Bug#506919: vim: multiple vulnerabilities (CVE-2008-3074, CVE-2008-3075, and CVE-2008-3076)

2008-11-25 Thread Michael S. Gilbert
Package: vim Version: 1:7.0.109 Severity: grave Tags: security Justification: user security hole redhat has just released an update that fixes multiple security flaws in vim [1]. these issues are currently reserved in the CVE tracker, but redhat describes the probems as: Multiple security

Bug#502139: etch - lenny upgrade failure

2008-10-13 Thread Michael S. Gilbert
Package: anjuta Version: 1.2.4a-5 Severity: grave i just tested the etch - lenny transition, and anjuta failed to upgrade properly. the error follows: Preparing to replace anjuta 1:1.2.4a-5 (using .../anjuta_2%3a2.4.2-1_amd64.deb) ... Unpacking replacement anjuta ... dpkg: error processing

Bug#502140: cannot unlock screen during etch - lenny transition

2008-10-13 Thread Michael S. Gilbert
Package: xscreensaver Version: 5.05-3 Severity: grave i just tested the etch - lenny transition on two of my systems, and xscreensaver ended up locking me out of both of them. version 4.24 of the xscreensaver daemon was running when i started the upgrade. i went off to work on some other

Bug#527640: opensc: insecure due to wrong public exponent

2009-05-08 Thread Michael S. Gilbert
Package: opensc Severity: grave Tags: security Tags: patch Hi, There is a vulnerability in opensc. Details are: | The security problem in short: you need a combination of | 1.) a tool that startes a key generation with public exponent set to 1 | (an invalid value that causes an insecure

Bug#524803: ghostscript vulns in stable

2009-05-11 Thread Michael S. Gilbert
hello all, any news on the patches for ghostscript in stable (CVE-2007-6725, CVE-2008-6679, and CVE-2009-0196)? these issues have been sitting unfixed for quite a while now. thanks. mike -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe.

Bug#528281: gnutls26: CVE-2009-1417 certificate expiration vulnerability

2009-05-11 Thread Michael S. Gilbert
Package: gnutls26 Severity: grave Tags: security Hi, The following CVE (Common Vulnerabilities Exposures) ids were published for gnutls26. CVE-2009-1417[0]: | gnutls-cli in GnuTLS before 2.6.6 does not verify the activation and | expiration times of X.509 certificates, which allows remote

Bug#523054: Any likely update for mod_jk?

2009-05-14 Thread Michael S. Gilbert
On Tue, 12 May 2009 13:54:10 +0100, Dominic Hargreaves wrote: Hi, I wondered if any fix is likely to be available for CVE-2008-5519 (information disclosure, looks potentially quite severe) any time soon or if any more help is needed? hi, no one has claimed this (that i've seen), and the

Bug#528434: [Secure-testing-team] Bug#528434: cron: Incomplete fix for CVE-2006-2607 (setgid() and initgroups() not checked)

2009-05-14 Thread Michael S. Gilbert
On Tue, 12 May 2009 16:53:41 -0500, Jamie Strandboge wrote: Package: cron Version: 3.0pl1-105 Severity: grave Tags: patch security Justification: user security hole User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu jaunty ubuntu-patch Hi, I was reviewing a list of old bugs

Bug#528778: [Secure-testing-team] Bug#528778: eggdrop: incomplete patch for CVE-2007-2807

2009-05-15 Thread Michael S. Gilbert
On Fri, 15 May 2009 14:18:26 +0200, Nico Golde wrote: Package: eggdrop Severity: grave Tags: security Justification: user security hole Hi, turns out my patch has a bug in it which opens this up for a buffer overflow again in case strlen(ctcpbuf) returns 0:

Bug#528281: closed by Nico Golde n...@debian.org (Re: Bug#528281: gnutls26: CVE-2009-1417 certificate expiration vulnerability)

2009-05-15 Thread Michael S. Gilbert
On Tue, 12 May 2009 00:03:05 +, Debian Bug Tracking System wrote: This is an automatic notification regarding your Bug report which was filed against the gnutls26 package: #528281: gnutls26: CVE-2009-1417 certificate expiration vulnerability does it make sense to close this bug since

Bug#528281: closed by Nico Golde n...@debian.org (Re: Bug#528281: gnutls26: CVE-2009-1417 certificate expiration vulnerability)

2009-05-15 Thread Michael S. Gilbert
On Fri, 15 May 2009 20:15:49 +0200, Andreas Metzler wrote: On 2009-05-15 Michael S. Gilbert michael.s.gilb...@gmail.com wrote: On Tue, 12 May 2009 00:03:05 +, Debian Bug Tracking System wrote: This is an automatic notification regarding your Bug report which was filed against

Bug#528281: closed by Nico Golde n...@debian.org (Re: Bug#528281: gnutls26: CVE-2009-1417 certificate expiration vulnerability)

2009-05-15 Thread Michael S. Gilbert
On Fri, 15 May 2009 20:50:47 +0200, Nico Golde wrote: Hi, * Michael S. Gilbert michael.s.gilb...@gmail.com [2009-05-15 19:45]: On Tue, 12 May 2009 00:03:05 +, Debian Bug Tracking System wrote: This is an automatic notification regarding your Bug report which was filed against

Bug#528204: CVE-2008-0388

2009-05-17 Thread Michael S. Gilbert
this is CVE-2008-0388: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0388 -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Bug#528204: CVE-2008-0388

2009-05-18 Thread Michael S. Gilbert
On Mon, 18 May 2009 06:49:48 +0200, Ola Lundqvist wrote: Thanks. However this applies only to the windows version as that functions do not even exist in the linux/unix version. ok, yes, i see that now. thanks. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a

Bug#529518: openoffice.org-common: fails to install (need to use mkdir -p to creat missing directory)

2009-05-19 Thread Michael S. Gilbert
package: openoffice.org-common severity: grave version: 1:3.1.0-2 the latest version of openoffice will not install because a mkdir fails: mkdir: cannot create directory '/var/lib/openoffice/share/config': No such file or directory if i manually create the directory, the installation works: $

Bug#532352: gstreamer0.10-plugins-good: CVE-2009-1932 integer overflows

2009-06-08 Thread Michael S. Gilbert
Package: gstreamer0.10-plugins-good Version: 0.10.8-4.1~lenny1 0.10.4-4 Severity: serious Tags: security patch Hi, the following CVE (Common Vulnerabilities Exposures) id was published for gstreamer0.10-plugins-good. CVE-2009-1932[0]: | Multiple integer overflows in the (1) user_info_callback,

Bug#532372: ecryptfs-utils: CVE-2009-1296 unencrypted passphrase on disk

2009-06-08 Thread Michael S. Gilbert
package: ecryptfs-utils version: 68-1 version: 75-1 severity: serious tags: security Hi, the following CVE (Common Vulnerabilities Exposures) id was published for ecryptfs-utils. CVE-2009-1296[0]: |Chris Jones discovered that the eCryptfs support utilities would |report the mount passphrase

Bug#517639: still present in stable releases

2009-06-09 Thread Michael S. Gilbert
reopen 517639 found 517639 1.8.7.72-3 found 517639 1.8.5-4etch4 thank you hi, this bug is still present in the stable releases. please coordinate with the security team (t...@security.debian.org) to prepare updated packages. thanks. -- To UNSUBSCRIBE, email to

Bug#532514: predictable random number generator used in web browsers

2009-06-09 Thread Michael S. Gilbert
package: webkit severity: serious tags: security hello, it has been discovered that all of the major web browsers use a predictable pseudo-random number generator (PRNG). please see reference [0]. the robust solution is to switch to a provably unpredictable PRNG such as Blum Blum Shub [1,2].

Bug#532720: dbus: CVE-2009-1189 incomplete fix for CVE-2008-3834

2009-06-10 Thread Michael S. Gilbert
Package: dbus Version: 1.2.1-5 Severity: grave Tags: security , patch Hi, the following CVE (Common Vulnerabilities Exposures) id was published for dbus. CVE-2009-1189[0]: | The _dbus_validate_signature_with_reason function | (dbus-marshal-validate.c) in D-Bus (aka DBus) before 1.2.14 uses |

Bug#532720: (no subject)

2009-06-10 Thread Michael S. Gilbert
found 532720 1.0.2-1+etch2 thank you note bug report on CVE-2008-3834 is here: http://bugs.debian.org/501433 -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Bug#550150: cupsys: CVE-2009-2807 issue in usb backend

2009-10-07 Thread Michael S Gilbert
package: cupsys version: 1.2.7-4 severity: serious tags: security hi, cups may be affected by a security issue in its usb backend [0]. the advisories state that this affects mac os x, but it is unclear if other os'es are affected. i've submitted a bug upstream requesting more info [1]. you

Bug#550423: samba: CVE-2009-2906 dos and CVE-2009-2948 password access

2009-10-09 Thread Michael S Gilbert
package: samba version: 3.0.24-6 severity: serious tags: security , patch hi, the following CVEs were issued for samba. CVE-2009-2906 [0]: | smbd in Samba 3.0 before 3.0.37, 3.2 before 3.2.15, 3.3 before 3.3.8, and 3.4 | before 3.4.2 allows remote authenticated users to cause a denial of

Bug#550424: openexr6: CVE-2009-1720,1721,1722 potential vectors for arbitrary code execution

2009-10-09 Thread Michael S Gilbert
Package: openexr6 Version: 1.6.1 Severity: serious Tags: security Hi, the following CVE (Common Vulnerabilities Exposures) ids were published for openexr6. CVE-2009-1720[0]: | Multiple integer overflows in OpenEXR 1.2.2 and 1.6.1 allow | context-dependent attackers to cause a denial of service

Bug#550440: advi: CVE-2009-2295 arbitrary code execution

2009-10-09 Thread Michael S Gilbert
Package: advi Version: 1.6.0-12 Severity: serious Tags: security Hi, The following CVE (Common Vulnerabilities Exposures) id was published for camlimages. advi statically links to camlimages, so any issues in that package are also applicable to advi. There were already updates to camlimages

Bug#550442: ffmpeg: deluge of crashes due to missing input sanitization

2009-10-09 Thread Michael S Gilbert
package: ffmpeg version: 0.cvs20060823-8 severity: serious tags: security hi, ffmpeg has been found to be vulnerable to many crashers [0],[1]. this may enable remote compromise of a system. please coordinate with upstream and the security team to push out updates for these issues. mike [0]

Bug#550423: [Pkg-samba-maint] Bug#550423: samba: CVE-2009-2906 dos and CVE-2009-2948 password access

2009-10-09 Thread Michael S Gilbert
On Sat, 10 Oct 2009 07:10:51 +0200 Christian Perrier wrote: Version: 3.4.2-1 Quoting Michael S Gilbert (michael.s.gilb...@gmail.com): package: samba version: 3.0.24-6 severity: serious tags: security , patch hi, the following CVEs were issued for samba. Fixed in 3.4.2

Bug#537104: iceweasel: critical 0-day remote shellcode injection

2009-07-14 Thread Michael S. Gilbert
package: iceweasel version: 3.5 severity: critical tags: security hello, a remote shellcode injection has been disclosed for firefox [0], [1]. the advisory says that version 3.5 has been verified as vulnerable, but older versions are very likely susseptable as well. i have not checked. this is

Bug#537104: forwarded

2009-07-14 Thread Michael S Gilbert
forwarded 537104 https://bugzilla.mozilla.org/show_bug.cgi?id=504237 thanks -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Bug#537281: dbus: uninstallable due to missing directory

2009-07-16 Thread Michael S. Gilbert
package: dbus version: 1.2.16-1 severity: grave hello, dbus is currently uninstallable on sid; erroring with the following message: chown: cannot access `/usr/lib/dbus-1.0/dbus-daemon-launch-help': No such file or directory this can be fixed with a 'mkdir -p': $ sudo mkdir -p

Bug#537299: base: user deletes files without write permission, partition full

2009-07-16 Thread Michael S. Gilbert
On Thu, 16 Jul 2009 21:26:53 +0200, Chiel Kooijman wrote: Package: base Severity: critical Tags: security Justification: root security hole I tried to edit /etc/fstab as user (forgot to use `sudo') but, as I noticed later, the partition that contains the root (/) files was full. After

Bug#537299: base: user deletes files without write permission, partition full

2009-07-16 Thread Michael S. Gilbert
reassign 537299 vim retitle 537299 vim: potential data loss on saturated disk partitions tag 537299 - security thanks On Thu, 16 Jul 2009 23:26:26 +0200, Chiel Kooijman wrote: Thanks for your reply, I guess you're right. It hadn't occurred to me yet that it could have happened at the moment

Bug#537633: libio-socket-ssl-perl: incorrect validation of hostnames

2009-07-19 Thread Michael S. Gilbert
package: libio-socket-ssl-perl version: 1.01-1 severity: serious tags: security , patch a security issue has been fixed in the latest upstream version of libio-socket-ssl-perl [0]. see patch [1]. please coordinate with the security team to prepare updates for the stable releases. thank you.

Bug#537634: mediawiki: multiple vulnerabilities fixed in new upstreams

2009-07-19 Thread Michael S. Gilbert
package: mediawiki version: 1:1.15.0-1 severity: serious tags: security hello, multiple vulnerabilies have been fixed in upstream mediawiki 1.15.1 (these problems did not exist before 1.14.0, so lenny/etch are not vulnerable) [0]. please update unstable to this version. thanks. [0]

Bug#537637: htmldoc: buffer overflow in util.cxx's set_page_size()

2009-07-19 Thread Michael S. Gilbert
package: htmldoc version: 1.8.27-2 severity: serious tags: security , patch hello, a security advisory has been issued for htmldoc [0]. patches available from gentoo [1]. please coordinate with the security team to prepare updates for the stable releases. thank you. [0]

Bug#537409: info

2009-07-19 Thread Michael S Gilbert
while this bug is still open, would it make sense to disable the gcc option/optimization/bug/flaw that allows this vulnerability to exist? the -fno-delete-null-pointer-checks flag will completely disable this option kernel-wide [1]. obviously there is a tradeoff here. the null pointer

Bug#524806: Fwd: etch patch for CVE-2009-0146/147/0166/0799/0800/1179/1180/1181/1182/1183/1187

2009-08-04 Thread Michael S Gilbert
tag 524806 patch thanks derived from ubuntu's 0.5.1 patch, here is a patch set for etch's 0.4.5. i am fairly certain all of these CVEs are addressed in this one. note vulnerable code not present in etch for CVE-2009-0755/1188. please test; i've done some basic testing with existing pdfs on my

Bug#535909:

2009-08-08 Thread Michael S. Gilbert
reopen 535909 fixed 535909 1:3.0.1-3 thanks This bug has been solved with 1:3.0.1-2 before the bug was opened. thanks for the update. please coordinate with the security team to prepare updates for the stable releases. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org

Bug#540605: php5: memory disclosure

2009-08-08 Thread Michael S. Gilbert
package: php5 version: 5.2.0-8+etch13 severity: serious tags: security , patch it has been disclosed that php is potentially vulnerable to remote memory dislosure [0]. patches are available for 5.2.10 and 5.3.0, but older versions are likely affected (as well as php4). please check and

Bug#536724: incomplete fix

2009-08-08 Thread Michael S. Gilbert
the 2.8.1 fix is incomplete, and is now claimed fixed in 2.8.3. see: http://wordpress.org/development/2009/08/wordpress-2-8-3-security-release/ http://core.trac.wordpress.org/changeset/11765 http://core.trac.wordpress.org/changeset/11766 http://core.trac.wordpress.org/changeset/11768

Bug#540610: rubygems: integrity violation

2009-08-09 Thread Michael S. Gilbert
package: rubygems1.9 version: 1.3.1 tags: security severity: serious hello, it has been disclosed thet a specially crafted gem archive could be used to overwrite system files. confirmed for 1.3.x, but older versions may also be affected. please check and help the security team prepare updates

Bug#540610: rubygems: integrity violation

2009-08-09 Thread Michael S. Gilbert
On Sun, 09 Aug 2009 15:34:18 +0900 Daigo Moriwaki wrote: Hello Michael, Michael S. Gilbert wrote: package: rubygems1.9 version: 1.3.1 tags: security severity: serious hello, it has been disclosed thet a specially crafted gem archive could be used to overwrite system files

Bug#535909:

2009-08-09 Thread Michael S. Gilbert
On Sun, 9 Aug 2009 11:00:50 +0200 Sylvain Le Gall wrote: Hello, On Sat, Aug 08, 2009 at 11:01:45PM -0400, Michael S. Gilbert wrote: reopen 535909 fixed 535909 1:3.0.1-3 thanks This bug has been solved with 1:3.0.1-2 before the bug was opened. thanks for the update. please

Bug#540610: rubygems: integrity violation

2009-08-09 Thread Michael S. Gilbert
On Sun, 09 Aug 2009 17:01:38 +0900 Daigo Moriwaki wrote: Hello Michael, Michael S. Gilbert wrote: In Debian, executables from gems install into a particular directory specific to RubyGems such as /var/lib/gems/{1.8|1.9.0}/bin instead of the system directory /usr/bin. There should

Bug#540610: [DRE-maint] Bug#540610: rubygems: integrity violation

2009-08-10 Thread Michael S. Gilbert
On Mon, 10 Aug 2009 08:24:06 -0500, Gunnar Wolf wrote: Michael S. Gilbert dijo [Sun, Aug 09, 2009 at 11:58:04PM -0400]: I tried testgem downloaded from http://bugs.gentoo.org/show_bug.cgi?id=278566. % sudo gem install testgem-0.0.1.gem Successfully installed testgem-0.0.1 1

Bug#540958: libvorbis: CVE-2009-2663 vulnerability

2009-08-10 Thread Michael S Gilbert
Package: libvorbis Version: 1.1.2.dfsg-1.4 Severity: grave Tags: security Hi, the following CVE (Common Vulnerabilities Exposures) id was published for libvorbis. CVE-2009-2663[0]: | libvorbis before r16182, as used in Mozilla Firefox before 3.0.13 and | 3.5.x before 3.5.2 and other products,

Bug#540961: xulrunner: CVE-2009-2663 vulnerability

2009-08-10 Thread Michael S Gilbert
Package: xulrunner Version: 1.9.1.1-2 Severity: grave Tags: security Hi, the following CVE (Common Vulnerabilities Exposures) id was published for xulrunner. CVE-2009-2663[0]: | libvorbis before r16182, as used in Mozilla Firefox before 3.0.13 and | 3.5.x before 3.5.2 and other products, allows

Bug#540958: libvorbis: CVE-2009-2663 vulnerability

2009-08-11 Thread Michael S. Gilbert
On Mon, 10 Aug 2009 23:01:36 -0500, Peter Samuelson wrote: CVE-2009-2663[0]: | libvorbis before r16182, as used in Mozilla Firefox before 3.0.13 and | 3.5.x before 3.5.2 and other products, allows context-dependent | attackers to cause a denial of service (memory corruption and |

Bug#540961: xulrunner: CVE-2009-2663 vulnerability

2009-08-11 Thread Michael S. Gilbert
On Tue, 11 Aug 2009 11:47:50 +0200, Alexander Sack wrote: On Mon, Aug 10, 2009 at 07:47:29PM -0400, Michael S Gilbert wrote: Package: xulrunner Version: 1.9.1.1-2 Severity: grave Tags: security Hi, the following CVE (Common Vulnerabilities Exposures) id was published

Bug#517639: severity

2009-08-11 Thread Michael S. Gilbert
severity 532689 important thanks denial-of-services are not serious. this should probably be fixed with CVE-2009-0642 which is actually serious. please coordinate with the security team to prepare updates for the stable releases on these. -- To UNSUBSCRIBE, email to

Bug#515104: nautilus: potential exploits via application launchers

2009-02-13 Thread Michael S. Gilbert
Package: nautilus Version: 2.20-7 Severity: grave Tags: security as you have probably seen by now, there has been a lot of coverage about the potential avenue for exploits via kde and gnome application launchers (it looks like xfce is safe, for now) [1], [2], [3]. the core of the problem is that

Bug#515106: konqueror:

2009-02-13 Thread Michael S. Gilbert
Package: konqueror Version: 4:3.5.9.dfsg.1-6 Severity: grave Tags: security as you have probably seen by now, there has been a lot of coverage about the potential avenue for exploits via kde and gnome application launchers (it looks like xfce is safe, for now) [1], [2], [3]. the core of the

Bug#515104: link to kde bug

2009-02-13 Thread Michael S. Gilbert
you can track progress for this bug in kde here [1] [1] http://bugs.debian.org/515106 -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Bug#517020: [Pkg-xfce-devel] Bug#517020: Bug#517020: Bug#517020: thunar: potential exploits via application launchers

2009-03-01 Thread Michael S. Gilbert
On Sun, 01 Mar 2009 10:16:27 +0100 wrote: (although if that's the case, i think that there is a problem with debian's documentation [1] since it appears to indicate that any and all security holes are to be reported as grave). It says “Most security bugs should also be set at critical or

Bug#545501: xfce4-clipman: uninstallable due file conflict with xfce4-clipman-plugin

2009-09-07 Thread Michael S Gilbert
package: xfce4-clipman severity: serious version: 2:1.1.0-2 hello, both xfce4-clipman and xfce4-clipman-plugin install the file '/usr/share/applications/xfce4-clipman-plugin.desktop', which causes xfce4-clipman's installation to fail: Unpacking xfce4-clipman (from

Bug#546198: xfs: uninstallable due to logged in debian-xfs user

2009-09-11 Thread Michael S Gilbert
package: xfs version: 1:1.0.8-4 severity: serious the latest xfs update is currently uninstallable on unstable. the error is: Setting up xfs (1:1.0.8-4) ... Installing new version of config file /etc/init.d/xfs ... usermod: user debian-xfs is currently logged in dpkg: error processing

Bug#523016: clamav vulnerability

2009-04-07 Thread Michael S. Gilbert
package: clamav severity: grave tags: security hi, ubuntu recently patched a problem in clamav [1]. the description is: It was discovered that ClamAV did not properly verify its input when processing TAR archives. A remote attacker could send a specially crafted TAR file and cause a

Bug#523028: php5: multiple vulnerabilities

2009-04-07 Thread Michael S. Gilbert
Package: php5 Severity: grave Tags: security Hi, the following CVE (Common Vulnerabilities Exposures) ids were published for php5. CVE-2008-5814[0]: | Cross-site scripting (XSS) vulnerability in PHP, possibly 5.2.7 and | earlier, when display_errors is enabled, allows remote attackers to |

Bug#523475: xine-lib: CVE-2009-0385 arbitrary code execution

2009-04-10 Thread Michael S. Gilbert
Package: xine-lib Severity: grave Tags: security Hi, The following CVE (Common Vulnerabilities Exposures) id was published for xine-lib. CVE-2009-0385[0]: | Integer signedness error in the fourxm_read_header function in | libavformat/4xm.c in FFmpeg before revision 16846 allows remote |

Bug#524373: linux-2.6: /dev/mem rootkit vulnerability

2009-04-16 Thread Michael S. Gilbert
package: linux-2.6 severity: grave tags: security as seen in recent articles and discussions, the linux kernel is currently vulnerable to rootkit attacks via the /dev/mem device. one article [1] mentions that there is an existing patch for the problem, but does not link to it. perhaps this fix

Bug#524373: linux-2.6: /dev/mem rootkit vulnerability

2009-04-16 Thread Michael S. Gilbert
On Thu, 16 Apr 2009 12:43:07 -0400, Noah Meyerhans wrote: On Thu, Apr 16, 2009 at 11:55:05AM -0400, Michael S. Gilbert wrote: as seen in recent articles and discussions, the linux kernel is currently vulnerable to rootkit attacks via the /dev/mem device. one article [1] mentions

Bug#524373: linux-2.6: /dev/mem rootkit vulnerability

2009-04-16 Thread Michael S. Gilbert
reopen 524373 thanks On Thu, 16 Apr 2009 16:53:38 -0400 Noah Meyerhans wrote: On Thu, Apr 16, 2009 at 04:21:10PM -0400, Michael S. Gilbert wrote: i think that any flaw that allows an attacker to elevate his pwnage from root to hidden should always be considered a grave security issue

Bug#524373: linux-2.6: /dev/mem rootkit vulnerability

2009-04-16 Thread Michael S. Gilbert
btw, redhat-based distros are thought to be invulnerable to these attacks due their incorporation of execshield (in particular, due to address space randomization). perhaps it's high time that debian consider doing the same? i know that execshield is not in the vanilla kernel, but when it comes

Bug#523475: xine-lib: CVE-2009-0385 arbitrary code execution

2009-04-19 Thread Michael S. Gilbert
fyi, see upstream changelog as well: http://sourceforge.net/project/shownotes.php?group_id=9655release_id=673233 -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Bug#523475: xine-lib: CVE-2009-0385 arbitrary code execution

2009-04-19 Thread Michael S. Gilbert
On Fri, 10 Apr 2009 18:18:00 +0100 Darren Salt wrote: This does not apply to xine-lib. You mean CVE-2009-0698, which is fixed in unstable (and should soon be fixed in, at least, stable too; it probably applies to oldstable too, but I've not looked yet). not that i nor anyone else should trust

Bug#524803: ghostscript: multiple vulnerabilities

2009-04-19 Thread Michael S. Gilbert
package: ghostscript severity: grave tags: security Hi, The following CVE (Common Vulnerabilities Exposures) ids were published for ghostscript. CVE-2007-6725[0]: | The CCITTFax decoding filter in Ghostscript 8.60, 8.61, and possibly | other versions, allows remote attackers to cause a denial

Bug#524806: poppler: multiple vulnerabilities

2009-04-19 Thread Michael S. Gilbert
package: poppler severity: grave tags: security hello, ubuntu recently patched the following poppler issues [0]: CVE-2009-0146, CVE-2009-0147, CVE-2009-0166, CVE-2009-0799, CVE-2009-0800, CVE-2009-1179, CVE-2009-1180, CVE-2009-1181, CVE-2009-1182, CVE-2009-1183, CVE-2009-1187, CVE-2009-1188

Bug#524807: cups: multiple vulnerabilities

2009-04-19 Thread Michael S. Gilbert
package: cups severity: grave tags: security hello, redhat recently patched the following cups [0], xpdf [1], and kdegraphics[2] issues: CVE-2009-0146, CVE-2009-0147, CVE-2009-0166, CVE-2009-0799, CVE-2009-0800, CVE-2009-1179, CVE-2009-1180, CVE-2009-1181, CVE-2009-1182, CVE-2009-1183 these

Bug#515104: closed by Josselin Mouette j...@debian.org (Bug#515104: fixed in nautilus 2.26.2-1)

2009-04-25 Thread Michael S. Gilbert
On Sat, 25 Apr 2009 01:15:11 + Debian Bug Tracking System wrote: This is an automatic notification regarding your Bug report which was filed against the nautilus package: #515104: nautilus: potential exploits via application launchers awesome! any chance of backporting this to lenny

Bug#524803: CVE-2008-6679 also fixed

2009-04-26 Thread Michael S. Gilbert
On Tue, 21 Apr 2009 23:54:36 +0200 Nico Golde wrote: Hi, turns out CVE-2008-6679 also is fixed since 8.64. The only unfixed issue in this report is CVE-2009-0196. Michael, please better check the code next time, this would have save me a lot of time this evening. I appologize. I have

Bug#526041: clamav: CVE-2008-5525 malware detection bypass

2009-04-28 Thread Michael S. Gilbert
Package: clamav Severity: grave Tags: security Hi, The following CVE (Common Vulnerabilities Exposures) ids were published for clamav. CVE-2008-5525[0]: | ClamAV 0.94.1 and possibly 0.93.1, when Internet Explorer 6 or 7 is | used, allows remote attackers to bypass detection of malware in an |

Bug#510205: buffer overflow in libaudiofile

2009-05-06 Thread Michael S. Gilbert
hi, any news on this one? since this is being tracked with critical severity, it really should be handled as swiftly as possible (it's been six months now since the original disclosure). suse has issued updates for CVE-2008-5824, perhaps their patches may be helpful [1]. thanks. mike [1]

Bug#527474: pango1.0: integer overflow in heap allocation size calculations

2009-05-07 Thread Michael S. Gilbert
package: pango severity: grave tags: security Hi, The following CVE (Common Vulnerabilities Exposures) id was published for pango1.0. CVE-2009-1194[0]: |Pango is a library for laying out and rendering text, with an emphasis |on internationalization. Pango suffers from a multiplicative integer

Bug#520052: webkit: CVE-2008-4723 cross-site scripting vulnerability

2009-06-17 Thread Michael S. Gilbert
reopen 520052 found 520052 1.0.1-4 fixed 520052 1.1.7-1 thanks yes, i, as the original reporter, spent a non-insignificant amount of time to determine that webkit is indeed affected. in fact, i believe that my description in the original report is very complete and describes the extent of the

Bug#520052: wrong CVE

2009-06-17 Thread Michael S. Gilbert
CVE-2008-4723 is the wrong CVE, which is for firefox. it should be CVE-2008-4724 -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Bug#520052: spu candidate

2009-06-17 Thread Michael S. Gilbert
since this is a minor issue, would you be interested in pushing out fixes for this problem in a stable proposed update? if so, please contact the security team. mike -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact

Bug#532689: lenny still affected

2009-06-19 Thread Michael S Gilbert
reopen 532689 thank you this bug isn't entirely fixed yet since stable is still affected. please coordinate with the security team to prepare updates for lenny. thanks. mike -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact

Bug#533676: libpng: CVE-2009-2042 out-of-bounds pixels vulnerability

2009-06-19 Thread Michael S Gilbert
Package: libpng Version: 1.2.15~beta5-1+etch2 Severity: serious Tags: security Hi, the following CVE (Common Vulnerabilities Exposures) id was published for libpng. CVE-2009-2042[0]: | libpng before 1.2.37 does not properly parse 1-bit interlaced images | with width values that are not

Bug#532520: predictable random number generator used in web browsers

2009-06-25 Thread Michael S. Gilbert
On Thu, 25 Jun 2009 22:33:10 + Moritz Muehlenhoff wrote: lynx supports neither Javascript nor multipart/form-data, so it's not affected. i am trying to track the deeper cause here (the fact that all of the web browsers use a predictable PRNG), rather than the symptom (this particular

Bug#535488: cupsys: CVE-2009-0791 integer overflow vulnerabilities

2009-07-02 Thread Michael S. Gilbert
Package: cupsys Version: 1.2.7-4etch6 Severity: serious Tags: security , patch Hi, the following CVE (Common Vulnerabilities Exposures) id was published for cups. CVE-2009-0791[0]: | Multiple integer overflows in the pdftops filter in CUPS 1.1.17, | 1.1.22, and 1.3.7 allow remote attackers to

Bug#535489: cups: CVE-2009-0791 integer overflow vulnerabilities

2009-07-02 Thread Michael S. Gilbert
Package: cups Version: 1.3.8-1+lenny6 Severity: serious Tags: security , patch Hi, the following CVE (Common Vulnerabilities Exposures) id was published for cups. CVE-2009-0791[0]: | Multiple integer overflows in the pdftops filter in CUPS 1.1.17, | 1.1.22, and 1.3.7 allow remote attackers to

Bug#534973: stable updates

2009-07-04 Thread Michael S. Gilbert
reopen 534973 fixed 534973 1:1.5.2-5 thanks hello, please assist the security team to prepare updates for this issue in the stable releases. thank you. mike -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact

Bug#515734: solutions don't work for me

2009-07-04 Thread Michael S. Gilbert
hello, i just encountered this problem after upgrading xorg in unstable as well. i use the dvorak keyboard, but now gdm and x have switched to qwerty by default. i have tried reverting to libxi6 1.1.4 from testing, but that did not solve the problem. i also tried setting up the following in

Bug#532522: forwarded

2009-07-04 Thread Michael S. Gilbert
reopen 532522 forwarded 532522 http://www.dillo.org/bugtrack/Dquery.html thanks -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Bug#535788: dillo: CVE-2009-2294 integer overflow vulnerability

2009-07-04 Thread Michael S. Gilbert
package: dillo version: 0.8.5-4 severity: serious tags: security hello, it has been found that dillo is vulnerable to an integer overflow. the text of the problem is: |Dillo, an open source graphical web browser, suffers from an integer |overflow which may lead to a potentially exploitable

Bug#533347: info

2009-07-04 Thread Michael S. Gilbert
fixed 533347 1.0.8-1 thanks some more info about this issue can be found here [1]. please coordinate with the security team to prepare updated packages for the stable releases. thanks. [1] https://bugzilla.redhat.com/show_bug.cgi?id=501929 -- To UNSUBSCRIBE, email to

Bug#535793: webkit: deluge of security vulnerabilities

2009-07-04 Thread Michael S Gilbert
package: webkit version: 1.0.1-4 severity: grave tags: security hello, webkit has recently been hit by a deluge of security issues [1],[2]. i've been trying to figure out the state of these problems and where debian is affected, but apple's security announcements have been notoriously sparse.

