Bug#721041: nm.debian.org XSS

2013-08-27 Thread Moritz Naumann
Package: nm.debian.org Severity: normal Tags: security Cross site scripting bugs with possible security impact on nm.debian.org: https://nm.debian.org/public/person/%3Cbody%20onload=alert%28%27XSS%27%29%3E https://nm.debian.org/public/process/%3Cbody%20onload=alert%28%27XSS%27%29%3E Thanks for l

Bug#556619: Update

2011-12-16 Thread Moritz Naumann
Hi again, it's two years later - I'm not sure whether or not this site has yet been upgraded to the new codebase Christoph (Myon) referred to. But it looks like there are still/again SQL injection issues present: https://nm.debian.org/nmstatus.php?email=' I'm sending this in a public bug report

Bug#609126: Please improve default SSL configuration

2011-01-06 Thread Moritz Naumann
Package: apache2.2-common Version: 2.2.9-10+lenny9 Severity: wishlist Tags: security The default SSL configuration found on lenny (and - without having checked - I think on squeeze and sid, too) is to use this cipher suite: SSLCipherSuite HIGH:MEDIUM:!ADH Lenny's openssl 0.9.8g-15+lenny11 makes

Bug#592580: Flash 10.1.82.76 security fix (APSB10-16) is available, please update

2010-08-11 Thread Moritz Naumann
Package: flashplugin-nonfree Version: 1:2.8.1 As per Adobe security advisory APSB10-16 [1] Flash player 10.1.82.76 is available, fixing several critical security issues (as usual): > This update resolves a memory corruption vulnerability that could lead to > code execution (CVE-2010-0209). > Th

Bug#582057: sudo: Segmentation fault with invalid UID

2010-05-17 Thread Moritz Naumann
Package: sudo Version: 1.6.9p17-2+lenny1 Severity: important When invoking sudo with -u, passing an invalid (or valid but not matching/existing) UID value, it segfaults. r...@pepper:~# sudo -u \#-1 Segmentation fault r...@pepper:~# Please ensure this is not a security issue. Kernel: Linux 2.6

Bug#571408: fix available

2010-05-12 Thread Moritz Naumann
The patch by Daniel J Blueman should fix this: > https://bugs.launchpad.net/ubuntu/+source/microcode.ctl/+bug/569488/comments/4 -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#579568: Medusa 2.0 is available

2010-04-28 Thread Moritz Naumann
Package: medusa Version: 1.5-1 Severity: wishlist Medusa 2.0 is available at http://www.foofus.net/jmk/tools/medusa-2.0.tar.gz (released in February) Changelog: http://www.foofus.net/jmk/tmp/ChangeLog Release Announcement: http://www.securityfocus.com/archive/101/509569 It would be nice to hav

Bug#247225: Postfixadmin 2.3 now released

2010-01-27 Thread Moritz Naumann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi Norman, Norman Messtorff schrieb: > thank you for the feedback! ...thanks for yours! > I've worked the most stuff of upstream's .deb and there are one minor > and one critical bug which I want to be fixed in the next weeks. Then > I'll contact

Bug#557105: crash while sending online data

2009-12-10 Thread Moritz Naumann
Package: taxbird Version: 0.14-1 Severity: normal (Probably) same here. When sending as test case (incompletely filled form, not exported to Coala XML, no signature, call Geier, do not print transmission protocol via taxbird-print-helper, do not store protocol to file) I get: > Program received

Bug#556619: sql

2009-11-16 Thread Moritz Naumann
one of my tests also caused a postgresql SQL error to be displayed (which can be an indication of an SQL injection vulnerability). Unfortunately I did not note it down nor do I know how exactly to reproduce it. If you have logs, please review them. -- To UNSUBSCRIBE, email to debian-bugs-dist-

Bug#556619: nm.debian.org: GPG Signing Coordination utility lacks input validation

2009-11-16 Thread Moritz Naumann
Package: nm.debian.org Severity: normal Tags: security The GPG key signing coordination utility does not seem to attamept to validate user inputs. As a result, it is possible to create a new signing offer or requestaccount and fill in some HTML or script code which may * steal other https://nm

