Accepted dokuwiki 0.0.20090214b-3.1 (source all)

2010-01-17 Thread Giuseppe Iuculano
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sun, 17 Jan 2010 14:47:41 +0100 Source: dokuwiki Binary: dokuwiki Architecture: source all Version: 0.0.20090214b-3.1 Distribution: unstable Urgency: high Maintainer: Mohammed Adnène Trojette adn+...@diwi.org Changed-By: Giuseppe

Bug#561832: [4a7279a] Fix for Bug#561832 committed to git

2010-01-17 Thread Giuseppe Iuculano
tags 561832 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano iucul...@debian.org on Sun, 17 Jan 2010 12:41:13 +0100. The fix will be in the next upload. = Fixed

Bug#565406: NMU

2010-01-17 Thread Giuseppe Iuculano
@@ +dokuwiki (0.0.20090214b-3.1) unstable; urgency=high + + * Non-maintainer upload by the Security Team. + * Check against cross-site request forgeries (CSRF) + * Fixed multiple vulnerabilities in ACL plugin (Closes: #565406) + + -- Giuseppe Iuculano iucul...@debian.org Sun, 17 Jan 2010 14:47:41 +0100

Bug#565406: NMU

2010-01-17 Thread Giuseppe Iuculano
@@ +dokuwiki (0.0.20090214b-3.1) unstable; urgency=high + + * Non-maintainer upload by the Security Team. + * Check against cross-site request forgeries (CSRF) + * Fixed multiple vulnerabilities in ACL plugin (Closes: #565406) + + -- Giuseppe Iuculano iucul...@debian.org Sun, 17 Jan 2010 14:47:41 +0100

Bug#563402: [Pkg-ia32-libs-maintainers] Bug#563402: ia32-libs broken on ia64

2010-01-16 Thread Giuseppe Iuculano
Il 16/01/2010 11:08, Goswin von Brederlow ha scritto: That usualy means one of the libraries can not be found. What does ldd i586-jdk/bin/unpack200 $ ldd i586-jdk/bin/unpack200 not a dynamic executable Cheers, Giuseppe. signature.asc Description: OpenPGP digital signature

Bug#563402: [Pkg-ia32-libs-maintainers] Bug#563402: ia32-libs broken on ia64

2010-01-16 Thread Giuseppe Iuculano
Il 16/01/2010 11:08, Goswin von Brederlow ha scritto: That usualy means one of the libraries can not be found. What does ldd i586-jdk/bin/unpack200 $ ldd i586-jdk/bin/unpack200 not a dynamic executable Cheers, Giuseppe. signature.asc Description: OpenPGP digital signature

[Full-disclosure] [SECURITY] [DSA-1971-1] New libthai packages fix arbitrary code execution

2010-01-15 Thread Giuseppe Iuculano
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-1971-1secur...@debian.org http://www.debian.org/security/Giuseppe Iuculano January 15, 2010

[Secure-testing-commits] r13827 - data/DSA

2010-01-15 Thread Giuseppe Iuculano
Author: derevko-guest Date: 2010-01-15 20:14:24 + (Fri, 15 Jan 2010) New Revision: 13827 Modified: data/DSA/list Log: DSA-1971-1 libthai - arbitrary code execution Modified: data/DSA/list === --- data/DSA/list

[Secure-testing-commits] r13828 - data/CVE

2010-01-15 Thread Giuseppe Iuculano
Author: derevko-guest Date: 2010-01-15 20:19:46 + (Fri, 15 Jan 2010) New Revision: 13828 Modified: data/CVE/list Log: CVE-2009-4012 fixed in libthai 0.1.13-1 Modified: data/CVE/list === --- data/CVE/list 2010-01-15

[SECURITY] [DSA-1971-1] New libthai packages fix arbitrary code execution

2010-01-15 Thread Giuseppe Iuculano
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-1971-1secur...@debian.org http://www.debian.org/security/Giuseppe Iuculano January 15, 2010

[Full-disclosure] [SECURITY] [DSA-1969-1] New krb5 packages fix denial of service

2010-01-13 Thread Giuseppe Iuculano
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-1969-1 secur...@debian.org http://www.debian.org/security/Giuseppe Iuculano January 12, 2010

[SECURITY] [DSA-1969-1] New krb5 packages fix denial of service

2010-01-13 Thread Giuseppe Iuculano
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-1969-1 secur...@debian.org http://www.debian.org/security/Giuseppe Iuculano January 12, 2010

[Secure-testing-commits] r13793 - data/CVE

2010-01-12 Thread Giuseppe Iuculano
Author: derevko-guest Date: 2010-01-12 21:35:11 + (Tue, 12 Jan 2010) New Revision: 13793 Modified: data/CVE/list Log: CVE-2009-4212 disclosed Modified: data/CVE/list === --- data/CVE/list 2010-01-12 20:52:02 UTC (rev

