Re: minor trinity patch

2013-05-22 Thread Nico Golde
Hi, I'm not sure if you would like to change this In devices.c you scan for the device name in /proc/devices using the %as string. On bionic this doesn't seem to work and therefore no devices are found and because of this no ioctl group ever matches. I changed the code the following way: @@

Bug#709215: nitrogen: Please provide desktop file

2013-05-21 Thread Nico Golde
/nitrogen/commit/227ea7a82f698807df7ea038f6a0fd4febb77b75.patch Will add in the next upload. Thanks! Cheers Nico -- Nico Golde - XMPP: n...@jabber.ccc.de - GPG: 0xA0A0 -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact

[Secure-testing-commits] r22282 - data/CVE

2013-05-16 Thread Nico Golde
Author: nion Date: 2013-05-16 09:30:14 + (Thu, 16 May 2013) New Revision: 22282 Modified: data/CVE/list Log: yet another keystone issue (CVE-2013-2014) Modified: data/CVE/list === --- data/CVE/list 2013-05-16 09:14:26

Bug#708515: keystone: CVE-2013-2014 DoS via large POST requests

2013-05-16 Thread Nico Golde
/cvename.cgi?name=CVE-2013-2014 http://security-tracker.debian.org/tracker/CVE-2013-2014 -- Nico Golde - XMPP: n...@jabber.ccc.de - GPG: 0xA0A0 pgpXnGMT1X84j.pgp Description: PGP signature

Bug#708515: keystone: CVE-2013-2014 DoS via large POST requests

2013-05-16 Thread Nico Golde
/cvename.cgi?name=CVE-2013-2014 http://security-tracker.debian.org/tracker/CVE-2013-2014 -- Nico Golde - XMPP: n...@jabber.ccc.de - GPG: 0xA0A0 pgpHdX9ExAZ3O.pgp Description: PGP signature

[Secure-testing-commits] r22261 - data/CVE

2013-05-14 Thread Nico Golde
Author: nion Date: 2013-05-14 20:27:46 + (Tue, 14 May 2013) New Revision: 22261 Modified: data/CVE/list Log: CVE-2013-2596 is not NFU Modified: data/CVE/list === --- data/CVE/list 2013-05-14 20:19:43 UTC (rev 22260) +++

Accepted fetchmail 6.3.26-1 (source all amd64)

2013-05-11 Thread Nico Golde
...@lists.alioth.debian.org Changed-By: Nico Golde n...@debian.org Description: fetchmail - SSL enabled POP3, APOP, IMAP mail gatherer/forwarder fetchmailconf - fetchmail configurator Closes: 631781 699425 706045 Changes: fetchmail (6.3.26-1) unstable; urgency=low . * New upstream release. - Fix

[Secure-testing-commits] r22197 - data/CVE

2013-05-07 Thread Nico Golde
Author: nion Date: 2013-05-07 14:01:48 + (Tue, 07 May 2013) New Revision: 22197 Modified: data/CVE/list Log: CVE-2013-2595 is nfu Modified: data/CVE/list === --- data/CVE/list 2013-05-07 13:18:21 UTC (rev 22196) +++

Re: [dev][ii]Help with my frontend

2013-05-04 Thread Nico Golde
... Cheers Nico -- Nico Golde - XMPP: n...@jabber.ccc.de - GPG: 0xA0A0

Bug#706644: untrusted input file might be harmful

2013-05-02 Thread Nico Golde
and there are no reverse dependencies. I therefore suggest removing the package from testing due to it's bad shape. FWIF, I'm fine with that. The stuff is easy to address, but I lost interest in doing so. Cheers Nico -- Nico Golde - XMPP: n...@jabber.ccc.de - GPG: 0xA0A0 pgpyfYgwuHJUs.pgp

Bug#706644: untrusted input file might be harmful

2013-05-02 Thread Nico Golde
and there are no reverse dependencies. I therefore suggest removing the package from testing due to it's bad shape. FWIF, I'm fine with that. The stuff is easy to address, but I lost interest in doing so. Cheers Nico -- Nico Golde - XMPP: n...@jabber.ccc.de - GPG: 0xA0A0 pgprEBSyMOkfA.pgp

Bug#706045: [pkg-fetchmail-maint] Bug#706045: help?

2013-04-26 Thread Nico Golde
I'll probably fix it next week. Sorry I'm traveling right now... Cheers Nico -- Nico Golde - XMPP: n...@jabber.ccc.de - GPG: 0xA0A0 pgpd2a8vm2ykA.pgp Description: PGP signature

Bug#706045: [pkg-fetchmail-maint] Bug#706045: help?

2013-04-26 Thread Nico Golde
I'll probably fix it next week. Sorry I'm traveling right now... Cheers Nico -- Nico Golde - XMPP: n...@jabber.ccc.de - GPG: 0xA0A0 pgpp97JFsRRNu.pgp Description: PGP signature

Bug#706041: O: tpp -- text presentation program

2013-04-23 Thread Nico Golde
Package: wnpp Severity: normal I intend to orphan the tpp package. The package description is: Tpp stands for text presentation program and is an ncurses-based presentation tool. The presentation can be written with your favorite editor in a simple description format and then shown on any

Bug#706041: O: tpp -- text presentation program

2013-04-23 Thread Nico Golde
Package: wnpp Severity: normal I intend to orphan the tpp package. The package description is: Tpp stands for text presentation program and is an ncurses-based presentation tool. The presentation can be written with your favorite editor in a simple description format and then shown on any

Re: [dev] ii IPv6 support

2013-04-13 Thread Nico Golde
Hi, * William Giokas 1007...@gmail.com [2013-04-12 03:35]: On Fri, Apr 12, 2013 at 09:25:25AM +0800, Patrick Haller wrote: On 2013-04-11 21:17, Carlos Torres wrote: it was there just a little hidden http://git.suckless.org/sites/tree/tools.suckless.org/ii/patches/ii-ipv6.diff i mean

Re: [dev] ii IPv6 support

2013-04-11 Thread Nico Golde
Hi, * Patrick 201009-suckl...@haller.ws [2013-04-08 12:25]: Attached is a patch to add IPv6 support to ii, based on where it was as of 7a99152ce64d7006730006094b333edbecbe505a Enjoy, scream, whatever... hmm? http://tools.suckless.org/ii/patches/ii-1.7-ssl.diff Cheers Nico

[Secure-testing-commits] r21848 - org

2013-04-05 Thread Nico Golde
Author: nion Date: 2013-04-05 12:12:15 + (Fri, 05 Apr 2013) New Revision: 21848 Modified: org/security-frontdesk.2013.txt Log: shuffling frontdesk due to traveling :/ Modified: org/security-frontdesk.2013.txt === ---

Bug#703738: [pkg-fetchmail-maint] Bug#703738: fetchmail: Dot at 1st column of any line cuts delivered message

2013-03-23 Thread Nico Golde
to another package, e.g. mpop leads to delivery of whole message. Can you show fetchmail -v of such a message fetch? I can not reproduce this behaviour. Cheers Nico -- Nico Golde - XMPP: n...@jabber.ccc.de - GPG: 0xA0A0 pgpcTSwpzvCIT.pgp Description: PGP signature

Accepted newsbeuter 2.6-1 (source amd64)

2013-03-21 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Wed, 20 Mar 2013 20:28:55 +0100 Source: newsbeuter Binary: newsbeuter Architecture: source amd64 Version: 2.6-1 Distribution: unstable Urgency: low Maintainer: Nico Golde n...@debian.org Changed-By: Nico Golde n...@debian.org

Bug#703632: Please update the package 'newsbeuter' to version 2.6

2013-03-21 Thread Nico Golde
Hi, * Miś Uszatek adres.em...@ymail.com [2013-03-21 17:01]: Please update the package 'newsbeuter' to version 2.6. This already happened, even though I just noticed I uploaded the package with my old key.. Expect an upload to pop up shortly... Cheers Nico -- Nico Golde - XMPP: n

[Secure-testing-commits] r21505 - data/CVE

2013-03-04 Thread Nico Golde
Author: nion Date: 2013-03-04 16:21:29 + (Mon, 04 Mar 2013) New Revision: 21505 Modified: data/CVE/list Log: new stunnel issue Modified: data/CVE/list === --- data/CVE/list 2013-03-04 16:07:33 UTC (rev 21504) +++

Bug#702267: stunnel: CVE-2013-1762 buffer overflow in TLM authentication of the CONNECT protocol negotiation

2013-03-04 Thread Nico Golde
changelog entry. For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1762 http://security-tracker.debian.org/tracker/CVE-2013-1762 Please adjust the affected versions in the BTS as needed. -- Nico Golde - XMPP: n...@jabber.ccc.de - GPG: 0xA0A0

