Bug#308818: not able to use ~ as $HOME

2005-05-12 Thread Martin Schulze
Nico Golde wrote: > Package: screen > Version: 4.0.2-4.1 > Severity: wishlist > Tags: patch > Hi, > screen isn't able to handle ~/ if you want to load a > configuration file via source in the command line. > I hate this because it is short and good :) > However, I attached a patch which fixes this.

Bug#308818: not able to use ~ as $HOME

2005-05-13 Thread Martin Schulze
Nico Golde wrote: > > Nico Golde wrote: > > > Package: screen > > > Version: 4.0.2-4.1 > > > Severity: wishlist > > > Tags: patch > > > Hi, > > > screen isn't able to handle ~/ if you want to load a > > > configuration file via source in the command line. > > > I hate this because it is short and g

Bug#308972: Description is wrong

2005-05-13 Thread Martin Schulze
Package: gimp-svg Version: 2.2.7-1 According to the Depends: line the Description: line is wrong: Version: 2.2.7-1 Depends: gimp (= 2.2.7-1), libatk1.0-0 (>= 1.7.2), [..] ^^^ Description: SVG plugin for The GIMP, stable version 2.0

Bug#309949: gv is lying about --grayscale

2005-05-20 Thread Martin Schulze
Package: gv Version: 1:3.6.1-10 Something is very wrong here: [..] gv: unrecognized option `--grayscale' Usage: gv [OPTION]... [FILE] PostScript and PDF viewer. --monochrome display document using only black and white --grayscaledisplay document without colors [.

Bug#290242: prozilla in woody

2005-05-21 Thread Martin Schulze
Andrew Donnellan wrote: > reopen 290242 > thanks > > I'm reopening this bug because prozilla is still in woody, and Martin > 'Joey' Schulze is preparing 3.0r6, which, from what he's told me, will > still have prozilla in it. This should not happen. In my opinion, > prozilla is either patched or re

Bug#292759: shell script sniplets in /usr/bin?

2005-01-31 Thread Martin Schulze
Adrian von Bidder wrote: > > You wouldn't need to change "every" script - you just need to move > > gettext.sh to /usr/share/gettext/scripts and create /usr/bin/gettext.sh > > with the content Sean suggested. > > Which buys us what? > > This new gettext.sh would still be a non-executable script s

Bug#292370: CAN-2004-1388

2005-01-31 Thread Martin Schulze
This problem has been assigned Candidate: CAN-2004-1388 URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1388 Reference: BUGTRAQ:20050126 DMA[2005-0125a] - 'berlios gpsd format string vulnerability' Reference: URL:http://marc.theaimsgroup.com/?l=bugtraq&m=110677341711505&w=2 Reference

Bug#293418: CAN-2005-0198: Authentication bypass

2005-02-02 Thread Martin Schulze
Package: uw-imap Version: 2002edebian1-5 Severity: grave Tags: security sarge sid patch A vulnerability was discovered in the CRAM-MD5 authentication in UW-IMAP where, on the fourth failed authentication attempt, a user would be able to access the IMAP server regardless. This problem exists only

Bug#293754: kleopatra does not install

2005-02-05 Thread Martin Schulze
Package: kleopatra Version: 3.3.1-3 Tags: sid sarge Severity: serious The package should at least be installable when it is in the Debian archive, even if it is a contrib package. # apt-get install kleopatra Reading Package Lists... Done Building Dependency Tree... Done Some packages could not be

Bug#305605: CAN-2005-0718: remote DoS in Squid -- any progress?

2005-04-29 Thread Martin Schulze
Christian Hammers wrote: > Hello > > The bug has been reported more than a week ago and the last status from > the same date is that the Woody package is beeing investigated. > > Are there any news regarding the vulnerability status of the Woody > package or the preparation of a DSA? Luigi is ta

Bug#305605: CAN-2005-0718: remote DoS in Squid -- any progress?