Bug#556618: nm.debian.org: XSS in gpglogin2.php

2009-11-16 Thread Moritz Naumann
Package: nm.debian.org Severity: normal Tags: security Hi, there's an XSS issue here: https://nm.debian.org/gpglogin2.php?username=%22%20onmouseover%3Ddocument.location%3DString.fromCharCode%28104,116,116,112,58,47,47,114,101,100,104,97,116,46,99,111,109%29%2F%2F Once you have this URL loaded,

Bug#247225: Postfixadmin 2.3 now released

2009-11-12 Thread Moritz Naumann
Norman Messtorff wrote: > Now we are waiting for the 2.3 release of Postfix Admin to start with a > good tested release in Debian. postfixadmin 2.3 is available since Oct 26 at http://sourceforge.net/projects/postfixadmin/files/ I use upstreams' .deb on an i386 Debian Etch system and it works wel

Bug#550512: Default tiger.ignore contains incorrect extended regex patterns and wastes processing time

2009-10-10 Thread Moritz Naumann
Package: tiger Version: 3.2.2-11 Severity: normal Tags: patch According to /usr/share/doc/tiger/README.ignore and TIGER(8) the lines in /etc/tiger/tiger.ignore will be interpreted as extended regular expressions. As such, two of the rules coming with tiger on Debian are incorrect and will never

Bug#506807: Patch

2008-12-06 Thread Moritz Naumann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Please note that I have sent a patch introducing input validation for buildd.php to Adeodato Simó on Nov 29th 2008. I can resend this patch here if you do not mind this becoming public. Moritz -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GN

Bug#506807: XSS in bugs.debian.org

2008-11-27 Thread Moritz Naumann
On Mon, 24 Nov 2008 22:52:25 +0100, Adeodato Simó <[EMAIL PROTECTED]> wrote: >> Am Samstag, den 01.11.2008, 17:47 +0100 schrieb Moritz Naumann: >>> Let me know if you need any help fixing these. > > I would welcome help in fixing these, yes. What do you need, the

Bug#418062: Simplistic Patch

2008-11-02 Thread Moritz Naumann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Please find attached a simple patch for this issue which applies to mailman 2.1.9-7. -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iEYEAREKAAYFAkkOATkACgkQn6GkvSd/Bgwy8ACfczQBGCk9ZUlUSe53Or+yuDob wGEAnRAOM73iGSOBYHItPA3FZBRjKcJs =

Bug#491977: grub-probe fails with "Cannot find a GRUB drive for /dev/dm-N."

2008-07-31 Thread Moritz Naumann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Robert Millan wrote: > If this problem is uncommon or only affects users with a deprecated setup, > let's not worry about it. GRUB 2 handles this in a completely different way, > so our effort is most likely not going to pay back. I just upgraded t

Bug#491977: grub-probe fails with "Cannot find a GRUB drive for /dev/dm-N."

2008-07-28 Thread Moritz Naumann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Robert Millan wrote: > I think the usual thing to find in that output are physical devices instead > of /dev/dm-X. > > What other special things are in your setup that we should know about? Are > you using LVM / EVMS or something like that? No LVM

Bug#491977: grub-probe fails with "Cannot find a GRUB drive for /dev/dm-N."

2008-07-28 Thread Moritz Naumann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Robert Millan wrote: > Please try: > > mdadm -D -b /dev/md0 > mdadm -D /dev/md0 > debby:~# mdadm -D -b /dev/md0 > ARRAY /dev/md0 level=raid1 num-devices=1 spares=1 > UUID=b36bed37:7b1ca284:5f985e7d:0ec83b51 > debby:~# mdadm -D /dev/md0 > /dev

Bug#491977: grub-probe fails with "Cannot find a GRUB drive for /dev/dm-N."

2008-07-27 Thread Moritz Naumann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Robert Millan wrote: > On Sun, Jul 27, 2008 at 03:07:41PM +0200, Moritz Naumann wrote: >> debby:~# /usr/sbin/grub-probe -t device /boot >> /dev/md0 >> >> debby:~# /usr/sbin/grub-probe -t device / >> /dev/md2 > &g

Bug#491977: grub-probe fails with "Cannot find a GRUB drive for /dev/dm-N."

2008-07-27 Thread Moritz Naumann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Felix Zielcke wrote: > Am Sonntag, den 27.07.2008, 15:07 +0200 schrieb Moritz Naumann: > >> Unfortunately, it doesn't work with 1.96+20080724-2 either: > > I just saw that PATH contains /usr/local before /usr, I always th

Bug#491977: grub-probe fails with "Cannot find a GRUB drive for /dev/dm-N."