Bug#702267: stunnel: CVE-2013-1762 buffer overflow in TLM authentication of the CONNECT protocol negotiation

2013-03-04 Thread Nico Golde
changelog entry. For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1762 http://security-tracker.debian.org/tracker/CVE-2013-1762 Please adjust the affected versions in the BTS as needed. -- Nico Golde - XMPP: n...@jabber.ccc.de - GPG: 0xA0A0

[Secure-testing-commits] r21465 - data/CVE

2013-03-01 Thread Nico Golde
Author: nion Date: 2013-03-01 11:12:07 + (Fri, 01 Mar 2013) New Revision: 21465 Modified: data/CVE/list Log: new busybox issue Modified: data/CVE/list === --- data/CVE/list 2013-03-01 07:56:37 UTC (rev 21464) +++

[Full-disclosure] [SECURITY] [DSA 2634-1] python-django security update

2013-02-27 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - Debian Security Advisory DSA-2634-1 secur...@debian.org http://www.debian.org/security/Nico Golde February 27, 2013

[Secure-testing-commits] r21451 - data/CVE

2013-02-27 Thread Nico Golde
Author: nion Date: 2013-02-27 20:23:19 + (Wed, 27 Feb 2013) New Revision: 21451 Modified: data/CVE/list Log: two new sudo issues Modified: data/CVE/list === --- data/CVE/list 2013-02-27 19:50:30 UTC (rev 21450) +++

Bug#701838: sudo: CVE-2013-1775 authentication bypass when clock is reset

2013-02-27 Thread Nico Golde
the affected versions in the BTS as needed. Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 pgpbmpQYgwHAw.pgp Description: PGP signature

Bug#701839: sudo: CVE-2013-1776 potential bypass of sudo tty_tickets constraints

2013-02-27 Thread Nico Golde
http://security-tracker.debian.org/tracker/CVE-2013-1776 Please adjust the affected versions in the BTS as needed. -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 pgpc_GnIsaKAh.pgp Description: PGP signature

[SECURITY] [DSA 2634-1] python-django security update

2013-02-27 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - Debian Security Advisory DSA-2634-1 secur...@debian.org http://www.debian.org/security/Nico Golde February 27, 2013

Bug#701838: sudo: CVE-2013-1775 authentication bypass when clock is reset

2013-02-27 Thread Nico Golde
the affected versions in the BTS as needed. Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 pgppbYwtzHCYJ.pgp Description: PGP signature

[Secure-testing-commits] r21441 - data/DSA

2013-02-26 Thread Nico Golde
Author: nion Date: 2013-02-26 23:41:37 + (Tue, 26 Feb 2013) New Revision: 21441 Modified: data/DSA/list Log: DSA-2644-1 (python-django) Modified: data/DSA/list === --- data/DSA/list 2013-02-26 23:25:12 UTC (rev 21440)

[Secure-testing-commits] r21442 - data/DSA

2013-02-26 Thread Nico Golde
Author: nion Date: 2013-02-26 23:45:27 + (Tue, 26 Feb 2013) New Revision: 21442 Modified: data/DSA/list Log: fix python-django dsa number Modified: data/DSA/list === --- data/DSA/list 2013-02-26 23:41:37 UTC (rev 21441)

Accepted httping 1.5.8-1 (source amd64)

2013-02-19 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 19 Feb 2013 15:39:36 +0100 Source: httping Binary: httping Architecture: source amd64 Version: 1.5.8-1 Distribution: unstable Urgency: low Maintainer: Nico Golde n...@debian.org Changed-By: Nico Golde n...@debian.org Description

Re: [dev] gregkh likes us

2013-02-17 Thread Nico Golde
. that get added over time. Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 pgpB9PZ2wxLCP.pgp Description: PGP signature

Accepted httping 1.5.7-1 (source amd64)

2013-02-10 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sun, 10 Feb 2013 17:21:08 +0100 Source: httping Binary: httping Architecture: source amd64 Version: 1.5.7-1 Distribution: unstable Urgency: low Maintainer: Nico Golde n...@debian.org Changed-By: Nico Golde n...@debian.org Description

[Secure-testing-commits] r21214 - data/CVE

2013-02-09 Thread Nico Golde
Author: nion Date: 2013-02-09 13:25:08 + (Sat, 09 Feb 2013) New Revision: 21214 Modified: data/CVE/list Log: CVE-2010-5107 will be fixed via pu Modified: data/CVE/list === --- data/CVE/list 2013-02-09 13:19:54 UTC (rev

