[Secure-testing-commits] r19800 - org

2012-07-25 Thread Nico Golde
Author: nion Date: 2012-07-25 09:23:45 + (Wed, 25 Jul 2012) New Revision: 19800 Modified: org/security-frontdesk.2012.txt Log: add myself week 37 Modified: org/security-frontdesk.2012.txt === ---

[Secure-testing-commits] r19803 - data/CVE

2012-07-25 Thread Nico Golde
Author: nion Date: 2012-07-25 11:03:57 + (Wed, 25 Jul 2012) New Revision: 19803 Modified: data/CVE/list Log: add new isc-dhcp issues Modified: data/CVE/list === --- data/CVE/list 2012-07-25 09:47:55 UTC (rev 19802) +++

[Secure-testing-commits] r19780 - data/CVE

2012-07-22 Thread Nico Golde
Author: nion Date: 2012-07-22 13:00:19 + (Sun, 22 Jul 2012) New Revision: 19780 Modified: data/CVE/list Log: CVE-2012-3401 fixed in tiff 3.9.6-7/4.0.2-2 Modified: data/CVE/list === --- data/CVE/list 2012-07-22 09:14:21

[Secure-testing-commits] r19781 - data/CVE

2012-07-22 Thread Nico Golde
Author: nion Date: 2012-07-22 13:04:48 + (Sun, 22 Jul 2012) New Revision: 19781 Modified: data/CVE/list Log: a couple of more fixes that havent been recorded yet Modified: data/CVE/list === --- data/CVE/list 2012-07-22

[Secure-testing-commits] r19776 - data/CVE

2012-07-21 Thread Nico Golde
Author: nion Date: 2012-07-21 11:11:44 + (Sat, 21 Jul 2012) New Revision: 19776 Modified: data/CVE/list Log: CVE-2012-3409 fixed in ecryptfs-utils 99-1 Modified: data/CVE/list === --- data/CVE/list 2012-07-20 21:14:19

[Secure-testing-commits] r19777 - data/CVE

2012-07-21 Thread Nico Golde
Author: nion Date: 2012-07-21 11:25:24 + (Sat, 21 Jul 2012) New Revision: 19777 Modified: data/CVE/list Log: CVE-2012-3409 does not affect our version in squeeze, attacker cant freely chose mointpoints Modified: data/CVE/list

Bug#682309: unblock: ecryptfs-utils/99-1

2012-07-21 Thread Nico Golde
-- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. pgpuk7hO1Jm31.pgp Description: PGP signature

Bug#682309: unblock: ecryptfs-utils/99-1

2012-07-21 Thread Nico Golde
-- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. pgp5ElQ95kL1R.pgp Description: PGP signature

[Full-disclosure] [SECURITY] [DSA 2515-1] nsd3 security update

2012-07-20 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - Debian Security Advisory DSA-2515-1 secur...@debian.org http://www.debian.org/security/Nico Golde July 19, 2012

Bug#682193: unblock: nsd3/3.2.12-1

2012-07-20 Thread Nico Golde
/3.2.12-1 Kind regards Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. pgpGljU0bGYmj.pgp Description: PGP signature

Bug#682193: unblock: nsd3/3.2.12-1

2012-07-20 Thread Nico Golde
/3.2.12-1 Kind regards Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. pgpW3gLNRNUaN.pgp Description: PGP signature

[Full-disclosure] [SECURITY] [DSA 2513-1] iceape security update

2012-07-19 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - Debian Security Advisory DSA-2513-1 secur...@debian.org http://www.debian.org/security/Nico Golde July 17, 2012

[Full-disclosure] [SECURITY] [DSA 2514-1] iceweasel security update

2012-07-19 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - Debian Security Advisory DSA-2514-1 secur...@debian.org http://www.debian.org/security/Nico Golde July 17, 2012

[Secure-testing-commits] r19761 - data/CVE

2012-07-19 Thread Nico Golde
Author: nion Date: 2012-07-19 10:24:24 + (Thu, 19 Jul 2012) New Revision: 19761 Modified: data/CVE/list Log: add new/old quota issue Modified: data/CVE/list === --- data/CVE/list 2012-07-18 21:31:33 UTC (rev 19760) +++