[Secure-testing-commits] r13777 - in data: . CVE

2010-01-10 Thread Giuseppe Iuculano
Author: derevko-guest Date: 2010-01-10 13:11:25 + (Sun, 10 Jan 2010) New Revision: 13777 Modified: data/CVE/list data/spu-candidates.txt Log: NFU spu notifications Modified: data/CVE/list === --- data/CVE/list

[Secure-testing-commits] r13778 - data/CVE

2010-01-10 Thread Giuseppe Iuculano
Author: derevko-guest Date: 2010-01-10 13:43:17 + (Sun, 10 Jan 2010) New Revision: 13778 Modified: data/CVE/list Log: - CVE-2009-4565: sendmail does not properly handle a '\0' character - sarg issues - NFUs Modified: data/CVE/list

Bug#564581: CVE-2009-4565: does not properly handle a '\0' character in a Common Name (CN) field of an X.509 certificate

2010-01-10 Thread Giuseppe Iuculano
Package: sendmail Severity: grave Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for sendmail. CVE-2009-4565[0]: | sendmail before 8.14.4 does not properly handle a '\0' character in a | Common Name (CN)

Bug#564581: CVE-2009-4565: does not properly handle a '\0' character in a Common Name (CN) field of an X.509 certificate

2010-01-10 Thread Giuseppe Iuculano
Package: sendmail Severity: grave Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for sendmail. CVE-2009-4565[0]: | sendmail before 8.14.4 does not properly handle a '\0' character in a | Common Name (CN)

[Full-disclosure] [SECURITY] [DSA-1965-1] New phpldapadmin packages fix remote file inclusion

2010-01-07 Thread Giuseppe Iuculano
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-1965 secur...@debian.org http://www.debian.org/security/ Giuseppe Iuculano January 06, 2010

Accepted amule 2.2.6+debian0-6 (source i386 all)

2010-01-07 Thread Giuseppe Iuculano
Team pkg-amule-de...@lists.alioth.debian.org Changed-By: Giuseppe Iuculano iucul...@debian.org Description: amule - client for the eD2k and Kad networks, like eMule amule-common - common files for the rest of aMule packages amule-daemon - non-graphic version of aMule, a client for the eD2k

[Secure-testing-commits] r13731 - data/CVE

2010-01-06 Thread Giuseppe Iuculano
Author: derevko-guest Date: 2010-01-06 10:24:52 + (Wed, 06 Jan 2010) New Revision: 13731 Modified: data/CVE/list Log: - NFUs - new uzbl issue Modified: data/CVE/list === --- data/CVE/list 2010-01-06 01:28:25 UTC (rev

[Secure-testing-commits] r13732 - data/CVE

2010-01-06 Thread Giuseppe Iuculano
Author: derevko-guest Date: 2010-01-06 10:39:38 + (Wed, 06 Jan 2010) New Revision: 13732 Modified: data/CVE/list Log: uzbl: CVE id requested Modified: data/CVE/list === --- data/CVE/list 2010-01-06 10:24:52 UTC (rev

[Secure-testing-commits] r13733 - data/CVE

2010-01-06 Thread Giuseppe Iuculano
Author: derevko-guest Date: 2010-01-06 14:14:50 + (Wed, 06 Jan 2010) New Revision: 13733 Modified: data/CVE/list Log: NFU redmine: bug filed Modified: data/CVE/list === --- data/CVE/list 2010-01-06 10:39:38 UTC (rev

[Secure-testing-commits] r13735 - data/CVE

2010-01-06 Thread Giuseppe Iuculano
Author: derevko-guest Date: 2010-01-06 17:44:57 + (Wed, 06 Jan 2010) New Revision: 13735 Modified: data/CVE/list Log: CVE-2009-4427: phpldapadmin in etch not affected Modified: data/CVE/list === --- data/CVE/list

Accepted amule 2.2.6+debian0-5 (source i386 all)

2010-01-06 Thread Giuseppe Iuculano
Team pkg-amule-de...@lists.alioth.debian.org Changed-By: Giuseppe Iuculano iucul...@debian.org Description: amule - client for the eD2k and Kad networks, like eMule amule-common - common files for the rest of aMule packages amule-daemon - non-graphic version of aMule, a client for the eD2k

Accepted wordpress 2.9.1-1 (source all)

2010-01-06 Thread Giuseppe Iuculano
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 06 Jan 2010 13:20:35 +0100 Source: wordpress Binary: wordpress wordpress-l10n Architecture: source all Version: 2.9.1-1 Distribution: unstable Urgency: low Maintainer: Giuseppe Iuculano iucul...@debian.org Changed-By: Giuseppe