[Secure-testing-commits] r21194 - data/CVE

2013-02-08 Thread Nico Golde
Author: nion Date: 2013-02-08 18:48:59 + (Fri, 08 Feb 2013) New Revision: 21194 Modified: data/CVE/list Log: bug for CVE-2010-5107 Modified: data/CVE/list === --- data/CVE/list 2013-02-08 15:38:54 UTC (rev 21193) +++

Bug#700102: openssh: CVE-2010-5107 trivial DoS due to default configuration

2013-02-08 Thread Nico Golde
-2010-5107 Please adjust the affected versions in the BTS as needed. -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 pgpNEP9WHCFGN.pgp Description: PGP signature

Bug#700102: openssh: CVE-2010-5107 trivial DoS due to default configuration

2013-02-08 Thread Nico Golde
-2010-5107 Please adjust the affected versions in the BTS as needed. -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 pgp2XJiydxHtU.pgp Description: PGP signature

[Secure-testing-commits] r21180 - data/CVE

2013-02-07 Thread Nico Golde
Author: nion Date: 2013-02-07 11:33:02 + (Thu, 07 Feb 2013) New Revision: 21180 Modified: data/CVE/list Log: CVE-2010-5107 openssh unfixed Modified: data/CVE/list === --- data/CVE/list 2013-02-07 10:29:07 UTC (rev

[Secure-testing-commits] r21184 - data/CVE

2013-02-07 Thread Nico Golde
Author: nion Date: 2013-02-07 12:33:23 + (Thu, 07 Feb 2013) New Revision: 21184 Modified: data/CVE/list Log: CVE-2012-588[1-3] fixed in yui 2.9.0.dfsg.0.1-0.1 Modified: data/CVE/list === --- data/CVE/list 2013-02-07

Bug#699425: [pkg-fetchmail-maint] Bug#699425: Fetchmail's resolvconf update script can be simplified

2013-01-31 Thread Nico Golde
the bug in this case. Hence downgrading. Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Re: [dev] iim - ii improved and rewriten

2013-01-09 Thread Nico Golde
Hi, * Ivan Kanakarakis ivan.ka...@gmail.com [2013-01-08 23:11]: On 8 January 2013 23:28, Nico Golde n...@ngolde.de wrote: * Ivan Kanakarakis ivan.ka...@gmail.com [2013-01-08 14:52]: [...] anyway, I hope I did not annoy anyone, I just found cause on what you said to express my thoughts

[Secure-testing-commits] r20855 - data/CVE

2013-01-08 Thread Nico Golde
Author: nion Date: 2013-01-08 21:17:17 + (Tue, 08 Jan 2013) New Revision: 20855 Modified: data/CVE/list Log: yet another rails issue Modified: data/CVE/list === --- data/CVE/list 2013-01-08 21:14:47 UTC (rev 20854) +++

[Secure-testing-commits] r20856 - data/CVE

2013-01-08 Thread Nico Golde
Author: nion Date: 2013-01-08 21:40:15 + (Tue, 08 Jan 2013) New Revision: 20856 Modified: data/CVE/list Log: new nagios issue Modified: data/CVE/list === --- data/CVE/list 2013-01-08 21:17:17 UTC (rev 20855) +++

Re: [dev] iim - ii improved and rewriten

2013-01-08 Thread Nico Golde
on suckless.org though for obvious reasons. Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 pgpY7W_zPQqht.pgp Description: PGP signature

Re: [dev] iim - ii improved and rewriten

2013-01-08 Thread Nico Golde
Hi, * Ivan Kanakarakis ivan.ka...@gmail.com [2013-01-08 14:52]: On 8 January 2013 14:02, Nico Golde n...@ngolde.de wrote: * Anselm R Garbe garb...@gmail.com [2013-01-08 12:50]: On 8 January 2013 03:05, Ivan Kanakarakis ivan.ka...@gmail.com wrote: I've been tweaking ii's code lately, mainly

[Full-disclosure] [SECURITY] [DSA 2600-1] cups security update

2013-01-07 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - Debian Security Advisory DSA-2600-1 secur...@debian.org http://www.debian.org/security/Nico Golde January 06, 2013

Bug#697595: O: openbox -- standards compliant, fast, light-weight, extensible window manager

2013-01-07 Thread Nico Golde
Package: wnpp Severity: normal I intend to orphan the openbox package. The package description is: Openbox works with your applications, and makes your desktop easier to manage. This is because the approach to its development was the opposite of what seems to be the general case for window

