Accepted fetchmail 6.3.21-3 (source all amd64)

2011-12-29 Thread Nico Golde
...@lists.alioth.debian.org Changed-By: Nico Golde n...@debian.org Description: fetchmail - SSL enabled POP3, APOP, IMAP mail gatherer/forwarder fetchmailconf - fetchmail configurator Closes: 653538 Changes: fetchmail (6.3.21-3) unstable; urgency=low . * Build with hardening compiler flags (Closes

Accepted libsoup2.4 2.4.1-2+lenny1 (source all amd64)

2011-12-26 Thread Nico Golde
Maintainers pkg-gnome-maintain...@lists.alioth.debian.org Changed-By: Nico Golde n...@debian.org Description: libsoup2.4-1 - an HTTP library implementation in C -- Shared library libsoup2.4-dev - an HTTP library implementation in C -- Development files libsoup2.4-doc - an HTTP library

[Full-disclosure] [SECURITY] [DSA 2381-] lighttpd security update

2011-12-22 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - --- Debian Security Advisory DSA-2368-1 secur...@debian.org http://www.debian.org/security/ Nico Golde Dec 20th, 2011

[Full-disclosure] [SECURITY] [DSA 2368-1] lighttpd security update

2011-12-22 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - --- Debian Security Advisory DSA-2368-1 secur...@debian.org http://www.debian.org/security/ Nico Golde Dec 20th, 2011

[Full-disclosure] [SECURITY] [DSA 2369-1] libsoup2.4 security update

2011-12-22 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - --- Debian Security Advisory DSA-2369-1 secur...@debian.org http://www.debian.org/security/ Nico Golde Dec 21th, 2011

[Secure-testing-commits] r17844 - data/DSA

2011-12-21 Thread Nico Golde
Author: nion Date: 2011-12-21 21:15:54 + (Wed, 21 Dec 2011) New Revision: 17844 Modified: data/DSA/list Log: fix lighttpd version in lenny, thanks wintermute! Modified: data/DSA/list === --- data/DSA/list 2011-12-21

[Secure-testing-commits] r17845 - data/DSA

2011-12-21 Thread Nico Golde
Author: nion Date: 2011-12-21 22:19:56 + (Wed, 21 Dec 2011) New Revision: 17845 Modified: data/DSA/list Log: DSA-2369-1 (libsoup2.4) Modified: data/DSA/list === --- data/DSA/list 2011-12-21 21:15:54 UTC (rev 17844) +++

Re: [pkg-lighttpd] [SECURITY] [DSA 2368-1] lighttpd security update

2011-12-21 Thread Nico Golde
pointless to not include another improvement in the same update. Kind regards Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. pgpCW7ADhMZ8q.pgp Description: PGP signature

[SECURITY] [DSA 2381-] lighttpd security update

2011-12-21 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - --- Debian Security Advisory DSA-2368-1 secur...@debian.org http://www.debian.org/security/ Nico Golde Dec 20th, 2011

[SECURITY] [DSA 2368-1] lighttpd security update

2011-12-21 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - --- Debian Security Advisory DSA-2368-1 secur...@debian.org http://www.debian.org/security/ Nico Golde Dec 20th, 2011

[Secure-testing-commits] r17831 - data/CVE

2011-12-20 Thread Nico Golde
Author: nion Date: 2011-12-20 13:41:48 + (Tue, 20 Dec 2011) New Revision: 17831 Modified: data/CVE/list Log: debian bug for CVE-2011-4362 Modified: data/CVE/list === --- data/CVE/list 2011-12-20 08:08:54 UTC (rev 17830)

[Secure-testing-commits] r17832 - data/CVE

2011-12-20 Thread Nico Golde
Author: nion Date: 2011-12-20 13:43:09 + (Tue, 20 Dec 2011) New Revision: 17832 Modified: data/CVE/list Log: #628843 got a cve id Modified: data/CVE/list === --- data/CVE/list 2011-12-20 13:41:48 UTC (rev 17831) +++

[Secure-testing-commits] r17835 - data/CVE hardening

2011-12-20 Thread Nico Golde
Author: nion Date: 2011-12-20 20:18:13 + (Tue, 20 Dec 2011) New Revision: 17835 Modified: data/CVE/list hardening/subgoal-daemons.txt Log: CVE-2011-3389/CVE-2011-4362 fixed in lighttpd 1.4.30-1; lighttpd now comes with hardening enabled Modified: data/CVE/list

