Bug#526121: hotssh: versioned build-dependency on scrollkeeper

2009-04-30 Thread Thomas Bläsing
On Wed, Apr 29, 2009 at 02:17:44PM +0200, Josselin Mouette wrote:
 Package: hotssh
 Version: 0.5.2-3
 Severity: serious
 
 Hi,
Hi,

 currently hotssh Build-Depends on scrollkeeper (= 0.3.14). However, we
 are about to remove scrollkeeper from the archive; hence the serious
 severity.
 
 Please remove the version requirement, or add rarian-compat as an
 alternative. Soon, only rarian-compat will remain.
Let me first check if I can use rarian-compat instead of scrollkeepr.

I'll send you a mail when I'm finished checking, ok?
 
 Thanks,
Regards,
Thomas.

 -- 
  .''`.  Josselin Mouette
 : :' :
 `. `'   “I recommend you to learn English in hope that you in
   `- future understand things”  -- Jörg Schilling




signature.asc
Description: Digital signature


Bug#526121: hotssh: versioned build-dependency on scrollkeeper

2009-04-30 Thread Thomas Bläsing
On Thu, Apr 30, 2009 at 11:26:11AM +0200, Josselin Mouette wrote:
 Le jeudi 30 avril 2009 à 09:28 +0200, Thomas Bläsing a écrit :
   Please remove the version requirement, or add rarian-compat as an
   alternative. Soon, only rarian-compat will remain.
  Let me first check if I can use rarian-compat instead of scrollkeepr.
  
  I'll send you a mail when I'm finished checking, ok?
 
 Thanks. If there’s anything still missing in rarian-compat so that it
 can completely emulate scrollkeeper, I’ll be glad to add it.
I've got a look at the build-deps of hotssh and changed the scrollkeeper
to rarian-compat. It builds without errors and seems to work as normal
as before. It's lintian clean, too ;)

I've put the relevant files to:
http://www-pool.math.tu-berlin.de/~thomasbl/hotssh/

Can you please upload the package?

thanks,
Thomas.


signature.asc
Description: Digital signature


Bug#512532: CVE-2008-5659: The gnu.java.security.util.PRNG class in GNU Classpath 0.97.2 and ...

2009-01-21 Thread Thomas Bläsing
Source: classpath
Version: = 0.97.2
Severity: grave
Tags: security

Hi,
the following CVE (Common Vulnerabilities  Exposures) id was
published for classpath.

CVE-2008-5659[0]:
| The gnu.java.security.util.PRNG class in GNU Classpath 0.97.2 and
| earlier uses a predictable seed based on the system time, which makes
| it easier for context-dependent attackers to conduct brute force
| attacks against cryptographic routines that use this class for
| randomness, as demonstrated against DSA private keys.

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

For a better description of this bug please have a look at:
http://gcc.gnu.org/bugzilla/show_bug.cgi?id=38417

The affected code you can find in 
classpath-0.97.2/gnu/java/security/util/PRNG.java
on the lines where ``System.currentTimeMillis();'' is used.

For further information see:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5659
http://security-tracker.debian.net/tracker/CVE-2008-5659

Kind regards,
Thomas.


signature.asc
Description: Digital signature


Bug#505116: ITP: proxystrike -- an active Web Application Proxy designed to find vulnerabilities while browsing

2008-11-09 Thread Thomas Bläsing
Package: wnpp
Severity: wishlist
Owner: Thomas Bläsing [EMAIL PROTECTED]

Package name: proxystrike
Version : 2.0
Upstream Author : Carlos del Ojo Elías deepbit_AT_gmail.com
URL : http://www.edge-security.com/proxystrike.php
License : GPLv2
Language: python
Description : an active Web Application Proxy designed to find 
vulnerabilities while browsing

ProxyStrike is a tool designed to find Sql injection and xss
vulnerabilities while browsing an application.