[Secure-testing-commits] r19762 - data/CVE

2012-07-19 Thread Nico Golde
Author: nion Date: 2012-07-19 10:25:23 + (Thu, 19 Jul 2012) New Revision: 19762 Modified: data/CVE/list Log: squeeze actually contains a version that is already fixed as well Modified: data/CVE/list === --- data/CVE/list

[Secure-testing-commits] r19765 - data/CVE

2012-07-19 Thread Nico Golde
Author: nion Date: 2012-07-19 19:24:52 + (Thu, 19 Jul 2012) New Revision: 19765 Modified: data/CVE/list Log: quota got CVE-2012-3417 Modified: data/CVE/list === --- data/CVE/list 2012-07-19 16:15:37 UTC (rev 19764) +++

[SECURITY] [DSA 2515-1] nsd3 security update

2012-07-19 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - Debian Security Advisory DSA-2515-1 secur...@debian.org http://www.debian.org/security/Nico Golde July 19, 2012

Re: mumble and celt, #682010, TC

2012-07-19 Thread Nico Golde
to be honest, especially due to the integer arithmetics involved in several allocations. I don't think there is an objection from the security team in general to include this codec. Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text

Re: mumble and celt, #682010, TC

2012-07-19 Thread Nico Golde
to be honest, especially due to the integer arithmetics involved in several allocations. I don't think there is an objection from the security team in general to include this codec. Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text

Bug#674448: CVE-2012-2098

2012-07-18 Thread Nico Golde
6.0.6. I had prepared an upload to fix this issue in stable. Are you OK with an upload to stable then? Please notify the release team before. Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13

Bug#674448: CVE-2012-2098

2012-07-18 Thread Nico Golde
6.0.6. I had prepared an upload to fix this issue in stable. Are you OK with an upload to stable then? Please notify the release team before. Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13

[SECURITY] [DSA 2514-1] iceweasel security update

2012-07-18 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - Debian Security Advisory DSA-2514-1 secur...@debian.org http://www.debian.org/security/Nico Golde July 17, 2012

Bug#674448: CVE-2012-2098

2012-07-18 Thread Nico Golde
6.0.6. I had prepared an upload to fix this issue in stable. Are you OK with an upload to stable then? Please notify the release team before. Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13

[Secure-testing-commits] r19753 - data/CVE

2012-07-17 Thread Nico Golde
Author: nion Date: 2012-07-17 19:42:14 + (Tue, 17 Jul 2012) New Revision: 19753 Modified: data/CVE/list Log: several iceweasel issues fixed in 10.0.6esr-1 Modified: data/CVE/list === --- data/CVE/list 2012-07-17

[Secure-testing-commits] r19754 - data/CVE

2012-07-17 Thread Nico Golde
Author: nion Date: 2012-07-17 19:47:29 + (Tue, 17 Jul 2012) New Revision: 19754 Modified: data/CVE/list Log: CVE-2012-3414 was assigned for libjs-swfupload issue Modified: data/CVE/list === --- data/CVE/list 2012-07-17

[Secure-testing-commits] r19755 - data/DSA

2012-07-17 Thread Nico Golde
Author: nion Date: 2012-07-17 19:50:49 + (Tue, 17 Jul 2012) New Revision: 19755 Modified: data/DSA/list Log: DSA-2514-1, DSA-2513-1 (iceape/iceweasel) Modified: data/DSA/list === --- data/DSA/list 2012-07-17 19:47:29

[Secure-testing-commits] r19747 - data/CVE

2012-07-16 Thread Nico Golde
Author: nion Date: 2012-07-16 18:22:36 + (Mon, 16 Jul 2012) New Revision: 19747 Modified: data/CVE/list Log: add new libjs-swfupload issue, fix pending in 2.2.0.1+ds1-2 Modified: data/CVE/list === --- data/CVE/list

Bug#681455: openbox: Does not exit on Exit in pop-up menu.

2012-07-14 Thread Nico Golde
/menu.xml There is no openbox bug here as far as I can judge, thus closing the bug report. Hmm. What if I the commands are set already? May I will check it first - after You tell me how? Sorry, I think I don't understand what you mean. Please try to rephrase. Cheers Nico -- Nico Golde - http

Bug#681455: openbox: Does not exit on Exit in pop-up menu.

