Bug#633637: NMU patch

2011-07-18 Thread Steffen Joeris
@@ +libapache2-mod-authnz-external (3.2.4-2.1) unstable; urgency=high + + * Non-maintainer upload by the security team + * Fix SQL injection via the $user paramter (Closes: #633637) +Fixes: CVE-2011-2688 + + -- Steffen Joeris wh...@debian.org Mon, 18 Jul 2011 10:26:11 +1000 + libapache2-mod

Bug#633637: reopen bug

2011-07-14 Thread Steffen Joeris
Hi Amaya, Steffen Joeris wrote: I had a quick look and didn't see that code included in debian as far as I can see the package has the same version in all suites or am I missing anything? Oh, $DEITY, you are absolutely right, I looked at a locally patched version and confused

Bug#628448: several vulnerabilities: CVE-2011-2162 CVE-2011-2161 CVE-2011-2160

2011-05-28 Thread Steffen Joeris
Package: libav Severity: grave Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) ids were published for libav. CVE-2011-2162[0]: | Multiple unspecified vulnerabilities in FFmpeg 0.4.x through 0.6.x, as | used in MPlayer 1.0

Bug#628449: CVE-2011-2147: missing restrictions

2011-05-28 Thread Steffen Joeris
Package: openswan Severity: grave Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for openswan. CVE-2011-2147[0]: | Openswan 2.2.x does not properly restrict permissions for (1) | /var/run/starter.pid,

Bug#628450: CVE-2011-0188: arbitrary code execution

2011-05-28 Thread Steffen Joeris
Package: libruby1.9.1 Severity: grave Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for openswan. CVE-2011-0188[0]: | The VpMemAlloc function in bigdecimal.c in the BigDecimal class in | Ruby 1.9.2-p136

Bug#628451: CVE-2011-0188: arbitrary code execution

2011-05-28 Thread Steffen Joeris
Package: ruby1.9 Severity: grave Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for openswan. CVE-2011-0188[0]: | The VpMemAlloc function in bigdecimal.c in the BigDecimal class in | Ruby 1.9.2-p136 and

Bug#628452: CVE-2011-0188: arbitrary code execution

2011-05-28 Thread Steffen Joeris
Package: ruby1.8 Version: 1.8.7.334-5 Severity: grave Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for openswan. CVE-2011-0188[0]: | The VpMemAlloc function in bigdecimal.c in the BigDecimal class in |

Bug#628453: CVE-2011-1521: information disclosure

2011-05-28 Thread Steffen Joeris
Package: python3.1 Severity: grave Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for python3.1. CVE-2011-1521[0]: | The urllib and urllib2 modules in Python 2.x before 2.7.2 and 3.x | before 3.2.1 process

Bug#628455: CVE-2011-1521: information disclosure

2011-05-28 Thread Steffen Joeris
Package: python2.6 Version: 2.6.6-10 Severity: grave Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for python2.6. CVE-2011-1521[0]: | The urllib and urllib2 modules in Python 2.x before 2.7.2 and 3.x |

Bug#628456: CVE-2011-0766: cryptographic weakness

2011-05-28 Thread Steffen Joeris
Package: erlang Severity: grave Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, Please see http://www.kb.cert.org/vuls/id/178990 for all the information. The upstream patch can be reviewed here: https://github.com/erlang/otp/commit/f228601de45c5 Cheers, Steffen -BEGIN

Bug#603749: mahara in sid not affected

2010-11-17 Thread Steffen Joeris
severity 603749 normal thx It seems that the vulnerable file was introduced after 1.2.6, which is currently in sid. So as long as a fixed version is uploaded next, everything should be fine. Cheers, Steffen signature.asc Description: This is a digitally signed message part.

Bug#596086: NMU diff

2010-09-18 Thread Steffen Joeris
team + * Fix DoS due to wrong string handling (Closes: #596086) +Fixes: CVE-2010-3072 + + -- Steffen Joeris wh...@debian.org Mon, 13 Sep 2010 17:07:51 +1000 + squid3 (3.1.6-1) unstable; urgency=low * New upstream release diff -u squid3-3.1.6/debian/patches/00list squid3-3.1.6/debian

Bug#574418: barnowl security update

2010-03-26 Thread Steffen Joeris
Hi Sam Could you prepare updated packages for lenny and send a debdiff? We'll need to release a DSA for this issue. Cheers Steffen signature.asc Description: This is a digitally signed message part.