The process is very simple, ProxyStrike runs like a passive proxy
listening on port 8008 by default, so you have to browse the desired
web site using ProxyStrike as proxy and it will attack all the
parameters in background mode.

Kind regards,
Thomas.



signature.asc
Description: Digital signature


Bug#471512: RFP: get-you

2008-10-08 Thread Thomas Bläsing
retitle 471512 RFP: get-you -- Download tool for a lot of video portals written 
in java
thanks

hi,

this packages is written in _java_

] getyou/ $ find . -name *.py | wc -l
] 0

] getyou/ $ find . -name *.java | wc -l
] 133

There also exists a package for ubuntu on:
https://launchpad.net/get-you/+download

I don't want to maintain this package so feel free
to adopt it :)

Kind regards,
Thomas.


signature.asc
Description: Digital signature


Bug#500278: not vulnerable?

2008-10-06 Thread Thomas Bläsing
hi,

I've installed the actually linux-ftpd version in order to make a NMU.
I was wondering by doing the following to reproduce the bug:

] $ echo open ftp://[EMAIL PROTECTED]:21  script; python -c 'for i in 
range(1,5200): print %ssyst % (A*i)'  script
] $ lftp -f script  out
] $ grep -iv Unknown command \`[A]*syst'. out | wc -l
] 0

As you can see there is no problem :)
Btw, the buffer is only 512K big, so ftpd might split the incoming buffer as
mentioned in 
http://lists.grok.org.uk/pipermail/full-disclosure/2008-September/064697.html

Furthermore, the patch which is attached to this bug causes the package
not to build properly. So, it's better to wait for a new upstream release
or fix the patch :)

Kind regards,
Thomas.



signature.asc
Description: Digital signature


Bug#500381: vim: CVE-2008-4101 Vim 3.0 through 7.x before 7.2.010 does not properly escape ...

2008-09-27 Thread Thomas Bläsing
Source: vim
Version: 7.2.000-3
Severity: grave
Tags: security patch

Hi,
the following CVE (Common Vulnerabilities  Exposures) id was
published for vim.

CVE-2008-4101[0]:
| Vim 3.0 through 7.x before 7.2.010 does not properly escape
| characters, which allows user-assisted attackers to (1) execute
| arbitrary shell commands by entering a K keystroke on a line that
| contains a ; (semicolon) followed by a command, or execute arbitrary
| Ex commands by entering an argument after a (2) Ctrl-] (control
| close-square-bracket) or (3) g] (g close-square-bracket) keystroke
| sequence, a different issue than CVE-2008-2712.

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4101
http://security-tracker.debian.net/tracker/CVE-2008-4101

The patch is available at:
http://groups.google.com/group/vim_dev/msg/9290f26f9bc11b33

For a better explanation see:
http://www.rdancer.org/vulnerablevim-K.html

Kind regards,
Thomas.



signature.asc
Description: Digital signature


Bug#488523: smarty: CVE-2007-2326 Multiple PHP remote file inclusion vulnerabilities in HYIP Manager Pro ...

2008-08-08 Thread Thomas Bläsing
On Mon, Aug 04, 2008 at 08:24:22PM +0200, Tomas Hoger wrote:
 Hi Thomas!
Hi Tomas,
 
 Have you managed to reproduce this, even with Smarty in webroot and
 register_globals enabled?  Your report mentions _get_plugin_filepath,
 but that does seem to be a different vector that one described in the
 original report.  $type and $name can not be spoofed with
 register_globals, as those are function arguments.  Moreover, in most
 cases where _get_plugin_filepath is called, both arguments are fixed
 strings or values read from the (trusted) file.
 
 Reported attack vector is:
   Smarty_Compiler.class.php?plugin_file=http://shell
 
 However, $plugin_file is always initialized before use in
 Smarty_Compiler.class.php.  Is the original report bogus or does HYIP
 use some old or customized Smarty version?  (Well, I guess you don't
 know the real answer to this, just like me ;).