2005-04-29 Thread Martin Schulze
Christian Hammers wrote: > On Fri, Apr 29, 2005 at 02:56:38PM +0200, Martin Schulze wrote: > > > Are there any news regarding the vulnerability status of the Woody > > > package or the preparation of a DSA? > > > > Luigi is taking a look. It's not yet clea

Bug#307256: apt-rpm-repository: Description improvement

2005-05-01 Thread Martin Schulze
Package: apt-rpm-repository Version: current Severity: minor - Description: tools to create APT RPM repository + Description: Tools to create an APT RPM repository ^^ Regards, Joey -- If nothing changes, everything will remain the same. -- Barne's Law P

Bug#307360: oops: Format string vulnerability in database auth handling (CAN-2005-1121)

2005-05-05 Thread Martin Schulze
Moritz Muehlenhoff wrote: > Package: oops > Severity: grave > Tags: security patch sid woody > Justification: user security hole > > [Cc:ing security@, should affect woody as well] It does. > A format string vulnerability in the auth() function for SQL database > user handling possibly permits e

Bug#299272: Regarding xfree86 and CAN-2005-0609

2005-05-06 Thread Martin Schulze
Branden Robinson wrote: > Hi Joey, > > xfree86's fix for CAN-2005-0609 has not yet been uploaded to > testing/unstable. I expect to make an upload soon, however; the packages > are currently in preparation, and you can view the current status of the > SVN trunk at: > > http://necrotic.deadbeas

Bug#307951: Description leads to broken mail

2005-05-06 Thread Martin Schulze
Package: bsmtpd Version: 2.3pl8b-16 Severity: normal Tags: patch I've just noticed that a leading dot in a line is not only duplicated but tripplicated (sp?) when using bsmtp and postfix in the documented (README.Debian) fashion. Apparenly, Postfix is duplicating the leading dot already, but then

Bug#299516: nufw: Description improvement

2005-03-14 Thread Martin Schulze
Package: nufw Version: current Severity: minor - Description: a per-user firewalling daemon that interfers with libipq + Description: Per-user firewalling daemon that interferes with libipq ^ Spelling error. I'd capitalise the beginning as

Bug#299517: lkl: Description improvement

2005-03-14 Thread Martin Schulze
Package: lkl Version: current Severity: minor - Description: userspace keylogger for x86 architechture + Description: Userspace keylogger for x86 architecture ^ Spelling problem (I'd use a capital U as well, but that's debatable). Regards,

Bug#298039: Fixes

2005-03-18 Thread Martin Schulze
.17.0/debian/changelog @@ -1,3 +1,14 @@ +xli (1.17.0-11woody1) stable-security; urgency=high + + * Non-maintainer upload by the Security Team + * Applied patch from DSA 069 to fix buffer overflow in faces decoder +[faces.c, CAN-2001-0775] + + -- Martin Schulze <[EMAIL PROTECTED]> Fri, 18

Bug#296674: [CAN-2004-0957] i believe this patch should do it...

2005-03-18 Thread Martin Schulze
sean finney wrote: > On Fri, Mar 11, 2005 at 09:39:10AM +0100, Christian Hammers wrote: > > Wasn't it the one where a privilege granted to "table_name" also grants > > rights on "tableXname", "tableYname" as '_' was considered as something > > like a dot in a RegEx? This should be fairly easy to te

Bug#316590: woody backport now available for all cacti security issues

2005-07-18 Thread Martin Schulze
sean finney wrote: > On Fri, Jul 15, 2005 at 04:15:22PM +0200, Martin Schulze wrote: > > > However, as I don't like the "next week" part too much, I'll try to > > > work on the update on my own and send you the diff for comments. > > > Should redu

Bug#316590: woody backport now available for all cacti security issues

2005-07-18 Thread Martin Schulze
Sean Finney wrote: > hi, > > On Mon, Jul 18, 2005 at 07:21:29PM +0200, Martin Schulze wrote: > > > i'll try and set some time aside tonight or tomorrow to test, but > > > it looks good from an initial glance. > > > > Any outcome? In other words,

Bug#315671: webcalendar unauthorized access

2005-07-18 Thread Martin Schulze
Stephen Gran wrote: > Hello all, Thanks a lot for contacting us. > There is a security bug in webcalendar (#315671 and > http://www.securityfocus.com/bid/14072, for reference). Tim is the > maintainer, but does not yet have a debian account, and cannot upload. > We have a fixed version for sarge

Bug#315703: Bug#316590: woody backport now available for all cacti security issues

2005-07-19 Thread Martin Schulze
Sean Finney wrote: > On Tue, Jul 19, 2005 at 07:54:31AM +0200, Martin Schulze wrote: > > Ok, I'll wait. > > so, a 6 hour plane flight later, i've learned 3 things: > > 1 - there are a number of other variables that also need to be included. > 2 - there are a n