Bug#313579: [Pkg-amule-devel] Bug#313579: reopen

2010-01-06 Thread Giuseppe Iuculano
Vollstrecker ha scritto: So one package for one single small file? I got critized for spltting the translations and the utils into separate packages (which I have still reasons for). Where's the difference? I don't know why you got criticized, but there are many other packages that provide

Bug#563940: CVE-2009-4459: uses the title tag before defining the character encoding in a meta tag

2010-01-06 Thread Giuseppe Iuculano
Package: redmine Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for redmine. CVE-2009-4459[0]: | Redmine 0.8.7 and earlier uses the title tag before defining the | character encoding in a

[Secure-testing-team] Bug#563940: CVE-2009-4459: uses the title tag before defining the character encoding in a meta tag

2010-01-06 Thread Giuseppe Iuculano
Package: redmine Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for redmine. CVE-2009-4459[0]: | Redmine 0.8.7 and earlier uses the title tag before defining the | character encoding in a

[SECURITY] [DSA-1965-1] New phpldapadmin packages fix remote file inclusion

2010-01-06 Thread Giuseppe Iuculano
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-1965 secur...@debian.org http://www.debian.org/security/ Giuseppe Iuculano January 06, 2010

Bug#563940: CVE-2009-4459: uses the title tag before defining the character encoding in a meta tag

2010-01-06 Thread Giuseppe Iuculano
Package: redmine Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for redmine. CVE-2009-4459[0]: | Redmine 0.8.7 and earlier uses the title tag before defining the | character encoding in a

Accepted phpldapadmin 1.1.0.5-6+lenny1 (source all)

2010-01-06 Thread Giuseppe Iuculano
-By: Giuseppe Iuculano iucul...@debian.org Description: phpldapadmin - web based interface for administering LDAP servers Closes: 561975 Changes: phpldapadmin (1.1.0.5-6+lenny1) stable-security; urgency=high . * Non-maintainer upload by the Security Team. * Fixed CVE-2009-4427: Local file

[Secure-testing-commits] r13719 - data/CVE

2010-01-05 Thread Giuseppe Iuculano
Author: derevko-guest Date: 2010-01-05 08:11:13 + (Tue, 05 Jan 2010) New Revision: 13719 Modified: data/CVE/list Log: CVE-2009-0689 fixed in kdelibs 4:3.5.10.dfsg.1-3 Modified: data/CVE/list === --- data/CVE/list

Accepted amule 2.2.6+debian0-3 (source i386 all)

2010-01-05 Thread Giuseppe Iuculano
Team pkg-amule-de...@lists.alioth.debian.org Changed-By: Giuseppe Iuculano iucul...@debian.org Description: amule - client for the eD2k and Kad networks, like eMule amule-common - common files for the rest of aMule packages amule-daemon - non-graphic version of aMule, a client for the eD2k

Accepted amule 2.2.6+debian0-4 (source i386 all)

2010-01-05 Thread Giuseppe Iuculano
Team pkg-amule-de...@lists.alioth.debian.org Changed-By: Giuseppe Iuculano iucul...@debian.org Description: amule - client for the eD2k and Kad networks, like eMule amule-common - common files for the rest of aMule packages amule-daemon - non-graphic version of aMule, a client for the eD2k

Bug#313579: [Pkg-amule-devel] Bug#313579: marked as done (please provide amule.schemas file for gconf (teaches browsers about ed2k:// links))

2010-01-05 Thread Giuseppe Iuculano
reopen 313579 thanks Hi, Debian Bug Tracking System ha scritto: Hi, I'm closing this bug, because this won't get included upstream, and including it in debian would help users of firefoy/iceweasel and gnome. I expect right after including this, someone wants lynx to be patched for

Bug#313579: [Pkg-amule-devel] Bug#313579: reopen

2010-01-05 Thread Giuseppe Iuculano
Hi, Vollstrecker ha scritto: If we can add a gnome support, we should do it. And if we could add kde-support, we should do it? And if we could add opera-support, we should do it? Why not? :-) everything, but I as a user would be pissed if I would have to install support for a system I

Accepted phpldapadmin 1.1.0.7-1.2 (source all)

2010-01-04 Thread Giuseppe Iuculano
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Mon, 04 Jan 2010 21:08:46 +0100 Source: phpldapadmin Binary: phpldapadmin Architecture: source all Version: 1.1.0.7-1.2 Distribution: unstable Urgency: high Maintainer: Fabio Tranchitella kob...@debian.org Changed-By: Giuseppe