Bug#572417: tidary XSS

2010-03-07 Thread Steffen Joeris
Hi Hideki Indeed this should be fixed via a DSA and for unstable as well. I am still having slight problems understanding the XSS issue here. Apparently, to_native() is converting it to another encoding, but shouldn't it do some escaping of certain characters to avoid having the usual html

Bug#572417: tidary XSS

2010-03-07 Thread Steffen Joeris
Hi Hideki Thanks for the information. Have you been able to reproduce the problem with IE and checked the patch? Cheers Steffen On Sun, 7 Mar 2010 19:10:12 +1100 Steffen Joeris steffen.joe...@skolelinux.de wrote: Apparently, to_native() is converting it to another encoding

Bug#572417: tdiary XSS

2010-03-07 Thread Steffen Joeris
On Mon, 8 Mar 2010 03:01:39 am Hideki Yamane wrote: Hi Steffen, On Sun, 7 Mar 2010 21:47:53 +1100 Steffen Joeris steffen.joe...@skolelinux.de wrote: Thanks for the information. Have you been able to reproduce the problem with IE and checked the patch? with IE6 and IE8, I cannot

Bug#568291: possible buffer overflows

2010-02-04 Thread Steffen Joeris
Hi Mirco Hi GMime upstream has released latest 2.4.15 [1] version of the library fixing one security issue. From 2.4.15-changes [2] file: 2010-01-31 Jeffrey Stedfast f...@novell.com * gmime/gmime-encodings.h (GMIME_UUENCODE_LEN): Fixed to prevent possible buffer

Bug#555233: system copy of prototypejs

2010-02-04 Thread Steffen Joeris
Hi Andres I've read your previous comments to the bugreport, but wanted to stress the point that it will not be acceptable for mediabomb to use an internal copy of prototypejs. We do not want a version of the package in squeeze that does not use the system wide protoypejs. I understand that

Bug#568291: possible buffer overflows

2010-02-03 Thread Steffen Joeris
Package: libgmime-2.0-2a Severity: grave Tags: security patch Hi GMime upstream has released latest 2.4.15 [1] version of the library fixing one security issue. From 2.4.15-changes [2] file: 2010-01-31 Jeffrey Stedfast f...@novell.com * gmime/gmime-encodings.h (GMIME_UUENCODE_LEN):

Bug#559531: reopen

2010-02-02 Thread Steffen Joeris
reopen 559531 severity 559531 important thanks Hi MSA-09-0025 and MSA-09-0029 don't seem to be fixed. Both issues are minor security issues, so I am lowering the severity. Cheers Steffen signature.asc Description: This is a digitally signed message part.

Bug#505122: NMU patch

2010-01-30 Thread Steffen Joeris
-1.9.4/debian/changelog --- audiere-1.9.4/debian/changelog +++ audiere-1.9.4/debian/changelog @@ -1,3 +1,11 @@ +audiere (1.9.4-3.1) unstable; urgency=low + + * Non-maintainer upload + * Fix FTBFS with GCC 4.4 (Closes: #505122) +Thanks to Martin Michlmayr + + -- Steffen Joeris wh...@debian.org

Bug#564601: CVE id for maildrop issue (CVE-2010-0301)

2010-01-29 Thread Steffen Joeris
Hi FYI, This issue has been assigned CVE-2010-0301. Cheers Steffen signature.asc Description: This is a digitally signed message part.

Bug#550389: NMU patch

2010-01-29 Thread Steffen Joeris
descriptors +Thanks to Julien Cristau + + -- Steffen Joeris wh...@debian.org Fri, 29 Jan 2010 14:30:27 +0100 + hybserv (1.9.2-4) unstable; urgency=low * Update 01_fhs+mkdirfix.dpatch: diff -u hybserv-1.9.2/debian/hybserv.postinst hybserv-1.9.2/debian/hybserv.postinst --- hybserv-1.9.2

Bug#550389: CVE id

2010-01-29 Thread Steffen Joeris
Hi For the record, this issue got CVE-2010-0303 assigned. Cheers Steffen signature.asc Description: This is a digitally signed message part.

Bug#567193: include patch from DSA to fix integer underflow

2010-01-27 Thread Steffen Joeris
Package: oftc-hybrid Severity: grave Tags: security patch Hi Please include the patch from DSA-1980-1, which fixes an integer underflow (patch attached). Cheers Steffen --- ircd-hybrid-7.2.2.dfsg.2.orig/src/irc_string.c +++ ircd-hybrid-7.2.2.dfsg.2/src/irc_string.c @@ -103,7 +103,9 @@ }

Bug#567191: please include patches from DSA

2010-01-27 Thread Steffen Joeris
Package: ircd-ratbox Severity: grave Tags: security patch Hi DSA-1980-1 has fixed two issues in ircd-ratbox, patches attached. Please include them in the next upload. Cheers Steffen --- ircd-hybrid-7.2.2.dfsg.2.orig/src/irc_string.c +++ ircd-hybrid-7.2.2.dfsg.2/src/irc_string.c @@ -103,7 +103,9

Bug#567192: include patches from recent DSA

2010-01-27 Thread Steffen Joeris
Package: ircd-hybrid Version: 1:7.2.2.dfsg.2-6.1 Severity: grave Tags: security patch Hi DSA-1980-1 has fixed an issue in ircd-hybrid, patch attached. Please include this patch in your next upload. Cheers Steffen --- ircd-hybrid-7.2.2.dfsg.2.orig/src/irc_string.c +++

