Bug#1074912: dircprxy / gcc-14 issue

2024-08-30 Thread Alex Pennace
severity 1074912 important
stop

Well, when I wrote my message of August 6, I had hoped that someone would
actually offer an explanation for why a compiler issue is a dircproxy issue :)

I'm not against this being set to serious, but it would be nice if someone
could articulate why this is a dircproxy problem when the issue happens
with gcc-14, but not with gcc-13.

-- 
Alex Pennace, a...@pennace.org



Bug#1074912: dircproxy build failures

2024-08-06 Thread Alex Pennace
severity 1074912 important
stop

As far as I can tell, this bug is about a build failure where it builds
successfully with a prior version of gcc, but not with a proposed new
version. Although that's a concern, I cannot agree that it warrants a
serious bug against dircproxy, please correct me if I am wrong.

-- 
Alex Pennace, a...@pennace.org



Bug#477025: libelfg0-dev: Missing on i386

2008-04-26 Thread Alex Pennace
On Sat, Apr 26, 2008 at 04:05:42PM +0200, Josselin Mouette wrote:
> libelfg0-dev 0.8.10-1 still includes these headers in /usr/include,
> except for the i386 architecture.
> 
> If we have to use the new location, so be it, and I'll happily include
> the patch, but the current situation is not acceptable.

libelf is in the wrong here, and will be fixed.

The build environment for the i386 libelfg0-dev package included
 et al, which prompted libelf's configure script to not
install its own copies. The fix is to force configure to include these
compatability headers.



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#445883: CVE-2007-5226 remote denial of service

2007-10-09 Thread Alex Pennace
On Mon, Oct 08, 2007 at 11:55:20PM +0200, Nico Golde wrote:
> Hi,
> the following CVE (Common Vulnerabilities & Exposures) id was
> published for dircproxy.
> 
> CVE-2007-5226[0]:
> | irc_server.c in dircproxy 1.2.0 and earlier allows remote attackers to
> | cause a denial of service (segmentation fault) via an ACTION command
> | without a parameter, which triggers a NULL pointer dereference, as
> | demonstrated using a blank /me message from irssi.
> 
> If you fix this vulnerability please also include the CVE id
> in your changelog entry.
> 
> The null pointer dereference itself is not that big kind of 
> a problem here but since this also means to lose the data 
> you want to read while you are away I mark this as grave.

Thanks Nico and Steffen.

Security team: this bug is also present in stable and oldstable.



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#285626: dircproxy: FTBFS (amd64/gcc-4.0): invalid lvalue in assignment

2005-07-21 Thread Alex Pennace
On Thu, Jul 21, 2005 at 10:21:30PM +0100, Roger Leigh wrote:
> Unless you plan to make a new upload in the next few days, or have any
> objections to the following patch, I intend to NMU dircproxy shortly
> to fix this RC bug.

The patch is acceptable. Although I do plan to work on dircproxy this
weekend, we should bring immediate closure to this FTBFS bug. You can
make the NMU at once. Thanks,


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]