very most. Privilege escalation nor any kind of local exploitation is expected as it runs with the