Bug#563784: bastille NMU

2010-01-23 Thread Steffen Joeris
dependency in init LSB header to use $network rather than +$local_fs to make sure networking is available during boot and to +make the package installation work again (Closes: #563784) +Thanks to Petter Reinholdtsen + + -- Steffen Joeris wh...@debian.org Sat, 23 Jan 2010 13:08:40 +0100

Bug#545651: FTBFS for gcc4.4 patch

2010-01-23 Thread Steffen Joeris
Hi Unfortunately, the package still doesn't work, but please find the patch for the initialising error from the newer compiler below. Cheers Steffen --- insight-6.7.1.dfsg.1.orig/gdb/eval.c +++ insight-6.7.1.dfsg.1/gdb/eval.c @@ -1627,6 +1627,8 @@ if (nargs != ndimensions)

Bug#557807: proposed argus-server patch

2010-01-22 Thread Steffen Joeris
Hi Andrew Following up on this bugreport, if I take the current argus-server package from unstable and try to rebuild it, I'll end up without the argus (or argus_linux) binary in the package[0]. There seems to be a change in the libpcap package's API. Also, you've used the pcap_read() and

Bug#557807: NMU

2010-01-22 Thread Steffen Joeris
-16.1) unstable; urgency=low + + * Non-maintainer upload + * Use pcap_dispatch() rather than the private functions +pcap_offline_read()/pcap_read() and fix a few compilation errors +(Closes: #557807) + + -- Steffen Joeris wh...@debian.org Fri, 22 Jan 2010 15:16:59 +0100 + argus (1:2.0.6

Bug#565287: gwget2 nmu

2010-01-22 Thread Steffen Joeris
by adjusting configure.ac and debian/rules +(Closes: #565287) Thanks to Peter Green + + -- Steffen Joeris wh...@debian.org Fri, 22 Jan 2010 21:39:05 +0100 + gwget2 (1.0.4-1) unstable; urgency=low * New upstream release. Closes: #533658, #552715. diff -u gwget2-1.0.4/debian/rules gwget2

Bug#505626: NMU patch

2010-01-22 Thread Steffen Joeris
GCC compiler (Closes: #505626) +Thanks to Martin Michlmayr + + -- Steffen Joeris wh...@debian.org Fri, 22 Jan 2010 23:08:35 +0100 + mm3d (1.3.7-1.1) unstable; urgency=low * Non-maintainer upload. only in patch2: unchanged: --- mm3d-1.3.7.orig/src/mm3dcore/tool.h +++ mm3d-1.3.7/src

Bug#566002: CVE-2010-0001: integer underflow

2010-01-20 Thread Steffen Joeris
Package: gzip Version: 1.3.12-8 Severity: grave Tags: security patch Hi Bdale, Carl Carl, I saw too late that you're a new co-maintainer so I only forwarded the pre-notification to Bdale (who is probably busy at LCA). i the following CVE (Common Vulnerabilities Exposures) id was published for

Bug#504956: dc-qt: diff for NMU version 0.2.0.alpha-4.1

2009-12-26 Thread Steffen Joeris
Hi Christoph I've prepared an NMU for dc-qt (versioned as 0.2.0.alpha-4.1) and uploaded it to DELAYED/2. Please feel free to tell me if I should delay it longer. Thanks for your work. I am not really maintaining the package anymore. I guess I should check whether the alternatives are good

Bug#558685: some more information and patch on rails issues

2009-12-24 Thread Steffen Joeris
Hi Adam These issues have been assigned CVE ids, see below: CVE-2009-4214[0]: | Cross-site scripting (XSS) vulnerability in the strip_tags function in | Ruby on Rails before 2.2.s, and 2.3.x before 2.3.5, allows remote | attackers to inject arbitrary web script or HTML via vectors involving |

Bug#562165: CVE-2009-4369, CVE-2009-4370, CVE-2009-4371: Several XSS issues

2009-12-23 Thread Steffen Joeris
Package: drupal6 Severity: grave Tags: security patch Hi Luigi, the following CVE (Common Vulnerabilities Exposures) ids were published for drupal6. CVE-2009-4371[0]: | Cross-site scripting (XSS) vulnerability in the Locale module | (modules/locale/locale.module) in Drupal Core 6.14, and

Bug#562165: drupal5?

2009-12-23 Thread Steffen Joeris
Hi Luigi By the way, drupal5 is also affected by at least one of these issues. Can we remove drupal5 from debian or is there a reason for keeping it? It would be easier foaev it gone, then we'd only have to track one package. Cheers Steffen -- To UNSUBSCRIBE, email to

Bug#560604: NMU patch

2009-12-23 Thread Steffen Joeris
+ + * Non-maintainer upload + * Add libmagickcore2-extra as build-depends since imagemagick has +reorganised the plugin packages (thanks to Stuart Prescott) +(Closes: #560604) + + -- Steffen Joeris wh...@debian.org Wed, 23 Dec 2009 22:19:35 +0100 + qemulator (0.5-3) unstable; urgency=low

