Bug#681471: gunicorn 0.14.4 does not properly limit requests size

2012-07-13 Thread Djoume Salvetti
Package: gunicorn Version: 0.14.3-1 Severity: grave Tags: security fixed-upstream gunicorn 0.14 introduced the ability to check if a request line is too large to protect against DoS, however the implementation had the following flaws: * Gunicorn does not limit the size of a request header

Bug#681471: gunicorn 0.14.4 does not properly limit requests size

2012-07-13 Thread Djoume Salvetti
+1 for migrating 0.14.5 from sid to wheezy. On 12-07-13 09:47 AM, Chris Lamb wrote: Hi Djoume, Package: gunicorn Version: 0.14.3-1 Severity: grave [..] This has been fixed upstream in 0.14.4: We could cherry-pick this commit and upload the result to wheezy-p-u but I suggest that we just

Bug#462313: subversion-tools: manpages of svnwrap has a wrong inetd.conf example

2008-01-23 Thread Djoume SALVETTI
Package: subversion-tools Severity: normal Hi, in svnwrap manpage the recommanded way of configuring inetd.conf is: svn stream tcp nowait my_svn_user /usr/bin/svnwrap svnserve -i -r /srv/svn This configuration gave me svn: Malformed network data when I try to checkout. I think that should

Bug#446102: boxes: New upstream version available

2007-10-10 Thread Djoume SALVETTI
Package: boxes Version: 1.0.1a-2.2 Severity: normal Hello, Since July 23, 2006 a new upstream version is available on : http://boxes.thomasjensen.com/ It includes all fixes contained in boxes-1.0.1.patch except the config file location. It also includes new designs (boxquote, stone, ...)

Bug#418004: Please update sun-java6 with new upstream version

2007-05-25 Thread Djoume SALVETTI
merge 410052 410116 tag 410052 security thanks Hi, Please note that the actual JVM is vulnerable to a JPG/BMP parser vulnerability. This is known as CVE-2007-2789. More info (including a PoC) is available here : http://scary.beasts.org/security/CESA-2006-004.html Regards. -- Djoume

Bug#423062: Martin Zobel-Helas: Packages considered for 4.0r1

2007-05-11 Thread Djoume SALVETTI
#150_11 Regards. -- Djoume SALVETTI -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#385299: umbrello: Umbrello should depend on kdebase-bin

2007-03-27 Thread Djoume SALVETTI
. Regards. -- Djoume SALVETTI signature.asc Description: Digital signature

Bug#385299: umbrello: Umbrello should depend on kdebase-bin

2007-02-19 Thread Djoume SALVETTI
XSLT processing library - runtime ii libxt6 1:1.0.2-2 X11 toolkit intrinsics library ii zlib1g 1:1.2.3-13compression library - runtime umbrello recommends no packages. -- no debconf information -- Djoume SALVETTI Index: kdesdk-3.5.5/debian

Bug#385299: umbrello: Umbrello should depend on kdebase-bin

2007-02-19 Thread Djoume SALVETTI
will downgrade this soon, unless I get better reasonings May be it's not drkonqi that is required. Anyway, feel free to downgrade if you think serious is not justified. Regards. -- Djoume SALVETTI signature.asc Description: Digital signature

Bug#385299: umbrello: Umbrello should depend on kdebase-bin

2007-02-19 Thread Djoume SALVETTI
severity #385299 important thanks Le lun 19 fév 2007 14:36:08 GMT Sune Vuorela [EMAIL PROTECTED] a écrit : On Monday 19 February 2007, Djoume SALVETTI wrote: I would be glad if you could pinpoint it to a specific part of kdebase-bin that it is needed. I have just tired to force-remove

Bug#406315: totem-mozilla + vlc freeze my powerbook

2007-01-10 Thread Djoume SALVETTI
, the computer freeze like the first time. That's strange; at all rates, the X server should not freeze. That's why I had previously set the severity to critical. Maybe this bug should be reassign to xserver-xorg-video-nv? Regards. -- Djoume SALVETTI -- To UNSUBSCRIBE, email to [EMAIL PROTECTED

Bug#406315: totem-mozilla + vlc freeze my powerbook

2007-01-10 Thread Djoume SALVETTI
have debian-multimedia in my sources.list but I haven't gstreamer0.10-plugins-really-bad installed. The only packages from debian-multimedia installed on my computer are lame and lame-extras. Regards. -- Djoume SALVETTI