2012-07-13 Thread Nico Golde
button in openbox' main menu and the exit button works just fine. Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. pgplrKh3LB7hN.pgp Description: PGP signature

Bug#679491: [pkg-fetchmail-maint] Bug#679491: [fetchmail] Spamassassin-Fetchmail depedenty boot order needs fixing

2012-06-30 Thread Nico Golde
insserv. This won't happen or at least is very unlikely. I don't see a bug here to be honest and the purpose of those targets is not to list every single individual program that people might find useful to get started beforehand. Kind regards Nico -- Nico Golde - http://www.ngolde.de - n

Bug#678993: openbox: xmodmap freezes openbox in lxde

2012-06-26 Thread Nico Golde
Hi, * Paul Seyfert pseyf...@mathphys.fsk.uni-heidelberg.de [2012-06-26 09:48]: Hi, On 25.06.2012 19:44, Nico Golde wrote: Hi, * Paul Seyfert pseyf...@mathphys.fsk.uni-heidelberg.de [2012-06-25 17:49]: I use my notebook with lxde. after some time of operation I connect an external

Bug#678993: openbox: xmodmap freezes openbox in lxde

2012-06-26 Thread Nico Golde
if this happens with a different window manager as well? I have the feeling that this might not be openbox related. In the end xmodmap should be handled by X and the window manager should eat whatever signal is delivered by X on a key press. Cheers Nico -- Nico Golde - http://www.ngolde.de - n

Bug#678993: openbox: xmodmap freezes openbox in lxde

2012-06-25 Thread Nico Golde
. I get back to working by running killall -9 openbox ; sleep 10s ; openbox disown; exit (luckily after calling xmodmap, the active window is a shell) Can you share your xmodmap? I can't reproduce this in a quick test. Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de

Accepted mktorrent 1.0-4 (source amd64)

2012-06-17 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sun, 17 Jun 2012 14:22:03 +0200 Source: mktorrent Binary: mktorrent Architecture: source amd64 Version: 1.0-4 Distribution: unstable Urgency: low Maintainer: Nico Golde n...@debian.org Changed-By: Nico Golde n...@debian.org

Bug#650632: mcabber: fails to handle bookmarks for password protected MUCs

2012-06-17 Thread Nico Golde
. Could you maybe just change the output funktion to display * instead of the actual password? Sure, an updated version of the patch is attached. I'm using this patch btw since I reported the bug, without problems so far. Cheers Nico -- Nico Golde - http://www.ngolde.de - n

Re: [dev] [ii] exposed password on process monitoring

2012-06-16 Thread Nico Golde
Hi, * Ivan Kanakarakis ivan.ka...@gmail.com [2012-06-13 14:49]: On 20 April 2012 03:37, Nico Golde n...@ngolde.de wrote: [...] I think a nice thing to do that would also resolve the naming choice would be to have -k or some other argument mean that ii should read the -k flag as an env

Accepted openbox 3.5.0-4 (source amd64)

2012-06-05 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 05 Jun 2012 07:18:19 +0200 Source: openbox Binary: openbox gnome-panel-control libobt0 libobrender27 openbox-dev Architecture: source amd64 Version: 3.5.0-4 Distribution: unstable Urgency: low Maintainer: Nico Golde n

Accepted httping 1.5.3-1 (source amd64)

2012-05-30 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 30 May 2012 20:43:06 +0200 Source: httping Binary: httping Architecture: source amd64 Version: 1.5.3-1 Distribution: unstable Urgency: low Maintainer: Nico Golde n...@debian.org Changed-By: Nico Golde n...@debian.org Description

[Secure-testing-commits] r19325 - data/CVE

2012-05-26 Thread Nico Golde
Author: nion Date: 2012-05-26 21:31:17 + (Sat, 26 May 2012) New Revision: 19325 Modified: data/CVE/list Log: owncloud is in the archive now Modified: data/CVE/list === --- data/CVE/list 2012-05-26 09:25:26 UTC (rev

Bug#672724: [pkg-fetchmail-maint] Bug#672724: Init script message about disabled daemon should be info rather than warning

2012-05-13 Thread Nico Golde
keine Policy Regel dafür. Gruß Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. pgpkQ51dHXEj0.pgp Description: PGP signature