Bug#561338: CVE-2009-4032: multiple XSS issues

2009-12-16 Thread Steffen Joeris
by the security team + * Fix several cross-site scriptings via different vectors +Fixes: CVE-2009-4032 + + -- Steffen Joeris wh...@debian.org Wed, 16 Dec 2009 12:06:20 +0100 + cacti (0.8.7e-1) unstable; urgency=low * New upstream release (Closes: #541490). diff -u cacti-0.8.7e/debian/patches

Bug#561339: CVE-2009-4112: arbitrary command execution

2009-12-16 Thread Steffen Joeris
Package: cacti Severity: grave Tags: security Hi Sean the following CVE (Common Vulnerabilities Exposures) id was published for cacti. CVE-2009-4112[0]: | Cacti 0.8.7e and earlier allows remote authenticated administrators to | gain privileges by modifying the Data Input Method for the Linux -

Bug#555666: CVE-2009-2820: XSS issues

2009-11-10 Thread Steffen Joeris
Package: cups Version: 1.4.1-5 Severity: grave Tags: security patch Hi Martin The recent DSA (DSA-1933-1) fixed a few cross-site scripting issues. Please include the patch in the unstable/testing distribution. Cheers Steffen diff -u cupsys-1.2.2/debian/changelog cupsys-1.2.2/debian/changelog

Bug#550440: advi: CVE-2009-2295 arbitrary code execution

2009-10-10 Thread Steffen Joeris
On Sun, 11 Oct 2009 07:38:01 am Mehdi Dogguy wrote: Michael S Gilbert a écrit : Package: advi Version: 1.6.0-12 Severity: serious Tags: security Hi, The following CVE (Common Vulnerabilities Exposures) id was published for camlimages. advi statically links to camlimages, so

Bug#548198: CVE-2009-2905: buffer overflow

2009-09-24 Thread Steffen Joeris
Package: newt Severity: grave Tags: security patch Hi There is a buffer overflow in textbox.c. This issue is CVE-2009-2905. In textbox.c the following patch has been applied. - result = malloc(strlen(text) + (strlen(text) / width) + 2); + result = malloc(strlen(text) +

Bug#545779: XSS and illegal characters while printing name-value pairs

2009-09-09 Thread Steffen Joeris
Package: viewvc Severity: grave Tags: security patch Hi According to upstream: Version 1.1.2 (released 11-Aug-2009) * security fix: validate the 'view' parameter to avoid XSS attack * security fix: avoid printing illegal parameter names and values

Bug#540146: gentoo's patch and debdiff

2009-08-08 Thread Steffen Joeris
patch for integer overflows to also cover other +image types (Closes: #540146) +Fixes: CVE-2009-2660 + + -- Steffen Joeris wh...@debian.org Sat, 08 Aug 2009 07:05:38 + + camlimages (1:3.0.1-2) unstable; urgency=low [ Mehdi Dogguy ] diff -u camlimages-3.0.1/debian/patches

Bug#539492: CVE-2009-1892: DoS

2009-08-01 Thread Steffen Joeris
Package: dhcp3-server Severity: grave Tags: security patch Hi, the following CVE (Common Vulnerabilities Exposures) id was published for dhcp3. CVE-2009-1892[0]: | dhcpd in ISC DHCP 3.0.4 and 3.1.1, when the dhcp-client-identifier and | hardware ethernet configuration settings are both used,

Bug#533386: new evolution-data-server packages

2009-07-20 Thread Steffen Joeris
Hi So I had another look at the issue. Indeed, set_nss_error was undefined, so I used a different function. Also, I think there was another regression with displaying signed and encrypted S/MIME messages. Could you please test these updated packages[0] in your environments and tell me, whether

Bug#536554: nmu patch

2009-07-11 Thread Steffen Joeris
-maintainer upload by the security team + * Fix XSS via the backend parameter (Closes: #536554) +Fixes: CVE-2009-2360 + + -- Steffen Joeris wh...@debian.org Sat, 11 Jul 2009 06:02:56 + + sork-passwd-h3 (3.1-1) unstable; urgency=low * New upstream release. only in patch2: unchanged: --- sork

Bug#536554: CVE-2009-2360: Cross-site scripting vulnerability

2009-07-10 Thread Steffen Joeris
Package: sork-passwd-h3 Severity: grave Tags: security patch Hi, the following CVE (Common Vulnerabilities Exposures) id was published for sork-passwd-h3. CVE-2009-2360[0]: | Cross-site scripting (XSS) vulnerability in passwd/main.php in the | Passwd module before 3.1.1 for Horde allows remote

Bug#530271: NMU patch

2009-07-06 Thread Steffen Joeris
team + * Fix cross-site scripting vulnerability, which can be exploited via +the userid, userdescrip, useremail, grp and grpdescrip parameters +(Closes: #530271) +Fixes: CVE-2009-1732 + + -- Steffen Joeris wh...@debian.org Mon, 06 Jul 2009 08:09:24 + + ipplan (4.91a-1) unstable