Bug#697595: O: openbox -- standards compliant, fast, light-weight, extensible window manager

2013-01-07 Thread Nico Golde
Package: wnpp Severity: normal I intend to orphan the openbox package. The package description is: Openbox works with your applications, and makes your desktop easier to manage. This is because the approach to its development was the opposite of what seems to be the general case for window

[SECURITY] [DSA 2597-1] rails security update

2013-01-07 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - Debian Security Advisory DSA-2597-1 secur...@debian.org http://www.debian.org/security/Nico Golde January 04, 2013

[SECURITY] [DSA 2600-1] cups security update

2013-01-07 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - Debian Security Advisory DSA-2600-1 secur...@debian.org http://www.debian.org/security/Nico Golde January 06, 2013

[Full-disclosure] [SECURITY] [DSA 2597-1] rails security update

2013-01-06 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - Debian Security Advisory DSA-2597-1 secur...@debian.org http://www.debian.org/security/Nico Golde January 04, 2013

[Secure-testing-commits] r20835 - data/DSA

2013-01-06 Thread Nico Golde
Author: nion Date: 2013-01-06 16:35:08 + (Sun, 06 Jan 2013) New Revision: 20835 Modified: data/DSA/list Log: DSA-2600-1 cups Modified: data/DSA/list === --- data/DSA/list 2013-01-06 14:55:57 UTC (rev 20834) +++

[Secure-testing-commits] r20836 - data/CVE

2013-01-06 Thread Nico Golde
Author: nion Date: 2013-01-06 18:00:53 + (Sun, 06 Jan 2013) New Revision: 20836 Modified: data/CVE/list Log: add CVE-2013-0157 (mount) Modified: data/CVE/list === --- data/CVE/list 2013-01-06 16:35:08 UTC (rev 20835)

Bug#671530: tpp: does not work with ruby 1.9

2013-01-06 Thread Nico Golde
-ncurses upload works fine. I expected tpp to respond to user keyboard input with ruby 1.9 as it does with ruby 1.8. Can you please tell me the exact steps to reproduce this? I can't seem to reproduce it with ruby 1.9.3p194 and ruby-ncurses 1.3.1. Cheers Nico -- Nico Golde - http

Bug#671540: tpp: please update to gem2deb packaging

2013-01-06 Thread Nico Golde
have been ignoring this for too long. I will fix this with a new upload soon. Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 pgpDoNdiVcufk.pgp Description: PGP signature

Re: [SECURITY] [DSA 2600-1] cups security update

2013-01-06 Thread Nico Golde
* Nico Golde n...@debian.org [2013-01-06 18:40]: - Debian Security Advisory DSA-2600-1 secur...@debian.org http://www.debian.org/security/Nico Golde January 06, 2013

[Secure-testing-commits] r20826 - data/CVE

2013-01-05 Thread Nico Golde
Author: nion Date: 2013-01-05 16:44:31 + (Sat, 05 Jan 2013) New Revision: 20826 Modified: data/CVE/list Log: add mount issue Modified: data/CVE/list === --- data/CVE/list 2013-01-05 13:08:25 UTC (rev 20825) +++

Accepted ii 1.7-1 (source amd64)

2013-01-05 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sat, 05 Jan 2013 17:50:18 +0100 Source: ii Binary: ii Architecture: source amd64 Version: 1.7-1 Distribution: unstable Urgency: low Maintainer: Nico Golde n...@debian.org Changed-By: Nico Golde n...@debian.org Description: ii

Bug#697251: gnupg2: gnupg key import memory corruption

2013-01-05 Thread Nico Golde
Hi, * Eric Dorland e...@debian.org [2013-01-05 14:02]: * Thijs Kinkhorst (th...@debian.org) wrote: On Fri, January 4, 2013 11:39, Thijs Kinkhorst wrote: On Thu, January 3, 2013 04:19, Christoph Anton Mitterer wrote: This is a follow up for #697108 and CVE-2012-6085. Eric,

[dev] [ii] 1.7 release

2013-01-05 Thread Nico Golde
Hey, way too late, but I just wrapped up the current git head of ii[0] to an 1.7 release. The archive is available at [1]. 1.7 (2013-01-05) - -k now specifies an environment variable that contains the server key. This behaviour has been changed in order to not expose the password