Bug#315671: webcalendar unauthorized access

2005-07-19 Thread Martin Schulze
Stephen Gran wrote: > Hello all, > > There is a security bug in webcalendar (#315671 and > http://www.securityfocus.com/bid/14072, for reference). Tim is the > maintainer, but does not yet have a debian account, and cannot upload. > We have a fixed version for sarge ready (patch attached). I am

Bug#316590: woody backport now available for all cacti security issues

2005-07-23 Thread Martin Schulze
Sean Finney wrote: > this is done now. Thanks a lot. I have reviewed it and will use it for the advisory. Regards, Joey -- Reading is a lost art nowadays. -- Michael Weber -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTEC

Bug#319406: heartbeat: upgrade and reconfigure errors

2005-07-25 Thread Martin Schulze
Horms wrote: > The attached patch should resolve this problem, and I have put > packages that include this patch up at > http://debian.vergenet.net/pending/heartbeat/ > > Joey, what do you want to do about this? We can't do anything about it. All you can do, ant that's what you did already, is p

Bug#110181: half-done

2005-07-27 Thread Martin Schulze
This is half-done. One can edit the CSS file (if one knows enough about CSS and stuff), but upon the next upgrade the changes would be gone since /usr/share/cvsweb/css/cvsweb.css is not a conffile. Hence, if you want to eventually fix and close this bug report, you'll have to move that file into

Bug#301428: smail: Remote and local vulnerabilities can be exploited to obtain root access

2005-03-27 Thread Martin Schulze
Héctor García Álvarez wrote: > El vie, 25-03-2005 a las 21:54 +0100, Moritz Muehlenhoff escribió: > > Package: smail > > Severity: grave > > Tags: security patch > > Justification: user security hole > > > > [Dear security-team, this should affect Woody as well] > > > > Sean <[EMAIL PROTECTED] ha

Bug#301986: gphpedit: Description improvement

2005-03-29 Thread Martin Schulze
Package: gphpedit Version: current Severity: minor - Description: Developemnt environment for PHP/HTML/CSS + Description: Development environment for PHP/HTML/CSS ^^ Regards, Joey -- Testing? What's that? If it compiles, it is good, if it boots up, it is perfect.

Bug#316590: cacti security update, second version available fixing all issues

2005-07-06 Thread Martin Schulze
sean finney wrote: > hi, > > i've prepared a new version which addresses both the previous issues > addressed in sarge0 and the new hardened-php reported issues: > > deb http://people.debian.org/~seanius/cacti/sarge ./ > deb-src http://people.debian.org/~seanius/cacti/sarge ./ > > version: 0.8.6

Bug#248600: Contents file for woody does not contain non-US anymore

2005-07-07 Thread Martin Schulze
Adam D. Barratt wrote: > On Thu, 2004-05-13 at 10:17 +0200, Martin Schulze wrote: > [...] > > James Troup wrote: > > > Martin Schulze <[EMAIL PROTECTED]> writes: > [...] > > > > It seems that the Contents-$arch.gz file for woody does not contain > &g

Bug#309739: woody is still vulnerable to CAN-2005-1544

2005-07-10 Thread Martin Schulze
Jay Berkenbilt wrote: > > Some time ago, a bug was posted about tiff being vulnerable to > CAN-2005-1544: a bug that caused and exploitable segmentation fault on > files with certain bad BitsPerSample values (making it a potential DOS > bug). The fix is already in sarge. I had posted a patch aga

Bug#305142: CAN-2005-2214: insegure apt-setup

2005-07-11 Thread Martin Schulze
severity 305142 important tags 305142 security thanks Is there any motion on this problem? == Candidate: CAN-2005-2214 URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2214 Final-Decision: Interim-Decision: Modified: Proposed: Assigne

Bug#44910: gnupg: should not leasen permissions

2005-07-12 Thread Martin Schulze
Thijs Kinkhorst wrote: > On Tue, July 12, 2005 12:33, Werner Koch wrote: > > On Tue, 12 Jul 2005 10:37:41 +0200, Thijs Kinkhorst said: > > > >> version of GnuPG in Debian (1.4.1-1). I'm wondering what the stance of > >> upstream is on this bug: will or won't it be fixed? > > > > I don't see the pro