Bug#406315: totem-mozilla + vlc freeze my powerbook

2007-01-10 Thread Djoume SALVETTI
to read simultaneously two video, one with totem and the other one with vlc I've got the same system freeze as describe before. Regards. -- Djoume SALVETTI -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#400990: installation-report: Etch install over SSH rocks! :-)

2006-11-29 Thread Djoume SALVETTI
Package: installation-reports Version: 2.23 Severity: normal -- Package-specific info: Boot method: network Image version: http://www.slug-firmware.net/ Date: Date and time of the install Machine: NSLU2 Partitions: df -Tl will do; the raw partition table is preferred [EMAIL PROTECTED]:~$ df

Bug#356190: r83 works fine with 2.6.17

2006-07-12 Thread Djoume SALVETTI
Good day, I was also loosing 3 bytes per packet with 0.0.0.svnr67-2. I Just want to add that r83 works fine here, with a standard debian 2.6.17 kernel (2.6.17-1-powerpc), on a powerbook 12 and a ZyXEL Zyair 802.11b/g (ID 0586:3401). Regards. -- Djoume SALVETTI -- To UNSUBSCRIBE, email

Bug#356190: Same problem here

2006-03-30 Thread Djoume SALVETTI
have a ZyXEL Zyair 802.11b/g (ID 0586:3401). Regards. -- Djoume SALVETTI -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#302527: #302527: snapscan e25 segfault

2005-09-30 Thread Djoume SALVETTI
, can you confirm ? Yes I can confirm. No more segfault with sm3600 and snapscan enable. Congratulations guys! :-) -- Djoume SALVETTI -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#310046: xcdroast: [CAN-2003-1155] woody version vulnerable to symlink attack

2005-05-21 Thread Djoume SALVETTI
Package: xcdroast Severity: important Tags: woody security Good day, From CAN-2003-1155 : | X-CD-Roast 0.98 alpha10 through alpha14 allows local users to overwrite | arbitrary files via a symlink attack on an unknown file. This is fixed in debian package 0.98+0alpha15-1 (so sarge and sid are

Bug#308875: metamail: Metamail 'extcompose' script Symlink Vulnerability

2005-05-12 Thread Djoume SALVETTI
Package: metamail Severity: normal Tags: security patch Good day, From CAN-2004-1808 : | Extcompose in metamail does not verify the output file before writing | to it, which allows local users to overwrite arbitrary files via a | symlink attack. More info is available here :

Bug#302527: sane-utils: scanimage -L segfault on powerpc with AGFA snapscan e25

2005-04-05 Thread Djoume SALVETTI
Le mardi 04/05/05 Julien BLACHE [EMAIL PROTECTED] a écrit : It would be nice if you could find the backend that is causing the problem, so that we can try to solve the bug. If you have/had libsane-extras installed, please try those backends first. Hi, I didn't have libsane-extras

Bug#302527: sane-utils: scanimage -L segfault on powerpc with AGFA snapscan e25

2005-04-05 Thread Djoume SALVETTI
Le mardi 04/05/05 Julien BLACHE [EMAIL PROTECTED] a écrit : sm3600 seems to be the backend which cause scanimage (and other programs) to segfault. Hmm. valgrind produces no error on the backend... I have try to look with valgrind by myself but I haven't found any ppc version that works yet

Bug#302527: sane-utils: scanimage -L segfault on powerpc with AGFA snapscan e25

2005-04-05 Thread Djoume SALVETTI
Le mardi 04/05/05 Julien BLACHE [EMAIL PROTECTED] a écrit : sm3600 seems to be the backend which cause scanimage (and other programs) to segfault. Does it segfault too if you only enable the sm3600 backend ? No, it doesn't segfault when sm3600 is the only one enable But it still segfault

Bug#302527: sane-utils: scanimage -L segfault on powerpc with AGFA snapscan e25

2005-04-04 Thread Djoume SALVETTI
Le dimanche 04/03/05 Julien BLACHE [EMAIL PROTECTED] a écrit : Could you disable all the backends in /etc/sane.d/dll.conf *AND* /etc/sane.d/dll.d/* (or just purge libsane-extras if you don't need it) and see if it still crashes ? Many thanks, after disabling everything (except snapscan) in

Bug#302527: sane-utils: scanimage -L segfault on powerpc with AGFA snapscan e25

2005-04-02 Thread Djoume SALVETTI
Le vendredi 04/01/05 Julien BLACHE [EMAIL PROTECTED] a écrit : What does file scanimage tell about your scanimage binary ? It should tell you it's not stripped. By the way, you need to have /usr/lib/sane/libsane-snapscan.so.1.0.15 as a non-stripped binary if you want to get something useful.