Bug#697251: gnupg2: gnupg key import memory corruption

2013-01-05 Thread Nico Golde
Hi, * Eric Dorland e...@debian.org [2013-01-05 14:02]: * Thijs Kinkhorst (th...@debian.org) wrote: On Fri, January 4, 2013 11:39, Thijs Kinkhorst wrote: On Thu, January 3, 2013 04:19, Christoph Anton Mitterer wrote: This is a follow up for #697108 and CVE-2012-6085. Eric,

[Secure-testing-commits] r20808 - org

2013-01-04 Thread Nico Golde
Author: nion Date: 2013-01-04 21:11:48 + (Fri, 04 Jan 2013) New Revision: 20808 Added: org/security-frontdesk.2013.txt Log: add security frontdesk for 2013 Added: org/security-frontdesk.2013.txt === ---

[Secure-testing-commits] r20810 - data/DSA

2013-01-04 Thread Nico Golde
Author: nion Date: 2013-01-04 21:59:14 + (Fri, 04 Jan 2013) New Revision: 20810 Modified: data/DSA/list Log: DSA-2597-1 rails Modified: data/DSA/list === --- data/DSA/list 2013-01-04 21:27:00 UTC (rev 20809) +++

Bug#696161: unblock: fetchmail/6.3.22-2

2012-12-28 Thread Nico Golde
Hi, * Julien Cristau jcris...@debian.org [2012-12-28 18:12]: Control: tags -1 moreinfo On Mon, Dec 17, 2012 at 13:16:13 +0100, Nico Golde wrote: Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: freeze-exception Hi, please

Bug#696161: unblock: fetchmail/6.3.22-2

2012-12-28 Thread Nico Golde
Hi, * Salvatore Bonaccorso car...@debian.org [2012-12-28 19:19]: On Fri, Dec 28, 2012 at 06:46:40PM +0100, Nico Golde wrote: Hi, * Julien Cristau jcris...@debian.org [2012-12-28 18:12]: Control: tags -1 moreinfo On Mon, Dec 17, 2012 at 13:16:13 +0100, Nico Golde wrote

Bug#696161: unblock: fetchmail/6.3.22-2

2012-12-28 Thread Nico Golde
Hi, * Julien Cristau jcris...@debian.org [2012-12-28 18:12]: Control: tags -1 moreinfo On Mon, Dec 17, 2012 at 13:16:13 +0100, Nico Golde wrote: Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: freeze-exception Hi, please

Bug#696161: unblock: fetchmail/6.3.22-2

2012-12-28 Thread Nico Golde
Hi, * Salvatore Bonaccorso car...@debian.org [2012-12-28 19:19]: On Fri, Dec 28, 2012 at 06:46:40PM +0100, Nico Golde wrote: Hi, * Julien Cristau jcris...@debian.org [2012-12-28 18:12]: Control: tags -1 moreinfo On Mon, Dec 17, 2012 at 13:16:13 +0100, Nico Golde wrote

Accepted fetchmail 6.3.22-2 (source all amd64)

2012-12-17 Thread Nico Golde
...@lists.alioth.debian.org Changed-By: Nico Golde n...@debian.org Description: fetchmail - SSL enabled POP3, APOP, IMAP mail gatherer/forwarder fetchmailconf - fetchmail configurator Closes: 671294 688015 Changes: fetchmail (6.3.22-2) unstable; urgency=low . * Fix memory leak in OpenSSL's certificate

Bug#696161: unblock: fetchmail/6.3.22-2

2012-12-17 Thread Nico Golde
that did not work as intended (#671294). unblock: fetchmail/6.3.22-2 Kind regards Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. pgpfnXZfpa52X.pgp Description: PGP signature

Bug#696161: unblock: fetchmail/6.3.22-2

2012-12-17 Thread Nico Golde
that did not work as intended (#671294). unblock: fetchmail/6.3.22-2 Kind regards Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. pgpBrbnU2nvCk.pgp Description: PGP signature

Bug#688015: [pkg-fetchmail-maint] Bug#688015: memory leak

2012-12-09 Thread Nico Golde
instances running 24/7 since months with around 6MB RAM being used in daemon mode. Also what platform is this? Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe

Bug#694935: unblock: openbox/3.5.0-6

2012-12-02 Thread Nico Golde
regards Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. pgpnZQ758B09Z.pgp Description: PGP signature

Bug#694935: unblock: openbox/3.5.0-6

2012-12-02 Thread Nico Golde
regards Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. pgpbMAXzzPHoa.pgp Description: PGP signature

Accepted openbox 3.5.0-6 (source amd64)