First of all, sorry for the long delay! I had a big hardware crash on my
developing pc :(

So, I now have tested it again on a PC on my work and I am wondered
that it doesn't be vulnerable again like before. It's the same versions
and packages installed ... So, Either I did a mistake on my first
research or now.

My offer for you is that if you also aren't able to reproduce this issue
for the actually smarty package, you can close this bug and all is fine,
because you know the source better than me, I think.
 
 -- 
 Tomas Hoger
Kind regards,
Thomas.



signature.asc
Description: Digital signature


Bug#493579: upstream patch for XSS

2008-08-08 Thread Thomas Bläsing
On Thu, Aug 07, 2008 at 05:40:08PM +1000, Steffen Joeris wrote:
 Hi
Hi,

 
 I've attached the part from the upsteam VCS, which should address this XSS.
 Upstream confirmed this via private email. I am still looking into #493372, 
 but it seems that unstable and testing are already fixed.
No, there is no fix in unstable and testing, because the used version is 
also 0.95-1 and there isn't the patch included - I checked it again today.

But if the maintainer fixes the #493372 they will also fix this bug within the
upstream patch, I think, and so it's not very important to discuss it anymore,
because it's just a XSS issue which isn't an very hard bug :)
 
 Cheers
 Steffen
Kind regards,
Thomas.

 --- new/owl-dms-0.95/lib/owl.lib.php  2007-10-07 13:42:37.0 +
 +++ upstream/owl.lib.php  2008-08-06 14:18:41.0 +
 @@ -70,6 +71,9 @@
 } 
  } 
  
 +$username = ereg_replace('script','', $username);
 +$username = ereg_replace('/script','', $username);
 +
  require_once($default-owl_fs_root ./lib/sort.lib.php);
  
  if(!empty($_GET[currentdb]))





signature.asc
Description: Digital signature


Bug#493576: pdns-server: CVE-2008-3217 ( PowerDNS Recursor before 3.1.6 does not always use the strongest random number generator... )

2008-08-03 Thread Thomas Bläsing
Package: pdns-server
Version: 2.9.21-6
Severity: serious
Tags: security

Hi,
the following CVE (Common Vulnerabilities  Exposures) id was
published for pdns-server.

CVE-2008-3217[0]:
| PowerDNS Recursor before 3.1.6 does not always use the strongest
| random number generator for source port selection, which makes it
| easier for remote attack vectors to conduct DNS cache poisoning.
NOTE:
| this is related to incomplete integration of security improvements
| associated with addressing CVE-2008-1637.

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3217
http://security-tracker.debian.net/tracker/CVE-2008-3217

Kind regards,
Thomas.



signature.asc
Description: Digital signature


Bug#493579: owl-dms: CVE-2008-3100 (Cross-site scripting (XSS) vulnerability in lib/owl.lib.php ...)

2008-08-03 Thread Thomas Bläsing
Package: owl-dms
Version: 0.95-1
Severity: normal
Tags: security patch

Hi,
the following CVE (Common Vulnerabilities  Exposures) id was
published for owl-dms.

CVE-2008-3100[0]:
| Cross-site scripting (XSS) vulnerability in lib/owl.lib.php in Steve
| Bourgeois and Chris Vincent Owl Intranet Knowledgebase 0.95 and
| earlier allows remote attackers to inject arbitrary web script or HTML
| via the username parameter in a getpasswd action to register.php.

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3100
http://security-tracker.debian.net/tracker/CVE-2008-3100

There is a fix out there at:
http://owl.cvs.sourceforge.net/*checkout*/owl/owl-0.90/lib/owl.lib.php

Kind regards,
Thomas.


signature.asc
Description: Digital signature


Bug#492492: moodle: CVE-2008-3326 Cross-site scripting (XSS) vulnerability in blog/edit.php

2008-07-26 Thread Thomas Bläsing
Package: moodle
Version: 1.8.2-1.3 
Severity: normal
Tags: security

Hi,

there is a Cross-site scripting (XSS) vulnerability in blog/edit.php
as mentioned in [0]. There is also a patch for this version at [1].

