Bug#740898: [9e1ed7f] Fix for Bug#740898 committed to git

2015-03-21 Thread Giuseppe Iuculano
tags 740898 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano iucul...@debian.org on Sat, 21 Mar 2015 12:05:27 +0100. The fix will be in the next upload. = Ignore

Bug#777583: Incorrect debian/copyright for smartmontools

2015-02-14 Thread Giuseppe Iuculano
retitle -1 debian/copyright for smartmontools is too restrictive severity -1 wishlist Il 14/02/2015 06:57, Mark H Weaver ha scritto: Every package must be accompanied by a verbatim copy of its copyright information and distribution license in the file /usr/share/doc/package/copyright.

Bug#766178: [12d5f9d] Fix for Bug#766178 committed to git

2014-10-21 Thread Giuseppe Iuculano
tags 766178 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano iucul...@debian.org on Tue, 21 Oct 2014 13:28:29 +0200. The fix will be in the next upload. = Correct

Bug#754684: [c2c3369] Fix for Bug#754684 committed to git

2014-10-18 Thread Giuseppe Iuculano
tags 754684 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano iucul...@debian.org on Sat, 18 Oct 2014 16:53:15 +0200. The fix will be in the next upload. = Fix FTBFS

Bug#765659: /etc/default/chromium removed in postinst

2014-10-17 Thread Giuseppe Iuculano
Package: chromium Version: 37.0.2062.120-3 Severity: grave Hi, debian/chromium.postinst line 12 Really you cannot remove /etc/default/chromium file without asking or warning user... You have to move in /etc/chromium-browser/default This is what happens when you push huge commits and nobody

Bug#764180: /etc/default/chromium removed in postinst

2014-10-06 Thread Giuseppe Iuculano
Package: chromium Version: 37.0.2062.120-3 Severity: grave Hi, debian/chromium.postinst line 12 Really you cannot remove /etc/default/chromium file without asking... You have to move it in /etc/chromium-browser/default This is what happens when you push huge commits and nobody can double

Bug#761728: [49fccbc] Fix for Bug#761728 committed to git

2014-10-04 Thread Giuseppe Iuculano
tags 761728 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano iucul...@debian.org on Sat, 4 Oct 2014 19:11:13 +0200. The fix will be in the next upload. = Depends

Bug#757758: [9064776] Fix for Bug#757758 committed to git

2014-10-04 Thread Giuseppe Iuculano
tags 757758 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano iucul...@debian.org on Sat, 4 Oct 2014 19:28:19 +0200. The fix will be in the next upload. = Fixed sed

Bug#745646: chromium: certificate revocation is not checked

2014-05-01 Thread Giuseppe Iuculano
tags 745646 unreproducible notfound 745646 34.0.1847.116-2 severity 745646 normal thanks Il 2014-04-30 20:30 Jonathan Nieder ha scritto: However Vincent is right that the CRLSets[1] are a different mechanism than OCSP revocation checking and that CRLSet checking is enabled by default. Yes,

Bug#745646: [Pkg-chromium-maint] Bug#745646: closed by Michael Gilbert mgilb...@debian.org (Re: Bug#745646: chromium: certificate revocation is not checked)

2014-04-30 Thread Giuseppe Iuculano
Hi, On 30/04/2014 02:28, Vincent Lefevre wrote: No, Chromium developers tell users not to enable it, and consider it as an obsolete option that will be removed. Indeed, in case of real MITM attack, the attacker can block the OCSP server, in which case Chromium will silently consider the

Bug#745646: [Pkg-chromium-maint] Bug#745646: closed by Michael Gilbert mgilb...@debian.org (Re: Bug#745646: chromium: certificate revocation is not checked)

2014-04-30 Thread Giuseppe Iuculano
On 30/04/2014 19:49, Vincent Lefevre wrote: Bug 745646 is a different bug, specifically about the CRLSet system, which is very broken. What you write is not a bug, if you want to do revocation check you must enable it in settings. chromium --temp-profile Go to settings and enable revocation

Bug#741908: extplorer: CVE-2013-5951

2014-03-17 Thread Giuseppe Iuculano
Hi Thomas, On 17/03/2014 08:34, Thomas Goirand wrote: I've been waiting for comments on my security upload for 5 months now. The issue was supposed to be embargoed (in fact, just waiting on Debian...). Please review the fixed packages!!! If you don't have time to review it, just accept that I

Bug#728823: [Pkg-chromium-maint] Bug#728823: Fails to start: Running without the SUID sandbox!