Bug#535793: upstream discussion

2009-07-04 Thread Michael S Gilbert
forwarded 535793 https://bugs.webkit.org/show_bug.cgi?id=26973 thanks i've started a discussion on these issues in the upstream bug report in the above link. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact

Bug#535795: [Secure-testing-team] Bug#535795: nagios3: 3.0.6-5 uninstallable in amd64 due to dependencies

2009-07-05 Thread Michael S Gilbert
On 7/5/09, Kiko Piris wrote: Can’t upgrade nagios3 to 3.0.6-5, aptitude complains : | The following packages have unmet dependencies: | nagios3: Depends: libltdl3 (= 1.5.2-2) which is a virtual package. And since that version solves DSA-1825-1, setting severity to grave. Regards --

Bug#532520: forwarded

2009-07-05 Thread Michael S. Gilbert
forwarded 532520 http://lists.gnu.org/archive/html/lynx-dev/2009-07/msg0.html thanks it looks like the lynx situation for this issue isn't so simple. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact

Bug#532520: info

2009-07-05 Thread Michael S. Gilbert
from some of the upstream discussion, it looks like libbsd provides an arc4random cryptographically secure PRNG, which lynx prefers when available. an appropriate fix for this issue thus would be to depend on libbsd0 and make sure lynx makes use of its arc4random. mike -- To UNSUBSCRIBE,

Bug#535795: nagios3: 3.0.6-5 uninstallable in amd64 due to dependencies

2009-07-05 Thread Michael S. Gilbert
On Sun, 5 Jul 2009 08:43:27 +0200 Kiko Piris wrote: | # apt-cache policy nagios3 | nagios3: | Installed: 3.0.6-4+b1 | Candidate: 3.0.6-5 | Version table: | 3.0.6-5 0 | 500 http://mir1.ovh.net unstable/main Packages | *** 3.0.6-4+b1 0 | 100 /var/lib/dpkg/status

Bug#535795: nagios3: 3.0.6-5 uninstallable in amd64 due to dependencies

2009-07-05 Thread Michael S. Gilbert
On Sun, 5 Jul 2009 20:25:47 +0200 Kiko Piris wrote: Yes, I can see it now. But, according to the file date on a couple of mirrors I just checked, it seems to have “appeared” this morning at 11:19 CEST (just a couple of hours after my bugreport). fixed in latest unstable upload. closing.

Bug#535890: phpmyadmin: remote code injection via xss vulnerability

2009-07-05 Thread Michael S. Gilbert
Package: phpmyadmin Version: 4:2.9.1.1-10 Severity: serious Tags: security Hi, the following CVE (Common Vulnerabilities Exposures) id was published for phpmyadmin. CVE-2009-2284[0]: | Cross-site scripting (XSS) vulnerability in phpMyAdmin before 3.2.0.1 | allows remote attackers to inject

Bug#535896: rails: potential password bypass

2009-07-05 Thread Michael S. Gilbert
package: rails version: 1.1.6-3 severity: serious tags: security hello, it has been found that rails is vulnerable to a password bypass [1]. this will be fixed in upstream version 2.3.3. [1] http://weblog.rubyonrails.org/2009/6/3/security-problem-with-authenticate_with_http_digest -- To

Bug#535909: camlimages: CVE-2009-2295 several integer overflows

2009-07-05 Thread Michael S. Gilbert
package: camlimages version: 2.20-8 severity: serious tags: security hello, camlimages is vulnerable to several integer overflows [1]. this has not yet been fixed upstream, but has been addressed by redhat [2]. [1] http://www.ocert.org/advisories/ocert-2009-009.html [2]

Bug#534973: stable updates

2009-07-06 Thread Michael S. Gilbert
On Mon, 6 Jul 2009 21:44:44 +0200 Thijs Kinkhorst wrote: version 1:1.5.2-5 that I released to unstable is suitable for stable aswell. Prior to this bugfix unstable and stable both contained version 1:1.5.2-4. Attached is a patch with the fix. Do you want me to build it for stable aswell?

Bug#536718: apache2: CVE-2009-1890 denial-of-service vulnerability

2009-07-12 Thread Michael S. Gilbert
Package: apache2 Version: 2.2.3-4+etch6 Severity: serious Tags: security , patch Hi, the following CVE (Common Vulnerabilities Exposures) id was published for apache2. CVE-2009-1890[0]: | The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy | module in the Apache HTTP Server

Bug#535489: [Pkg-cups-devel] Bug#535488: cupsys: CVE-2009-0791 integer overflow vulnerabilities

2009-07-12 Thread Michael S. Gilbert
reopen 535488 reopen 535489 thanks On Sat, 11 Jul 2009 17:20:46 +0200 Martin Pitt wrote: Hello Michael, Michael S. Gilbert [2009-07-02 12:35 -0400]: Hi, the following CVE (Common Vulnerabilities Exposures) id was published for cups. CVE-2009-0791[0]: | Multiple integer

Bug#536724: wordpress: CORE-2009-0515 priviledges unchecked and multiple information disclosures

2009-07-12 Thread Michael S. Gilbert
package: wordpress version: 2.0.10-1etch3 severity: serious tags: security an advisory, CORE-2009-0515, has been issued for wordpress. there are issues with unchecked privilidges and many potential information disclosures. see [1]. this is fixed in upstream version 2.8.1. please coordinate

  1   2   >