Bug#561975: NMU

2010-01-04 Thread Giuseppe Iuculano
Giuseppe Iuculano ha scritto: Hi, Attached is a debdiff of the changes I made for 1.1.0.7-1.1 0-day NMU. Hi, previous NMU introduced a regression. Attached the debdiff for 1.1.0.7-1.2 0-day NMU. Cheers, Giuseppe. diff -u phpldapadmin-1.1.0.7/debian/changelog phpldapadmin-1.1.0.7/debian

Bug#562992: [6d07590] Fix for Bug#562992 committed to git

2010-01-04 Thread Giuseppe Iuculano
tags 562992 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano iucul...@debian.org on Tue, 5 Jan 2010 08:43:30 +0100. The fix will be in the next upload. = Disable

Re: [Secure-testing-team] alien-arena SPU

2010-01-04 Thread Giuseppe Iuculano
Michael Gilbert ha scritto: Hi all, I've prepared updates for CVE-2009-3637 for alien-arena [0] and gotten that approved [1] for a stable-proposed-update. Would anyone be willing to sponsor this upload? Fixed the distribution field in debian/changelog (s/unstable/stable-proposed-updates/)

Bug#561975: NMU

2010-01-04 Thread Giuseppe Iuculano
Giuseppe Iuculano ha scritto: Hi, Attached is a debdiff of the changes I made for 1.1.0.7-1.1 0-day NMU. Hi, previous NMU introduced a regression. Attached the debdiff for 1.1.0.7-1.2 0-day NMU. Cheers, Giuseppe. diff -u phpldapadmin-1.1.0.7/debian/changelog phpldapadmin-1.1.0.7/debian

Bug#562992: [6d07590] Fix for Bug#562992 committed to git

2010-01-04 Thread Giuseppe Iuculano
tags 562992 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano iucul...@debian.org on Tue, 5 Jan 2010 08:43:30 +0100. The fix will be in the next upload. = Disable

[Secure-testing-commits] r13701 - in data: CVE NMU

2010-01-03 Thread Giuseppe Iuculano
Author: derevko-guest Date: 2010-01-03 10:55:57 + (Sun, 03 Jan 2010) New Revision: 13701 Modified: data/CVE/list data/NMU/list Log: - NFUs and ITPs - phpldapadmin NMUed Modified: data/CVE/list === --- data/CVE/list

[Secure-testing-commits] r13704 - data/CVE

2010-01-03 Thread Giuseppe Iuculano
Author: derevko-guest Date: 2010-01-03 17:54:42 + (Sun, 03 Jan 2010) New Revision: 13704 Modified: data/CVE/list Log: gwt uploaded in unstable Modified: data/CVE/list === --- data/CVE/list 2010-01-03 17:25:10 UTC (rev

[Secure-testing-commits] r13708 - data/CVE

2010-01-03 Thread Giuseppe Iuculano
Author: derevko-guest Date: 2010-01-04 07:46:02 + (Mon, 04 Jan 2010) New Revision: 13708 Modified: data/CVE/list Log: CVE-2007-6452 is fixed Modified: data/CVE/list === --- data/CVE/list 2010-01-04 07:29:22 UTC (rev

Re: [Secure-testing-commits] r13705 - data/CVE

2010-01-03 Thread Giuseppe Iuculano
Michael Gilbert ha scritto: CVE-2007-6452 (Unspecified vulnerability in the benchmark reporting system in Google ...) - - gwt 1.6.4-1 + - gwt undetermined (low; bug #563542) Why this should be undetermined? Cheers, Giuseppe. signature.asc Description: OpenPGP digital signature

Accepted phpldapadmin 1.1.0.7-1.1 (source all)

2010-01-03 Thread Giuseppe Iuculano
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sun, 03 Jan 2010 11:47:29 +0100 Source: phpldapadmin Binary: phpldapadmin Architecture: source all Version: 1.1.0.7-1.1 Distribution: unstable Urgency: high Maintainer: Fabio Tranchitella kob...@debian.org Changed-By: Giuseppe

Bug#561975: CVE-2009-4427: Local file inclusion vulnerability

2010-01-03 Thread Giuseppe Iuculano
retitle 561975 CVE-2009-4427: Local file inclusion vulnerability thanks Hi, this issue got a CVE id: CVE-2009-4427[0]: | Directory traversal vulnerability in cmd.php in phpLDAPadmin 1.1.0.5 | allows remote attackers to include and execute arbitrary local files | via a .. (dot dot) in the cmd

Bug#561975: NMU

2010-01-03 Thread Giuseppe Iuculano
(1.1.0.7-1.1) unstable; urgency=high + + * Non-maintainer upload by the Security Team. + * Fixed CVE-2009-4427 (Closes: #561975) + + -- Giuseppe Iuculano iucul...@debian.org Sun, 03 Jan 2010 11:47:29 +0100 + phpldapadmin (1.1.0.7-1) unstable; urgency=low * New upstream release. diff -u