2013-11-07 Thread Giuseppe Iuculano
Hi, commit 64b895bf23943f8c72a49216d24e36b128213167 Author: Giuseppe Iuculano iucul...@debian.org Date: Mon Oct 21 13:05:14 2013 +0200 Move chrome_sandbox to chrome-sandbox, chromium reads that file Your -2 uploads didn't contain my -1 changes. Michael, please, please, update your

Bug#717567: [8251afb] Fix for Bug#717567 committed to git

2013-09-05 Thread Giuseppe Iuculano
tags 717567 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano iucul...@debian.org on Thu, 5 Sep 2013 13:34:36 +0200. The fix will be in the next upload. = Fix FTBFS

Bug#706909: [5ae3fa9] Fix for Bug#706909 committed to git

2013-06-02 Thread Giuseppe Iuculano
tags 706909 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano iucul...@debian.org on Sun, 2 Jun 2013 10:08:14 +0200. The fix will be in the next upload. = Use /var/lib

Bug#702261: libv8: CVE-2012-5153 CVE-2013-0836

2013-03-08 Thread Giuseppe Iuculano
On 04/03/2013 16:39, Moritz Muehlenhoff wrote: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5153 Fix: https://code.google.com/p/v8/source/detail?r=13161 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0836 Fix: https://code.google.com/p/v8/source/detail?r=12543 Cheers,

Bug#699887: Security fix for #699887, CVE-2013-0169

2013-02-10 Thread Giuseppe Iuculano
Hi Roland, On 07/02/2013 22:58, Roland Stigge wrote: I prepared a security upload for stable (attached debdiff). Should I upload it to stable-security(security-master)? Thanks for contacting us. please upload to security-master (please make sure to include the .orig.tar.gz in the upload, -sa

Bug#695224: Locale::Maketext security fix: real world breakage?

2013-02-06 Thread Giuseppe Iuculano
Hi Dominic, On 04/02/2013 21:28, Dominic Hargreaves wrote: I had no replies about this, so I think it's time to bite the bullet and decide whether we should target this fix at - stable-security - stable - neither of the above. I think I'm leaning towards stable on the basis that that's

Bug#695703: [Pkg-chromium-maint] Bug#695703: chromium-browser: diff for NMU version 22.0.1229.94~r161065+dfsg-0.1

2013-01-02 Thread Giuseppe Iuculano
On 02/01/2013 12:15, David Prévot wrote: I've prepared an NMU for chromium-browser (versioned as 22.0.1229.94~r161065+dfsg-0.1) and uploaded it to DELAYED/2. No, you haven't uploaded it to DELAYED/2. signature.asc Description: OpenPGP digital signature

Bug#696179: [Pkg-mediawiki-devel] Bug#696179: mediawiki-extensions-base: RSS_Reader Javascript injection

2012-12-19 Thread Giuseppe Iuculano
Hi, On 17/12/2012 18:21, Jonathan Wiltshire wrote: Security team: is it too late to get a CVE through you now that a public bug has been filed? And should a DSA be prepared, as I have not looked but can be fairly sure this will affect stable. yes, if it is public, we cannot assign a CVE. you

Bug#677393: [743e0f4] Fix for Bug#677393 committed to git

2012-07-16 Thread Giuseppe Iuculano
tags 677393 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano iucul...@debian.org on Mon, 16 Jul 2012 12:00:06 +0200. The fix will be in the next upload. = Fixed FTBFS

Bug#677393: [f10872d] Fix for Bug#677393 committed to git

2012-07-16 Thread Giuseppe Iuculano
tags 677393 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano iucul...@debian.org on Mon, 16 Jul 2012 14:30:09 +0200. The fix will be in the next upload. = Really fix

Bug#679848: [Pkg-chromium-maint] Bug#679848: chromium: everything related to chrome:// is broken

2012-07-07 Thread Giuseppe Iuculano
Hi Norbert! On 07/02/2012 04:53 AM, Norbert Preining wrote: In short, everything that starts with chromium:// Did you mean chrome:// ? Cheers, Giuseppe. signature.asc Description: OpenPGP digital signature

Bug#676142: [16216c8] Fix for Bug#676142 committed to git

2012-06-13 Thread Giuseppe Iuculano
tags 676142 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano iucul...@debian.org on Wed, 13 Jun 2012 16:29:49 +0200. The fix will be in the next upload. = Fixed FTBFS

Bug#676636: [c0e9499] Fix for Bug#676636 committed to git

2012-06-12 Thread Giuseppe Iuculano
tags 676636 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano iucul...@debian.org on Tue, 12 Jun 2012 11:06:24 +0200. The fix will be in the next upload. = Improved