Bug#302527: sane-utils: scanimage -L segfault on powerpc with AGFA snapscan e25

2005-04-01 Thread Djoume SALVETTI
Package: sane-utils Version: 1.0.15-8 Severity: normal Good day, I'm not able to use my AGFA snapscan e25 USB scanner on my powerbook running Debian sid. Every program I have tried segfault (scanimage, xscanimage, xcam) or eat 100% of my CPU (xsane). My scanner works fine with my other laptop

Bug#302527: sane-utils: scanimage -L segfault on powerpc with AGFA snapscan e25

2005-04-01 Thread Djoume SALVETTI
Le vendredi 04/01/05 Julien BLACHE [EMAIL PROTECTED] a écrit : If it could be useful, I can try to recompiled sane with debug information and send a gdb backtrace. That'd be good, because it doesn't segfault here with my snapscan scanner. Here is the backtrace : (gdb) exec-file

Bug#299185: kernel-source-2.6.8: Please consider include Guido Guenther rivafb patch

2005-03-12 Thread Djoume SALVETTI
Package: kernel-source-2.6.8 Version: 2.6.8-13.djo Severity: wishlist Good day, Actual kernel-source-2.6.8 doesn't provide support for backlight control on newer powerbooks (12, NV30 based) which reduce a lot battery's autonomy. Could you consider include rivafb backlight control support and

Bug#298926: [CAN-2005-0638] xloadimage shell metacharacters vulnerability

2005-03-10 Thread Djoume SALVETTI
Package: xloadimage Version: 4.1-14 Severity: normal Tags: security, patch Good day, From CAN-2005-0638 : | xloadimage before 4.1-r2, and xli before 1.17, allows attackers to | execute arbitrary commands via shell metacharacters in filenames for | compressed images, which are not properly

Bug#298105: sympa: [CAN-2004-1735] XSS vulnerability in the create list option in Sympa 4.1.x

2005-03-04 Thread Djoume SALVETTI
Package: sympa Severity: normal Tags: security Good day, From CAN-2004-1735 : | Cross-site scripting (XSS) vulnerability in the create list option in | Sympa 4.1.x and earlier allows remote authenticated users to inject | arbitrary web script or HTML via the description field. More info is

Bug#297627: kernel-source-2.6.10: Please consider include rivafb as builtin

2005-03-01 Thread Djoume SALVETTI
Package: kernel-source-2.6.10 Version: 2.6.10-5 Severity: wishlist Good day, Radeonfb and offb are builtin but rivafb is not. I don't know why but it seems that rivafb can't take over from offb even with video=rivafb kernel parameter. So this mean that on my 12 powerbook I can only used offb

Bug#296780: sablevm: no Exception AbstractMethodError when access to a non-implemented abstract method

2005-02-24 Thread Djoume SALVETTI
Package: sablevm Version: 1.1.9-1 Severity: normal Good day, SableVM seems to go for an infinite loop instead of throw AbstractMethodError exception (as Sun VM do) when I try to access to a non-implemented abstract method. To reproduce the problem I have use the two files attached and do in

Bug#296780: Acknowledgement (sablevm: no Exception AbstractMethodError when access to a non-implemented abstract method)

2005-02-24 Thread Djoume SALVETTI
Just want to add that kaffe as the same behavior as Sun VM : [EMAIL PROTECTED]:~/perso/IFITEP/Java/abstract$ kaffe BugAbstract java.lang.AbstractMethodError: B.f at BugAbstract.main (BugAbstract.java:7) -- Djoumé SALVETTI -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of

Bug#296677: kernel-source-2.6.10: Please consider include Guido Guenther powerpc patches

2005-02-23 Thread Djoume SALVETTI
Package: kernel-source-2.6.10 Severity: wishlist Tags: patch Good day, Guido Guenther maintains some patches against 2.6 that I found very usefull : software suspend : From debian-ppc : | On Wed, Feb 23, 2005 at 11:54:20AM +1100, Benjamin Herrenschmidt wrote: | I also gather that