Bug#530271: xss patch

2009-07-05 Thread Steffen Joeris
On Wed, 24 Jun 2009 07:46:01 am Richard Ellerbrock wrote: The existing patch is correct - using htmlspecialchars will have the effect of placing escaped stings in the database. It will also have the effect of double escaping each time you edit a field. My patch replaces the display template

Bug#530271: xss patch

2009-06-23 Thread Steffen Joeris
Hi Richard I am not sure about your patch. Setting a maximum length does not fix a potential xss issue. Why not using htmlspecialchars() to take care of escaping? I have attached a potential patch for that. Of course, it would be good to check the rest of the code as well and see whether it is

Bug#525943: CVE-2009-0662: privilege escalation

2009-04-27 Thread Steffen Joeris
Package: plone3 Severity: grave Tags: security, patch Hi, the following CVE (Common Vulnerabilities Exposures) id was published for plone3. CVE-2009-0662[0]: | The PlonePAS product 3.x before 3.9 and 3.2.x before 3.2.2, a product | for Plone, does not properly handle the login form, which

Bug#521949: CVE-2009-0790: DoS

2009-04-02 Thread Steffen Joeris
Hi Rene Unfortunately, this doesn't apply as dpd code seems to have moved out of demux.c (I didn't find any of the patch context). Have you had contact with openswan upstream concerning this bug? Isn't the vulnerable code in programs/pluto/ikev1.c? Cheers Steffen -- To UNSUBSCRIBE, email

Bug#521823: SQL injection

2009-03-30 Thread Steffen Joeris
vulnerability when used with multibyte +encodings by using mysql_real_escape_string() + + -- Steffen Joeris wh...@debian.org Mon, 30 Mar 2009 11:21:06 +0200 + auth2db (0.2.5-2+dfsg-1) unstable; urgency=medium * New debian-specific+upstream release (Closes: #493132): diff -u auth2db-0.2.5-2+dfsg

Bug#521949: CVE-2009-0790: DoS

2009-03-30 Thread Steffen Joeris
upload by the security team + * Fix DoS issue via malicious Dead Peer Detection packet +Fixes: CVE-2009-0790 + + -- Steffen Joeris wh...@debian.org Tue, 24 Mar 2009 13:20:43 + + openswan (1:2.4.12+dfsg-1.3) unstable; urgency=high * Non-maintainer upload. diff -u openswan-2.4.12+dfsg

Bug#521950: CVE-2009-0790: DoS

2009-03-30 Thread Steffen Joeris
by the security team + * Fix DoS issue via malicious Dead Peer Detection packet +Fixes: CVE-2009-0790 + + -- Steffen Joeris wh...@debian.org Tue, 24 Mar 2009 12:31:39 + + strongswan (4.2.4-5) unstable; urgency=high Reason for urgency high: this is potentially security relevant. diff -u

Bug#517792: CVE-2009-0698: integer overflow

2009-03-01 Thread Steffen Joeris
Package: xine-lib Severity: grave Tags: security, patch Justification: user security hole Hi, the following CVE (Common Vulnerabilities Exposures) id was published for xine-lib. CVE-2009-0698[0]: | Integer overflow in the 4xm demuxer (demuxers/demux_4xm.c) in xine-lib | 1.1.16.1 allows remote

Bug#516388: proftpd: Several SQL injection vulnerabilities

2009-02-20 Thread Steffen Joeris
Package: proftpd Severity: grave Tags: security Justification: user security hole Hi, the following CVE (Common Vulnerabilities Exposures) ids were published for proftpd. CVE-2009-0543[0]: | ProFTPD Server 1.3.1, with NLS support enabled, allows remote | attackers to bypass SQL injection

Bug#514142: NMU patch

2009-02-05 Thread Steffen Joeris
; urgency=high + + * Non-maintainer upload by the security team + * Include upstream patch to fix DoS via error in request processing +code (Closes: #514142) + + -- Steffen Joeris wh...@debian.org Thu, 05 Feb 2009 18:28:57 + + squid (2.7.STABLE3-4) unstable; urgency=low * debian/rules diff

Bug#514138: audacity: buffer overflow

2009-02-04 Thread Steffen Joeris
Package: audacity Version: 1.3.5-2 Severity: grave Tags: security Justification: user security hole There is a buffer overflow in audacity apparently affecting the etch and lenny version. You can find a reproducer here[0]. However, I just took a random .gro file and when importing it under

Bug#514142: squid: denial of service via crafted request

2009-02-04 Thread Steffen Joeris
Package: squid Severity: grave Tags: security Justification: user security hole Hi A DoS issue has been reported[0] for squid. So far I cannot see the vulnerable code in the stable release, but it would be nice, if you could check that as well. Lenny seems to be affected and needs fixing. I've

Bug#514138: audacity: buffer overflow

2009-02-04 Thread Steffen Joeris
fixed 514138 1.3.6-1 thanks Hi Benjamin On Wed, 4 Feb 2009 04:29:05 pm Benjamin Drung wrote: The upcoming audacity 1.3.7-1 does not crash if I open the generated file from [0]. According to the Gentoo bug tracker [1] audacity 1.3.6 does not have this bug any more. You can find