[Secure-testing-commits] r17836 - data/CVE

2011-12-20 Thread Nico Golde
Author: nion Date: 2011-12-20 20:23:33 + (Tue, 20 Dec 2011) New Revision: 17836 Modified: data/CVE/list Log: CVE-2011-4617 fixed in python-virtualenv 1.4.9-1 Modified: data/CVE/list === --- data/CVE/list 2011-12-20

[Secure-testing-commits] r17838 - data/DSA

2011-12-20 Thread Nico Golde
Author: nion Date: 2011-12-20 23:45:36 + (Tue, 20 Dec 2011) New Revision: 17838 Modified: data/DSA/list Log: DSA-2368-1 (lighttpd) Modified: data/DSA/list === --- data/DSA/list 2011-12-20 21:14:19 UTC (rev 17837) +++

Bug#652653: python-virtualenv: insecure /tmp file handling

2011-12-20 Thread Nico Golde
generally not involved in such discussions until after the security team have decided they don't want to issue a DSA for a particular issue and someone raises it with us. We will not issue a DSA for this vulnerability. Please go ahead and fix this through spu. Kind regards Nico -- Nico Golde

Re: [SECURITY] [DSA 2381-] lighttpd security update

2011-12-20 Thread Nico Golde
Hi, * Nico Golde n...@debian.org [2011-12-21 01:25]: --- Debian Security Advisory DSA-2368-1 secur...@debian.org [...] Sorry, I messed up the subject and assumed the list rejected the mail due to some

Bug#652653: python-virtualenv: insecure /tmp file handling

2011-12-20 Thread Nico Golde
generally not involved in such discussions until after the security team have decided they don't want to issue a DSA for a particular issue and someone raises it with us. We will not issue a DSA for this vulnerability. Please go ahead and fix this through spu. Kind regards Nico -- Nico Golde

[Python-modules-team] Bug#652653: python-virtualenv: insecure /tmp file handling

2011-12-20 Thread Nico Golde
generally not involved in such discussions until after the security team have decided they don't want to issue a DSA for a particular issue and someone raises it with us. We will not issue a DSA for this vulnerability. Please go ahead and fix this through spu. Kind regards Nico -- Nico Golde

Re: Bug#652653: python-virtualenv: insecure /tmp file handling

2011-12-20 Thread Nico Golde
generally not involved in such discussions until after the security team have decided they don't want to issue a DSA for a particular issue and someone raises it with us. We will not issue a DSA for this vulnerability. Please go ahead and fix this through spu. Kind regards Nico -- Nico Golde

[Secure-testing-commits] r17822 - data/CVE

2011-12-19 Thread Nico Golde
Author: nion Date: 2011-12-19 16:23:41 + (Mon, 19 Dec 2011) New Revision: 17822 Modified: data/CVE/list Log: new python-virtualenv issue Modified: data/CVE/list === --- data/CVE/list 2011-12-19 09:14:21 UTC (rev 17821)

[Secure-testing-commits] r17823 - in data: . CVE

2011-12-19 Thread Nico Golde
Author: nion Date: 2011-12-19 16:27:07 + (Mon, 19 Dec 2011) New Revision: 17823 Modified: data/CVE/list data/spu-candidates.txt Log: CVE-2011-4616 no-dsa Modified: data/CVE/list === --- data/CVE/list 2011-12-19

Bug#652653: python-virtualenv: insecure /tmp file handling

2011-12-19 Thread Nico Golde
Package: python-virtualenv Version: 1.4.9-3 Severity: grave Tags: patch Hi, it was discovered that python-virtualenv is handling /tmp files in an insecure manner. The following patch fixed this problem: https://bitbucket.org/ianb/virtualenv/changeset/8be37c509fe5 A CVE id for this issue has

Bug#652653: python-virtualenv: insecure /tmp file handling

2011-12-19 Thread Nico Golde
Package: python-virtualenv Version: 1.4.9-3 Severity: grave Tags: patch Hi, it was discovered that python-virtualenv is handling /tmp files in an insecure manner. The following patch fixed this problem: https://bitbucket.org/ianb/virtualenv/changeset/8be37c509fe5 A CVE id for this issue has