2008-07-27 Thread Moritz Naumann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Felix Zielcke wrote: > Please see the message above in the report, The patch from Robert is in > 1.96+20080724-2 not -1 which you have installed. > Ah, my bad. Thanks for the hint, Felix. Unfortunately, it doesn't work with 1.96+20080724-2 either:

Bug#491977: grub-probe fails with "Cannot find a GRUB drive for /dev/dm-N."

2008-07-26 Thread Moritz Naumann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Robert Millan wrote: > [..] Simply run from your build dir: > > ./grub-probe -t device / > ./grub-probe -t device /boot > > Instead of /dev/dm-X, it should print /dev/md0 or /dev/md2. While this worked, installing the new grub-common package (

Bug#491977: grub-probe fails with "Cannot find a GRUB drive for /dev/dm-N."

2008-07-25 Thread Moritz Naumann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Robert Millan wrote: > [..] Simply run from your build dir: > > ./grub-probe -t device / > ./grub-probe -t device /boot > > Instead of /dev/dm-X, it should print /dev/md0 or /dev/md2. It does :-) : debby:~/grub2-1.96+20080704# ./grub-probe -t

Bug#491977: grub-probe fails with "Cannot find a GRUB drive for /dev/dm-N."

2008-07-23 Thread Moritz Naumann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Felix Zielcke wrote: > ./configure; make install installs everything to /usr/local not /usr > and /usr is before /usr/local in PATH > update-grub is just a bash script which invokes some commands I realized this, thanks for making me aware though. I

Bug#491977: grub-probe fails with "Cannot find a GRUB drive for /dev/dm-N."

2008-07-23 Thread Moritz Naumann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Robert Millan wrote: > Does this patch (for grub-common) fix the problem? While the patch applies fine and I can compile using "./configure; make", I cannot rebuild the deb using debuild: > debby:~/grub2-1.96+20080704# export LANG=en_US.UTF-8 > deb

Bug#491977: grub-probe fails with "Cannot find a GRUB drive for /dev/dm-N."

2008-07-22 Thread Moritz Naumann
Package: grub Version: 0.97-41 Severity: important I'm unable to install any linux (kernel) security updates or any other kernels at all. Whenever I try to installa new kernel image (and thus run update-grub) I get this: > Running postinst hook script /usr/sbin/update-grub. > Searching for GRUB i

Bug#491917: emdebian-tools: PHP local file inclusion

2008-07-22 Thread Moritz Naumann
Package: emdebian-tools Severity: grave Tags: security I'm not providing additional technical information or ways to reproduce this issue since - while a patch is available - I cannot verify whether or not there are other vulnerable installations out there. Please feel free to get in touch with

Bug#487923: login freezes in multiuser mode with valid credentials (nis+nfs)

2008-06-25 Thread Moritz Naumann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 This appears have been caused by a local routing issue. Still, it would be nice to have a timeout occur there and to possibly inform the user about the source of this issue (unless this introduces a vulnerability). -BEGIN PGP SIGNATURE- Versi

Bug#487923: login freezes in multiuser mode with valid credentials (nis+nfs)

2008-06-25 Thread Moritz Naumann
Package: login Version: 1:4.0.18.1-7 Severity: important Filing this bug against login is a pure guess, I just don't know any better - sorry. I'm having trouble logging into this system which uses NIS and NFS shares. When I attempt to authenticate with incorrect credentials behavior is as expect

Bug#486252: flashplugin-nonfree: should not depend on people.debian.org

2008-06-14 Thread Moritz Naumann
Package: flashplugin-nonfree Version: 1:1.5 Severity: normal flashplugin-nonfree depends on the availability of people.debian.org, however, no Debian package should depend on availability of this server. Actually, no installation or removal scripts should depend on availability of any server, but

Bug#486228: flashplugin-nonfree: Purge doesn't work

2008-06-14 Thread Moritz Naumann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Same problem here. This is because the prerm script attempts to download files from http://people.debian.org (using wget), which is not currently available, and fails to generate a timeout. Which leads to the question: why does a removal script nee

Bug#481236: grub-probe: error: /boot/grub/device.map:2: Duplicated entry found

2008-05-16 Thread Moritz Naumann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Robert Millan wrote: > On Wed, May 14, 2008 at 08:06:50PM +0200, Moritz Naumann wrote: >> Package: grub >> Version: 0.97-38 >> Severity: normal >> >> When running update-grub, I have this output: >>