So, please change the affected lines of code in the source :)

[0] http://moodle.org/mod/forum/discuss.php?d=101401
[1] http://cvs.moodle.org/moodle/blog/lib.php?r1=1.38.6.3r2=1.38.6.2

Kind regards,
Thomas.


signature.asc
Description: Digital signature


Bug#488527: change severity for several bugs

2008-07-17 Thread Thomas Bläsing
severity 488523 normal
severity 488525 normal
severity 488527 normal

thanks

Hi,

I change the severity of this bug to normal, because
this is a non-issue. To exploit this, the smarty files
need to be installed in a http daemon accessible directory.
(should be the case for embedded copies), however additionally
this relies on register_globals being switched on.

Kind Regards,
Thomas.



signature.asc
Description: Digital signature


Bug#487095: xen-3: multiple security issues

2008-06-19 Thread Thomas Bläsing
Source: xen-3
Version: 3.2.1-1
Severity: grave
Tags: security, patch

Hi,
the following CVE (Common Vulnerabilities  Exposures) ids were
published for xen-3.

CVE-2008-1943[0]:
| Buffer overflow in the backend of XenSource Xen Para Virtualized Frame
| Buffer (PVFB) 3.0 through 3.1.2 allows local users to cause a denial
| of service (crash) and possibly execute arbitrary code via a crafted
| description of a shared framebuffer.

CVE-2008-1944[1]:
| Buffer overflow in the backend framebuffer of XenSource Xen
| Para-Virtualized Framebuffer (PVFB) Message 3.0 through 3.0.3 allows
| local users to cause a denial of service (SDL crash) and possibly
| execute arbitrary code via bogus screen updates, related to missing
| validation of the format of messages.

CVE-2008-1952[2]:
| ** RESERVED **
| This candidate has been reserved by an organization or individual that
| will use it when announcing a new security problem.  When the
| candidate has been publicized, the details for this candidate will be
| provided.

If you fix the vulnerabilities please also make sure to include the
CVE ids in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1943
http://security-tracker.debian.net/tracker/CVE-2008-1943
[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1944
http://security-tracker.debian.net/tracker/CVE-2008-1944
[2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1952
http://security-tracker.debian.net/tracker/CVE-2008-1952

These issues are fixed within the following patch for fedora:
http://cvs.fedoraproject.org/viewcvs/rpms/xen/F-9/xen-pvfb-validate-fb.patch?view=markup

Kind regards,
Thomas.



signature.asc
Description: Digital signature


Bug#487097: xen-unstable: multiple security issues

2008-06-19 Thread Thomas Bläsing
Source: xen-unstable
Version: 3.3-unstable+hg17602-1
Severity: grave
Tags: security, patch

Hi,
the following CVE (Common Vulnerabilities  Exposures) ids were
published for xen-unstable.

CVE-2008-1943[0]:
| Buffer overflow in the backend of XenSource Xen Para Virtualized Frame
| Buffer (PVFB) 3.0 through 3.1.2 allows local users to cause a denial
| of service (crash) and possibly execute arbitrary code via a crafted
| description of a shared framebuffer.

CVE-2008-1944[1]:
| Buffer overflow in the backend framebuffer of XenSource Xen
| Para-Virtualized Framebuffer (PVFB) Message 3.0 through 3.0.3 allows
| local users to cause a denial of service (SDL crash) and possibly
| execute arbitrary code via bogus screen updates, related to missing
| validation of the format of messages.

CVE-2008-1952[2]:
| ** RESERVED **
| This candidate has been reserved by an organization or individual that
| will use it when announcing a new security problem.  When the
| candidate has been publicized, the details for this candidate will be
| provided.