Bug#672724: [pkg-fetchmail-maint] Bug#672724: Init script message about disabled daemon should be info rather than warning

2012-05-13 Thread Nico Golde
Hi, * Nico Golde n...@debian.org [2012-05-13 20:09]: * Moritz Muehlenhoff j...@debian.org [2012-05-13 11:25]: The init script has the following: if [ ! x$START_DAEMON = xyes -a ! $1 = status ]; then log_warning_msg Not starting fetchmail daemon, disabled via /etc/default

Accepted openbox 3.5.0-3 (source amd64)

2012-05-10 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Fri, 11 May 2012 06:00:28 +0200 Source: openbox Binary: openbox gnome-panel-control libobt0 libobrender27 openbox-dev Architecture: source amd64 Version: 3.5.0-3 Distribution: unstable Urgency: low Maintainer: Nico Golde n

Bug#566900: RFH: openbox -- standards compliant, fast, light-weight, extensible window manager

2012-05-10 Thread Nico Golde
Hi, * Daniel Baumann daniel.baum...@progress-technologies.net [2012-05-10 09:19]: On 05/08/2012 07:12 AM, Nico Golde wrote: Feel free to join as a co-maintainer. my intention is to consolidate openbox with the rest of the lxde packages, i'm currently not interested in another 'not into my

Bug#566900: RFH: openbox -- standards compliant, fast, light-weight, extensible window manager

2012-05-10 Thread Nico Golde
Hi, * Daniel Baumann daniel.baum...@progress-technologies.net [2012-05-10 09:19]: On 05/08/2012 07:12 AM, Nico Golde wrote: Feel free to join as a co-maintainer. my intention is to consolidate openbox with the rest of the lxde packages, i'm currently not interested in another 'not into my

Accepted newsbeuter 2.5-2 (source amd64)

2012-05-07 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Mon, 07 May 2012 21:27:20 +0200 Source: newsbeuter Binary: newsbeuter Architecture: source amd64 Version: 2.5-2 Distribution: unstable Urgency: low Maintainer: Nico Golde n...@debian.org Changed-By: Nico Golde n...@debian.org

Bug#566900: RFH: openbox -- standards compliant, fast, light-weight, extensible window manager

2012-05-07 Thread Nico Golde
Hi, * Daniel Baumann daniel.baum...@progress-technologies.net [2012-04-23 11:34]: I offer to adopt openbox on behalf of the Debian LXDE team. Thanks but so far my intention was not to orphan it. Feel free to join as a co-maintainer. Cheers Nico -- Nico Golde - http://www.ngolde.de - n

Bug#566900: RFH: openbox -- standards compliant, fast, light-weight, extensible window manager

2012-05-07 Thread Nico Golde
Hi, * Daniel Baumann daniel.baum...@progress-technologies.net [2012-04-23 11:34]: I offer to adopt openbox on behalf of the Debian LXDE team. Thanks but so far my intention was not to orphan it. Feel free to join as a co-maintainer. Cheers Nico -- Nico Golde - http://www.ngolde.de - n

[Secure-testing-commits] r19156 - data/CVE

2012-05-06 Thread Nico Golde
Author: nion Date: 2012-05-06 17:20:21 + (Sun, 06 May 2012) New Revision: 19156 Modified: data/CVE/list Log: CVE-2012-2396 is a non-issue Modified: data/CVE/list === --- data/CVE/list 2012-05-06 12:16:10 UTC (rev 19155)

Re: Complain about Christoph Martin

2012-05-04 Thread Nico Golde
judge the situation and I don't know the maintainer... This assumption of a proper reaction is definitely wrong and does not consider a lot of cases. Kind regards Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double

Re: Complain about Christoph Martin

2012-05-04 Thread Nico Golde
judge the situation and I don't know the maintainer... This assumption of a proper reaction is definitely wrong and does not consider a lot of cases. Kind regards Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double

Accepted fetchmail 6.3.21-4 (source all amd64)

2012-05-02 Thread Nico Golde
...@lists.alioth.debian.org Changed-By: Nico Golde n...@debian.org Description: fetchmail - SSL enabled POP3, APOP, IMAP mail gatherer/forwarder fetchmailconf - fetchmail configurator Closes: 671026 Changes: fetchmail (6.3.21-4) unstable; urgency=low . * Fix building with build-arch (Closes: #671026