Bug#481236: grub-probe: error: /boot/grub/device.map:2: Duplicated entry found

2008-05-14 Thread Moritz Naumann
Package: grub Version: 0.97-38 Severity: normal When running update-grub, I have this output: # update-grub Searching for GRUB installation directory ... found: /boot/grub grub-probe: error: /boot/grub/device.map:2: Duplicated entry found # This did not happen with older versions of grub-legacy

Bug#479723: php 5.2.6 Security Fixes

2008-05-06 Thread Moritz Naumann
Package: php5 Version: 5.2.0-8+etch10 Tags: security, upstream, fixed-upstream, etch, lenny http://www.php.net/ChangeLog-5.php lists several security fixes which are included in upstream PHP 5.2.6: * Fixed possible stack buffer overflow in FastCGI SAPI. (Andrei Nigmatulin) --> CVE-2008

Bug#475129: closed by Bart Martens (flashplugin-nonfree: Fails to install latest Adobe security update(9.0.124.0))

2008-04-11 Thread Moritz Naumann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Sorry for the broken formatting of my last email. Bart Martens wrote: > Does this work ? > > man update-flashplugin-nonfree yes > update-flashplugin-nonfree --install yes Unfortunately, I was not aware of the update-flashplugin-nonfree script. I

Bug#475129: closed by Bart Martens (flashplugin-nonfree: Fails to install latest Adobe security update(9.0.124.0))

2008-04-11 Thread Moritz Naumann
<[EMAIL PROTECTED]> <[EMAIL PROTECTED]> Message-ID: <[EMAIL PROTECTED]> X-Sender: [EMAIL PROTECTED] Received: from janus.zertificon.com [213.23.92.1] with HTTP/1.1 (POST); Fri, 11 Apr 2008 09:55:58 + User-Agent: freeIT.org Webmail Content-Type: text/plain; charset="UTF-8" Content-Transf

Bug#475129: flashplugin-nonfree: Fails to install latest Adobe security update (9.0.124.0)

2008-04-09 Thread Moritz Naumann
Package: flashplugin-nonfree Version: 1:1.4~bpo40+1 Severity: grave Tags: security Justification: user security hole Adobe has released v9.0.124.0 which is supposed to provide fixes for CVE-2007-5275 CVE-2007-6243 CVE-2007-6637 CVE-2007-6019 CVE-2007-0071 CVE-2008-1655 CVE-2008-1654 http://www.a

Bug#474507: bitlbee: Please remove default passwords

2008-04-06 Thread Moritz Naumann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 I apparently misunderstood the format pof this config file. The line ## Comments are marked like this. The rest of the file is INI-style. combined with other lines such as # OperPassword = ChangeMe! made me think that lines starting with just a

Bug#471525: iceweasel: authentication confirmation prompt asks whether user wishes to visit site $USERNAME

2008-03-18 Thread Moritz Naumann
Package: iceweasel Version: 2.0.0.12-0etch1 Severity: normal It appears that in some or all cases, the confirmation prompt window which is displayed when a user connects to a URL containing a username (and optional password) in the form of http://USER[:[EMAIL PROTECTED]/, will display a questio

Bug#443946: Please add add entries to inetd, procdel whitelists

2007-09-24 Thread Moritz Naumann
Package: rkhunter Version: 1.3.0-1 Severity: wishlist Please add the following to the commented out INETD_ALLOWED_SVC section in the config file: #INETD_ALLOWED_SVC=/usr/sbin/tcpd tcpd is used by some Debian packages, such as bitlbee. Also, please add these entries to the ALLOWPROCDELFILE sectio

Bug#443945: Minor fixes/improvements to documentation

2007-09-24 Thread Moritz Naumann
Package: rkhunter Version: 1.3.0-1 Severity: minor Missing letter 't' in README.Debian at position 34,48. In the same file, at position 35,6, there is a reference to a file named /var/lib/rkhunter/db/rkhunter.db. This file is actually called /var/lib/rkhunter/db/rkhunter.dat. rkhunter also suppo