Bug#561975: CVE-2009-4427: Local file inclusion vulnerability

2010-01-03 Thread Giuseppe Iuculano
retitle 561975 CVE-2009-4427: Local file inclusion vulnerability thanks Hi, this issue got a CVE id: CVE-2009-4427[0]: | Directory traversal vulnerability in cmd.php in phpLDAPadmin 1.1.0.5 | allows remote attackers to include and execute arbitrary local files | via a .. (dot dot) in the cmd

Bug#561975: NMU

2010-01-03 Thread Giuseppe Iuculano
(1.1.0.7-1.1) unstable; urgency=high + + * Non-maintainer upload by the Security Team. + * Fixed CVE-2009-4427 (Closes: #561975) + + -- Giuseppe Iuculano iucul...@debian.org Sun, 03 Jan 2010 11:47:29 +0100 + phpldapadmin (1.1.0.7-1) unstable; urgency=low * New upstream release. diff -u

[Secure-testing-commits] r13696 - in data: . CVE

2010-01-02 Thread Giuseppe Iuculano
Author: derevko-guest Date: 2010-01-02 09:30:05 + (Sat, 02 Jan 2010) New Revision: 13696 Modified: data/CVE/list data/ospu-candidates.txt data/spu-candidates.txt Log: SPU notifications Modified: data/CVE/list === ---

[Secure-testing-commits] r13697 - in data: . CVE

2010-01-02 Thread Giuseppe Iuculano
Author: derevko-guest Date: 2010-01-02 15:01:04 + (Sat, 02 Jan 2010) New Revision: 13697 Modified: data/CVE/list data/ospu-candidates.txt data/spu-candidates.txt Log: NFUs and ITPs two minor network-manager issues Modified: data/CVE/list

Bug#563371: CVE-2009-4145: information disclosure

2010-01-02 Thread Giuseppe Iuculano
Package: network-manager-applet Severity: important Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for network-manager-applet. CVE-2009-4145[0]: | nm-connection-editor in NetworkManager (NM) 0.7.x exports

Bug#560067: CVE-2009-4144: WPA enterprise network not verified when certificate is removed

2010-01-02 Thread Giuseppe Iuculano
Hi, this issue got a CVE id: CVE-2009-4144[0]: | NetworkManager (NM) 0.7.2 does not ensure that the configured | Certification Authority (CA) certificate file for a (1) WPA Enterprise | or (2) 802.1x network remains present upon a connection attempt, which | might allow remote attackers to

Bug#563402: ia32-libs broken on ia64

2010-01-02 Thread Giuseppe Iuculano
Package: ia32-libs Version: 20090808 Severity: serious Hi, it seems ia32-libs is broken on ia64: $ file i586-jdk/bin/unpack200 i586-jdk/bin/unpack200: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 2.2.5, not stripped $

[Secure-testing-team] Bug#563371: CVE-2009-4145: information disclosure

2010-01-02 Thread Giuseppe Iuculano
Package: network-manager-applet Severity: important Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for network-manager-applet. CVE-2009-4145[0]: | nm-connection-editor in NetworkManager (NM) 0.7.x exports

[Pkg-utopia-maintainers] Bug#560067: CVE-2009-4144: WPA enterprise network not verified when certificate is removed

2010-01-02 Thread Giuseppe Iuculano
Hi, this issue got a CVE id: CVE-2009-4144[0]: | NetworkManager (NM) 0.7.2 does not ensure that the configured | Certification Authority (CA) certificate file for a (1) WPA Enterprise | or (2) 802.1x network remains present upon a connection attempt, which | might allow remote attackers to

Bug#563402: ia32-libs broken on ia64

2010-01-02 Thread Giuseppe Iuculano
Package: ia32-libs Version: 20090808 Severity: serious Hi, it seems ia32-libs is broken on ia64: $ file i586-jdk/bin/unpack200 i586-jdk/bin/unpack200: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 2.2.5, not stripped $

Accepted amule 2.2.6+debian0-1 (source i386 all)

2009-12-29 Thread Giuseppe Iuculano
Team pkg-amule-de...@lists.alioth.debian.org Changed-By: Giuseppe Iuculano iucul...@debian.org Description: amule - client for the eD2k and Kad networks, like eMule amule-common - common files for the rest of aMule packages amule-daemon - non-graphic version of aMule, a client for the eD2k

Accepted amule 2.2.6+debian0-2 (source i386 all)

2009-12-29 Thread Giuseppe Iuculano
Team pkg-amule-de...@lists.alioth.debian.org Changed-By: Giuseppe Iuculano iucul...@debian.org Description: amule - client for the eD2k and Kad networks, like eMule amule-common - common files for the rest of aMule packages amule-daemon - non-graphic version of aMule, a client for the eD2k