Bug#676636: [e2adf90] Fix for Bug#676636 committed to git

2012-06-11 Thread Giuseppe Iuculano
tags 676636 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano iucul...@debian.org on Mon, 11 Jun 2012 16:16:37 +0200. The fix will be in the next upload. = Applied

Bug#675563: [Pkg-chromium-maint] Bug#675563: chromium: builds against embedded binary binutils-gold that does not include source

2012-06-02 Thread Giuseppe Iuculano
On 02/06/2012 08:15, shawn wrote: I noticed this while trying to get this package to build on armel. Could you patch debian/control and try to build on armel again please? --- a/debian/control +++ b/debian/control @@ -64,7 +64,7 @@ Build-Depends: cdbs, libxt-dev, libxtst-dev,

Bug#674081: [16893a8] Fix for Bug#674081 committed to git

2012-05-28 Thread Giuseppe Iuculano
tags 674081 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano iucul...@debian.org on Mon, 28 May 2012 10:41:13 +0200. The fix will be in the next upload. = Support

Bug#671994: [8cb8e89] Fix for Bug#671994 committed to git

2012-05-19 Thread Giuseppe Iuculano
tags 671994 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano iucul...@debian.org on Sat, 19 May 2012 10:22:05 +0200. The fix will be in the next upload. = Use gcc 4.6

Bug#665007: CVE-2012-1185 / CVE-2012-1186: incomplete ImageMagick fixes for CVE-2012-0247 / CVE-2012-0248

2012-03-22 Thread Giuseppe Iuculano
Package: imagemagick Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, The original fixes for the ImageMagick issues CVE-2012-0247 and CVE-2012-0248 are incomplete. Please see: http://seclists.org/oss-sec/2012/q1/685

Bug#665012: CVE-2012-1570: maradns deleted domain record cache persistance flaw

2012-03-22 Thread Giuseppe Iuculano
Package: maradns Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 It was reported that MaraDNS suffers from a flaw where it is susceptible to spoofing attacks. Due to an error in the cache update policy, which does not properly handle revoked domain names, a remote

Bug#660159: [b88a849] Fix for Bug#660159 committed to git

2012-02-19 Thread Giuseppe Iuculano
tags 660159 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano iucul...@debian.org on Sun, 19 Feb 2012 20:18:27 +0100. The fix will be in the next upload. = Remove

Bug#656057: CVE-2011-2830

2012-01-16 Thread Giuseppe Iuculano
On 16/01/2012 09:43, Giuseppe Iuculano wrote: This is not for libv8, CVE description is wrong, this affects webkit: http://trac.webkit.org/changeset/93495 Or better, the issue is in the V8 binding source in webkit. We use that code only in chromium, I will check if stable is affected. Cheers

Bug#654534: Patch

2012-01-04 Thread Giuseppe Iuculano
tag 654534 patch thanks CVE-2011-3892 http://src.chromium.org/viewvc/chrome?view=revrevision=107489 CVE-2011-3893 this is due to http://llvm.org/bugs/show_bug.cgi?id=7554 http://src.chromium.org/viewvc/chrome?view=revrevision=106599 http://src.chromium.org/viewvc/chrome?view=revrevision=106621

Bug#516394: [CVE-2008-4392]

2012-01-03 Thread Giuseppe Iuculano
Dear Sergiusz, it seems my reply to your private email didn't convince you, so replying again on behalf of the Security Team. Dear Security Team, CVE-2008-4392 has Candidate status and is being reviewed for almost three years now, and still must accepted by the CVE Editorial Board[0].

Bug#640591: smbind: diff for NMU version 0.4.7-5.1

2011-12-10 Thread Giuseppe Iuculano
On 12/10/2011 02:27 PM, gregor herrmann wrote: Dear maintainer, I've prepared an NMU for smbind (versioned as 0.4.7-5.1) and uploaded it to DELAYED/2. Please feel free to tell me if I should delay it longer. Gregor, thanks for your NMU. Please upload to DELAYED/0 Cheers, Giuseppe.

Bug#643648: CVE-2011-2834 and CVE-2011-2821

2011-09-28 Thread Giuseppe Iuculano
Package: libxml2 Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, two libxml2 issues were fixed in the latest chrome updates: CVE-2011-2821 Double free vulnerability in libxml2, as used in Google Chrome before 13.0.782.215, allows remote attackers to cause a

Bug#639744: Compromised certificates for *.google.com issued by DigiNotar Root CA

2011-09-06 Thread Giuseppe Iuculano
Hi, On 09/04/2011 09:20 PM, Raphael Geissert wrote: NSS now ships modified certs of DigiNotar, their name is Explicitly Disabled DigiNotar rest of the original CN here In chromium, for example, if you browse a DigiNotar-signed website and check the certificate chain you will see the

Bug#639733: wordpress: Wordpress breaks TinyMCE install

2011-08-30 Thread Giuseppe Iuculano
tags 639733 moreinfo unreproducible thanks Hi, On 08/29/2011 08:43 PM, Laurens Blankers wrote: Upgrading from 3.0.5+dfsg-1 to 3.2.1+dfsg-1 causes plugin files to be written to /usr/share/tinymce which is partily symlinked from /usr/share/wordpress/wp-includes/js/tinymce/ this

Bug#639126: [73b0e59] Fix for Bug#639126 committed to git

2011-08-24 Thread Giuseppe Iuculano
tags 639126 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano iucul...@debian.org on Wed, 24 Aug 2011 14:25:06 +0200. The fix will be in the next upload. = Fixed

Bug#631815: reinstalling didn't fix the issue

2011-06-27 Thread Giuseppe Iuculano
In my case, reinstalling didn't fix the issue (Derbian testing i386) Cheers, Giuseppe. signature.asc Description: OpenPGP digital signature

Bug#631615: CVE-2011-2192: libcurl inappropriate GSSAPI delegation

2011-06-25 Thread Giuseppe Iuculano
Package: curl Version: 7.21.6-1 Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Please see http://curl.haxx.se/docs/adv_20110623.html Cheers, Giuseppe. -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.11 (GNU/Linux)

Bug#626445: [Pkg-chromium-maint] Bug#626445: multiple (89!) security issues in chromium

2011-05-13 Thread Giuseppe Iuculano
Hi Antoine, thanks for the bug report. On 05/12/2011 06:14 AM, Antoine Beaupré wrote: But the version in stable is a much more serious issue. I do not think there is the possbility of maintaining that branch all by ourselves here, and I would recommend either dropping the package from stable

Bug#564853: [0d4b071] Fix for Bug#564853 committed to git

2011-03-20 Thread Giuseppe Iuculano
tags 564853 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano iucul...@debian.org on Sun, 20 Mar 2011 11:11:40 +0100. The fix will be in the next upload. = Fix FTBFS

Bug#617418: CVE

2011-03-10 Thread Giuseppe Iuculano
# [$1000] [74675] High Invalid memory access in v8. Credit to Christian Holler. http://code.google.com/p/v8/issues/detail?id=1146 Patch: http://code.google.com/p/v8/source/detail?r=6773 This is CVE-2011-1286 # [$1000] [74662] High Corruption via re-entrancy of RegExp code. Credit to

Bug#617418: v8 security issues fixed in chromium 10.0.648.127

2011-03-08 Thread Giuseppe Iuculano
Package: libv8 Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, chromium 10.0.648.127 fixed the following security issues in libv8: # [$1000] [74675] High Invalid memory access in v8. Credit to Christian Holler.

Bug#612618: [Pkg-chromium-maint] Bug#612618: FTBFS: chrome/common/metrics_helpers.cc:22:20: error: prtime.h: No such file or directory

2011-02-11 Thread Giuseppe Iuculano
Hey Timo, On 02/09/2011 04:42 PM, Timo Juhani Lindfors wrote: chrome/common/metrics_helpers.cc:22:20: error: prtime.h: No such file or directory Have you installed libnspr4-dev? Cheers, Giuseppe. signature.asc Description: OpenPGP digital signature

Bug#611518: [Pkg-chromium-maint] Bug#611518: chromium-browser: FTBFS v8/src/arm/macro-assembler-arm.cc:61:3: error: #error For thumb inter-working we require an architecture which supports blx

2011-01-30 Thread Giuseppe Iuculano
Hi Timo, On 01/30/2011 01:57 PM, Timo Juhani Lindfors wrote: the contents of src/v8 seems match what is in libv8. Would it be possible to avoid compiling src/v8 if chromium-browser is anyway using external libv8? yes, the version in squeeze already compiles against libv8. The next version in

Bug#610510: CVE-2010-4489: Integer Overflow in VP8 decoding leads to memory corruption

2011-01-19 Thread Giuseppe Iuculano
Package: libvpx Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for libvpx. CVE-2010-4489[0]: | Google Chrome before 8.0.552.215 does not properly handle WebM video, | which allows remote

Bug#608273: CVE-2010-3853: pam_namespace executes namespace.init with service's environment

2010-12-29 Thread Giuseppe Iuculano
Package: pam Severity: serious Tags: security patch -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Tomas Mraz pointed out that pam_namespace PAM module executes external namespace.init script with an environment settings inherited form the program or service that has pam_namespace configured.