Bug#296466: xerces21: [CAN-2004-1575] Xerces-C++ 2.5.0: Attribute blowup

2005-02-22 Thread Djoume SALVETTI
Package: xerces21 Severity: normal Good day, From [CAN-2004-1575] : | The XML parser in Xerces-C++ 2.5.0 allows remote attackers to cause a | denial of service (CPU consumption) via XML attributes in a crafted | XML document. This problem have been fixed in version 2.6 of Xerces. I have

Bug#295960: Acknowledgement (webcalendar: SQL injection via login name in validate.php)

2005-02-20 Thread Djoume SALVETTI
This problem has been reference as CAN-2005-0474, Could you please reference this CAN number in changelog entries fixing this bug? Regards. -- Djoumé SALVETTI -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#295947: kernel-source-2.6.10: [CAN-2005-0449] skb_checksum_help DoS

2005-02-19 Thread Djoume SALVETTI
Package: kernel-source-2.6.10 Severity: normal Good day, From CAN-2005-0449 : | The netfilter/iptables module in Linux before 2.6.8.1 allows remote | attackers to cause a denial of service (kernel crash) or bypass | firewall rules via crafted packets, which are not properly handled by | the

Bug#295960: webcalendar: SQL injection via login name in validate.php

2005-02-19 Thread Djoume SALVETTI
Package: webcalendar Version: 0.9.45-2 Severity: normal Tags: security patch Good day, From [1] : | There is a security hole in WebCalendar 0.9.45 and | earlier that can allow a malicious user to issue SQL | commands to affect your database. The user could | insert data, delete data or drop

Bug#295759: squid: [CAN-2005-0446] Assertion failure on certain odd DNS responses

2005-02-17 Thread Djoume SALVETTI
Package: squid Version: squid 2.5.8-2 Severity: normal Good day, From CAN-2005-0446 | Squid 2.5.STABLE8 and earlier allows remote attackers to cause a | denial of service (crash) via certain DNS responses regarding (1) | Fully Qualified Domain Names (FQDN) in fqdncache.c or (2) IP addresses |

Bug#295756: openwebmail: [CAN-2005-0445] XSS via domainname

2005-02-17 Thread Djoume SALVETTI
Package: openwebmail Version: 2.41-10 Severity: normal Good day, From CAN-2005-0445 : | Cross-site scripting (XSS) vulnerability in Open WebMail 2.x allows | remote attackers to inject arbitrary HTML or web script via the domain | name parameter (logindomain) in the login page. This problem

Bug#293940: kernel-patch-adamantix: [CAN-2004-0667] RSBAC privilege escalation inside jail

2005-02-06 Thread Djoume SALVETTI
Package: kernel-patch-adamantix Severity: normal Good day, RSBAC patch included in kernel-patch-adamantix seems to be vulnerable to CAN-2004-0667 : More details can be grab here : http://www.rsbac.org/download/bugfixes/ and a one line patch is available here :

Bug#293664: mozilla-firefox: [CAN-2004-1156] secunia window injection

2005-02-05 Thread Djoume SALVETTI
Le samedi 02/05/05 Eric Dorland [EMAIL PROTECTED] a écrit : Unfortunately the patch does not apply cleanly to Firefox 1.0 sources. Any idea if they're planing a 1.0.1 to address it? On https://bugzilla.mozilla.org/show_bug.cgi?id=103638 Boris Zbarsky wrote : | What worries me most is that

Bug#293663: /usr/bin/mozilla-1.7.5: [CAN-2004-1156] secunia window injection vulnerability

2005-02-04 Thread Djoume SALVETTI
Package: mozilla-browser Version: 2:1.7.5-1 Severity: normal File: /usr/bin/mozilla-1.7.5 Good day, Mozilla browser is vulnerable to window injection vulnerability describe in CAN-2004-1156 : http://secunia.com/secunia_research/2004-13/advisory/

Bug#293664: mozilla-firefox: [CAN-2004-1156] secunia window injection

2005-02-04 Thread Djoume SALVETTI
Package: mozilla-firefox Version: 1.0+dfsg.1-4 Severity: normal Good day, Firefox is vulnerable to window injection vulnerability describe in CAN-2004-1156 : http://secunia.com/secunia_research/2004-13/advisory/ http://secunia.com/multiple_browsers_window_injection_vulnerability_test/ The