[Secure-testing-commits] r13668 - data/CVE

2009-12-28 Thread Giuseppe Iuculano
Author: derevko-guest Date: 2009-12-28 09:48:04 + (Mon, 28 Dec 2009) New Revision: 13668 Modified: data/CVE/list Log: kvm and xen-tools removed Modified: data/CVE/list === --- data/CVE/list 2009-12-27 22:25:37 UTC (rev

Accepted dmraid 1.0.0.rc16-3 (source i386)

2009-12-28 Thread Giuseppe Iuculano
: Giuseppe Iuculano iucul...@debian.org Changed-By: Giuseppe Iuculano iucul...@debian.org Description: dmraid - Device-Mapper Software RAID support tool dmraid-udeb - Device-Mapper Software RAID support tool (udeb) (udeb) libdmraid-dev - Device-Mapper Software RAID support tool - header files

Bug#548620: /usr/bin/amuled: immediate segfault

2009-12-27 Thread Giuseppe Iuculano
tags 548620 moreinfo unreproducible thanks Package: amule-daemon Version: 2.2.1-1+lenny2 Severity: grave File: /usr/bin/amuled Justification: renders package unusable It is impossible to use the program. Immediately does segfault. I can't reproduce that, please provide[1] a meaningful

Bug#553716: [91c0944] Fix for Bug#553716 committed to git

2009-12-27 Thread Giuseppe Iuculano
tags 553716 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano iucul...@debian.org on Sun, 27 Dec 2009 16:43:01 +0100. The fix will be in the next upload. = Replace

Bug#525264: [5b8227f] Fix for Bug#525264 committed to git

2009-12-27 Thread Giuseppe Iuculano
tags 525264 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano iucul...@debian.org on Sun, 27 Dec 2009 16:51:46 +0100. The fix will be in the next upload. = Fixed

Bug#525265: [57dd562] Fix for Bug#525265 committed to git

2009-12-27 Thread Giuseppe Iuculano
tags 525265 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano iucul...@debian.org on Sun, 27 Dec 2009 16:58:10 +0100. The fix will be in the next upload. = Fixed

Bug#548620: /usr/bin/amuled: immediate segfault

2009-12-27 Thread Giuseppe Iuculano
tags 548620 moreinfo unreproducible thanks Package: amule-daemon Version: 2.2.1-1+lenny2 Severity: grave File: /usr/bin/amuled Justification: renders package unusable It is impossible to use the program. Immediately does segfault. I can't reproduce that, please provide[1] a meaningful

Accepted kvm 72+dfsg-5~lenny4 (source all i386)

2009-12-27 Thread Giuseppe Iuculano
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 22 Dec 2009 20:57:32 +0100 Source: kvm Binary: kvm kvm-source Architecture: source all i386 Version: 72+dfsg-5~lenny4 Distribution: stable-security Urgency: high Maintainer: Jan Lübbe jlue...@debian.org Changed-By: Giuseppe

[Secure-testing-commits] r13651 - in data: CVE NMU

2009-12-26 Thread Giuseppe Iuculano
Author: derevko-guest Date: 2009-12-26 09:33:13 + (Sat, 26 Dec 2009) New Revision: 13651 Modified: data/CVE/list data/NMU/list Log: poppler NMUed Modified: data/CVE/list === --- data/CVE/list 2009-12-26 09:15:04 UTC

[Secure-testing-commits] r13658 - data/CVE

2009-12-26 Thread Giuseppe Iuculano
Author: derevko-guest Date: 2009-12-26 18:24:10 + (Sat, 26 Dec 2009) New Revision: 13658 Modified: data/CVE/list Log: - NFUs - CVE-2009-4422: Multiple cross-site scripting (XSS) vulnerabilities in libphp-jpgraph - CVE-2009-4412: Unrestricted file upload vulnerability in Serendipity -

Bug#562633: CVE-2009-4422: Multiple cross-site scripting (XSS) vulnerabilities

2009-12-26 Thread Giuseppe Iuculano
Package: libphp-jpgraph Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for libphp-jpgraph. CVE-2009-4422[0]: | Multiple cross-site scripting (XSS) vulnerabilities in the | GetURLArguments

Bug#562634: CVE-2009-4412: Unrestricted file upload vulnerability

2009-12-26 Thread Giuseppe Iuculano
Package: serendipity Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for serendipity. CVE-2009-4412[0]: | Unrestricted file upload vulnerability in Serendipity before 1.5 | allows remote

