Bug#382392: krb5: setuid() and seteuid() local privilege escalation vulnerabilities

2006-08-10 Thread Iosif Peterfi
Package: krb5 Severity: grave Justification: user security hole http://www.gentoo.org/security/en/glsa/glsa-200608-15.xml appies to debian too 2006-001-patch_1.5.txt - is from gentoo, applies to debian krb5 too, with some hunks succeding in different places krb5-1.3.6-patch - is the diff

Bug#363694: ntop: active tcp sessions page misscalculation

2006-04-20 Thread Iosif Peterfi
Package: ntop Version: 2:3.0-5 Severity: minor When browsing to Local IP - Active TCP Sessions, the numbers of pages are shown in a wrong way. In the pages are shown only ACTIVE and established connections but the total number includes connections wich are not shown. The folowing patch should

Bug#363695: ntop: active tcp sessions page misscalculation

2006-04-20 Thread Iosif Peterfi
Package: ntop Version: 2:3.0-5 Severity: minor When browsing to Local IP - Active TCP Sessions, the numbers of pages are shown in a wrong way. In the pages are shown only ACTIVE and established connections but the total number includes connections wich are not shown. The folowing patch should

Bug#358812: bugfix for stable sid

2006-04-07 Thread Iosif Peterfi
I've seen the unstable version has been fixed. When will be fixed Debain sid stable ?! -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#354683: sid

2006-04-07 Thread Iosif Peterfi
Debian 3.1 sid stable is affected ? If it is, when will be patched ? -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#354683: typo

2006-04-07 Thread Iosif Peterfi
i meant Debian stable (sarge) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#348530: Clam AntiVirus UPX Unpacking Code Execution Vulnerability

2006-01-17 Thread Iosif Peterfi
Package: clamav-daemon Version: 0.84-2.sarge.6 Severity: critical Justification: root security hole *** Please type your report below this line *** http://www.securityfocus.com/bid/16191/info http://www.securityfocus.com/bid/16191/references -- System Information: Debian Release: 3.1

Bug#320014: What about sarge stable ?

2006-01-17 Thread Iosif Peterfi
Sarge stable hasn't been updated yet. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#314468: squid QoS + tc

2005-06-16 Thread Forte Systems - Iosif Peterfi
Package: squid Version: 2.5.9-10 Severity: wishlist *** Please type your report below this line *** Hello, I wanted to know if there is possible to add the zero penality hit patch for squid in the debian package tree. The package is located here: