Bug#633637: NMU patch

2011-07-18 Thread Steffen Joeris
@@ +libapache2-mod-authnz-external (3.2.4-2.1) unstable; urgency=high + + * Non-maintainer upload by the security team + * Fix SQL injection via the $user paramter (Closes: #633637) +Fixes: CVE-2011-2688 + + -- Steffen Joeris wh...@debian.org Mon, 18 Jul 2011 10:26:11 +1000 + libapache2-mod

Bug#633637: reopen bug

2011-07-14 Thread Steffen Joeris
Hi Amaya, Steffen Joeris wrote: I had a quick look and didn't see that code included in debian as far as I can see the package has the same version in all suites or am I missing anything? Oh, $DEITY, you are absolutely right, I looked at a locally patched version and confused

Bug#628448: several vulnerabilities: CVE-2011-2162 CVE-2011-2161 CVE-2011-2160

2011-05-28 Thread Steffen Joeris
Package: libav Severity: grave Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) ids were published for libav. CVE-2011-2162[0]: | Multiple unspecified vulnerabilities in FFmpeg 0.4.x through 0.6.x, as | used in MPlayer 1.0

Bug#628449: CVE-2011-2147: missing restrictions

2011-05-28 Thread Steffen Joeris
Package: openswan Severity: grave Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for openswan. CVE-2011-2147[0]: | Openswan 2.2.x does not properly restrict permissions for (1) | /var/run/starter.pid,

Bug#628450: CVE-2011-0188: arbitrary code execution

2011-05-28 Thread Steffen Joeris
Package: libruby1.9.1 Severity: grave Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for openswan. CVE-2011-0188[0]: | The VpMemAlloc function in bigdecimal.c in the BigDecimal class in | Ruby 1.9.2-p136

Bug#628451: CVE-2011-0188: arbitrary code execution

2011-05-28 Thread Steffen Joeris
Package: ruby1.9 Severity: grave Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for openswan. CVE-2011-0188[0]: | The VpMemAlloc function in bigdecimal.c in the BigDecimal class in | Ruby 1.9.2-p136 and

Bug#628452: CVE-2011-0188: arbitrary code execution

2011-05-28 Thread Steffen Joeris
Package: ruby1.8 Version: 1.8.7.334-5 Severity: grave Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for openswan. CVE-2011-0188[0]: | The VpMemAlloc function in bigdecimal.c in the BigDecimal class in |

Bug#628453: CVE-2011-1521: information disclosure

2011-05-28 Thread Steffen Joeris
Package: python3.1 Severity: grave Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for python3.1. CVE-2011-1521[0]: | The urllib and urllib2 modules in Python 2.x before 2.7.2 and 3.x | before 3.2.1 process

Bug#628455: CVE-2011-1521: information disclosure

2011-05-28 Thread Steffen Joeris
Package: python2.6 Version: 2.6.6-10 Severity: grave Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for python2.6. CVE-2011-1521[0]: | The urllib and urllib2 modules in Python 2.x before 2.7.2 and 3.x |

Bug#628456: CVE-2011-0766: cryptographic weakness

2011-05-28 Thread Steffen Joeris
Package: erlang Severity: grave Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, Please see http://www.kb.cert.org/vuls/id/178990 for all the information. The upstream patch can be reviewed here: https://github.com/erlang/otp/commit/f228601de45c5 Cheers, Steffen -BEGIN

Bug#619806: CVE-2010-3695: fix XSS

2011-03-27 Thread Steffen Joeris
by the security team + * Fix cross-site scripting via the fm parameters (Closes: #598584) +Fixes: CVE-2010-3695 + + -- Steffen Joeris wh...@debian.org Sun, 27 Mar 2011 20:42:56 +1100 + imp4 (4.2-4lenny2) stable; urgency=low * Backport patches from Horde CVS (http://bugs.horde.org/ticket/8836

Bug#606384: unblock: collectd/4.10.1-2.1

2010-12-08 Thread Steffen Joeris
Hi, On Wed, Dec 08, 2010 at 09:03:17PM +, Adam D. Barratt wrote: On Wed, 2010-12-08 at 21:10 +0100, Moritz Muehlenhoff wrote: Please unblock package collectd. Judging by the changelog 4.10.1-1+squeeze1 and 4.10.1-2 look alike, but for some reason Steffen NMUd the unstable version.

Bug#605092: nmu patch

2010-12-07 Thread Steffen Joeris
=high + + * Non-maintainer upload by the security team + * Fix DoS in RRD file creation (Closes: #605092) +Fixes: CVE-2010-4336 +Thanks to Florian Forster + + -- Steffen Joeris wh...@debian.org Wed, 08 Dec 2010 17:45:50 +1100 + collectd (4.10.1-2) unstable; urgency=medium * debian

Bug#603749: mahara in sid not affected

2010-11-17 Thread Steffen Joeris
severity 603749 normal thx It seems that the vulnerable file was introduced after 1.2.6, which is currently in sid. So as long as a fixed version is uploaded next, everything should be fine. Cheers, Steffen signature.asc Description: This is a digitally signed message part.

Bug#596086: NMU diff

2010-09-18 Thread Steffen Joeris
team + * Fix DoS due to wrong string handling (Closes: #596086) +Fixes: CVE-2010-3072 + + -- Steffen Joeris wh...@debian.org Mon, 13 Sep 2010 17:07:51 +1000 + squid3 (3.1.6-1) unstable; urgency=low * New upstream release diff -u squid3-3.1.6/debian/patches/00list squid3-3.1.6/debian

Bug#574418: barnowl security update

2010-03-26 Thread Steffen Joeris
Hi Sam Could you prepare updated packages for lenny and send a debdiff? We'll need to release a DSA for this issue. Cheers Steffen signature.asc Description: This is a digitally signed message part.

Bug#572417: tidary XSS

2010-03-07 Thread Steffen Joeris
Hi Hideki Indeed this should be fixed via a DSA and for unstable as well. I am still having slight problems understanding the XSS issue here. Apparently, to_native() is converting it to another encoding, but shouldn't it do some escaping of certain characters to avoid having the usual html

Bug#572417: tidary XSS

2010-03-07 Thread Steffen Joeris
Hi Hideki Thanks for the information. Have you been able to reproduce the problem with IE and checked the patch? Cheers Steffen On Sun, 7 Mar 2010 19:10:12 +1100 Steffen Joeris steffen.joe...@skolelinux.de wrote: Apparently, to_native() is converting it to another encoding

Bug#572417: tdiary XSS

2010-03-07 Thread Steffen Joeris
On Mon, 8 Mar 2010 03:01:39 am Hideki Yamane wrote: Hi Steffen, On Sun, 7 Mar 2010 21:47:53 +1100 Steffen Joeris steffen.joe...@skolelinux.de wrote: Thanks for the information. Have you been able to reproduce the problem with IE and checked the patch? with IE6 and IE8, I cannot

Bug#568291: possible buffer overflows

2010-02-04 Thread Steffen Joeris
Hi Mirco Hi GMime upstream has released latest 2.4.15 [1] version of the library fixing one security issue. From 2.4.15-changes [2] file: 2010-01-31 Jeffrey Stedfast f...@novell.com * gmime/gmime-encodings.h (GMIME_UUENCODE_LEN): Fixed to prevent possible buffer

Bug#555233: system copy of prototypejs

2010-02-04 Thread Steffen Joeris
Hi Andres I've read your previous comments to the bugreport, but wanted to stress the point that it will not be acceptable for mediabomb to use an internal copy of prototypejs. We do not want a version of the package in squeeze that does not use the system wide protoypejs. I understand that

Bug#568291: possible buffer overflows

2010-02-03 Thread Steffen Joeris
Package: libgmime-2.0-2a Severity: grave Tags: security patch Hi GMime upstream has released latest 2.4.15 [1] version of the library fixing one security issue. From 2.4.15-changes [2] file: 2010-01-31 Jeffrey Stedfast f...@novell.com * gmime/gmime-encodings.h (GMIME_UUENCODE_LEN):

Bug#559531: reopen

2010-02-02 Thread Steffen Joeris
reopen 559531 severity 559531 important thanks Hi MSA-09-0025 and MSA-09-0029 don't seem to be fixed. Both issues are minor security issues, so I am lowering the severity. Cheers Steffen signature.asc Description: This is a digitally signed message part.

Bug#505122: NMU patch

2010-01-30 Thread Steffen Joeris
-1.9.4/debian/changelog --- audiere-1.9.4/debian/changelog +++ audiere-1.9.4/debian/changelog @@ -1,3 +1,11 @@ +audiere (1.9.4-3.1) unstable; urgency=low + + * Non-maintainer upload + * Fix FTBFS with GCC 4.4 (Closes: #505122) +Thanks to Martin Michlmayr + + -- Steffen Joeris wh...@debian.org

Bug#567462: courier-maildrop is a code duplication of maildrop

2010-01-29 Thread Steffen Joeris
Package: courier-maildrop Severity: important Hi During the last DSA I realised that we have a maildrop and a courier-maildrop package in debian. Both have the same code and the only difference afaik are some configure options and maybe a different build system. However, I don't see a reason for

Bug#564601: CVE id for maildrop issue (CVE-2010-0301)

2010-01-29 Thread Steffen Joeris
Hi FYI, This issue has been assigned CVE-2010-0301. Cheers Steffen signature.asc Description: This is a digitally signed message part.

Bug#550389: NMU patch

2010-01-29 Thread Steffen Joeris
descriptors +Thanks to Julien Cristau + + -- Steffen Joeris wh...@debian.org Fri, 29 Jan 2010 14:30:27 +0100 + hybserv (1.9.2-4) unstable; urgency=low * Update 01_fhs+mkdirfix.dpatch: diff -u hybserv-1.9.2/debian/hybserv.postinst hybserv-1.9.2/debian/hybserv.postinst --- hybserv-1.9.2

Bug#550389: CVE id

2010-01-29 Thread Steffen Joeris
Hi For the record, this issue got CVE-2010-0303 assigned. Cheers Steffen signature.asc Description: This is a digitally signed message part.

Bug#554788: raise severity

2010-01-28 Thread Steffen Joeris
severity 554788 serious thanks Hi This bug caused the regression on the last DSA and dpkg-shlibdeps is still not able to set a proper dependency on courier-authlib. This might be fixed for maildrop by a hard dependency, but this is not the way to go. Please fix this issue for squeeze and IMHO

Bug#567193: include patch from DSA to fix integer underflow

2010-01-27 Thread Steffen Joeris
Package: oftc-hybrid Severity: grave Tags: security patch Hi Please include the patch from DSA-1980-1, which fixes an integer underflow (patch attached). Cheers Steffen --- ircd-hybrid-7.2.2.dfsg.2.orig/src/irc_string.c +++ ircd-hybrid-7.2.2.dfsg.2/src/irc_string.c @@ -103,7 +103,9 @@ }

Bug#567191: please include patches from DSA

2010-01-27 Thread Steffen Joeris
Package: ircd-ratbox Severity: grave Tags: security patch Hi DSA-1980-1 has fixed two issues in ircd-ratbox, patches attached. Please include them in the next upload. Cheers Steffen --- ircd-hybrid-7.2.2.dfsg.2.orig/src/irc_string.c +++ ircd-hybrid-7.2.2.dfsg.2/src/irc_string.c @@ -103,7 +103,9

Bug#567192: include patches from recent DSA

2010-01-27 Thread Steffen Joeris
Package: ircd-hybrid Version: 1:7.2.2.dfsg.2-6.1 Severity: grave Tags: security patch Hi DSA-1980-1 has fixed an issue in ircd-hybrid, patch attached. Please include this patch in your next upload. Cheers Steffen --- ircd-hybrid-7.2.2.dfsg.2.orig/src/irc_string.c +++

Bug#563784: bastille NMU

2010-01-23 Thread Steffen Joeris
dependency in init LSB header to use $network rather than +$local_fs to make sure networking is available during boot and to +make the package installation work again (Closes: #563784) +Thanks to Petter Reinholdtsen + + -- Steffen Joeris wh...@debian.org Sat, 23 Jan 2010 13:08:40 +0100

Bug#545651: FTBFS for gcc4.4 patch

2010-01-23 Thread Steffen Joeris
Hi Unfortunately, the package still doesn't work, but please find the patch for the initialising error from the newer compiler below. Cheers Steffen --- insight-6.7.1.dfsg.1.orig/gdb/eval.c +++ insight-6.7.1.dfsg.1/gdb/eval.c @@ -1627,6 +1627,8 @@ if (nargs != ndimensions)

Bug#557807: proposed argus-server patch

2010-01-22 Thread Steffen Joeris
Hi Andrew Following up on this bugreport, if I take the current argus-server package from unstable and try to rebuild it, I'll end up without the argus (or argus_linux) binary in the package[0]. There seems to be a change in the libpcap package's API. Also, you've used the pcap_read() and

Bug#557807: NMU

2010-01-22 Thread Steffen Joeris
-16.1) unstable; urgency=low + + * Non-maintainer upload + * Use pcap_dispatch() rather than the private functions +pcap_offline_read()/pcap_read() and fix a few compilation errors +(Closes: #557807) + + -- Steffen Joeris wh...@debian.org Fri, 22 Jan 2010 15:16:59 +0100 + argus (1:2.0.6

Bug#565287: gwget2 nmu

2010-01-22 Thread Steffen Joeris
by adjusting configure.ac and debian/rules +(Closes: #565287) Thanks to Peter Green + + -- Steffen Joeris wh...@debian.org Fri, 22 Jan 2010 21:39:05 +0100 + gwget2 (1.0.4-1) unstable; urgency=low * New upstream release. Closes: #533658, #552715. diff -u gwget2-1.0.4/debian/rules gwget2

Bug#505626: NMU patch

2010-01-22 Thread Steffen Joeris
GCC compiler (Closes: #505626) +Thanks to Martin Michlmayr + + -- Steffen Joeris wh...@debian.org Fri, 22 Jan 2010 23:08:35 +0100 + mm3d (1.3.7-1.1) unstable; urgency=low * Non-maintainer upload. only in patch2: unchanged: --- mm3d-1.3.7.orig/src/mm3dcore/tool.h +++ mm3d-1.3.7/src

Bug#566002: CVE-2010-0001: integer underflow

2010-01-20 Thread Steffen Joeris
Package: gzip Version: 1.3.12-8 Severity: grave Tags: security patch Hi Bdale, Carl Carl, I saw too late that you're a new co-maintainer so I only forwarded the pre-notification to Bdale (who is probably busy at LCA). i the following CVE (Common Vulnerabilities Exposures) id was published for

Bug#504956: dc-qt: diff for NMU version 0.2.0.alpha-4.1

2009-12-26 Thread Steffen Joeris
Hi Christoph I've prepared an NMU for dc-qt (versioned as 0.2.0.alpha-4.1) and uploaded it to DELAYED/2. Please feel free to tell me if I should delay it longer. Thanks for your work. I am not really maintaining the package anymore. I guess I should check whether the alternatives are good

Bug#558685: some more information and patch on rails issues

2009-12-24 Thread Steffen Joeris
Hi Adam These issues have been assigned CVE ids, see below: CVE-2009-4214[0]: | Cross-site scripting (XSS) vulnerability in the strip_tags function in | Ruby on Rails before 2.2.s, and 2.3.x before 2.3.5, allows remote | attackers to inject arbitrary web script or HTML via vectors involving |

Bug#562165: CVE-2009-4369, CVE-2009-4370, CVE-2009-4371: Several XSS issues

2009-12-23 Thread Steffen Joeris
Package: drupal6 Severity: grave Tags: security patch Hi Luigi, the following CVE (Common Vulnerabilities Exposures) ids were published for drupal6. CVE-2009-4371[0]: | Cross-site scripting (XSS) vulnerability in the Locale module | (modules/locale/locale.module) in Drupal Core 6.14, and

Bug#562165: drupal5?

2009-12-23 Thread Steffen Joeris
Hi Luigi By the way, drupal5 is also affected by at least one of these issues. Can we remove drupal5 from debian or is there a reason for keeping it? It would be easier foaev it gone, then we'd only have to track one package. Cheers Steffen -- To UNSUBSCRIBE, email to

Bug#560604: NMU patch

2009-12-23 Thread Steffen Joeris
+ + * Non-maintainer upload + * Add libmagickcore2-extra as build-depends since imagemagick has +reorganised the plugin packages (thanks to Stuart Prescott) +(Closes: #560604) + + -- Steffen Joeris wh...@debian.org Wed, 23 Dec 2009 22:19:35 +0100 + qemulator (0.5-3) unstable; urgency=low

Bug#561338: CVE-2009-4032: multiple XSS issues

2009-12-16 Thread Steffen Joeris
by the security team + * Fix several cross-site scriptings via different vectors +Fixes: CVE-2009-4032 + + -- Steffen Joeris wh...@debian.org Wed, 16 Dec 2009 12:06:20 +0100 + cacti (0.8.7e-1) unstable; urgency=low * New upstream release (Closes: #541490). diff -u cacti-0.8.7e/debian/patches

Bug#561339: CVE-2009-4112: arbitrary command execution

2009-12-16 Thread Steffen Joeris
Package: cacti Severity: grave Tags: security Hi Sean the following CVE (Common Vulnerabilities Exposures) id was published for cacti. CVE-2009-4112[0]: | Cacti 0.8.7e and earlier allows remote authenticated administrators to | gain privileges by modifying the Data Input Method for the Linux -

Bug#559667: CVE-2009-4081: untrusted search path

2009-12-05 Thread Steffen Joeris
Package: dstat Severity: important Tags: patch, security Hi, the following CVE (Common Vulnerabilities Exposures) id was published for dstat. CVE-2009-4081[0]: | Untrusted search path vulnerability in dstat before r3199 allows local | users to gain privileges via a Trojan horse Python module in

Bug#559453: only limited security support for ocsinventory-server and sql-ledger

2009-12-04 Thread Steffen Joeris
Package: release-notes Severity: important Hi Please indicate that the packages ocsinventory-server and sql-ledger only receive limited security support, because they should only be used behind authenticated HTTP zones. For sql-ledger, this is true for etch, lenny and squeeze and for

Bug#555666: CVE-2009-2820: XSS issues

2009-11-10 Thread Steffen Joeris
Package: cups Version: 1.4.1-5 Severity: grave Tags: security patch Hi Martin The recent DSA (DSA-1933-1) fixed a few cross-site scripting issues. Please include the patch in the unstable/testing distribution. Cheers Steffen diff -u cupsys-1.2.2/debian/changelog cupsys-1.2.2/debian/changelog

Bug#550440: advi: CVE-2009-2295 arbitrary code execution

2009-10-10 Thread Steffen Joeris
On Sun, 11 Oct 2009 07:38:01 am Mehdi Dogguy wrote: Michael S Gilbert a écrit : Package: advi Version: 1.6.0-12 Severity: serious Tags: security Hi, The following CVE (Common Vulnerabilities Exposures) id was published for camlimages. advi statically links to camlimages, so

Bug#532053: wrongly updates /etc/resolv.conf

2009-10-05 Thread Steffen Joeris
Hi I am using version 0.7.1-2. I do switch between several LAN connections and in the past nm used to update the /etc/resolv.conf file correctly and only added the used name server. Now it adds the other nameserver, but keeps the one from a previous connection as well, which causes DNS

Bug#548198: CVE-2009-2905: buffer overflow

2009-09-24 Thread Steffen Joeris
Package: newt Severity: grave Tags: security patch Hi There is a buffer overflow in textbox.c. This issue is CVE-2009-2905. In textbox.c the following patch has been applied. - result = malloc(strlen(text) + (strlen(text) / width) + 2); + result = malloc(strlen(text) +

Bug#547358: destar: security buggy, dead maintainer/upstream

2009-09-18 Thread Steffen Joeris
Package: release.debian.org Severity: normal Hi destar is security buggy and we have assessed the situation and decided that it is best to remove the package from (old)stable. Please schedule its removal with the next point release. Cheers Steffen -- To UNSUBSCRIBE, email to

Bug#546917: RM: rails/1.1.6-3

2009-09-16 Thread Steffen Joeris
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: rm On Wed, 16 Sep 2009 02:47:38 am Steffen Joeris wrote: Debian Security Advisory DSA-1887-1 secur

Bug#545779: XSS and illegal characters while printing name-value pairs

2009-09-09 Thread Steffen Joeris
Package: viewvc Severity: grave Tags: security patch Hi According to upstream: Version 1.1.2 (released 11-Aug-2009) * security fix: validate the 'view' parameter to avoid XSS attack * security fix: avoid printing illegal parameter names and values

Bug#542288: debian-policy: Version numbering: native packages, NMU's, and binary only uploads

2009-08-19 Thread Steffen Joeris
Hi You can base security uploads on NMUs, so I think you could get +deb50.1 +deb50.1+nmu1 +deb50.2 +deb50.2+nmu1 Hum I understand +nmu1+deb50.1 for a security upload of a package whose last upload was an NMU, but I don't see in what occasions you would NMU a package in

Bug#540762: mpt-status depends on a mail server being installed

2009-08-10 Thread Steffen Joeris
Because the init script sends out emails? Why should we need to install a mail server in order to check the consistency of our raid arrays? Please remove the bsd-mailx dependency. -- System Information: Debian Release: 5.0.2 APT prefers stable APT policy: (500, 'stable') Architecture:

Bug#540762: mpt-status depends on a mail server being installed

2009-08-10 Thread Steffen Joeris
Hi On Mon, 10 Aug 2009 08:58:12 pm Teste Teste wrote: The script should check if it can send emails and not make it a mandatory dependency. I think mpt-status users mostly want to check the raid status as part of existing health check systems which send notifications themselves. Trying to

Bug#540146: gentoo's patch and debdiff

2009-08-08 Thread Steffen Joeris
patch for integer overflows to also cover other +image types (Closes: #540146) +Fixes: CVE-2009-2660 + + -- Steffen Joeris wh...@debian.org Sat, 08 Aug 2009 07:05:38 + + camlimages (1:3.0.1-2) unstable; urgency=low [ Mehdi Dogguy ] diff -u camlimages-3.0.1/debian/patches

Bug#539492: CVE-2009-1892: DoS

2009-08-01 Thread Steffen Joeris
Package: dhcp3-server Severity: grave Tags: security patch Hi, the following CVE (Common Vulnerabilities Exposures) id was published for dhcp3. CVE-2009-1892[0]: | dhcpd in ISC DHCP 3.0.4 and 3.1.1, when the dhcp-client-identifier and | hardware ethernet configuration settings are both used,

Bug#537291: Acknowledgement (xoscope: fresh upstream is available: 2009 Jun 26: Version 2.0 is released)

2009-07-27 Thread Steffen Joeris
Hi Yaroslav Thanks for investing the time into xoscope. On Wed, 22 Jul 2009 02:48:03 pm Yaroslav Halchenko wrote: my ignorant take to prepare NMU: patch seems to be obsolete, not sure what to do about those magic ranames in debian/rules, also some issues with menu/desktop are pointed out with

Bug#533386: new evolution-data-server packages

2009-07-20 Thread Steffen Joeris
Hi So I had another look at the issue. Indeed, set_nss_error was undefined, so I used a different function. Also, I think there was another regression with displaying signed and encrypted S/MIME messages. Could you please test these updated packages[0] in your environments and tell me, whether

Bug#536554: nmu patch

2009-07-11 Thread Steffen Joeris
-maintainer upload by the security team + * Fix XSS via the backend parameter (Closes: #536554) +Fixes: CVE-2009-2360 + + -- Steffen Joeris wh...@debian.org Sat, 11 Jul 2009 06:02:56 + + sork-passwd-h3 (3.1-1) unstable; urgency=low * New upstream release. only in patch2: unchanged: --- sork

Bug#536554: CVE-2009-2360: Cross-site scripting vulnerability

2009-07-10 Thread Steffen Joeris
Package: sork-passwd-h3 Severity: grave Tags: security patch Hi, the following CVE (Common Vulnerabilities Exposures) id was published for sork-passwd-h3. CVE-2009-2360[0]: | Cross-site scripting (XSS) vulnerability in passwd/main.php in the | Passwd module before 3.1.1 for Horde allows remote