Bug#499076: CVE-2009-4411

2009-12-26 Thread Giuseppe Iuculano
retitle 499076 CVE-2009-4411: Physical walk no longer ignores all symlinks tags 499076 security severity 499076 serious thanks Hi, this issue got a CVE id: CVE-2009-4411[0]: | The (1) setfacl and (2) getfacl commands in XFS acl 2.2.47, when | running in recursive (-R) mode, follow symbolic

Bug#562639: CVE-2009-4402 CVE-2009-3580 CVE-2009-3581 CVE-2009-3582 CVE-2009-3583 CVE-2009-3584

2009-12-26 Thread Giuseppe Iuculano
Package: sql-ledger Severity: grave Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) ids were published for sql-ledger. CVE-2009-4402[0]: | The default configuration of SQL-Ledger 2.8.24 allows remote attackers | to perform

Bug#562643: CVE-2009-4270: Stack-based buffer overflow in the errprintf function

2009-12-26 Thread Giuseppe Iuculano
Package: ghostscript Version: 8.70~dfsg-2 Severity: grave Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for ghostscript. CVE-2009-4270[0]: | Stack-based buffer overflow in the errprintf function in

[Secure-testing-team] Bug#562639: CVE-2009-4402 CVE-2009-3580 CVE-2009-3581 CVE-2009-3582 CVE-2009-3583 CVE-2009-3584

2009-12-26 Thread Giuseppe Iuculano
Package: sql-ledger Severity: grave Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) ids were published for sql-ledger. CVE-2009-4402[0]: | The default configuration of SQL-Ledger 2.8.24 allows remote attackers | to perform

Bug#562633: CVE-2009-4422: Multiple cross-site scripting (XSS) vulnerabilities

2009-12-26 Thread Giuseppe Iuculano
Package: libphp-jpgraph Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for libphp-jpgraph. CVE-2009-4422[0]: | Multiple cross-site scripting (XSS) vulnerabilities in the | GetURLArguments

Bug#562634: CVE-2009-4412: Unrestricted file upload vulnerability

2009-12-26 Thread Giuseppe Iuculano
Package: serendipity Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for serendipity. CVE-2009-4412[0]: | Unrestricted file upload vulnerability in Serendipity before 1.5 | allows remote

Bug#562639: CVE-2009-4402 CVE-2009-3580 CVE-2009-3581 CVE-2009-3582 CVE-2009-3583 CVE-2009-3584

2009-12-26 Thread Giuseppe Iuculano
Package: sql-ledger Severity: grave Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) ids were published for sql-ledger. CVE-2009-4402[0]: | The default configuration of SQL-Ledger 2.8.24 allows remote attackers | to perform

Bug#562643: CVE-2009-4270: Stack-based buffer overflow in the errprintf function

2009-12-26 Thread Giuseppe Iuculano
Package: ghostscript Version: 8.70~dfsg-2 Severity: grave Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for ghostscript. CVE-2009-4270[0]: | Stack-based buffer overflow in the errprintf function in

Accepted poppler 0.12.2-2.1 (source i386)

2009-12-24 Thread Giuseppe Iuculano
: source i386 Version: 0.12.2-2.1 Distribution: unstable Urgency: high Maintainer: Loic Minier l...@dooz.org Changed-By: Giuseppe Iuculano iucul...@debian.org Description: libpoppler-dev - PDF rendering library -- development files libpoppler-glib-dev - PDF rendering library -- development files

Bug#551013: [smartmontools-support] smartmontools 5.38+svn2920-2 failing at boot (but is OK when restarting it?)

2009-12-24 Thread Giuseppe Iuculano
Justin Piszcz ha scritto: Package: smartmontools Version: 5.38+svn2920-2 Problem: smartmontools starts too early and fails since udev is not ready yet. Hi, sorry for the late reply. Could you try the 5.39-1 version please? Cheers, Giuseppe signature.asc Description: OpenPGP digital

[Full-disclosure] [SECURITY] [DSA-1962-1] New kvm packages fix several vulnerabilities

2009-12-23 Thread Giuseppe Iuculano
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-1962 secur...@debian.org http://www.debian.org/security/ Giuseppe Iuculano December 23, 2009

Accepted wordpress 2.9-1 (source all)

2009-12-23 Thread Giuseppe Iuculano
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 23 Dec 2009 14:31:36 +0100 Source: wordpress Binary: wordpress wordpress-l10n Architecture: source all Version: 2.9-1 Distribution: unstable Urgency: low Maintainer: Giuseppe Iuculano iucul...@debian.org Changed-By: Giuseppe

Bug#556902: [3287ec5] Fix for Bug#556902 committed to git

2009-12-23 Thread Giuseppe Iuculano
tags 556902 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano iucul...@debian.org on Wed, 23 Dec 2009 13:32:06 +0100. The fix will be in the next upload. = Updated