Bug#668038: regression on triggers

2012-05-02 Thread Nico Golde
Hi, * Julian Taylor jtaylor.deb...@googlemail.com [2012-05-02 21:17]: the patch for the code execution probably contains a regression I can't judge how severe it is or provide a testcase: /usr/share/gajim/src/notify.py:323 command = gajim.config.get_per('notifications',

Bug#668038: regression on triggers

2012-05-02 Thread Nico Golde
Hi, * Julian Taylor jtaylor.deb...@googlemail.com [2012-05-02 21:17]: the patch for the code execution probably contains a regression I can't judge how severe it is or provide a testcase: /usr/share/gajim/src/notify.py:323 command = gajim.config.get_per('notifications',

Bug#671071: sqlite3: WHERE x NOT IN not working with subquery in case first row contains NULL

2012-05-01 Thread Nico Golde
Package: sqlite3 Version: 3.7.11-3 Severity: normal Tags: upstream [nion@coredump:shm$] sqlite3 test.sqlite SQLite version 3.7.11 2012-03-20 11:35:50 Enter .help for instructions Enter SQL statements terminated with a ; sqlite create table foo (id integer primary key); sqlite create table bar (id

[Secure-testing-commits] r19078 - data/CVE

2012-04-25 Thread Nico Golde
Author: nion Date: 2012-04-25 23:49:54 + (Wed, 25 Apr 2012) New Revision: 19078 Modified: data/CVE/list Log: CVE-2012-2095 has been fixed via spu Modified: data/CVE/list === --- data/CVE/list 2012-04-25 21:28:02 UTC

[Secure-testing-commits] r19063 - data/CVE

2012-04-24 Thread Nico Golde
Author: nion Date: 2012-04-25 04:03:09 + (Wed, 25 Apr 2012) New Revision: 19063 Modified: data/CVE/list Log: fix fixed version for CVE-2011-4617 Modified: data/CVE/list === --- data/CVE/list 2012-04-24 22:41:29 UTC (rev

[SECURITY] [DSA 2455-1] typo3-src security update

2012-04-23 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - Debian Security Advisory DSA-2455-1 secur...@debian.org http://www.debian.org/security/Nico Golde April 20, 2012

[Full-disclosure] [SECURITY] [DSA 2455-1] typo3-src security update

2012-04-20 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - Debian Security Advisory DSA-2455-1 secur...@debian.org http://www.debian.org/security/Nico Golde April 20, 2012

[Secure-testing-commits] r19021 - data/CVE

2012-04-20 Thread Nico Golde
Author: nion Date: 2012-04-20 17:17:02 + (Fri, 20 Apr 2012) New Revision: 19021 Modified: data/CVE/list Log: CVE-2012-2112 already has a bug report and squeeze is affected Modified: data/CVE/list === --- data/CVE/list

[Secure-testing-commits] r19022 - data/DSA

2012-04-20 Thread Nico Golde
Author: nion Date: 2012-04-20 17:28:04 + (Fri, 20 Apr 2012) New Revision: 19022 Modified: data/DSA/list Log: DSA-2455-1 (typo3-src) Modified: data/DSA/list === --- data/DSA/list 2012-04-20 17:17:02 UTC (rev 19021) +++

Accepted binclock 1.5-6 (source amd64)

2012-04-20 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Fri, 20 Apr 2012 07:33:43 +0300 Source: binclock Binary: binclock Architecture: source amd64 Version: 1.5-6 Distribution: unstable Urgency: low Maintainer: Nico Golde n...@debian.org Changed-By: Nico Golde n...@debian.org Description

Bug#669597: yacpi: package new upstream release 3.0.1

2012-04-20 Thread Nico Golde
. Cheers Nico P.S. thx for the 3.0 pkg format patches! -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. pgpmUmpj5rgVF.pgp Description: PGP signature

Bug#669638: typo3-src: CVE-2012-2112 XSS in exception handler

2012-04-20 Thread Nico Golde
. For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2112 http://security-tracker.debian.org/tracker/CVE-2012-2112 https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-002/ -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de