2012-12-01 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sat, 01 Dec 2012 18:38:41 +0100 Source: openbox Binary: openbox gnome-panel-control libobt0 libobrender27 openbox-dev Architecture: source amd64 Version: 3.5.0-6 Distribution: unstable Urgency: low Maintainer: Nico Golde n

[Full-disclosure] [SECURITY] [DSA 2575-1] tiff security update

2012-11-19 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - Debian Security Advisory DSA-2575-1 secur...@debian.org http://www.debian.org/security/Nico Golde November 18, 2012

[SECURITY] [DSA 2575-1] tiff security update

2012-11-19 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - Debian Security Advisory DSA-2575-1 secur...@debian.org http://www.debian.org/security/Nico Golde November 18, 2012

[Secure-testing-commits] r20507 - data/DSA

2012-11-18 Thread Nico Golde
Author: nion Date: 2012-11-18 14:11:59 + (Sun, 18 Nov 2012) New Revision: 20507 Modified: data/DSA/list Log: DSA-2575-1 (tiff) Modified: data/DSA/list === --- data/DSA/list 2012-11-18 06:11:56 UTC (rev 20506) +++

[Secure-testing-commits] r20508 - data/CVE

2012-11-18 Thread Nico Golde
Author: nion Date: 2012-11-18 14:21:36 + (Sun, 18 Nov 2012) New Revision: 20508 Modified: data/CVE/list Log: CVE-2012-5884 does not affect bugzilla in squeeze, removed in unstable Modified: data/CVE/list === --- data/CVE/list

[Secure-testing-commits] r20509 - data/CVE

2012-11-18 Thread Nico Golde
Author: nion Date: 2012-11-18 14:36:50 + (Sun, 18 Nov 2012) New Revision: 20509 Modified: data/CVE/list Log: new yui issues NFUs Modified: data/CVE/list === --- data/CVE/list 2012-11-18 14:21:36 UTC (rev 20508) +++

Bug#693608: yui: multiple cross-site scripting issues in the flash component infrastructure

2012-11-18 Thread Nico Golde
-2012-5881 http://security-tracker.debian.org/tracker/CVE-2012-5881 http://yuilibrary.com/support/20121030-vulnerability/ Kind regards Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 pgpZwJy8KONTL.pgp Description: PGP signature

[Pkg-javascript-devel] Bug#693608: yui: multiple cross-site scripting issues in the flash component infrastructure

2012-11-18 Thread Nico Golde
-2012-5881 http://security-tracker.debian.org/tracker/CVE-2012-5881 http://yuilibrary.com/support/20121030-vulnerability/ Kind regards Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 pgpYvCJMeGmEF.pgp Description: PGP signature

Bug#693608: yui: multiple cross-site scripting issues in the flash component infrastructure

2012-11-18 Thread Nico Golde
-2012-5881 http://security-tracker.debian.org/tracker/CVE-2012-5881 http://yuilibrary.com/support/20121030-vulnerability/ Kind regards Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 pgpJzKrqok0MR.pgp Description: PGP signature

[Secure-testing-commits] r20503 - data/CVE

2012-11-17 Thread Nico Golde
Author: nion Date: 2012-11-17 22:07:07 + (Sat, 17 Nov 2012) New Revision: 20503 Modified: data/CVE/list Log: CVE-2012-4564 fixed in tiff 4.0.2-5 Modified: data/CVE/list === --- data/CVE/list 2012-11-17 13:30:42 UTC (rev

Re: Where is typo3-src/4.3.9+dfsg1-1+squeeze7 ?

2012-11-17 Thread Nico Golde
that the squeeze (security) version is 4.3.9+dfsg1-1+squeeze6... What's wrong? What did I fail to understand? You didn't fail to understand anything. We are currently investigating the issue. This certainly shouldn't have happened. Stay tuned... Kind regards Nico -- Nico Golde - http

Re: Where is typo3-src/4.3.9+dfsg1-1+squeeze7 ?

2012-11-17 Thread Nico Golde
Hi, * Nico Golde debian-security...@ngolde.de [2012-11-17 16:29]: * Francesco Poli invernom...@paranoici.org [2012-11-17 12:34]: DSA-2574-1 [1] announced a stable security update for typo3-src on Thursday, but I still see no trace of the announced typo3-src/4.3.9+dfsg1-1+squeeze7

Bug#693116: ii: Homepage URL in package description is incorrect.