Bug#315703: woody backport now available for all cacti security issues

2005-07-13 Thread Martin Schulze
sean finney wrote: > another update, > > the security release for cacti has been delayed due to complications > backporting the security fix into the version in woody, which is a major > release (and rewrite) behind the versions in sarge and sid. > > joey from the security team provided an init

Bug#315703: woody backport now available for all cacti security issues

2005-07-14 Thread Martin Schulze
Sean Finney wrote: > i guess i didn't in the email updating this, but did so in sanitize.php > itself: Yes, I saw that later. I hope, my tone wasn't too harsh. > > Additionally you seem to be using get_request_var only which > > uses the $_GET array, but not the $_REQUEST array, and hence > > ca

Bug#316590: woody backport now available for all cacti security issues

2005-07-15 Thread Martin Schulze
Martin Schulze wrote: > However, as I don't like the "next week" part too much, I'll try to > work on the update on my own and send you the diff for comments. > Should reduce the time you need to spend on the issue as well. Ok, here is an update. Regards,

Bug#297811: proposed fix to allow security support for fai-kernels in sarge (#297811)

2005-04-05 Thread Martin Schulze
Holger Levsen wrote: > Howto handle security fixes for fai-kernels > --- > > fai-kernels uses the kernel-source-2.4.27 and kernel-source-2.6.8 packages. > If these packages get updated with a security fix, fai-kernels needs to be > rebuild. > > The kernel

Bug#297811: proposed fix to allow security support for fai-kernels in sarge (#297811)

2005-04-05 Thread Martin Schulze
Steve Langasek wrote: > - Nothing in the source or binary package names matches the > kernel.*2\.(4\.27|6\.8) regexp that I've been using so far to identify the > kernel packages requiring attention > > I have no knowledge of how important the latter is to the security team; > they may not be both

Bug#303287: tecnoballz: Description improvement

2005-04-05 Thread Martin Schulze
Package: tecnoballz Version: current Severity: minor - Description: Breaking block game proted from the Amiga platform + Description: Breaking block game ported from the Amiga platform ^^ Regards, Joey -- Testing? What's that? If it compiles, it is g

Bug#297811: proposed fix to allow security support for fai-kernels in sarge (#297811)

2005-04-06 Thread Martin Schulze
Holger Levsen wrote: > Hmmm... the only mail address for stable security support on > http://www.debian.org/intro/organization is [EMAIL PROTECTED] - > <[EMAIL PROTECTED]> didnt seem appropriate to me. What's wrong with that address? > Would that have been a better address ? Yes. Regards,

Bug#304228: steam: Description improvement

2005-04-11 Thread Martin Schulze
Package: steam Version: current Severity: minor - Description: environment for cooperative knowledgemanagment + Description: Environment for cooperative knowledge management ^^ ^ (Similar for the other steam-foo packages.) Regards,

Bug#304229: tutos2: Description improvement

2005-04-11 Thread Martin Schulze
Package: tutos2 Version: current Severity: minor - Description: The Ultimate Team Organization Sofware + Description: The Ultimate Team Organization Software ^ Regards, Joey -- If nothing changes, everything will remain the same. -- Bar

Bug#334378: gspot: Description improvement

2005-10-17 Thread Martin Schulze
Package: gspot Version: current Severity: minor - Description: gspot: A GNOME applet to query the Net + Description: A GNOME applet to query the network No need to repeat the package name in the short description of said package. Regards, Joey -- Life is too short to run proprietary s

Bug#334113: CAN-2005-3257 assigned

2005-10-18 Thread Martin Schulze
This one is CAN-2005-3257. Regards, Joey -- Never trust an operating system you don't have source for! Please always Cc to me when replying to me on the lists. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Bug#334450: Review of proposed stable changes

2005-10-25 Thread Martin Schulze
Loic Minier wrote: > Hi, > > I'm willing to do a stable-proposed-updates upload of > libgnomeprint2.2-0 to address #334450. It is an important usability > bug, but I know that important bugs can not always be addressed in > stable. Joey: please check the severity of #334450 and the l

Bug#334450: Review of proposed stable changes

2005-10-25 Thread Martin Schulze
Loic Minier wrote: > Hi, > > On Tue, Oct 25, 2005, Martin Schulze wrote: > > If I understand the problem correctly, for some reason libgnomeprint does > > not use the proper lpr command. However, the patch does not implicate > > the execution location. > &