Bug#443943: file system checks should not report files created by rkhunte

2007-09-24 Thread Moritz Naumann
Package: rkhunter Version: 1.3.0-1 Severity: normal rkhunter reports: [04:00:02] Performing filesystem checks [04:00:02] Info: Starting test name 'filesystem' [04:00:02] Info: SCAN_MODE_DEV set to 'THOROUGH' [04:00:47] Checking /dev for suspicious file types [ Warning ] [04:00:47] Warnin

Bug#443942: Dependencies: please suggest tripwire; recommend wget|curl|links|elinks|lynx

2007-09-24 Thread Moritz Naumann
Package: rkhunter Version: 1.3.0-1 Severity: wishlist rkhunter supports running tripwire (check for "software intrusions") and so the package should suggest it. In addition to supporting wget (as mentioned in README.Debian) it also supports curl, links, elinks and lynx, according to upstreams' RE

Bug#443941: rkhunter: "--list languages" should default to english language

2007-09-24 Thread Moritz Naumann
Package: rkhunter Version: 1.3.0-1 Severity: normal Tags: l10n Not having run rkhunter before, I edited the config file and set it to use 'de' as locale (which does not yet exist). $ rkhunter --propupd The language specified is not available: de Use the '--list languages' option to see the list o

Bug#425299: bigmem vserver kernel images

2007-09-22 Thread Moritz Naumann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi, I'd like to second this. It may be worth replacing the current stock vserver <=4GB kernel images by bigmem ones, so the maintenance work remains more or less the same as now. I think systems in the need of both vserver and bigmem support are not

Bug#442180: d-i preseed method allows for remote cmd exec. in combination with DNS hijacking

2007-09-13 Thread Moritz Naumann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Package: win32-loader Version: 0.6.0~pre3 Severity: critical Tags: security Justification: root security hole The default boot option used by this package contains the following: preseed/url=http://goodbye-microsoft.com/runtime/preseed.cfg As seen

Bug#413790: SILC Toolkit 1.1.1 released

2007-06-25 Thread Moritz Naumann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 SILC Toolkit 1.1.1 has just been released, containing fixes for "over 20 bugs, most of them security fixes", compared to 1.1.0. It would be very nice to have a usable package crafted from any mantained upstream branch at some point. Thanks for putti

Bug#413790: New version

2007-04-06 Thread Moritz Naumann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 An upgrade would indeed be nice and somewhat neccessary. There have been a lot of changes: http://silcnet.org/docs/changelog/SILC%20Toolkit%201.0.2 Release notes for 1.0.2 (it says '1.0.1' which is incorrect): http://silcnet.org/docs/release/SILC%2

Bug#349540: Update?

2007-03-08 Thread Moritz Naumann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, are there any news on this? Thomas, did you get around to sort out the assumed licensing issue? jacORB 2.3.0 has been released on Feb 17th 2007, maybe it's worth giving it another look? http://www.jacorb.org/releases/2.3.0/REL_NOTES Thanks in a

Bug#409870: nvidia-kernel-legacy-2.6.18-3-486: Please extend description

2007-02-05 Thread Moritz Naumann
Package: nvidia-kernel-legacy-2.6.18-3-486 Version: 1.0.7184+5 Severity: wishlist Currently, the legacy versions of the binary kernel modules use exactly the same package description as the current packages. As such, it's not possible to determine the difference between the legacy and non-legacy v

Bug#391458: logcheck: Please provide a way to configure niceness of log scanning process

2006-10-06 Thread Moritz Naumann
Package: logcheck Version: 1.2.47 Severity: wishlist I'm running logcheck with an extended set of regular expressions on a desktop system. The CPU load of this system is normally very low, around 3%-5%. When logcheck starts scanning the logs, the CPU usage increases to 100% for several minutes and

Bug#295560: logcheck: Broken patch?

2006-09-23 Thread Moritz Naumann
Package: logcheck Version: 1.2.47 Followup-For: Bug #295560 This patch does not work for me in 1.2.47. Here's a (quick and dirty) way to determine the line number of a broken regular expression in a logcheck rule file. It doesn't solve the problem of not so useful output on cron jobs, though. #!

Bug#388040: qa.debian.org: HTML/Client side script injections (XSS) in "advanced [PTS] subscription" script

2006-09-18 Thread Moritz Naumann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi Thijs, Thijs Kinkhorst wrote: > I don't think this is in any way an issue, even not with "normal" > severity. in my opinion, it remains a bug for the reasons given below. Personally, I don't really care whether or not it's changed/fixed, though.