If you fix the vulnerabilities please also make sure to include the
CVE ids in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1943
http://security-tracker.debian.net/tracker/CVE-2008-1943
[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1944
http://security-tracker.debian.net/tracker/CVE-2008-1944
[2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1952
http://security-tracker.debian.net/tracker/CVE-2008-1952

These issues are fixed within the following patch for fedora:
http://cvs.fedoraproject.org/viewcvs/rpms/xen/F-9/xen-pvfb-validate-fb.patch?view=markup

Kind regards,
Thomas.


signature.asc
Description: Digital signature


Bug#487097: xen-unstable: multiple security issues

2008-06-19 Thread Thomas Bläsing
hi,

I'm sorry!

The CVE-2008-1952 doesn't affect you, so please disregard it :)

Kind regards,
Thomas.



signature.asc
Description: Digital signature


Bug#426837: ITP: giplet -- GNOME IP display applet

2008-06-16 Thread Thomas Bläsing
owner 426837 !
retitle 426837 ITP: giplet -- GNOME IP display applet
thanks


Hi,

i am intent to package this small app ;)

Kind regards,
Thomas.



signature.asc
Description: Digital signature


Bug#486110: vmware-package: CVE-2008-0967 Untrusted search path vulnerability in vmware-authd in VMware ...

2008-06-13 Thread Thomas Bläsing
Package: vmware-package
Version: 0.22
Severity: important
Tags: security

Hi,
the following CVE (Common Vulnerabilities  Exposures) id was
published for vmware-package.

CVE-2008-0967[0]:
| Untrusted search path vulnerability in vmware-authd in VMware
| Workstation 5.x before 5.5.7 build 91707 and 6.x before 6.0.4 build
| 93057, VMware Player 1.x before 1.0.7 build 91707 and 2.x before 2.0.4
| build 93057, and VMware Server before 1.0.6 build 91891 on Linux, and
| VMware ESXi 3.5 and VMware ESX 2.5.4 through 3.5, allows local users
| to gain privileges via an unspecified option in a configuration file.

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0967
http://security-tracker.debian.net/tracker/CVE-2008-0967

As mentioned in bug #484491, I think you just need to update the hashes
for the tarballs to fix this bug :)

Kind regards,
Thomas.



signature.asc
Description: Digital signature


Bug#485919: vmware-package: CVE-2008-2100 Multiple buffer overflows in VIX API 1.1.x before 1.1.4 build 93057

2008-06-12 Thread Thomas Bläsing
Package: vmware-package
Version: 0.22
Severity: normal
Tags: security

Hi,
the following CVE (Common Vulnerabilities  Exposures) id was
published for vmware-package.

CVE-2008-2100[0]:
| Multiple buffer overflows in VIX API 1.1.x before 1.1.4 build 93057 on
| VMware Workstation 5.x and 6.x, VMware Player 1.x and 2.x, VMware ACE
| 2.x, VMware Server 1.x, VMware Fusion 1.x, VMware ESXi 3.5, and VMware
| ESX 3.0.1 through 3.5 allow guest OS users to execute arbitrary code
| on the host OS via unspecified vectors.

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2100
http://security-tracker.debian.net/tracker/CVE-2008-2100

As mentioned in bug #484491, I think you just need to update the hashes
for the tarballs to fix this bug :)

Kind regards,
Thomas.



signature.asc
Description: Digital signature


Bug#485807: wordpress: CVE-2008-2392 Unrestricted file upload vulnerability in WordPress 2.5.1 and earlier

2008-06-11 Thread Thomas Bläsing
Package: wordpress
Version: = 2.5.1-3
Severity: important
Tags: security

Hi,
the following CVE (Common Vulnerabilities  Exposures) id was
published for wordpress.

CVE-2008-2392[0]:
| Unrestricted file upload vulnerability in WordPress 2.5.1 and earlier
| might allow remote authenticated administrators to upload and execute
| arbitrary PHP files via the Upload section in the Write Tabs area of
| the dashboard.