Bug#530271: NMU patch

2009-07-06 Thread Steffen Joeris
team + * Fix cross-site scripting vulnerability, which can be exploited via +the userid, userdescrip, useremail, grp and grpdescrip parameters +(Closes: #530271) +Fixes: CVE-2009-1732 + + -- Steffen Joeris wh...@debian.org Mon, 06 Jul 2009 08:09:24 + + ipplan (4.91a-1) unstable

Bug#535798: RFA: mpt-status

2009-07-05 Thread Steffen Joeris
Package: wnpp Severity: normal ckage: mpt-status Priority: extra Section: admin Installed-Size: 84 Maintainer: Steffen Joeris wh...@debian.org Architecture: i386 Version: 1.2.0-4.2 Depends: libc6 (= 2.7-1), lsb-base, daemon, mailx Filename: pool/main/m/mpt-status/mpt-status_1.2.0-4.2_i386.deb

Bug#530271: xss patch

2009-07-05 Thread Steffen Joeris
On Wed, 24 Jun 2009 07:46:01 am Richard Ellerbrock wrote: The existing patch is correct - using htmlspecialchars will have the effect of placing escaped stings in the database. It will also have the effect of double escaping each time you edit a field. My patch replaces the display template

Bug#530271: xss patch

2009-06-23 Thread Steffen Joeris
Hi Richard I am not sure about your patch. Setting a maximum length does not fix a potential xss issue. Why not using htmlspecialchars() to take care of escaping? I have attached a potential patch for that. Of course, it would be good to check the rest of the code as well and see whether it is

Bug#525078: NMU patch

2009-06-21 Thread Steffen Joeris
sure that the single tick is handled properly in order to avoid +code execution (Closes: #525078) +Fixes: CVE-2009-1440 + + -- Steffen Joeris wh...@debian.org Thu, 18 Jun 2009 14:10:54 + + amule (2.2.5-1) unstable; urgency=low +++ The Fido, Your Leash Is Too Long release. diff -u

Bug#533185: no more keyboard responses

2009-06-20 Thread Steffen Joeris
Hi On 2009 m. June 15 d., Monday 16:17:23 Steffen Joeris wrote: Sometimes I just lose my keyboard and it won't respond anymore under kde. I can help myself by changing to a system console and restart kdm. Not sure what debugging information you'd want me to include. I am happy to collect

Bug#533185: no more keyboard responses

2009-06-15 Thread Steffen Joeris
Package: kdm Version: 4:4.2.4-1 Severity: normal Hi Sometimes I just lose my keyboard and it won't respond anymore under kde. I can help myself by changing to a system console and restart kdm. Not sure what debugging information you'd want me to include. I am happy to collect some files next

Bug#525078: single tick escaping

2009-06-07 Thread Steffen Joeris
Hi Sam How about the lines below (2300-2302)? #ifndef __WXMSW__ rawFileName.Replace(QUOTE, wxT('\'\')); #endif Wouldn't it be sufficient to just run this over rawFileName at any time and escape the single tick or am I missing something? Cheers Steffen signature.asc

Bug#526594: moin update

2009-05-20 Thread Steffen Joeris
Hi Jonas Could you please upload a fixed moin version to unstable, so it can migrate to testing? I can't test it here right now. Cheers Steffen signature.asc Description: This is a digitally signed message part.

Bug#528352: CVE-2008-2025: Cross-site scripting (XSS) vulnerability

2009-05-12 Thread Steffen Joeris
Package: libstruts1.2-java Severity: important Tags: patch, security Hi, the following CVE (Common Vulnerabilities Exposures) id was published for libstruts1.2-java. CVE-2008-2025[0]: | Cross-site scripting (XSS) vulnerability in Apache Struts before | 1.2.9-162.31.1 on SUSE Linux Enterprise

Bug#526594: CVE-2009-1482: cross-site scripting (XSS) issue [moin 1.5 / oldstable not affected]

2009-05-06 Thread Steffen Joeris
On Tue, 5 May 2009 09:28:08 pm Jonas Smedegaard wrote: On Tue, May 05, 2009 at 09:54:36AM +0200, Frank Lin PIAT wrote: P.S. can you upload moin 1.7, I can't since I am not DD/DM. I'll do it now! - Jonas Also, please upload fixed packages for unstable with urgency high. :) Cheers Steffen

Bug#526594: CVE-2009-1482: cross-site scripting (XSS) issue

2009-05-01 Thread Steffen Joeris
Package: moin Severity: important Tags: patch, security Hi, the following CVE (Common Vulnerabilities Exposures) id was published for moin. CVE-2009-1482[0]: | Multiple cross-site scripting (XSS) vulnerabilities in | action/AttachFile.py in MoinMoin 1.8.2 and earlier allow remote | attackers to