[Python-modules-team] Bug#652653: python-virtualenv: insecure /tmp file handling

2011-12-19 Thread Nico Golde
Package: python-virtualenv Version: 1.4.9-3 Severity: grave Tags: patch Hi, it was discovered that python-virtualenv is handling /tmp files in an insecure manner. The following patch fixed this problem: https://bitbucket.org/ianb/virtualenv/changeset/8be37c509fe5 A CVE id for this issue has

Bug#557754: amsn: CVE-2006-0138 denial-of-services

2011-12-13 Thread Nico Golde
in tcl, I also doubt it can be properly maintained by anyone who is not the upstream. Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. pgpCEPATwk3qy.pgp Description: PGP signature

Bug#650632: mcabber: fails to handle bookmarks for password protected MUCs

2011-12-02 Thread Nico Golde
Hi, * Nico Golde n...@debian.org [2011-12-01 15:56]: it is possible to join a MUC with a password in mcabber. However, if you bookmark the MUC your next attempt to join will fail because currently mcabber does not handle password protected MUCs in bookmarks (hence normal and not wishlist

Bug#650632: mcabber: fails to handle bookmarks for password protected MUCs

2011-12-01 Thread Nico Golde
Package: mcabber Version: 0.10.1-2 Severity: normal Tags: patch Hey, it is possible to join a MUC with a password in mcabber. However, if you bookmark the MUC your next attempt to join will fail because currently mcabber does not handle password protected MUCs in bookmarks (hence normal and not

[Secure-testing-commits] r17705 - data/CVE

2011-11-29 Thread Nico Golde
Author: nion Date: 2011-11-29 15:03:38 + (Tue, 29 Nov 2011) New Revision: 17705 Modified: data/CVE/list Log: t1lib also affected by CVE-2010-2642, not fixed Modified: data/CVE/list === --- data/CVE/list 2011-11-29

Accepted tcpxtract 1.0.1-8 (source amd64)

2011-11-19 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sat, 19 Nov 2011 12:51:31 +0100 Source: tcpxtract Binary: tcpxtract Architecture: source amd64 Version: 1.0.1-8 Distribution: unstable Urgency: low Maintainer: Nico Golde n...@debian.org Changed-By: Nico Golde n...@debian.org

Bug#649249: tcpxtract: Fixed PNG header

2011-11-19 Thread Nico Golde
Hi, * David Manso david.ma...@epistolae.com [2011-11-19 10:55]: Fixed PNG header Please learn how to write a proper bug report for the next time... Your bug will be fixed in the next upload in case I interpreted your report correct. Cheers Nico pgpVfvPEmmiUw.pgp Description: PGP signature

[Secure-testing-commits] r17635 - data/CVE

2011-11-18 Thread Nico Golde
Author: nion Date: 2011-11-18 13:22:24 + (Fri, 18 Nov 2011) New Revision: 17635 Modified: data/CVE/list Log: add CVE-2011-4313 bug Modified: data/CVE/list === --- data/CVE/list 2011-11-18 04:47:37 UTC (rev 17634) +++

[Secure-testing-commits] r17627 - data/DSA

2011-11-17 Thread Nico Golde
Author: nion Date: 2011-11-17 14:22:24 + (Thu, 17 Nov 2011) New Revision: 17627 Modified: data/DSA/list Log: add cve id to DSA-2346-{1,2} Modified: data/DSA/list === --- data/DSA/list 2011-11-16 21:14:23 UTC (rev 17626)

Bug#649011: security-tracker: DSA-2346-1 vs. tracker

2011-11-17 Thread Nico Golde
Hi, * Francesco Poli (wintermute) invernom...@paranoici.org [2011-11-16 22:21]: Package: security-tracker Severity: normal Hello, it seems to me that the tracker page [1] for DSA-2346-1 [2] lacks the reference to CVE-2011-4130. Please update the tracker data. Thanks for your time!

Bug#649011: security-tracker: DSA-2346-1 vs. tracker

2011-11-17 Thread Nico Golde
Hi, * Francesco Poli (wintermute) invernom...@paranoici.org [2011-11-16 22:21]: Package: security-tracker Severity: normal Hello, it seems to me that the tracker page [1] for DSA-2346-1 [2] lacks the reference to CVE-2011-4130. Please update the tracker data. Thanks for your time!