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2392
http://security-tracker.debian.net/tracker/CVE-2008-2392

It seems that this bug is mentioned in wordpress as #7113 and
is fixed with the new svn revision 8068.

The diff for that can be viewed at:
http://trac.wordpress.org/attachment/ticket/7113/7113.2.diff

Kind regards,
Thomas.



signature.asc
Description: Digital signature


Bug#485807: wordpress: CVE-2008-2392 Unrestricted file upload vulnerability in WordPress 2.5.1 and earlier

2008-06-11 Thread Thomas Bläsing
Hi,

first of all SORRY for my mistakes in the last mail.

The 'Version'-tag is not really correct. So, you can
ignore the '=' :)

And, I am not 100% sure that the diff from the wordpress
trac system, I wrote, is the patch for the bug!
It seems so but I just had have only a quick look at it.

sorry,
Thomas.



signature.asc
Description: Digital signature


Bug#485841: freetype: multiple security issues

2008-06-11 Thread Thomas Bläsing
Package: freetype
Version: 2.3.5-1
Severity: important
Tags: security

Hi,

there are some security issues for FreeType2 2.3.5 as you can
see on the following websites:

http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=715
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=716
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=717

It seems that they are be solved in the new version 2.3.6 of
FreeType2.

Kind regards,
Thomas.



signature.asc
Description: Digital signature


Bug#366137: ITP: python-xlrd - extracting data from MS-Excel files

2008-05-19 Thread Thomas Bläsing
rename ITP: python-xlrd - extracting data from MS-Excel files
thanks

Hi,

the package is in a ready state and just need to be uploaded
by my favorite sponsor :)

Thomas.



signature.asc
Description: Digital signature


Bug#366137: RFP: python-xlrd - extracting data from MS-Excel files

2008-05-05 Thread Thomas Bläsing
owner !
thanks

Hi,

after getting the permissions from Joost van Baal via mail I am intend to
maintain this package.


Thomas.




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#477034: Patch to fix 477034

2008-04-26 Thread Thomas Bläsing
On Fri, Apr 25, 2008 at 07:42:29PM +0530, Kumar Appaiah wrote:
 tags 477034 + patch
 thanks
 
 Hi!
 
 Please find attached a patch to fix this bug. The solution is to just
 use the right Python version as given by pyversions -d.
First of all, thanks!
But I am solving some other minor fixes for this packages, so I just didn't
look for an Sponsor who could upload this package for me.

Seems to be in ready state at end of next week, maybe earlier :)

 
 HTH.
 
 Kumar
Regards,
Thomas.

 -- 
 Kumar Appaiah,
 458, Jamuna Hostel,
 Indian Institute of Technology Madras,
 Chennai - 600 036

 diff -Nru --exclude changelog wapiti-1.1.6/debian/rules 
 wapiti-1.1.6/debian/rules
 --- wapiti-1.1.6/debian/rules 2008-04-25 09:30:48.0 +0530
 +++ wapiti-1.1.6/debian/rules 2008-04-25 09:30:48.0 +0530
 @@ -22,7 +22,7 @@
   chmod +x $(CURDIR)/debian/wapiti/usr/bin/wapiti
   
   # for lintian to solve the hybrid problem
 - chmod +x $(CURDIR)/debian/wapiti/usr/lib/python2.4/site-packages/*.py
 + chmod +x $(CURDIR)/debian/wapiti/usr/lib/`pyversions 
 -d`/site-packages/*.py
   #rm -f 
 $(CURDIR)/debian/wapiti/usr/lib/python2.4/site-packages/*.egg-info
  
  binary-indep: install





signature.asc
Description: Digital signature


Bug#435261: FTBFS: dpkg-genchanges: failure: cannot read files list file: No such file or directory

2007-07-30 Thread Thomas Bläsing
On Mon, Jul 30, 2007 at 09:40:58AM -0600, dann frazier wrote:
 Package: python-libpcap
 Version: 0.6.1+cvs.2007.07.28-1
 Severity: serious
 