Bug#334450: Review of proposed stable changes

2005-10-25 Thread Martin Schulze
Loic Minier wrote: > On Tue, Oct 25, 2005, Martin Schulze wrote: > > Please upload a fixed package based on the patch you attached. > > Uploaded. Attached are the relevant interdiff and debdiff. > > I'm afraid the huge debdiff exposes that: > - the Uploaders

Bug#334450: Review of proposed stable changes

2005-10-25 Thread Martin Schulze
Loic Minier wrote: > On Tue, Oct 25, 2005, Martin Schulze wrote: > > BOTH PARTS ARE VERY EASY TO AVOID. > > cp patch foo/debian/patches > > dch -i / emacs debian/changelog > > fine. > > I'm sorry, but please reupload with only the patch you provided in the &g

Bug#334450: Review of proposed stable changes

2005-10-25 Thread Martin Schulze
Loic Minier wrote: > Hi, > > On Tue, Oct 25, 2005, Martin Schulze wrote: > > That should be followed by dpkg-source -b, of course. > > Ok, I didn't knew about that, and it offered a shorter debdiff at the > end indeed. I did: That looks a lot better. T

Bug#327722: Patch for Gopher bug CAN-2005-2772

2005-09-28 Thread Martin Schulze
Steve Kemp wrote: > On Mon, Sep 26, 2005 at 09:23:16AM -0500, John Goerzen wrote: > > > > Attached are the patches that Joey (Schulze) approved. > > > > Can you (or Joey) comment: did you use a different patch because you > > believe mine to be insecure, or for a different reason? (That's an >

Bug#328458: heartbeat-1.2.3-9sarge4 for 3.1r1

2005-09-30 Thread Martin Schulze
Steve Feehan wrote: > On Wed, Sep 28, 2005 at 03:34:22PM +0900, Horms wrote: > > Hi Martin, > > > I have prepared packages that include this fix, from upstream, > > and no other changes, and you can find them at > > http://packages.vergenet.net/sarge-proposed-updates/heartbeat/ > > > > Steve, ca

Bug#321927: Ubuntu patch for unzip CAN-2005-2475 (fwd)

2005-10-02 Thread Martin Schulze
Santiago Vila wrote: > Christian, I received this patch from Ubuntu, so if I'm not mistaken, > there are now three different ways to fix this bug (two of them from > discussions that were not cc:ed to the Debian BTS), but so far none of > these patches have been "blessed" by upstream (i.e. you). >

Bug#318420: Ubuntu patch for net-snmp CAN-2005-2177

2005-10-02 Thread Martin Schulze
Martin Pitt wrote: > The bug description is quite vague, but I believe it aims at this bug: > > > http://sourceforge.net/tracker/index.php?func=detail&aid=1207023&group_id=12694&atid=112694 > > which is fixed in > > > http://cvs.sourceforge.net/viewcvs.py/net-snmp/net-snmp/snmplib/snmp_api

Bug#332259: spampd fails with 'Error in process_request': Modification of read-only variable in Syslog.pm

2005-10-06 Thread Martin Schulze
Sven Mueller wrote: > I created a fixed package (actually two: one for sid/etch and one for > sarge), available at https://mail.incase.de/spampd/sarge-security/ > respectively at https://mail.incase.de/spampd/sid/ (until my sponsor > finds the time to upload the latter to sid). Personally, I'm indi

Bug#329156: gnome-pty-helper foo

2005-10-06 Thread Martin Schulze
Could somebody explain the security implication for me? being able to write arbitrary strings into valid records without overwriting any other data in utmp/wtmp can hardly be classified as a security vulnerability. (Apart from that, I'm only slightly annoyed as I had to learn about this via MITRE

Bug#332434: storebackup: Several security problems (already fixed in sid/testing)

2005-10-07 Thread Martin Schulze
Arthur Korn wrote: > Hi > > 1.19-1 source and binary packages work on stable, and the > differences to 1.18.4-2 are all local bugfixes, so I figure it > doesn't make any sense to separate bugfixes from bugfixes for a > special security fix for stable. Well, we could split out Since the diff betwe

Bug#332434: storebackup: Several security problems (already fixed in sid/testing)

2005-10-07 Thread Martin Schulze
Moritz Muehlenhoff wrote: > > 1.19-1 source and binary packages work on stable, and the > > differences to 1.18.4-2 are all local bugfixes, so I figure it > > doesn't make any sense to separate bugfixes from bugfixes for a > > special security fix for stable. Well, we could split out > > storeBacku