[Full-disclosure] [SECURITY] [DSA 2335-1] man2html security update

2011-11-07 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - Debian Security Advisory DSA-2335-1 secur...@debian.org http://www.debian.org/security/Nico Golde November 5th, 2011

[SECURITY] [DSA 2335-1] man2html security update

2011-11-07 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - Debian Security Advisory DSA-2335-1 secur...@debian.org http://www.debian.org/security/Nico Golde November 5th, 2011

[Secure-testing-commits] r17555 - data/DSA

2011-11-05 Thread Nico Golde
Author: nion Date: 2011-11-05 20:03:14 + (Sat, 05 Nov 2011) New Revision: 17555 Modified: data/DSA/list Log: dsa-2335-1 (man2html) Modified: data/DSA/list === --- data/DSA/list 2011-11-05 14:08:01 UTC (rev 17554) +++

Re: [dev] [dwm] 2000 SLOC

2011-10-31 Thread Nico Golde
Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. pgpydLn6OcLJZ.pgp Description: PGP signature

Re: [dev] [dwm] 2000 SLOC

2011-10-31 Thread Nico Golde
Hi, * Connor Lane Smith c...@lubutu.com [2011-10-31 21:05]: On 31 October 2011 20:33, Nico Golde n...@ngolde.de wrote: Sorry for the late response, missed this thread. I'm still maintaining and using it. So do some other people who occasionally contact me. Could you please apply

[Secure-testing-commits] r17531 - data/DSA

2011-10-30 Thread Nico Golde
Author: nion Date: 2011-10-30 12:31:43 + (Sun, 30 Oct 2011) New Revision: 17531 Modified: data/DSA/list Log: DSA-2333-1(phpldapadmin) Modified: data/DSA/list === --- data/DSA/list 2011-10-29 21:14:18 UTC (rev 17530) +++

Accepted openbox 3.5.0-2 (source amd64)

2011-10-30 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sun, 31 Oct 2011 23:41:20 +0200 Source: openbox Binary: openbox gnome-panel-control libobt0 libobrender27 openbox-dev Architecture: source amd64 Version: 3.5.0-2 Distribution: unstable Urgency: low Maintainer: Nico Golde n

Bug#644756: error message remains

2011-10-30 Thread Nico Golde
, the loading of this menu will fail. I will remove debian-menu.xml from rc.xml in the next upload and use a slightly modified version of the discussed patch. Kind regards Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail

[SECURITY] [DSA 2329-1] torque security update

2011-10-28 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA-2329-1secur...@debian.org http://www.debian.org/security/ Nico Golde Oct 27th, 2011

[Full-disclosure] [SECURITY] [DSA 2329-1] torque security update

2011-10-27 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA-2329-1secur...@debian.org http://www.debian.org/security/ Nico Golde Oct 27th, 2011

[Secure-testing-commits] r17506 - data/DSA

2011-10-27 Thread Nico Golde
Author: nion Date: 2011-10-27 08:54:48 + (Thu, 27 Oct 2011) New Revision: 17506 Modified: data/DSA/list Log: DSA-2329-1 (torque) Modified: data/DSA/list === --- data/DSA/list 2011-10-27 00:10:05 UTC (rev 17505) +++

[Secure-testing-commits] r17507 - data/CVE

2011-10-27 Thread Nico Golde
Author: nion Date: 2011-10-27 08:58:49 + (Thu, 27 Oct 2011) New Revision: 17507 Modified: data/CVE/list Log: new spip bug, no-dsa Modified: data/CVE/list === --- data/CVE/list 2011-10-27 08:54:48 UTC (rev 17506) +++

[Secure-testing-commits] r17501 - data/CVE

2011-10-26 Thread Nico Golde
Author: nion Date: 2011-10-26 15:36:15 + (Wed, 26 Oct 2011) New Revision: 17501 Modified: data/CVE/list Log: CVE-2011-2907 fixed in 2.4.15+dfsg-1 Modified: data/CVE/list === --- data/CVE/list 2011-10-25 21:22:39 UTC

Accepted stfl 0.22-1 (source all amd64)

2011-10-26 Thread Nico Golde
Urgency: low Maintainer: Nico Golde n...@debian.org Changed-By: Nico Golde n...@debian.org Description: libstfl-dev - development files for libstfl libstfl-perl - Perl bindings for the structured terminal forms language/library libstfl-ruby - Ruby bindings for the structured terminal forms language