Bug#608286: CVE-2010-4312: does not use HTTPOnly for session cookies by default

2010-12-29 Thread Giuseppe Iuculano
Package: tomcat6 Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for tomcat6. CVE-2010-4312[0]: | The default configuration of Apache Tomcat 6.x does not include the | HTTPOnly flag in a

Bug#608288: CVE-2010-4254

2010-12-29 Thread Giuseppe Iuculano
Package: moon Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for moon. CVE-2010-4254[0]: | Mono, when Moonlight before 2.3.0.1 or 2.99.x before 2.99.0.10 is | used, does not properly

Bug#608289: CVE-2010-3905

2010-12-29 Thread Giuseppe Iuculano
Package: eucalyptus Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for eucalyptus. CVE-2010-3905[0]: | The password reset feature in the administrator interface for | Eucalyptus 2.0.0 and

Bug#608290: CVE-2010-4480 CVE-2010-4481

2010-12-29 Thread Giuseppe Iuculano
Package: phpmyadmin Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) ids were published for phpmyadmin. CVE-2010-4480[0]: | error.php in PhpMyAdmin 3.3.8.1, and other versions before | 3.4.0-beta1, allows

Bug#607922: CVE-2010-4494: memory corruption (double-free) in XPath processing code

2010-12-24 Thread Giuseppe Iuculano
Package: libxml2 Severity: serious Tags: security patch -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for libxml2. CVE-2010-4494[0]: | Double free vulnerability in Google Chrome before 8.0.552.215 allows | remote

Bug#607240: [f29b6ac] Fix for Bug#607240 committed to git

2010-12-17 Thread Giuseppe Iuculano
tags 607240 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano iucul...@debian.org on Fri, 17 Dec 2010 10:59:01 +0100. The fix will be in the next upload. = Use GPL

Bug#602732: [612c23f] Fix for Bug#602732 committed to git

2010-12-06 Thread Giuseppe Iuculano
tags 602732 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano iucul...@debian.org on Mon, 6 Dec 2010 16:51:02 +0100. The fix will be in the next upload. = Remove

Bug#602693: Memory corruption in libvpx

2010-11-07 Thread Giuseppe Iuculano
Package: libvpx Version: 0.9.1-1 Severity: serious Tags: security patch -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, Christoph Diehl discovered a memory corruption in libvpx. (see the chromium blog post[0], [$1000] [60055] High Memory corruption in libvpx. Credit to Christoph Diehl.)

Bug#602693: Memory corruption in libvpx

2010-11-07 Thread Giuseppe Iuculano
On 11/07/2010 10:27 AM, Giuseppe Iuculano wrote: Patch: https://review.webmproject.org/#change,928 Please also apply the following regression patch: http://review.webmproject.org/#change,1098 Cheers, Giuseppe. signature.asc Description: OpenPGP digital signature

Bug#602609: CVE-2010-4008: does not well process a malformed XPATH

2010-11-06 Thread Giuseppe Iuculano
Package: libxml2 Version: 2.7.7.dfsg-4 Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, it was discovered that libxml2 does not well process a malformed XPATH, causing crash and allowing arbitrary code execution. Patch:

Bug#602609: Acknowledgement (CVE-2010-4008: does not well process a malformed XPATH)

2010-11-06 Thread Giuseppe Iuculano
fixed 602609 2.7.8.dfsg-1 thanks It was fixed in 2.7.8 Cheers, Giuseppe signature.asc Description: OpenPGP digital signature

Bug#597856: CVE-2010-3412: memory overrun issue in CPU profiler

2010-09-23 Thread Giuseppe Iuculano
Package: libv8 Severity: serious Tags: security patch -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for libv8. CVE-2010-3412[0]: | Race condition in the console implementation in Google Chrome before | 6.0.472.59 has

Bug#597856: CVE-2010-3412: memory overrun issue in CPU profiler

2010-09-23 Thread Giuseppe Iuculano
On 09/23/2010 06:18 PM, Jérémy Lal wrote: Thank you Giuseppe, i'll fix this tonight. You are welcome. Feel free to ping me if you need a sponsor. Cheers, Giuseppe. signature.asc Description: OpenPGP digital signature

Bug#590296: wget: diff for NMU version 1.12-2.1

2010-09-05 Thread Giuseppe Iuculano
to +overwriting arbitrary files. Thanks to Marc Deslauriers and the Ubuntu +Security team (Closes: #590296) + + -- Giuseppe Iuculano iucul...@debian.org Sun, 05 Sep 2010 15:33:19 +0200 + wget (1.12-2) unstable; urgency=low * acknoledge NMUs. Thanks for your work/help Matt and Anthony diff -Nru