Re: [dev] [ii] exposed password on process monitoring

2012-04-20 Thread Nico Golde
Hi, * Bjartur Thorlacius svartma...@gmail.com [2012-04-21 01:45]: On Fri, 20 Apr 2012 00:37:40 -, Nico Golde n...@ngolde.de wrote: * Ivan Kanakarakis ivan.ka...@gmail.com [2012-04-20 01:54]: I think a nice thing to do that would also resolve the naming choice would be to have -k or some

[Full-disclosure] [SECURITY] [DSA 2453-2] gajim regression

2012-04-19 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - Debian Security Advisory DSA-2453-2 secur...@debian.org http://www.debian.org/security/Nico Golde April 19, 2012

[SECURITY] [DSA 2453-2] gajim regression

2012-04-19 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - Debian Security Advisory DSA-2453-2 secur...@debian.org http://www.debian.org/security/Nico Golde April 19, 2012

Re: [dev] [ii] exposed password on process monitoring

2012-04-19 Thread Nico Golde
to leak your password use the environment variable and not -k then... Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. pgpQO2lEe3DlR.pgp Description: PGP signature

Re: [dev] [ii] exposed password on process monitoring

2012-04-19 Thread Nico Golde
Hi, * Ivan Kanakarakis ivan.ka...@gmail.com [2012-04-20 01:54]: On 20 April 2012 02:24, Connor Lane Smith c...@lubutu.com wrote: On 19 April 2012 23:51, Connor Lane Smith c...@lubutu.com wrote: [...] however if one wants to connect to more than one server and has a different password for

[Secure-testing-commits] r19005 - data/DSA

2012-04-18 Thread Nico Golde
Author: nion Date: 2012-04-18 22:37:41 + (Wed, 18 Apr 2012) New Revision: 19005 Modified: data/DSA/list Log: DSA-2453-2(gajim) Modified: data/DSA/list === --- data/DSA/list 2012-04-18 19:30:01 UTC (rev 19004) +++

[Secure-testing-commits] r19006 - data/DSA

2012-04-18 Thread Nico Golde
Author: nion Date: 2012-04-18 22:38:15 + (Wed, 18 Apr 2012) New Revision: 19006 Modified: data/DSA/list Log: DSA-2453-2(gajim), cp error Modified: data/DSA/list === --- data/DSA/list 2012-04-18 22:37:41 UTC (rev 19005)

[Secure-testing-commits] r18996 - data/CVE

2012-04-17 Thread Nico Golde
Author: nion Date: 2012-04-18 05:29:45 + (Wed, 18 Apr 2012) New Revision: 18996 Modified: data/CVE/list Log: fix rails entry Modified: data/CVE/list === --- data/CVE/list 2012-04-18 04:22:53 UTC (rev 18995) +++

Bug#669179: eglibc: please update ld.so manpages

2012-04-17 Thread Nico Golde
Source: eglibc Version: 2.13-27 Severity: wishlist Hello, please update the ld.so manapges for libc6 as shipped by Debian. They seem to be fairly outdated and do not reflect what our ld.so currently supports. I was just surprised to find out that LD_SHOW_AUXV is documented, but not in our

Re: security fix prevent Gajim to be run

2012-04-17 Thread Nico Golde
that: #668710 #669100 #669105 #669106 The solution is to move this os.rename inside a if exitcode == 0: test, to be sure convertion to png was successful. Fix is on it's way. Thanks for the notice! Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0

Bug#669179: eglibc: please update ld.so manpages

2012-04-17 Thread Nico Golde
Source: eglibc Version: 2.13-27 Severity: wishlist Hello, please update the ld.so manapges for libc6 as shipped by Debian. They seem to be fairly outdated and do not reflect what our ld.so currently supports. I was just surprised to find out that LD_SHOW_AUXV is documented, but not in our

[Full-disclosure] [SECURITY] [DSA 2453-1] gajim security update

2012-04-16 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - Debian Security Advisory DSA-2453-1 secur...@debian.org http://www.debian.org/security/Nico Golde April 16, 2012

[Secure-testing-commits] r18972 - data/CVE

2012-04-16 Thread Nico Golde
Author: nion Date: 2012-04-16 16:42:13 + (Mon, 16 Apr 2012) New Revision: 18972 Modified: data/CVE/list Log: CVE-2012-1098 has been cloned into a seperate bug Modified: data/CVE/list === --- data/CVE/list 2012-04-16