[SECURITY] [DSA 2327-1] libfcgi-perl security-update

2011-10-25 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA-2327-1secur...@debian.org http://www.debian.org/security/ Nico Golde Oct 24th, 2011

[Full-disclosure] [SECURITY] [DSA 2327-1] libfcgi-perl security-update

2011-10-24 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA-2327-1secur...@debian.org http://www.debian.org/security/ Nico Golde Oct 24th, 2011

[Secure-testing-commits] r17489 - in data: . CVE

2011-10-24 Thread Nico Golde
Author: nion Date: 2011-10-24 17:40:09 + (Mon, 24 Oct 2011) New Revision: 17489 Modified: data/CVE/list data/spu-candidates.txt Log: track new nss issue, no-dsa Modified: data/CVE/list === --- data/CVE/list

[Secure-testing-commits] r17490 - data/DSA

2011-10-24 Thread Nico Golde
Author: nion Date: 2011-10-24 18:18:22 + (Mon, 24 Oct 2011) New Revision: 17490 Modified: data/DSA/list Log: DSA-2327-1 (libfcgi-perl) Modified: data/DSA/list === --- data/DSA/list 2011-10-24 17:40:09 UTC (rev 17489)

Bug#646199: libstfl-dev: Needs to depend on libstfl0

2011-10-22 Thread Nico Golde
. Will be fixed soon. Thanks! Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. pgpVRHhWxaz5f.pgp Description: PGP signature

Bug#646199: libstfl-dev: Needs to depend on libstfl0

2011-10-22 Thread Nico Golde
. Will be fixed soon. Thanks! Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. pgpEqXrrFMLsy.pgp Description: PGP signature

[Secure-testing-commits] r17470 - org

2011-10-21 Thread Nico Golde
Author: nion Date: 2011-10-21 08:32:17 + (Fri, 21 Oct 2011) New Revision: 17470 Modified: org/security-frontdesk.2011.txt Log: swapped orga with jmm Modified: org/security-frontdesk.2011.txt === ---

Bug#644756: error message remains

2011-10-19 Thread Nico Golde
Hi, * Sebastian Reichel s...@debian.org [2011-10-20 00:14]: I tested this patch and the debian menu reappears. Openbox still generates a message into ~/.xsession-errors though: Openbox-Message: Unable to find a valid menu file debian-menu.xml Will be fixed soon. Cheers Nico -- Nico Golde

Bug#644754: openbox: Please document configuration changes to be made after upgrading to 3.5

2011-10-10 Thread Nico Golde
for the changes this time for the release. By the way, the 3.5.0-1 package doesn't ship any environment file, but still contains an autostart.sh file which can be misleading for the end user (at least, it was for me). We will update this and the news in the next upload. Cheers Nico -- Nico

[Full-disclosure] [SECURITY] [DSA 2318-1] cyrus-imapd-2.2 security update

2011-10-07 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA-2318-1secur...@debian.org http://www.debian.org/security/ Nico Golde Oct 6, 2011

Accepted openbox 3.5.0-1 (source amd64)

2011-10-07 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sun, 03 Oct 2011 22:59:30 +0200 Source: openbox Binary: openbox gnome-panel-control libobt0 libobrender27 openbox-dev Architecture: source amd64 Version: 3.5.0-1 Distribution: unstable Urgency: low Maintainer: Nico Golde n

[rt.debian.org #3390] CVE-2011-3208: cyrus nntpd buffer overflow, pkg-kolab-de...@lists.alioth.debian.org

2011-10-07 Thread Nico Golde via RT
dsa-2318-1 ___ Pkg-Cyrus-imapd-Debian-devel mailing list Pkg-Cyrus-imapd-Debian-devel@lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-cyrus-imapd-debian-devel

[SECURITY] [DSA 2318-1] cyrus-imapd-2.2 security update

2011-10-07 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA-2318-1secur...@debian.org http://www.debian.org/security/ Nico Golde Oct 6, 2011

[Secure-testing-commits] r17383 - in data: CVE DSA

2011-10-06 Thread Nico Golde
Author: nion Date: 2011-10-06 20:19:22 + (Thu, 06 Oct 2011) New Revision: 17383 Modified: data/CVE/list data/DSA/list Log: DSA-2318-1 (cyrus-imapd-2.2) Modified: data/CVE/list === --- data/CVE/list 2011-10-06