2012-11-13 Thread Nico Golde
Hi, * Simon Kainz si...@familiekainz.at [2012-11-13 10:13]: the new Homepage URL is http://tools.suckless.org/ii/ Thanks for noticing. Will be fixed in the next upload. Cheers Nico pgpIYrpSMtvhb.pgp Description: PGP signature

Bug#692737: suckless-tools: newer slock versions prevents unwanted exposure of passwords

2012-11-09 Thread Nico Golde
with that :-). Only thing is I don't want package to be removed from Wheezy because multiple packages depend on it. No worries :) Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 pgp1JWT45gTM7.pgp Description: PGP signature

Bug#692737: suckless-tools: newer slock versions prevents unwanted exposure of passwords

2012-11-08 Thread Nico Golde
Package: suckless-tools Version: 38-2 Severity: grave Justification: user security hole Hey, this package has not updated any of the tools included since two years. Please package newer tools, especially but most important slock. The current version of slock has no indication whatsoever that a

Bug#692737: suckless-tools: newer slock versions prevents unwanted exposure of passwords

2012-11-08 Thread Nico Golde
Package: suckless-tools Version: 38-2 Severity: grave Justification: user security hole Hey, this package has not updated any of the tools included since two years. Please package newer tools, especially but most important slock. The current version of slock has no indication whatsoever that a

Bug#691642: xterm: outputting the mc5 sequence (prtr_on / turn on printer) makes xterm crash

2012-10-28 Thread Nico Golde
appear in a remote file. Sorry, I couldn't parse this sentence. What exactly are the security implications? So far I don't see how this qualifies for a security bug. Kind regards Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 -- To UNSUBSCRIBE, email to debian

Bug#691642: xterm: outputting the mc5 sequence (prtr_on / turn on printer) makes xterm crash

2012-10-28 Thread Nico Golde
tags 691642 - security thanks Hi, * Vincent Lefevre vinc...@vinc17.net [2012-10-28 13:32]: On 2012-10-28 11:37:58 +0100, Nico Golde wrote: [...] In addition to possible data loss due to the crash, this is a security problem, because the sequence may appear in a remote file. Sorry, I

Bug#691642: xterm: outputting the mc5 sequence (prtr_on / turn on printer) makes xterm crash

2012-10-28 Thread Nico Golde
appear in a remote file. Sorry, I couldn't parse this sentence. What exactly are the security implications? So far I don't see how this qualifies for a security bug. Kind regards Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 -- To UNSUBSCRIBE, email to debian-x

Bug#691642: xterm: outputting the mc5 sequence (prtr_on / turn on printer) makes xterm crash

2012-10-28 Thread Nico Golde
tags 691642 - security thanks Hi, * Vincent Lefevre vinc...@vinc17.net [2012-10-28 13:32]: On 2012-10-28 11:37:58 +0100, Nico Golde wrote: [...] In addition to possible data loss due to the crash, this is a security problem, because the sequence may appear in a remote file. Sorry, I

Accepted exim4 4.72-6+squeeze3 (source amd64 all)

2012-10-28 Thread Nico Golde
exim4-dev Architecture: source amd64 all Version: 4.72-6+squeeze3 Distribution: stable-security Urgency: high Maintainer: Exim4 Maintainers pkg-exim4-maintain...@lists.alioth.debian.org Changed-By: Nico Golde n...@debian.org Description: exim4 - metapackage to ease Exim MTA (v4) installation

[Full-disclosure] [SECURITY] [DSA 2566-1] exim4 security update

2012-10-26 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - Debian Security Advisory DSA-2566-1 secur...@debian.org http://www.debian.org/security/Nico Golde October 25, 2012

[Secure-testing-commits] r20404 - in data: CVE DSA

2012-10-26 Thread Nico Golde
Author: nion Date: 2012-10-26 08:03:48 + (Fri, 26 Oct 2012) New Revision: 20404 Modified: data/CVE/list data/DSA/list Log: DSA-2566-1 (exim4) Modified: data/CVE/list === --- data/CVE/list 2012-10-26 07:23:58 UTC (rev

Accepted exim4 4.80-5.1 (source amd64 all)

2012-10-26 Thread Nico Golde
exim4-dev Architecture: source amd64 all Version: 4.80-5.1 Distribution: unstable Urgency: high Maintainer: Exim4 Maintainers pkg-exim4-maintain...@lists.alioth.debian.org Changed-By: Nico Golde n...@debian.org Description: exim4 - metapackage to ease Exim MTA (v4) installation exim4-base

<    1   2   3   4   5   6   7   8   9   10   >