Bug#388040: qa.debian.org: HTML/Client side script injections (XSS) in "advanced [PTS] subscription" script

2006-09-18 Thread Moritz Naumann
Package: qa.debian.org Severity: normal The following URLs demonstrate that it is possible to inject client side script (such as Javascript) and HTML tags into the HTML form (1) and error message (2) output generated by the "advanced [PTS] subscription" script. (1) http://packages.qa.debian.org

Bug#386292: /usr/bin/mysql_upgrade: unknown variable 'host=localhost'

2006-09-06 Thread Moritz Naumann
Package: mysql-server-5.0 Version: 5.0.24-3 Severity: normal When Mysql starts up, it reports: /etc/mysql/debian-start[575]: /usr/bin/mysql_upgrade: unknown variable 'host=localhost' This variable is found in /etc/mysql/debian.cnf: # Automatically generated for Debian scripts. DO NOT TOUCH! [clie

Bug#188433: Upstream won't fix?

2006-09-06 Thread Moritz Naumann
According to the timeline of http://bugzilla.gnome.org/show_bug.cgi?id=126468 and the mention of this bug in the "past notes on improvement" section on http://www.gnome.org/projects/gconf/plans.html upstream has not been unable to, not sufficiently interested in or discarded plans to fix this i

Bug#354683: PHP 4.3.10-16 (sarge) remains vulnerable to CVE-2006-0207

2006-08-14 Thread Moritz Naumann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi! http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=354683;msg=19 and http://idssi.enyo.de/tracker/CVE-2006-0207 claim CVE-2006-0207 would not apply to sarges' 4.3.10-16. However, it does apply. The false assumption that the advisory by Stefan Esser

Bug#364680: Patched in Firefox

2006-07-10 Thread Moritz Naumann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi Alex, this was just patched in Firefox, see Bug#371153. You were planning to look into why SSL2 has not been disabled in the 1.5 series upstream. Have you been able to research this, yet? Thanks, Moritz -BEGIN PGP SIGNATURE- Version: GnuPG

Bug#376395: harden-doc: Broken link: chapter 7.1, last but one paragraph

2006-07-02 Thread Moritz Naumann
Package: harden-doc Severity: minor I just came across a broken link in the 'Securing Debian' manual at http://www.debian.org/doc/manuals/securing-debian-howto/ch7.en.html#s-debian-sec-team Chapter 7.1, last but one paragraph, contains this broken link: debian-security-announce Obviously the pr

Bug#370175: qa.debian.org: Search function/redirection may cause unexpected results

2006-06-03 Thread Moritz Naumann
Package: qa.debian.org Severity: minor The search / redirection http://packages.qa.debian.org/common/index.html points to may provide unexpected results in some cases. For example, put a single dot into the search box and submit the search. http://packages.qa.debian.org/common/index.html?src=.

Bug#361138: stable: vulnerable, oldstable: not affected

2006-06-02 Thread Moritz Naumann
The vulnerable lines and the developers' counter measure can be inspected at http://mantisbt.cvs.sourceforge.net/mantisbt/mantisbt/view_all_set.php?r1=1.60&r2=1.61 The package state is as follows: STABLE The package in Debian stable is currently at version 0.19.2-5sarge2: http://packages.debia

Bug#369745: README.Debian: Typo in IPv6 issue workaround

2006-05-31 Thread Moritz Naumann
Package: proftpd Version: 1.3.0-8 Severity: minor In cases where the IPv6 getaddrinfo 'your_host_name' error: Name or service not known error occurs, README.Debian suggests editing /etc/hosts and, in case of a statically assigned IP address, to add an IPv4 mapped IPv6 address [1]

Bug#307575: Technical background

2006-05-20 Thread Moritz Naumann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Florian Weimer wrote: > The whitepaper you referenced describes a vulnerability in web > proxies. The sqwebmail vulnerability could be used to exploit it, but > then you could also direct the victim to a completely rogue web server > under your contro

Bug#307575: Technical background

2006-05-20 Thread Moritz Naumann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Here's a whitepaper on this issue, called HTTP Response Splitting, in case you're interested in the backgrounds. http://www.packetstormsecurity.org/papers/general/whitepaper_httpresponse.pdf The code quoted above makes me, too, think this needs to be