Bug#514177: gstreamer0.10-plugins-good: Several security issues: CVE-2009-0386 CVE-2009-0387 CVE-2009-0397 CVE-2009-0398

2009-02-04 Thread Steffen Joeris
Package: gstreamer0.10-plugins-good Version: 0.10.8-4.1 Severity: grave Tags: security Justification: user security hole Hi, the following CVE (Common Vulnerabilities Exposures) ids were published for gst-plugins-good0.10. CVE-2009-0386[0]: | Heap-based buffer overflow in the

Bug#513517: phpicalendar: Several vulnarbilities

2009-01-29 Thread Steffen Joeris
Package: phpicalendar Severity: grave Tags: security Justification: user security hole Hi, the following CVE (Common Vulnerabilities Exposures) ids were published for phpicalendar. CVE-2008-5840[0]: | PHP iCalendar 2.24 and earlier allows remote attackers to bypass | authentication by setting

Bug#507587: another CVE id about buffer overflows

2009-01-29 Thread Steffen Joeris
retitle 507587 CVE-2008-5282,CVE-2008-6005,CVE-2009-0323: multiple buffer overflows thanks Hi There is an additional CVE about buffer overflows. CVE-2009-0323[0]: | Multiple stack-based buffer overflows in W3C Amaya Web Browser 10.0 | and 11.0 allow remote attackers to execute arbitrary code

Bug#513531: CVE-2008-4770: Arbitrary code execution via crafted RFB protocol data

2009-01-29 Thread Steffen Joeris
Package: xvnc4viewer Severity: grave Tags: security, patch Justification: user security hole Hi, the following CVE (Common Vulnerabilities Exposures) id was published for vnc4. CVE-2008-4770[0]: | The CMsgReader::readRect function in the VNC Viewer component in | RealVNC VNC Free Edition 4.0

Bug#513158: CVE-2009-0260: Multiple cross-site scripting vulnerabilities

2009-01-26 Thread Steffen Joeris
Package: python-moinmoin Severity: grave Tags: security, patch Justification: user security hole Hi, the following CVE (Common Vulnerabilities Exposures) id was published for moin. CVE-2009-0260[0]: | Multiple cross-site scripting (XSS) vulnerabilities in | action/AttachFile.py in MoinMoin

Bug#511493: CVE-2008-5557: buffer overflow

2009-01-11 Thread Steffen Joeris
Package: php5 Severity: grave Tags: security, patch Justification: user security hole Hi, the following CVE (Common Vulnerabilities Exposures) id was published for php5. CVE-2008-5557[0]: | Heap-based buffer overflow in | ext/mbstring/libmbfl/filters/mbfilter_htmlent.c in the mbstring |

Bug#510918: CVE-2008-5514: Off-by-one error

2009-01-05 Thread Steffen Joeris
Package: uw-imap Severity: grave Tags: security, patch Justification: user security hole Hi, the following CVE (Common Vulnerabilities Exposures) id was published for uw-imap. CVE-2008-5514[0]: | Off-by-one error in the rfc822_output_char function in the | RFC822BUFFER routines in the

Bug#509024: php-xajax: XSS issue (incomplete patch for CVE-2007-2739)

2008-12-17 Thread Steffen Joeris
Package: php-xajax Severity: grave Justification: user security hole Tags: security Hi The patch for CVE-2007-2739 seems to be incomplete as already discussed via private mail. Just using htmlspecialchars(), instead of the replace calls should do the trick. I've requested a new CVE id for this

Bug#509024: php-xajax: XSS issue (incomplete patch for CVE-2007-2739)

2008-12-17 Thread Steffen Joeris
severity 509024 normal thanks On Wed, 17 Dec 2008 06:03:45 pm Nico Golde wrote: Hi, * Steffen Joeris steffen.joe...@skolelinux.de [2008-12-17 17:53]: The patch for CVE-2007-2739 seems to be incomplete as already discussed via private mail. Just using htmlspecialchars(), instead

Bug#508940: CVE-2008-5379: Symlink attack

2008-12-16 Thread Steffen Joeris
Package: netdisco-mibs-installer Severity: grave Tags: security Justification: user security hole Hi, the following CVE (Common Vulnerabilities Exposures) id was published for netdisco-mibs-installer. CVE-2008-5379[0]: | netdisco-mibs-installer 1.0 allows local users to overwrite arbitrary |

Bug#506741: wireshark: DoS caused by sending a SMTP request with large content

2008-12-03 Thread Steffen Joeris
On Wed, 3 Dec 2008 07:55:42 pm Joost Yervante Damad wrote: On Wednesday 03 December 2008 15:10:12 Frederic Peters wrote: Mark Purcell wrote: On Monday 24 November 2008 22:58:38 Steffen Joeris wrote: Packages for lenny and sid build fine with the patch, I haven't tested them though