Bug#561866: [3bea125] Fix for Bug#561866 committed to git

2009-12-23 Thread Giuseppe Iuculano
tags 561866 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano iucul...@debian.org on Wed, 23 Dec 2009 14:21:00 +0100. The fix will be in the next upload. = debian

Bug#561866: [3bea125] Fix for Bug#561866 committed to git

2009-12-23 Thread Giuseppe Iuculano
tags 561866 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano iucul...@debian.org on Wed, 23 Dec 2009 14:21:00 +0100. The fix will be in the next upload. = debian

[SECURITY] [DSA-1962-1] New kvm packages fix several vulnerabilities

2009-12-23 Thread Giuseppe Iuculano
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-1962 secur...@debian.org http://www.debian.org/security/ Giuseppe Iuculano December 23, 2009

[Secure-testing-commits] r13624 - data/CVE

2009-12-22 Thread Giuseppe Iuculano
Author: derevko-guest Date: 2009-12-22 13:28:40 + (Tue, 22 Dec 2009) New Revision: 13624 Modified: data/CVE/list Log: filed bugs for kvm issues Modified: data/CVE/list === --- data/CVE/list 2009-12-22 10:28:18 UTC (rev

[Secure-testing-commits] r13625 - data/CVE

2009-12-22 Thread Giuseppe Iuculano
Author: derevko-guest Date: 2009-12-22 20:26:39 + (Tue, 22 Dec 2009) New Revision: 13625 Modified: data/CVE/list Log: kvm issues triage Modified: data/CVE/list === --- data/CVE/list 2009-12-22 13:28:40 UTC (rev 13624)

Bug#561113: [f7f4c51] Fix for Bug#561113 committed to git

2009-12-22 Thread Giuseppe Iuculano
tags 561113 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano iucul...@debian.org on Tue, 22 Dec 2009 09:58:12 +0100. The fix will be in the next upload. = Fixed crash

Bug#562075: CVE-2009-4031

2009-12-22 Thread Giuseppe Iuculano
Package: kvm Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for kvm. CVE-2009-4031[0]: | The do_insn_fetch function in arch/x86/kvm/emulate.c in the x86 | emulator in the KVM subsystem in

Bug#562076: CVE-2009-3638: Integer overflow in the kvm_dev_ioctl_get_supported_cpuid function

2009-12-22 Thread Giuseppe Iuculano
Package: kvm Severity: grave Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for kvm. CVE-2009-3638[0]: | Integer overflow in the kvm_dev_ioctl_get_supported_cpuid function in | arch/x86/kvm/x86.c in the

Bug#534680: NMU

2009-12-22 Thread Giuseppe Iuculano
+ + * Non-maintainer upload by the Security Team. + * Fixed CVE-2009-3938 (Closes: #534680) + + -- Giuseppe Iuculano iucul...@debian.org Tue, 22 Dec 2009 16:11:27 +0100 + poppler (0.12.2-2) unstable; urgency=low * Switch to quilt to manage patches. diff -u poppler-0.12.2/debian/patches

[Secure-testing-team] Bug#562075: CVE-2009-4031

2009-12-22 Thread Giuseppe Iuculano
Package: kvm Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for kvm. CVE-2009-4031[0]: | The do_insn_fetch function in arch/x86/kvm/emulate.c in the x86 | emulator in the KVM subsystem in

[Secure-testing-team] Bug#562076: CVE-2009-3638: Integer overflow in the kvm_dev_ioctl_get_supported_cpuid function

2009-12-22 Thread Giuseppe Iuculano
Package: kvm Severity: grave Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for kvm. CVE-2009-3638[0]: | Integer overflow in the kvm_dev_ioctl_get_supported_cpuid function in | arch/x86/kvm/x86.c in the

Bug#562075: CVE-2009-4031

2009-12-22 Thread Giuseppe Iuculano
Package: kvm Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for kvm. CVE-2009-4031[0]: | The do_insn_fetch function in arch/x86/kvm/emulate.c in the x86 | emulator in the KVM subsystem in

Bug#562076: CVE-2009-3638: Integer overflow in the kvm_dev_ioctl_get_supported_cpuid function

2009-12-22 Thread Giuseppe Iuculano
Package: kvm Severity: grave Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for kvm. CVE-2009-3638[0]: | Integer overflow in the kvm_dev_ioctl_get_supported_cpuid function in | arch/x86/kvm/x86.c in the

[Secure-testing-commits] r13617 - data

2009-12-21 Thread Giuseppe Iuculano
Author: derevko-guest Date: 2009-12-21 18:29:24 + (Mon, 21 Dec 2009) New Revision: 13617 Modified: data/ospu-candidates.txt data/spu-candidates.txt Log: spu notifications Modified: data/ospu-candidates.txt === ---

<    9   10   11   12   13   14   15   16   17   18   >