Bug#509301: Need more info on #509301

2009-04-30 Thread Steffen Joeris
Hi John Steffen, I went to the URLs in this bug report, and nothing even indicated where in the source the problem was. I see no indication that upstream is even aware of this problem. The CVE status, in fact, is under review and I'm not certain that this is really an issue. Can you

Bug#525943: CVE-2009-0662: privilege escalation

2009-04-27 Thread Steffen Joeris
Package: plone3 Severity: grave Tags: security, patch Hi, the following CVE (Common Vulnerabilities Exposures) id was published for plone3. CVE-2009-0662[0]: | The PlonePAS product 3.x before 3.9 and 3.2.x before 3.2.2, a product | for Plone, does not properly handle the login form, which

Bug#525373: CVE-2009-0159: buffer overflow in ntpq

2009-04-23 Thread Steffen Joeris
Package: ntp Severity: important Tags: patch, security Hi, the following CVE (Common Vulnerabilities Exposures) id was published for ntp. CVE-2009-0159[0]: | Stack-based buffer overflow in the cookedprint function in ntpq/ntpq.c | in ntpq in NTP before 4.2.4p7-RC2 allows remote NTP servers to

Bug#521949: CVE-2009-0790: DoS

2009-04-02 Thread Steffen Joeris
Hi Rene Unfortunately, this doesn't apply as dpd code seems to have moved out of demux.c (I didn't find any of the patch context). Have you had contact with openswan upstream concerning this bug? Isn't the vulnerable code in programs/pluto/ikev1.c? Cheers Steffen -- To UNSUBSCRIBE, email

Bug#521823: SQL injection

2009-03-30 Thread Steffen Joeris
vulnerability when used with multibyte +encodings by using mysql_real_escape_string() + + -- Steffen Joeris wh...@debian.org Mon, 30 Mar 2009 11:21:06 +0200 + auth2db (0.2.5-2+dfsg-1) unstable; urgency=medium * New debian-specific+upstream release (Closes: #493132): diff -u auth2db-0.2.5-2+dfsg

Bug#521949: CVE-2009-0790: DoS

2009-03-30 Thread Steffen Joeris
upload by the security team + * Fix DoS issue via malicious Dead Peer Detection packet +Fixes: CVE-2009-0790 + + -- Steffen Joeris wh...@debian.org Tue, 24 Mar 2009 13:20:43 + + openswan (1:2.4.12+dfsg-1.3) unstable; urgency=high * Non-maintainer upload. diff -u openswan-2.4.12+dfsg

Bug#521950: CVE-2009-0790: DoS

2009-03-30 Thread Steffen Joeris
by the security team + * Fix DoS issue via malicious Dead Peer Detection packet +Fixes: CVE-2009-0790 + + -- Steffen Joeris wh...@debian.org Tue, 24 Mar 2009 12:31:39 + + strongswan (4.2.4-5) unstable; urgency=high Reason for urgency high: this is potentially security relevant. diff -u

Bug#521017: slows down when not enough file descriptors

2009-03-24 Thread Steffen Joeris
Package: squid Severity: wishlist Hi I am running transparent squid in a setup with more than 1000 users. I reached the limit of file descriptors and that slowed down the internet for everyone. I've now increased the number of file descriptors in the default configuration, which seemed to solve

Bug#519655: FTBFS during second build

2009-03-13 Thread Steffen Joeris
Package: yaws Severity: important Hi The package seems to have an FTBFS, if I build it twice in a row. The build log is below. Cheers Steffen wh...@security:~/yaws/yaws-1.80$ debuild -us -uc dpkg-buildpackage -rfakeroot -D -us -uc dpkg-buildpackage: set CFLAGS to default value: -g -O2

Bug#518468: CVE-2008-6393: possible DoS

2009-03-06 Thread Steffen Joeris
Package: psi Severity: important Tags: security Hi, the following CVE (Common Vulnerabilities Exposures) id was published for psi. CVE-2008-6393[0]: | PSI Jabber client before 0.12.1 allows remote attackers to cause a | denial of service (crash) and possibly execute arbitrary code via a | file

Bug#518469: CVE-2009-0752: possible security issue

2009-03-06 Thread Steffen Joeris
Package: movabletype-opensource Severity: normal Tags: security Hi, the following CVE (Common Vulnerabilities Exposures) id was published for movabletype-opensource. CVE-2009-0752[0]: | Unspecified vulnerability in Movable Type Pro and Community Solution | 4.x before 4.24 has unknown impact and

Bug#518478: several crashes (DoS)

2009-03-06 Thread Steffen Joeris
Package: libpoppler3 Version: 0.8.7-1 Severity: important Tags: patch, security Hi, the following CVE (Common Vulnerabilities Exposures) ids were published for poppler. CVE-2009-0756[0]: | The JBIG2Stream::readSymbolDictSeg function in Poppler before 0.10.4 | allows remote attackers to cause a