Bug#591195: [e8a913f] Fix for Bug#591195 committed to git

2010-09-01 Thread Giuseppe Iuculano
tags 591195 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano iucul...@debian.org on Wed, 1 Sep 2010 23:43:44 +0200. The fix will be in the next upload. = Remove

Bug#594300: CVE-2010-2810: Heap-based buffer overflow

2010-08-25 Thread Giuseppe Iuculano
Package: lynx-cur Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for lynx-cur. CVE-2010-2810[0]: | Heap-based buffer overflow in the convert_to_idna function in |

Bug#594301: CVE-2010-2809: The default configuration does not properly use the @SELECTED_URI feature

2010-08-25 Thread Giuseppe Iuculano
Package: uzbl Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for uzbl. CVE-2010-2809[0]: | The default configuration of the lt;Button2gt; binding in Uzbl before | 2010.08.05 does not

Bug#594304: CVE-2010-2790: Multiple cross-site scripting (XSS) vulnerabilities

2010-08-25 Thread Giuseppe Iuculano
Package: zabbix Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for zabbix. CVE-2010-2790[0]: | Multiple cross-site scripting (XSS) vulnerabilities in the formatQuery | function in

Bug#591204: lvm2: diff for NMU version 2.02.66-2.1

2010-08-19 Thread Giuseppe Iuculano
between lvm2 and clvmd +(Closes: #591204) + + -- Giuseppe Iuculano iucul...@debian.org Thu, 19 Aug 2010 11:56:07 +0200 + lvm2 (2.02.66-2) unstable; urgency=medium * Make libdevmapper1.02.1 depend on dmsetup. libdevmapper needs new enough diff -Nru lvm2-2.02.66/debian/patches/CVE-2010

Bug#591204: lvm2: diff for NMU version 2.02.66-2.1

2010-08-19 Thread Giuseppe Iuculano
On 08/19/2010 12:26 PM, Bastian Blank wrote: Where does this patch come from? It is not included into the upstream source this way. As long as this is not known: NACK. It comes from upstream, I used the essential part of the patch. Please see:

Bug#591204: lvm2: diff for NMU version 2.02.66-2.1

2010-08-19 Thread Giuseppe Iuculano
On 08/19/2010 12:54 PM, Bastian Blank wrote: Please describe the changes you made. It even differs in the comments. This only shows the annoncement, the patch is in https://bugzilla.redhat.com/attachment.cgi?id=434982 It is the same patch without the configure and Makefile stuff (upstream

Bug#591204: lvm2: diff for NMU version 2.02.66-2.1

2010-08-19 Thread Giuseppe Iuculano
On 08/19/2010 01:29 PM, Giuseppe Iuculano wrote: It is the same patch without the configure and Makefile stuff (upstream added --with-default-run-dir configure argument, I instead hardcoded it to /var/run/clvmd.sock ). I removed that part to avoid autoreconf I just noted I forgot

Bug#591204: lvm2: diff for NMU version 2.02.66-2.2

2010-08-19 Thread Giuseppe Iuculano
:57.0 +0200 +++ lvm2-2.02.66/debian/changelog 2010-08-19 13:48:52.0 +0200 @@ -1,3 +1,10 @@ +lvm2 (2.02.66-2.2) unstable; urgency=high + + * Non-maintainer upload by the Security Team. + * CVE-2010-2526: Also check permission on restart. + + -- Giuseppe Iuculano iucul...@debian.org Thu

Bug#591204: lvm2: diff for NMU version 2.02.66-2.2

2010-08-19 Thread Giuseppe Iuculano
On 08/19/2010 02:11 PM, Mehdi Dogguy wrote: Why two NMUs for a single patch? Can't you drop the first one, fix it and re-upload? Because dcut rm --searchdirs lvm2* didn't work, now I'm trying with rm DELAYED/1-day/libvm2* Cheers, Giuseppe. signature.asc Description: OpenPGP digital

Bug#591204: lvm2: diff for NMU version 2.02.66-2.2

2010-08-19 Thread Giuseppe Iuculano
On 08/19/2010 03:27 PM, Mehdi Dogguy wrote: I'm sure dcut cancel $changes_files works :) oh, it worked, thanks! :-) Cheers, Giuseppe. signature.asc Description: OpenPGP digital signature

Bug#591204: lvm2: diff for NMU version 2.02.66-2.1

2010-08-19 Thread Giuseppe Iuculano
On 08/19/2010 04:29 PM, Bastian Blank wrote: Sorry, this is not acceptable. The patch - differes in comments, - used path, - removes autoconf parts without reason, autoreconf is called anyway, and - is incomplete. Well, FWIW this is instead acceptable from a NMUer point of view, anyway this

Bug#587732: protobuf: diff for NMU version 2.3.0-2.1

2010-07-11 Thread Giuseppe Iuculano
On 07/11/2010 01:51 AM, Iustin Pop wrote: I'm not sure I understand what you mean. The jdk is *not* used during the binary build, except for unittests (if present). The jdk *is* used during the indep build, for the java part. What do you see here as an abuse? Sorry, let me rephrase a bit.