Bug#638783: please update to 3.5.0

2011-10-06 Thread Nico Golde
Hi, * Douglas A. Augusto daaugu...@gmail.com [2011-10-06 10:11]: On 05/10/2011 at 16:54, Nico Golde n...@debian.org wrote: Yes the package is ready in svn and waiting for me to prepare an updated obconf version due to the library changes. Thank you, Nico. I'm looking forward to it. Has

[Secure-testing-commits] r17369 - data/CVE

2011-10-05 Thread Nico Golde
Author: nion Date: 2011-10-05 09:22:36 + (Wed, 05 Oct 2011) New Revision: 17369 Modified: data/CVE/list Log: CVE-2011-2716 is low, tendency to unimportant imho Modified: data/CVE/list === --- data/CVE/list 2011-10-04

[Secure-testing-commits] r17374 - data/CVE

2011-10-05 Thread Nico Golde
Author: nion Date: 2011-10-05 16:30:19 + (Wed, 05 Oct 2011) New Revision: 17374 Modified: data/CVE/list Log: busybox udhcpc bug is no-dsa and unimportant Modified: data/CVE/list === --- data/CVE/list 2011-10-05 16:11:02

Bug#638783: please update to 3.5.0

2011-10-05 Thread Nico Golde
Hi, * Douglas A. Augusto daaugu...@gmail.com [2011-10-05 16:10]: Any news on upgrading Openbox to version 3.5.0? Yes the package is ready in svn and waiting for me to prepare an updated obconf version due to the library changes. Cheers Nico pgpdm7PORNQFM.pgp Description: PGP signature

Bug#635548: CVE-2011-2716

2011-10-05 Thread Nico Golde
Hi, * Michael Tokarev m...@tls.msk.ru [2011-10-05 20:44]: I'm Cc'ing the relevant bug# so others may see this information. Hopefully you wont object -- the bug is public for a long time. No, not at all. On 05.10.2011 16:04, Nico Golde wrote: * Nico Golde n...@ngolde.de [2011-10-05 11:21

Bug#635548: CVE-2011-2716

2011-10-05 Thread Nico Golde
Hi, * Michael Tokarev m...@tls.msk.ru [2011-10-05 20:44]: I'm Cc'ing the relevant bug# so others may see this information. Hopefully you wont object -- the bug is public for a long time. No, not at all. On 05.10.2011 16:04, Nico Golde wrote: * Nico Golde n...@ngolde.de [2011-10-05 11:21

Bug#635548: CVE-2011-2716

2011-10-05 Thread Nico Golde
Hi, * Michael Tokarev m...@tls.msk.ru [2011-10-05 20:44]: I'm Cc'ing the relevant bug# so others may see this information. Hopefully you wont object -- the bug is public for a long time. No, not at all. On 05.10.2011 16:04, Nico Golde wrote: * Nico Golde n...@ngolde.de [2011-10-05 11:21

Accepted ejabberd 2.1.5-3+squeeze1 (source amd64)

2011-10-05 Thread Nico Golde
Changed-By: Nico Golde n...@debian.org Description: ejabberd - distributed, fault-tolerant Jabber/XMPP server written in Erlang Changes: ejabberd (2.1.5-3+squeeze1) stable-security; urgency=high . * Non-maintainer upload by the Security Team. * Fix billion laughs attack DoS attack vector

Accepted vsftpd 2.0.7-1+lenny1 (source amd64)

2011-10-04 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 08 Sep 2011 19:15:16 + Source: vsftpd Binary: vsftpd Architecture: source amd64 Version: 2.0.7-1+lenny1 Distribution: oldstable-security Urgency: high Maintainer: Daniel Baumann dan...@debian.org Changed-By: Nico Golde n

[Full-disclosure] [SECURITY] [DSA 2314-1] puppet security update

2011-10-03 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA-2314-1secur...@debian.org http://www.debian.org/security/ Nico Golde Oct 3, 2011

[Secure-testing-commits] r17358 - in data: CVE DSA

2011-10-03 Thread Nico Golde
Author: nion Date: 2011-10-03 16:56:24 + (Mon, 03 Oct 2011) New Revision: 17358 Modified: data/CVE/list data/DSA/list Log: DSA-2314-1 (puppet) Modified: data/CVE/list === --- data/CVE/list 2011-10-03 12:10:18 UTC