Bug#507587: CVE-2008-5282: multiple buffer overflows

2008-12-02 Thread Steffen Joeris
Package: amaya Severity: grave Tags: security Justification: user security hole Hi, the following CVE (Common Vulnerabilities Exposures) id was published for amaya. CVE-2008-5282[0]: | Multiple stack-based buffer overflows in W3C Amaya Web Browser 10.0.1 | allow remote attackers to execute

Bug#507183: cups: integer overflow via validation code in of the image size

2008-11-28 Thread Steffen Joeris
Package: cups Version: 1.3.8-1lenny3 Severity: grave Tags: security, patch Justification: user security hole Hi Martin Cups upstream just fixed another integer overflow[0], which was introduced due to an incomplete fix for CVE-2008-1722. The upstream commit can be found here[1]. A CVE id has

Bug#507185: moodle: Several code copies

2008-11-28 Thread Steffen Joeris
Package: moodle Severity: serious Justification: Unknown Hi The moodle package embeds several code copies. At the moment the list includes: libphp-phpmailer tinymce libphp-adodb libphp-snoopy kses domxml-php4-to-php5.php libmarkdown-php There are a few others that are simply not yet packaged

Bug#506942: Buffer overflow exploit in versions until 2.1.8

2008-11-26 Thread Steffen Joeris
Hi Martin I just received the attached message from No-IP.com. This affects stable and testing. I might be tired, but where does this differ from #506179, which is fixed in unstable? Cheers Steffen signature.asc Description: This is a digitally signed message part.

Bug#506741: wireshark: DoS caused by sending a SMTP request with large content

2008-11-24 Thread Steffen Joeris
Package: wireshark Severity: grave Tags: security, patch Justification: user security hole Hi the following remotely exploitable vulnerability in Wireshark's SMTP dissector has been reported: References: http://packetstormsecurity.org/0811-advisories/wireshark104-dos.txt

Bug#504894: another SA issue

2008-11-08 Thread Steffen Joeris
Hi Please also see this advisory[0] as an additional issue. Description: A vulnerability has been reported in Nagios, which can be exploited by malicious people to conduct cross-site request forgery attacks. The application allows users to perform certain actions via HTTP requests without

Bug#504977: ffmpeg-debian: Several security issues

2008-11-08 Thread Steffen Joeris
Package: ffmpeg-debian Version: 0.svn20080206-14 Severity: grave Tags: security, patch Justification: user security hole Hi, the following CVE (Common Vulnerabilities Exposures) ids were published for ffmpeg. CVE-2008-4869[0]: | FFmpeg 0.4.9, as used by MPlayer, allows context-dependent

Bug#504977: ffmpeg-debian: Several security issues

2008-11-08 Thread Steffen Joeris
Hi CVE-2008-4868[1]: | Unspecified vulnerability in the avcodec_close function in | libavcodec/utils.c in FFmpeg 0.4.9 before r14787, as used by MPlayer, | has unknown impact and attack vectors, related to a free on random | pointers. Forget about this one, it seems to be fixed in our

Bug#504283: CVE-2007-3215: phpmailer issue (embedded code-copy)

2008-11-02 Thread Steffen Joeris
Package: phpgroupware Severity: grave Tags: security, patch Justification: user security hole Hi Peter, the following CVE (Common Vulnerabilities Exposures) id was published for egroupware-core. CVE-2007-3215[0]: | PHPMailer 1.7, when configured to use sendmail, allows remote | attackers to

Bug#504255: CVE-2007-3215: remote shell command execution in

2008-11-02 Thread Steffen Joeris
On Sun, 2 Nov 2008 09:49:32 pm Olivier Berger wrote: Le dimanche 02 novembre 2008 à 11:13 +0100, Olivier Berger a écrit : Thanks for spotting this problem. The referred [2] patch is actually not exactly apllicable to the version of class.phpmailer.php shipped in phpgroupware 0.9.11, and

Bug#504255: CVE-2007-3215: remote shell command execution in

2008-11-02 Thread Steffen Joeris
On Sun, 2 Nov 2008 11:34:28 pm Steffen Joeris wrote: On Sun, 2 Nov 2008 09:49:32 pm Olivier Berger wrote: Le dimanche 02 novembre 2008 à 11:13 +0100, Olivier Berger a écrit : Thanks for spotting this problem. The referred [2] patch is actually not exactly apllicable to the version

Bug#504150: snmpd: DoS in getbulk handling code in net-snmp

2008-11-01 Thread Steffen Joeris
Package: snmpd Severity: grave Tags: security, patch Justification: user security hole Hi The following announcement has been released by net-snmp upstream: SECURITY ISSUE: A bug in the getbulk handling code could let anyone with even minimal access crash the agent. If you have open access to

Bug#504168: CVE-2008-4796: missing input sanitising

2008-11-01 Thread Steffen Joeris
Package: libphp-snoopy Severity: grave Tags: security, patch Justification: user security hole Hi, the following CVE (Common Vulnerabilities Exposures) id was published for libphp-snoopy. CVE-2008-4796[0]: | The _httpsrequest function (Snoopy/Snoopy.class.php) in Snoopy 1.2.3 | and earlier