Bug#587732: protobuf: diff for NMU version 2.3.0-2.1

2010-07-11 Thread Giuseppe Iuculano
On 07/11/2010 11:45 AM, Julien Cristau wrote: On Sun, Jul 11, 2010 at 09:05:49 +0200, Giuseppe Iuculano wrote: If you put openjdk-6 in b-d-i, protobuf can't be built on those archs that hasn't openjdk-6, and imho this can be considered an FTBFS even if the binary build works. No, it can't

Bug#587732: protobuf: diff for NMU version 2.3.0-2.1

2010-07-11 Thread Giuseppe Iuculano
On 07/11/2010 12:27 PM, Julien Cristau wrote: Because there's no requirement anywhere that says arch:all packages need to be buildable on all architectures. The binary target must be all that is necessary for the user to build the binary package(s) produced from this source package. So I think

Bug#587732: protobuf: diff for NMU version 2.3.0-2.1

2010-07-11 Thread Giuseppe Iuculano
On 07/11/2010 12:55 PM, Iustin Pop wrote: Giuseppe, you didn't answer my other question. Can you confirm the package builds fine and the java parts work with gcj? Yes I can. Cheers, Giuseppe signature.asc Description: OpenPGP digital signature

Bug#587732: protobuf: diff for NMU version 2.3.0-2.1

2010-07-10 Thread Giuseppe Iuculano
+1,11 @@ +protobuf (2.3.0-2.1) unstable; urgency=high + + * Non-maintainer upload. + * Build-depends on on default-jdk and set JAVA_HOME to +/usr/lib/jvm/default-java (Closes: #587732) + + -- Giuseppe Iuculano iucul...@debian.org Sat, 10 Jul 2010 18:37:19 +0200 + protobuf (2.3.0-2) unstable

Bug#587732: protobuf: diff for NMU version 2.3.0-2.1

2010-07-10 Thread Giuseppe Iuculano
Hi Iustin, On 07/10/2010 08:39 PM, Iustin Pop wrote: I was planning to revert the move of the openjdk-6 from b-d-i to b-d, as an alternative to depend on default-jdk. The move was done simply to have 'jar' available during the build time for a few optional unittests which need it. I think

Bug#585757: libglewmx1.5: 1.5.4-1 makes libglc0 crash

2010-07-07 Thread Giuseppe Iuculano
Well, since the problem is somewhere in Quesoglc, I built a version of glc with debug symbols, to see where exactly the error is. And surprise, that version worked. The locally rebuilt package without debug symbols also works. Not sure what exactly is the problem, maybe libglc0 was built on

Bug#587732: protobuf should B-D on default-jdk

2010-07-07 Thread Giuseppe Iuculano
Since openjdk-6-jdk was available before on those arches, I hoped it will come back. Do you think it won't? It wasn't available, protobuf was built in those archs because you had openjdk-6-jdk in Build-Depends-Indep instead of Build-Depends Cheers, Giuseppe. signature.asc Description:

Bug#588137: CVE-2010-1625: Cross-site scripting (XSS) vulnerability

2010-07-05 Thread Giuseppe Iuculano
Package: lxr-cvs Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for lxr-cvs. CVE-2010-1625[0]: | Cross-site scripting (XSS) vulnerability in LXR Cross Referencer | before 0.9.7 allows

Bug#588138: CVE-2010-1625: Cross-site scripting (XSS) vulnerability

2010-07-05 Thread Giuseppe Iuculano
Package: lxr Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for lxr. CVE-2010-1625[0]: | Cross-site scripting (XSS) vulnerability in LXR Cross Referencer | before 0.9.7 allows remote

Bug#588036: CVE-2010-1448: Cross-site scripting (XSS) vulnerability

2010-07-04 Thread Giuseppe Iuculano
Package: lxr-cvs Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Ciao Giacomo, the following CVE (Common Vulnerabilities Exposures) id was published for lxr-cvs. CVE-2010-1448[0]: | Cross-site scripting (XSS) vulnerability in lib/LXR/Common.pm in LXR | Cross

Bug#584946: [Pkg-chromium-maint] Bug#584946: chromium-browser: segfault on startup on armel (openmoko freerunner)