 From 
 http://buildd.debian.org/fetch.cgi?pkg=python-libpcapver=0.6.1%2Bcvs.2007.07.28-1arch=ia64stamp=1185757680file=log:
 
 [snip]
 running build
 running build_ext
 building '_pcapmodule' extension
 generating constants.c from mk-constants.py
 swig -Wall -python -shadow -ISWIG -o pcap.c pcap.i
 /usr/bin/python ./build-tools/docify.py pcap.c
 /usr/bin/python ./build-tools/docify-shadow.py pcap.py
 creating build
 creating build/temp.linux-ia64-2.4
 gcc -pthread -fno-strict-aliasing -DNDEBUG -g -O2 -Wall -Wstrict-prototypes 
 -fPIC -DSWIG_COBJECT_TYPES -I/usr/include/python2.4 -c pcap.c -o 
 build/temp.linux-ia64-2.4/pcap.o
 pcap.c: In function 'init_pcap':
 pcap.c:4260: warning: passing argument 3 of 'PyModule_AddStringConstant' 
 discards qualifiers from pointer target type
 gcc -pthread -fno-strict-aliasing -DNDEBUG -g -O2 -Wall -Wstrict-prototypes 
 -fPIC -DSWIG_COBJECT_TYPES -I/usr/include/python2.4 -c pcap_interface.c -o 
 build/temp.linux-ia64-2.4/pcap_interface.o
 gcc -pthread -fno-strict-aliasing -DNDEBUG -g -O2 -Wall -Wstrict-prototypes 
 -fPIC -DSWIG_COBJECT_TYPES -I/usr/include/python2.4 -c exception.c -o 
 build/temp.linux-ia64-2.4/exception.o
 gcc -pthread -fno-strict-aliasing -DNDEBUG -g -O2 -Wall -Wstrict-prototypes 
 -fPIC -DSWIG_COBJECT_TYPES -I/usr/include/python2.4 -c error.c -o 
 build/temp.linux-ia64-2.4/error.o
 creating build/lib.linux-ia64-2.4
 gcc -pthread -shared build/temp.linux-ia64-2.4/pcap.o 
 build/temp.linux-ia64-2.4/pcap_interface.o 
 build/temp.linux-ia64-2.4/exception.o build/temp.linux-ia64-2.4/error.o 
 -lpcap -o build/lib.linux-ia64-2.4/_pcapmodule.so
 running build_py
 copying pcap.py - build/lib.linux-ia64-2.4
  /usr/bin/fakeroot debian/rules binary-arch
 make: Nothing to be done for `binary-arch'.
 dpkg-genchanges -B
 dpkg-genchanges: arch-specific upload - not including arch-independent 
 packages
 dpkg-genchanges: failure: cannot read files list file: No such file or 
 directory
I don't have access to an ia64 machine, so my first intention is to
modify the debian/rules:

--- debian/rules2007-07-30 19:31:25.0 +0200
+++ debian/rules.new2007-07-30 19:32:34.0 +0200
@@ -37,7 +37,5 @@
dh_md5sums
dh_builddeb

-binary-arch: 
-
-binary: binary-indep binary-arch
-.PHONY: build clean binary-indep binary-arch binary install
+binary: binary-indep 
+.PHONY: build clean install binary-indep 

Does it work now?

Regards,
Thomas.


signature.asc
Description: Digital signature


Bug#434804: Description does not say much about the package

2007-07-29 Thread Thomas Bläsing
On Thu, Jul 26, 2007 at 10:56:09PM +0200, Enrico Zini wrote:
 Package: wapiti
 Version: 1.1.6-1
 Severity: normal
 
 Hello,
Hello,

 
 thanks for maintaining wapiti.
 
 I noticed it entering lenny, but from the description I could not tell
 if I am interested in the package or not.
 