Bug#644156: O: obconf -- Preferences manager for Openbox window manager

2011-10-03 Thread Nico Golde
Package: wnpp Severity: normal I intend to orphan the obconf package. I'm just not using this software and I don't see the need for it. However, there seems to be some users for it, so it would be nice if someone wants to pick this up. The package description is: ObConf is a small graphical

Bug#644156: O: obconf -- Preferences manager for Openbox window manager

2011-10-03 Thread Nico Golde
Package: wnpp Severity: normal I intend to orphan the obconf package. I'm just not using this software and I don't see the need for it. However, there seems to be some users for it, so it would be nice if someone wants to pick this up. The package description is: ObConf is a small graphical

[SECURITY] [DSA 2314-1] puppet security update

2011-10-03 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA-2314-1secur...@debian.org http://www.debian.org/security/ Nico Golde Oct 3, 2011

[Secure-testing-commits] r17296 - data/CVE

2011-09-26 Thread Nico Golde
Author: nion Date: 2011-09-26 12:33:55 + (Mon, 26 Sep 2011) New Revision: 17296 Modified: data/CVE/list Log: CVE-2011-3208 fixed in cyrus-imapd-2.2 2.4.11-1 Modified: data/CVE/list === --- data/CVE/list 2011-09-26

Bug#642259: marked as done (security-tracker: DSA-2305-1 vs. tracker)

2011-09-21 Thread Nico Golde
-- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. pgpMRUQEmaCYF.pgp Description: PGP signature

Bug#642259: marked as done (security-tracker: DSA-2305-1 vs. tracker)

2011-09-21 Thread Nico Golde
-- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. pgpCoS9GiwUMV.pgp Description: PGP signature

Accepted vsftpd 2.3.2-3+squeeze2 (source amd64)

2011-09-21 Thread Nico Golde
-By: Nico Golde n...@debian.org Description: vsftpd - lightweight, efficient FTP server written for security Closes: 622741 Changes: vsftpd (2.3.2-3+squeeze2) stable-security; urgency=high . * Non-maintainer upload by the Security Team. * Disable network isolation due to a problem

[Full-disclosure] [SECURITY] [DSA 2305-1] vsftpd security update

2011-09-19 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA-2305-1secur...@debian.org http://www.debian.org/security/ Nico Golde September 19, 2011

[SECURITY] [DSA 2305-1] vsftpd security update

2011-09-19 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA-2305-1secur...@debian.org http://www.debian.org/security/ Nico Golde September 19, 2011

[Secure-testing-commits] r17257 - in data: CVE DSA

2011-09-18 Thread Nico Golde
Author: nion Date: 2011-09-19 00:20:20 + (Mon, 19 Sep 2011) New Revision: 17257 Modified: data/CVE/list data/DSA/list Log: rechange DSA-2305-1 version for squeeze Modified: data/CVE/list === --- data/CVE/list

Accepted squid3 3.0.STABLE8-3+lenny5 (source all amd64)

2011-09-14 Thread Nico Golde
Gangitano lu...@debian.org Changed-By: Nico Golde n...@debian.org Description: squid3 - A full featured Web Proxy cache (HTTP proxy) squid3-cgi - A full featured Web Proxy cache (HTTP proxy) - control CGI squid3-common - A full featured Web Proxy cache (HTTP proxy) - common files squidclient

Accepted squid3 3.1.6-1.2+squeeze1 (source all amd64)

2011-09-14 Thread Nico Golde
Gangitano lu...@debian.org Changed-By: Nico Golde n...@debian.org Description: squid-cgi - A full featured Web Proxy cache (HTTP proxy) - control CGI squid3 - A full featured Web Proxy cache (HTTP proxy) squid3-common - A full featured Web Proxy cache (HTTP proxy) - common files squid3-dbg

[Full-disclosure] [SECURITY] [DSA 2304-1] squid3 security update

2011-09-12 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA-2304-1secur...@debian.org http://www.debian.org/security/ Nico Golde Sep 11, 2011

[SECURITY] [DSA 2304-1] squid3 security update

2011-09-12 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA-2304-1secur...@debian.org http://www.debian.org/security/ Nico Golde Sep 11, 2011