[Secure-testing-commits] r18983 - data/CVE

2012-04-16 Thread Nico Golde
Author: nion Date: 2012-04-17 05:39:48 + (Tue, 17 Apr 2012) New Revision: 18983 Modified: data/CVE/list Log: add rails in unstable for CVE-2012-1099/CVE-2012-1098 Modified: data/CVE/list === --- data/CVE/list 2012-04-16

[SECURITY] [DSA 2453-1] gajim security update

2012-04-16 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - Debian Security Advisory DSA-2453-1 secur...@debian.org http://www.debian.org/security/Nico Golde April 16, 2012

Accepted gajim 0.13.4-3+squeeze2 (source amd64)

2012-04-16 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sun, 15 Apr 2012 20:35:02 + Source: gajim Binary: gajim Architecture: source amd64 Version: 0.13.4-3+squeeze2 Distribution: stable-security Urgency: high Maintainer: Yann Leboulanger aste...@lagaule.org Changed-By: Nico Golde n

[Secure-testing-commits] r18950 - hardening

2012-04-15 Thread Nico Golde
Author: nion Date: 2012-04-15 17:50:20 + (Sun, 15 Apr 2012) New Revision: 18950 Modified: hardening/subgoal-daemons.txt Log: inspircd build with hardening flags now Modified: hardening/subgoal-daemons.txt === ---

[Secure-testing-commits] r18952 - data/CVE

2012-04-15 Thread Nico Golde
Author: nion Date: 2012-04-15 19:10:22 + (Sun, 15 Apr 2012) New Revision: 18952 Modified: data/CVE/list Log: CVE-2011-5000 is fixed, no-dsa for squeeze Modified: data/CVE/list === --- data/CVE/list 2012-04-15 19:08:01

[Secure-testing-commits] r18953 - data/CVE

2012-04-15 Thread Nico Golde
Author: nion Date: 2012-04-15 19:18:04 + (Sun, 15 Apr 2012) New Revision: 18953 Modified: data/CVE/list Log: CVE-2012-1099/CVE-2012-1098 is ruby-actionpack in unstable Modified: data/CVE/list === --- data/CVE/list

[Secure-testing-commits] r18955 - data/CVE

2012-04-15 Thread Nico Golde
Author: nion Date: 2012-04-15 19:23:59 + (Sun, 15 Apr 2012) New Revision: 18955 Modified: data/CVE/list Log: CVE-2011-4623 is fixed in rsyslog 5.7.4-1, no-dsa Modified: data/CVE/list === --- data/CVE/list 2012-04-15

[Secure-testing-commits] r18957 - data/CVE

2012-04-15 Thread Nico Golde
Author: nion Date: 2012-04-15 19:29:31 + (Sun, 15 Apr 2012) New Revision: 18957 Modified: data/CVE/list Log: CVE-2011-4945 wrong srcpkg name, fixed in 0.103-1 (via debian patch), squeeze not affected Modified: data/CVE/list

[Secure-testing-commits] r18960 - data/DSA

2012-04-15 Thread Nico Golde
Author: nion Date: 2012-04-16 05:16:33 + (Mon, 16 Apr 2012) New Revision: 18960 Modified: data/DSA/list Log: DSA-2453-1 (gajim) Modified: data/DSA/list === --- data/DSA/list 2012-04-15 22:11:36 UTC (rev 18959) +++

Re: Bug#668456: pu: package wicd/1.7.0+ds1-5+squeeze1

2012-04-15 Thread Nico Golde
is usually used, I think it is fair to assume that most users are already root anyway. This has very little priority for us currently. Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted

[Secure-testing-commits] r18944 - data/CVE

2012-04-14 Thread Nico Golde
Author: nion Date: 2012-04-14 06:06:57 + (Sat, 14 Apr 2012) New Revision: 18944 Modified: data/CVE/list Log: CVE-2012-2093 bug reported Modified: data/CVE/list === --- data/CVE/list 2012-04-14 05:37:07 UTC (rev 18943)