 The main thing I think is missing is some details about what kind of
 vulnerabilities are scanned and how: does it have a database of known
 vulnerabilities in known web applications, does it crawl the pages of
 a web application filling in every field with potentially dangerous
 content, or something else?
Well, I'll repackage it with a better description, because it's really
a little bit strange. Sorry for that, it is one of my first packages
but if you don't want to wait until the package is up you can have a look
at the webpage http://wapiti.sourceforge.net/ .

 Best regards,
 
 Enrico
Regards,
Thomas.


signature.asc
Description: Digital signature


Bug#372656: [CLOSED] python-irclib 0.4.6 available

2007-07-26 Thread Thomas Bläsing
fixed 372656 0.4.6-1
thanks

hi,

I'm the new maintainer.
I've uploaded the new version and so the Bug is fixed ;)

Regards,
Thomas.



signature.asc
Description: Digital signature


Bug#215367: ITP: pylibpcap - status?

2007-07-24 Thread Thomas Bläsing
owner 215367 !
thanks

On Mon, Jul 23, 2007 at 11:52:19AM +1000, Paul Wise wrote:
 On Sun, 2007-07-22 at 12:04 +0200, Thomas Bläsing wrote:
 
  I'm very interested in maintain this package.
  So, is there any further working on it or can
  I take it?
 
 Before a package can be uploaded, this bug needs to be fixed:
 
 http://sf.net/support/tracker.php?aid=1320469
 
 Looks like it has been fixed in CVS, but not in the latest release.
 
 I don't really have much time to maintain more packages,or sponsor any,
 so feel free to take over this ITP.
ok, thanks ;)

 So I guess you will have to package a CVS snapshot for this to be
 uploaded to Debian.
I try to make a package till end of the week ;)
The developers contacted me by mail and we will find a solution, I think.

 
 You might want to join the Debian Python Modules Team:
 
 http://wiki.debian.org/Teams/PythonModulesTeam
I'll read it tonight and then try to get involved, because I have
to maintain 2 other python packages.

Paul: Could you sponsor me for this package when it is completed?

Thanks,
Thomas.



signature.asc
Description: Digital signature


Bug#215367: ITP: pylibpcap - status?

2007-07-22 Thread Thomas Bläsing
hi,

I'm very interested in maintain this package.
So, is there any further working on it or can
I take it?

Greets,
Thomas.



signature.asc
Description: Digital signature


Bug#431952: ITP: python-plwm -- Pointless Window Manager - python library for creating

2007-07-06 Thread Thomas Bläsing
owner 431952 !
thanks

I'll take and create a package.

thanks,
Thomas.



signature.asc
Description: Digital signature


Bug#431952: ITP: python-plwm -- Pointless Window Manager - python library for creating

2007-07-06 Thread Thomas Bläsing
On Fri, Jul 06, 2007 at 09:37:57AM -0400, Mike O'Connor wrote:
 owner 431952 !
 thanks
  
  I'll take and create a package.
  
  thanks,
  Thomas.
  
 
 I've already created packages.  They are available here:
 
 http://vireo.org/debian/tritium/
oh, sorry! I understand it in this way that you didn't
wan't create a package...

Sorry for my stupidity.
 
 stew
Regards,
Thomas


signature.asc
Description: Digital signature


Bug#377153: ITP: python-pysearch -- pYsearch is a wrapper for the Yahoo! search API

2007-07-01 Thread Thomas Bläsing
owner 377153 !
thanks

Hi,

after nearly a year of nothing done, and a new version 
of pYsearch I'll take it to me and create a package...

Regards,
Thomas.



signature.asc
Description: Digital signature


Bug#381418: ITP: wapiti -- Web application vulnerability scanner

2007-06-28 Thread Thomas Bläsing
retitle 381418 ITP: wapiti -- Web application vulnerability scanner
owner 381418 [EMAIL PROTECTED]
thanks

Played also much with it and try to build a package :)

Regards,
Thomas.



signature.asc
Description: Digital signature