2010-06-25 Thread Giuseppe Iuculano
Hi Timo, On 06/25/2010 05:41 PM, Timo Juhani Lindfors wrote: version 5.0.375.70~r48679-2 seems to start on openmoko! I can use the menus but trying to load any page results in a dialog that shows an error message that can not be copypasted. It says something about The following page(s) have

Bug#584946: [Pkg-chromium-maint] Bug#584946: chromium-browser: segfault on startup on armel (openmoko freerunner)

2010-06-25 Thread Giuseppe Iuculano
On 06/25/2010 06:50 PM, Timo Juhani Lindfors wrote: Giuseppe Iuculano giuse...@iuculano.it writes: Could you try version 5.0.375.86~r49890-1 when it will be available in armel please? Sure but the blx instructions in libv8 will still be a problem, right? Yes, please open a bug against

Bug#581265: [Pkg-chromium-maint] Bug#581265: release blocking bug

2010-06-12 Thread Giuseppe Iuculano
block 581265 by 583826 thanks On 05/18/2010 10:21 PM, Moritz Muehlenhoff wrote: The situation has changed a bit: Chromium might still be part of Squeeze. Guiseppe is currently checking with upstream on the feasibility of a upstream support lifetime suitable for the lifetime of Squeeze.

Bug#584517: CVE-2010-0404: Multiple SQL injection vulnerabilities

2010-06-07 Thread Giuseppe Iuculano
On 06/06/2010 06:16 PM, Olivier Berger wrote: Thanks for caring. I've tried and fix the most obvious problems reported by lintian and update the changelog, and have re-uploaded an updated package to mentors. If you can upload it for me, many thanks in advance. Best regards, I've added a

Bug#584516: CVE-2010-1628: allows context-dependent attackers to execute arbitrary code

2010-06-04 Thread Giuseppe Iuculano
Package: ghostscript Severity: grave Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for ghostscript. CVE-2010-1628[0]: | Ghostscript 8.64, 8.70, and possibly other versions allows | context-dependent

Bug#584517: CVE-2010-0404: Multiple SQL injection vulnerabilities

2010-06-04 Thread Giuseppe Iuculano
Package: phpgroupware Severity: grave Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for phpgroupware. CVE-2010-0404[0]: | Multiple SQL injection vulnerabilities in phpGroupWare (phpgw) before | 0.9.16.016

Bug#584518: CVE-2010-0403: Directory traversal vulnerability

2010-06-04 Thread Giuseppe Iuculano
Package: phpgroupware Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for phpgroupware. CVE-2010-0403[0]: | Directory traversal vulnerability in about.php in phpGroupWare (phpgw) | before

Bug#584517: CVE-2010-0404: Multiple SQL injection vulnerabilities

2010-06-04 Thread Giuseppe Iuculano
Hi Christian, On 06/04/2010 11:24 AM, christian bac wrote: -the unstable version : 1:0.9.16.016+dfsg-1 that is uploaded on mentors. do you need a sponsor ? Cheers, Giuseppe signature.asc Description: OpenPGP digital signature

Bug#584517: CVE-2010-0404: Multiple SQL injection vulnerabilities

2010-06-04 Thread Giuseppe Iuculano
On 06/04/2010 12:44 PM, Olivier Berger wrote: Here : http://mentors.debian.net/cgi-bin/sponsor-pkglist?action=details;package=phpgroupware Please add the Closes entries for the security bugs and add the source format (W: phpgroupware source: missing-debian-source-format). Cheers. Giuseppe.

Bug#581280: [387779e] Fix for Bug#581280 committed to git

2010-06-04 Thread Giuseppe Iuculano
tags 581280 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano iucul...@debian.org on Fri, 4 Jun 2010 13:05:09 +0200. The fix will be in the next upload. = Remove

Bug#584399: CVE-2010-1626:allows local users to delete the data and index

2010-06-03 Thread Giuseppe Iuculano
Package: mysql-dfsg-5.1 Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for mysql-dfsg-5.1. CVE-2010-1626[0]: | MySQL before 5.1.46 allows local users to delete the data and index | files

Bug#584400: CVE-2010-1626

2010-06-03 Thread Giuseppe Iuculano
Package: mysql-dfsg-5.0 Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for mysql-dfsg-5.0. CVE-2010-1626[0]: | MySQL before 5.1.46 allows local users to delete the data and index | files

Bug#584401: CVE-2010-1620: Integer overflow

2010-06-03 Thread Giuseppe Iuculano
Package: gnustep-base Version: 1.19.3-3 Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for gnustep-base. CVE-2010-1620[0]: | Integer overflow in the load_iface function in Tools/gdomap.c

  1   2   3   4   >