[Full-disclosure] [SECURITY] [DSA 2451-1] puppet security update

2012-04-13 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - Debian Security Advisory DSA-2451-1 secur...@debian.org http://www.debian.org/security/Nico Golde April 13, 2012

[Secure-testing-commits] r18942 - data/CVE

2012-04-13 Thread Nico Golde
Author: nion Date: 2012-04-14 05:30:23 + (Sat, 14 Apr 2012) New Revision: 18942 Modified: data/CVE/list Log: add CVE-2012-2102, minor issue Modified: data/CVE/list === --- data/CVE/list 2012-04-13 23:57:27 UTC (rev

[Secure-testing-commits] r18943 - data/CVE

2012-04-13 Thread Nico Golde
Author: nion Date: 2012-04-14 05:37:07 + (Sat, 14 Apr 2012) New Revision: 18943 Modified: data/CVE/list Log: add openjpeg issue (CVE-2009-5030) Modified: data/CVE/list === --- data/CVE/list 2012-04-14 05:30:23 UTC (rev

Bug#668607: CVE-2012-1098 / CVE-2012-1099

2012-04-13 Thread Nico Golde
patches/series |1 3 files changed, 55 insertions(+) debdiff, dsc and debian.tar.gz attached Looks good. Please go ahead and upload this to security-master. Thank you! Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0

Bug#668710: gajim: CVE-2012-2093 insecure temporary file creation in LaTeX support

2012-04-13 Thread Nico Golde
/CVE-2012-2093 -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. pgpE2QkDVy5fP.pgp Description: PGP signature

[SECURITY] [DSA 2451-1] puppet security update

2012-04-13 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - Debian Security Advisory DSA-2451-1 secur...@debian.org http://www.debian.org/security/Nico Golde April 13, 2012

Bug#668607: CVE-2012-1098 / CVE-2012-1099

2012-04-13 Thread Nico Golde
patches/series |1 3 files changed, 55 insertions(+) debdiff, dsc and debian.tar.gz attached Looks good. Please go ahead and upload this to security-master. Thank you! Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0

[DRE-maint] Bug#668607: CVE-2012-1098 / CVE-2012-1099

2012-04-13 Thread Nico Golde
patches/series |1 3 files changed, 55 insertions(+) debdiff, dsc and debian.tar.gz attached Looks good. Please go ahead and upload this to security-master. Thank you! Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0

Accepted sqlalchemy 0.6.3-3+squeeze1 (source all amd64)

2012-04-13 Thread Nico Golde
Urgency: high Maintainer: Piotr Ożarowski pi...@debian.org Changed-By: Nico Golde n...@debian.org Description: python-sqlalchemy - SQL toolkit and Object Relational Mapper for Python python-sqlalchemy-doc - documentation for the SQLAlchemy Python library python-sqlalchemy-ext - SQL toolkit and Object

[Full-disclosure] [SECURITY] [DSA 2449-1] sqlalchemy security update

2012-04-12 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - Debian Security Advisory DSA-2449-1 secur...@debian.org http://www.debian.org/security/Nico Golde April 12, 2012

[Secure-testing-commits] r18932 - in data: CVE DSA

2012-04-12 Thread Nico Golde
Author: nion Date: 2012-04-13 04:40:06 + (Fri, 13 Apr 2012) New Revision: 18932 Modified: data/CVE/list data/DSA/list Log: - DSA-2251-1 (puppet) - CVE-2012-1989 does not affect squeeze) Modified: data/CVE/list === ---

[Secure-testing-commits] r18917 - in data: . CVE

2012-04-11 Thread Nico Golde
Author: nion Date: 2012-04-11 16:17:35 + (Wed, 11 Apr 2012) New Revision: 18917 Modified: data/CVE/list data/spu-candidates.txt Log: m recent clamav issues, no-dsa Modified: data/CVE/list === --- data/CVE/list

[Secure-testing-commits] r18918 - data/CVE

2012-04-11 Thread Nico Golde
Author: nion Date: 2012-04-11 16:39:56 + (Wed, 11 Apr 2012) New Revision: 18918 Modified: data/CVE/list Log: new wicd issue Modified: data/CVE/list === --- data/CVE/list 2012-04-11 16:17:35 UTC (rev 18917) +++

<    1   2   3   4   5   6   7   8   9   10   >