[Secure-testing-commits] r17209 - data/DSA

2011-09-11 Thread Nico Golde
Author: nion Date: 2011-09-11 17:07:19 + (Sun, 11 Sep 2011) New Revision: 17209 Modified: data/DSA/list Log: DSA-2304-1 (squid3), vsftpd moved to 2305-1 Modified: data/DSA/list === --- data/DSA/list 2011-09-11 16:57:28

[Secure-testing-commits] r17204 - data/CVE

2011-09-10 Thread Nico Golde
Author: nion Date: 2011-09-10 08:19:13 + (Sat, 10 Sep 2011) New Revision: 17204 Modified: data/CVE/list Log: masqmail and quassel got cve ids Modified: data/CVE/list === --- data/CVE/list 2011-09-10 05:18:56 UTC (rev

[Secure-testing-commits] r17205 - data/CVE

2011-09-10 Thread Nico Golde
Author: nion Date: 2011-09-10 08:20:17 + (Sat, 10 Sep 2011) New Revision: 17205 Modified: data/CVE/list Log: remove cve id notes Modified: data/CVE/list === --- data/CVE/list 2011-09-10 08:19:13 UTC (rev 17204) +++

[Secure-testing-commits] r17207 - data/CVE

2011-09-10 Thread Nico Golde
Author: nion Date: 2011-09-10 12:43:33 + (Sat, 10 Sep 2011) New Revision: 17207 Modified: data/CVE/list Log: - NFUs - new openssl issues fixed in 1.0.0e-1 Modified: data/CVE/list === --- data/CVE/list 2011-09-10

[Secure-testing-commits] r17199 - in data: . CVE

2011-09-09 Thread Nico Golde
Author: nion Date: 2011-09-09 11:55:41 + (Fri, 09 Sep 2011) New Revision: 17199 Modified: data/CVE/list data/ospu-candidates.txt Log: new quassel issue, no-dsa Modified: data/CVE/list === --- data/CVE/list 2011-09-09

[Full-disclosure] [SECURITY] [DSA 2302-1] bcfg2 security update

2011-09-08 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA-2302-1secur...@debian.org http://www.debian.org/security/ Nico Golde Sep 7, 2011

[Secure-testing-commits] r17190 - data/CVE

2011-09-08 Thread Nico Golde
Author: nion Date: 2011-09-08 13:02:55 + (Thu, 08 Sep 2011) New Revision: 17190 Modified: data/CVE/list Log: - manthis issue update - new libfcgi-perl issue Modified: data/CVE/list === --- data/CVE/list 2011-09-07

[Secure-testing-commits] r17193 - in data: CVE DSA

2011-09-08 Thread Nico Golde
Author: nion Date: 2011-09-08 21:41:06 + (Thu, 08 Sep 2011) New Revision: 17193 Modified: data/CVE/list data/DSA/list Log: claim DSA-2304-1 (vsftpd) Modified: data/CVE/list === --- data/CVE/list 2011-09-08 21:14:18

[Secure-testing-commits] r17194 - data/CVE

2011-09-08 Thread Nico Golde
Author: nion Date: 2011-09-08 21:42:04 + (Thu, 08 Sep 2011) New Revision: 17194 Modified: data/CVE/list Log: fix vsftpd squeeze version Modified: data/CVE/list === --- data/CVE/list 2011-09-08 21:41:06 UTC (rev 17193)

[Secure-testing-commits] r17195 - data/CVE

2011-09-08 Thread Nico Golde
Author: nion Date: 2011-09-08 21:56:47 + (Thu, 08 Sep 2011) New Revision: 17195 Modified: data/CVE/list Log: new cyrus-imapd issue (CVE-2011-3208) Modified: data/CVE/list === --- data/CVE/list 2011-09-08 21:42:04 UTC

[Secure-testing-commits] r17196 - data/CVE

2011-09-08 Thread Nico Golde
Author: nion Date: 2011-09-08 22:14:01 + (Thu, 08 Sep 2011) New Revision: 17196 Modified: data/CVE/list Log: - NFUs - new rsyslog issue (CVE-2011-3200) fixed in 5.8.5-1 Modified: data/CVE/list === --- data/CVE/list

[SECURITY] [DSA 2302-1] bcfg2 security update

2011-09-08 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA-2302-1secur...@debian.org http://www.debian.org/security/ Nico Golde Sep 7, 2011

<    1   2   3   4   5   6   7   8   9   10   >