Bug#504169: CVE-2008-4796: missing input sanitising in Snoopy.class.php

2008-11-01 Thread Steffen Joeris
Package: ampache Severity: grave Tags: security, patch Justification: user security hole Hi, the following CVE (Common Vulnerabilities Exposures) id was published for ampache. CVE-2008-4796[0]: | The _httpsrequest function (Snoopy/Snoopy.class.php) in Snoopy 1.2.3 | and earlier allows remote

Bug#504170: CVE-2008-4796: missing input sanitising in Snoopy.class.php

2008-11-01 Thread Steffen Joeris
Package: mahara Severity: grave Tags: security, patch Justification: user security hole Hi, the following CVE (Common Vulnerabilities Exposures) id was published for mahara. CVE-2008-4796[0]: | The _httpsrequest function (Snoopy/Snoopy.class.php) in Snoopy 1.2.3 | and earlier allows remote

Bug#504171: CVE-2008-4796: missing input sanitising

2008-11-01 Thread Steffen Joeris
Package: pixelpost Severity: grave Tags: security, patch Justification: user security hole Hi, the following CVE (Common Vulnerabilities Exposures) id was published for pixelpost. CVE-2008-4796[0]: | The _httpsrequest function (Snoopy/Snoopy.class.php) in Snoopy 1.2.3 | and earlier allows

Bug#504172: CVE-2008-4796: missing input sanitising in Snoopy.class.php

2008-11-01 Thread Steffen Joeris
Package: mediamate Severity: grave Tags: security, patch Justification: user security hole Hi, the following CVE (Common Vulnerabilities Exposures) id was published for mediamate. CVE-2008-4796[0]: | The _httpsrequest function (Snoopy/Snoopy.class.php) in Snoopy 1.2.3 | and earlier allows

Bug#504173: CVE-2008-4796: missing input sanitising in Snoopy.class.php

2008-11-01 Thread Steffen Joeris
Package: opendb Severity: grave Tags: security, patch Justification: user security hole Hi, the following CVE (Common Vulnerabilities Exposures) id was published for opendb. CVE-2008-4796[0]: | The _httpsrequest function (Snoopy/Snoopy.class.php) in Snoopy 1.2.3 | and earlier allows remote

Bug#504169: CVE-2008-4796: missing input sanitising in Snoopy.class.php

2008-11-01 Thread Steffen Joeris
Hi Charlie Thanks for the bug report. I have addressed this issue in ampache-3.4.3-1 which is currently on m.d.n [1] awaiting sponsoring. With Lenny so close to release I am contacting my usual sponsor for guidance on which would be the best solution for this bug: a. use supplied patch,

Bug#449497: foo2zjs dispute

2008-10-28 Thread Steffen Joeris
reassgin 449497 tech-ctte,foo2zjs thanks Dear Technical Committee Members Currently, there is a dispute about a certain part of the foo2zjs package. Unfortunately, we do not seem to be able to solve it and thus require your assistance. We have tried to get a paragraph together to state the

Bug#449497: TC proposal for dispute (was: Re: foo2zjs: application depends on non-free firmware)

2008-10-27 Thread Steffen Joeris
Hi I am upset that you again raised the severity without consulting anyone. The package as it stands is DFSG free and the getweb script is there for the convenience of the users as well as the documentation. Your arguments haven't changed my opinion. However, it doesn't look like we are

Bug#449497: foo2zjs: application depends on non-free firmware

2008-10-26 Thread Steffen Joeris
Hi I understand your sentiment, and it is indeed a grey area situation. If I take policy literary, I think this package is fine in main, but it is not as simple... In order to get this bug rolling (and lenny released ;-) ), can you all live with me splitting up the package in two packages:

Bug#449497: foo2zjs: application depends on non-free firmware

2008-10-26 Thread Steffen Joeris
Hi Sorry for the confusing statement here. I understand your sentiment, and it is indeed a grey area situation. If I take policy literary, I think this package is fine in main, but it is not as simple... In order to get this bug rolling (and lenny released ;-) ), can you all

Bug#449497: foo2zjs: application depends on non-free firmware

2008-10-26 Thread Steffen Joeris
On Sun, 26 Oct 2008 10:12:49 pm Luca Capello wrote: Hi there! On Sun, 26 Oct 2008 08:03:46 +0100, Steffen Joeris wrote: On Sun, 26 Oct 2008 07:38:51 +0100. Joost Yervante Damad wrote: I understand your sentiment, and it is indeed a grey area situation. If I take policy literary, I think

Bug#449497: foo2zjs: application depends on non-free firmware

2008-10-26 Thread Steffen Joeris
severity 449497 important thanks On Sun, 26 Oct 2008 11:40:34 pm Joost Yervante Damad wrote: Hi Luca, [3] not that I checked with such printers, I'm only in touch with one that needs a non-free firmware http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=466758#15 So you don't

  1   2   3   >