Bug#367545: metche: Ignores debconf input for location of single file changelog

2006-05-16 Thread Moritz Naumann
Package: metche Severity: normal When setting up metche using debconf for the first time (and only then, it seems), selecting 'single changelog file' and providing a custom changelog location, this location is not written to /etc/metche.conf. Insetad, the default value of CHANGELOG_FILE="/root/Ch

Bug#364680: thunderbird: SSL v2 encryption is insecure, should be disabled by default

2006-04-25 Thread Moritz Naumann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Alexander Sack - Debian Bugmail wrote: > yes, a security issue but not a blocker IMO. I agree. I'm still in the process of getting acquainted with the Debian BTS. > Anyway, I will do some > research on this. I don't remember exactly why mozilla deci

Bug#364680: thunderbird: SSL v2 encryption is insecure, should be disabled by default

2006-04-24 Thread Moritz Naumann
Package: thunderbird Version: 1.5-4 Severity: grave Tags: security Justification: user security hole SSL v2 encryption is been considered insecure because of design flaws and weak ciphers [1], as such security.enable_ssl2 = false should be set by default. However, currently this package accepts S

Bug#179896: Any updates?

2006-04-23 Thread Moritz Naumann
This bug is rather old by now, is it still relevant? Unfortunately, Internet Explorer 5.5 is still used by a notable amount (~3%) of users, some of which may be badly maintained internet cafes, so it may still be relevant. Seemingly the many unpatched flaws in IE v5.x and 6.x have still not convin

Bug#364450: courier-imap-ssl: TLS/SSL session caching conflicts with widespread MUAs

2006-04-23 Thread Moritz Naumann
Package: courier-imap-ssl Version: 3.0.8-13 Severity: normal TLS/SSL session caching, an experimental feature, is activated by default. It causes issues with Mozilla Thunderbird MUA v1.0.7 and v1.5.x, if the client uses SSL connection and 'Maximum number of server connections' set set to a value

Bug#364298: bamboo: URL anchors are lost during authentication

2006-04-22 Thread Moritz Naumann
Package: bamboo Severity: minor Anchors contained in URLs are lost when authentication is required to view the related page. For example, if an URL such as http://my.host/view/protected/page/#anchor1 is clicked on, and this points at a view protected page which requires you to login first, t

Bug#359904: Erm

2006-03-29 Thread Moritz Naumann
Did I say "Please mark this a duplicate of 359905 and close."? Of course, I meant "Please mark this a duplicate of 359906 and close". I did not *mean to* destroy your day. /me looking for a good place to hide away. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". T

Bug#359904: Duplicate reports

2006-03-29 Thread Moritz Naumann
I'm sorry for this. Please mark this a duplicate of 359905 and close. Thanks. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Bug#359912: Security: Binary safety issue in html_entity_decode() may leak memory

2006-03-29 Thread Moritz Naumann
Package: php5 Version: 5:5.1.2-1 Severity: grave Tags: security Justification: user security hole A security issue in PHP has been reported which may allow for disclosing partial working memory contents on some PHP applications. Quoting Stefan Esser: > The bug is a binary safety issue in html_ent

Bug#359907: Duplicate report

2006-03-29 Thread Moritz Naumann
I'm sorry for this. Please mark this a duplicate of 359906 and close. I will file a seperate bug against the php5 package. Thanks. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Bug#359907: Security: Binary safety issue in html_entity_decode() may leak memory

2006-03-29 Thread Moritz Naumann
Package: php4 Version: 5:5.1.2-1 Severity: grave Tags: security Justification: user security hole A security issue in PHP has been reported which may allow for disclosing partial working memory contents on some PHP applications. Quoting Stefan Esser: > The bug is a binary safety issue in html_ent

Bug#359906: Security: Binary safety issue in html_entity_decode() may leak memory

2006-03-29 Thread Moritz Naumann
Package: php4 Version: 4:4.4.2-1 Severity: grave Tags: security Justification: user security hole A security issue in PHP has been reported which may allow for disclosing partial working memory contents on some PHP applications. Quoting Stefan Esser: > The bug is a binary safety issue in html_ent

Bug#359904: Security: Binary safety issue in html_entity_decode() may leak memory

2006-03-29 Thread Moritz Naumann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Package: php4 Version: 4:4.4.2-1 Severity: grave Tags: security Justification: user security hole A security issue in PHP has been reported which may allow for disclosing partial working memory contents on some PHP applications. Quoting Stefan Esser:

Bug#357373: Broken signature in magic.mime (libmagic1 4.17-1)

2006-03-27 Thread Moritz Naumann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Unfortunately, the magic.mime bug stops several other packages from working correctly. In combination with a default syscp setup it results in a mail flooded inbox due to cronjobs running every 5 mins. A workaround is provided at: http://forum.lightt

Bug#357373: Broken signature in magic.mime (libmagic1 4.17-1)

2006-03-27 Thread Moritz Naumann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Unfortunately, the magic.mime bug stops several other packages from working correctly. In combination with a default syscp setup it results in a mail flooded inbox due to cronjobs running every 5 mins. A workaround is provided at: http://forum.lightt

Bug#335977: tor: daemon dies silently

2006-01-23 Thread Moritz Naumann
Peter Palfrader schrieb: > > Is Tor 0.1.0.16 still broken with your openssl? What about 0.1.1.x? > Did we ever change anything with that or did the problem go away? Hi Peter, I'm currently using Tor 0.1.0.16-1 and openssl 0.9.8a-5. Tor works fine for me. It felt like the problem faded away slow

Bug#318712: tattle.pl

2006-01-07 Thread Moritz Naumann
Please note that there have been security issues in tattle versions before 0.3.0 as reported by b0iler on Bugtraq [1]. An updated release of tattle which fixes this issue is available on the new website [2] of its developer, Mr. C.J. Steele. Though much has been improved since the initial release

Bug#342378: file-roller: Sets incorrect passwords on .zip

2005-12-07 Thread Moritz Naumann
Package: file-roller Version: 2.10.4-2 Severity: important File-roller seems to incorrectly set passwords on .zip files. While I can set a password using file-roller and create a password protected archive just fine, and can also extract files from this archive fine using file-roller (after res

Bug#335977: tor: daemon dies silently

2005-11-08 Thread Moritz Naumann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi again, a friend has investigated this further and sent me this report: > __malloc_initialize_hook should probably not be called - which would > mean that there is something wrong with libcrypto.so. > > If you look at > int EVP_CIPHER_CTX_cleanup(

Bug#337047: gobby: valgrind output

2005-11-04 Thread Moritz Naumann
Package: gobby Version: 0.2.2-2 Followup-For: Bug #337047 I'm running into the same problem. Here's the (stripped down) output when running it under valgrind: $ valgrind --leak-check=full gobby >valgrind.log 2>&1 [..] ==10948== Using valgrind-2.4.0, a program supervision framework for x86-linux.

Bug#335977: tor: daemon dies silently

2005-10-29 Thread Moritz Naumann
Peter Palfrader schrieb: > Please install the tor-dbg to your tor binary package as well and send > us a backtrace. see below. > Is there anything interesting in the log? Nothing at all. > What was the previous version > which worked fine for you? Hmm, I wouldn't know how to determine the vers

Bug#307798: apache: Could this be escalated, please?

2005-10-27 Thread Moritz Naumann
Package: apache Followup-For: Bug #307798 Hi, it's a pity that this problem persists, as it breaks functionality of many common web applications, and does not match expected behaviour. This also seems to be an easily fixable bug. I propose to keep the 'icons' alias as it it, but to comment out

Bug#335977: tor: daemon dies silently

2005-10-26 Thread Moritz Naumann
Package: tor Version: 0.1.0.15-1.0.1 Severity: important Tor dies silently, sometimes at startup, sometimes after a few seconds or minutes of using it. This started after upgrading to 0.1.0.15-1.0.1. I can provide a core dump, how should I send it? Gzip + attach? -- System Information: Debian Re

Bug#243938: Existing packages

2005-08-22 Thread Moritz Naumann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi! I just realized there are already (inofficial) rkhunter packages. It took some time to find them, so you may have missed them, too. http://julien.valroff.free.fr/#main or http://kirya.net/~julien/wiki/doku.php?id=freesoftware:debianpackages Ju

Bug#291258: gtfp chmod function broken in gftp 2.0.18rc1

2005-01-19 Thread Moritz Naumann
Distribution: Debian 3.1 Package: gftp Severity: normal Version: GNOME2.8.1 2.0.18 Gnome-Distributor: Debian Synopsis: gtfp chmod function broken in gftp 2.0.18rc1 Bugzilla-Product: gftp Bugzilla-Component: general Bugzilla-Version: 2.0.18 Description: Description of Problem: It's impossible to chm