Bug#517791: CVE-2009-0653: missing verification

2009-03-01 Thread Steffen Joeris
Package: openssl Version: 0.9.8g-15 Severity: important Tags: security Hi, the following CVE (Common Vulnerabilities Exposures) id was published for openssl. CVE-2009-0653[0]: | OpenSSL, probably 0.9.6, does not verify the Basic Constraints for an | intermediate CA-signed certificate, which

Bug#517792: CVE-2009-0698: integer overflow

2009-03-01 Thread Steffen Joeris
Package: xine-lib Severity: grave Tags: security, patch Justification: user security hole Hi, the following CVE (Common Vulnerabilities Exposures) id was published for xine-lib. CVE-2009-0698[0]: | Integer overflow in the 4xm demuxer (demuxers/demux_4xm.c) in xine-lib | 1.1.16.1 allows remote

Bug#516555: CVE-2008-6059: missing access restriction

2009-02-22 Thread Steffen Joeris
Package: webkit Severity: important Tags: security Hi Mike, the following CVE (Common Vulnerabilities Exposures) id was published for webkit. CVE-2008-6059[0]: | xml/XMLHttpRequest.cpp in WebCore in WebKit before r38566 does not | properly restrict access from web pages to the (1) Set-Cookie

Bug#516388: proftpd: Several SQL injection vulnerabilities

2009-02-20 Thread Steffen Joeris
Package: proftpd Severity: grave Tags: security Justification: user security hole Hi, the following CVE (Common Vulnerabilities Exposures) ids were published for proftpd. CVE-2009-0543[0]: | ProFTPD Server 1.3.1, with NLS support enabled, allows remote | attackers to bypass SQL injection

Bug#514262: tmsnc: removal from stable

2009-02-05 Thread Steffen Joeris
Package: release.debian.org Severity: important Tags: security Hi I was working on a security update for tmsnc, a textbased msn client. When I tried to test the update, I found out that the program is not able to connect to MSN servers anymore due to a protocol missmatch. I assume that the

Bug#514142: NMU patch

2009-02-05 Thread Steffen Joeris
; urgency=high + + * Non-maintainer upload by the security team + * Include upstream patch to fix DoS via error in request processing +code (Closes: #514142) + + -- Steffen Joeris wh...@debian.org Thu, 05 Feb 2009 18:28:57 + + squid (2.7.STABLE3-4) unstable; urgency=low * debian/rules diff

Bug#514138: audacity: buffer overflow

2009-02-04 Thread Steffen Joeris
Package: audacity Version: 1.3.5-2 Severity: grave Tags: security Justification: user security hole There is a buffer overflow in audacity apparently affecting the etch and lenny version. You can find a reproducer here[0]. However, I just took a random .gro file and when importing it under

Bug#514142: squid: denial of service via crafted request

2009-02-04 Thread Steffen Joeris
Package: squid Severity: grave Tags: security Justification: user security hole Hi A DoS issue has been reported[0] for squid. So far I cannot see the vulnerable code in the stable release, but it would be nice, if you could check that as well. Lenny seems to be affected and needs fixing. I've

Bug#514138: audacity: buffer overflow

2009-02-04 Thread Steffen Joeris
fixed 514138 1.3.6-1 thanks Hi Benjamin On Wed, 4 Feb 2009 04:29:05 pm Benjamin Drung wrote: The upcoming audacity 1.3.7-1 does not crash if I open the generated file from [0]. According to the Gentoo bug tracker [1] audacity 1.3.6 does not have this bug any more. You can find

Bug#514177: gstreamer0.10-plugins-good: Several security issues: CVE-2009-0386 CVE-2009-0387 CVE-2009-0397 CVE-2009-0398

2009-02-04 Thread Steffen Joeris
Package: gstreamer0.10-plugins-good Version: 0.10.8-4.1 Severity: grave Tags: security Justification: user security hole Hi, the following CVE (Common Vulnerabilities Exposures) ids were published for gst-plugins-good0.10. CVE-2009-0386[0]: | Heap-based buffer overflow in the

Bug#514179: CVE-2009-0413: possible XSS issue

2009-02-04 Thread Steffen Joeris
Package: roundcube Version: 0.2~alpha-4 Severity: important Tags: security Hi, the following CVE (Common Vulnerabilities Exposures) id was published for roundcube. CVE-2009-0413[0]: | Cross-site scripting (XSS) vulnerability in RoundCube Webmail | (roundcubemail) 0.2 stable allows remote

Bug#513959: CVE-2008-5695: possible arbitrary code execution

2009-02-02 Thread Steffen Joeris
Package: wordpress Severity: normal Tags: security Hi, the following CVE (Common Vulnerabilities Exposures) id was published for wordpress. CVE-2008-5695[0]: | wp-admin/options.php in WordPress MU before 1.3.2, and WordPress 2.3.2 | and earlier, does not properly validate requests to update an

  1   2   3   4   5   6   7   8   >