Bug#329156: gnome-pty-helper foo

2005-10-07 Thread Martin Schulze
severity 329156 normal thanks dude Loïc Minier wrote: > Hi, > > On Fri, Oct 07, 2005, Martin Schulze wrote: > > Could somebody explain the security implication for me? > > You can record in the utmp/wtmp logs something which is wrong, for > example that an use

Bug#332434: storebackup: Several security problems (already fixed in sid/testing)

2005-10-07 Thread Martin Schulze
Moritz Muehlenhoff wrote: > Sounds correct, my manpage says: > -h, --no-dereference > affect each symbolic link instead of any referenced file (useful only on > systems that can change the ownership of a symlink) > > However, I think that this hunk is missing for CAN-2005-3148: > > diff -

Bug#329156: gnome-pty-helper foo

2005-10-07 Thread Martin Schulze
Loïc Minier wrote: > Hi, > > On Fri, Oct 07, 2005, Martin Schulze wrote: > > severity 329156 normal > > thanks dude > > You didn't Cc: control, I've bounced it to control. I usually use Bcc for that, so that group replies don't annoy our co

Bug#315957: Info

2005-09-09 Thread Martin Schulze
FWIW: I've just tried to install, reinstall and upgrade apache-ssl inside a sarge chroot environment and the package didn't show problem. So maybe this bug is indeed due to the many virtual hosts. Michael should debug the postinst script, e.g. by executing it with "sh -x" or by creative glancing

Bug#310327: patch

2005-09-10 Thread Martin Schulze
Aníbal Monsalve Salazar wrote: > >Upon investigation of this problem I noticed that ssmtp (oldstable > >and stable) always strips the last line of the input before sending. > > > >gluck!joey(pts/4):~> seq 1 10|sendmail [EMAIL PROTECTED] > > > >--> 1..9 > > > >gluck!joey(pts/4):~> echo seq 1 10|send

Bug#328275: www.debian.org: debian-faq seems outdated

2005-09-14 Thread Martin Schulze
Javier Fernández-Sanguino Peña wrote: > > The page on http://www.debian.org/doc/manuals/debian-faq/index.en.html > > says: "version CVS, 14 February 2003". However, the current doc-debian > > package ships "version 3.1.2, 9 June 2005". Is the debian-faq on the > > web really as outdated as it see

Bug#328275: www.debian.org: debian-faq seems outdated

2005-09-14 Thread Martin Schulze
Javier Fernández-Sanguino Peña wrote: > On Wed, Sep 14, 2005 at 04:44:33PM +0200, Joost van Baal wrote: > > Package: www.debian.org > > Severity: normal > > > > Hi, > > > > The page on http://www.debian.org/doc/manuals/debian-faq/index.en.html > > says: "version CVS, 14 February 2003". However,

Bug#318946: User expectations and shorewall

2005-09-15 Thread Martin Schulze
Florian Weimer wrote: > >> (Note that I have yet to test Lorenzo's new package.) > > > > Are you in a position to do so? > > Sure, but the question is if you want to rely on the results. You > don't seem to trust my judgement on this matter, for reasons I don't > know. I simply did not understan

Bug#318946: User expectations and shorewall

2005-09-16 Thread Martin Schulze
Lorenzo Martignoni wrote: > > If you can, please build an updated package, based on the version in > > sarge and woody if that's needed as well, and place them on a .debian.org > > host. > > I already have a fixed package. I only need to add the CVE ID. > > On which host of .debian.org should I u

Bug#328626: Sarge update for loop-aes-utils (CAN-2005-2876)

2005-09-16 Thread Martin Schulze
Max Vozeler wrote: > Hi security team, > > the loop-aes-utils package in sarge is affected by CAN-2005-2876 > (#328626). I've prepared a stable-security upload of 2.12p-4sarge1 > with a fix backported from 2.12r-pre1: > > http://people.debian.org/~xam/security/loop-aes-utils/ > > This bug will

Bug#319526: MySQL security bug in sarge (CAN-2005-1636)

2005-08-19 Thread Martin Schulze
Christian Hammers wrote: > Hello Security Team > > Are you aware of this bug? The "interdiff" patch are already in the BTS. > > http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=319526 > Applied the upstream patch that fixes a tempfile vulnerability in the > mysqld_install_db script th

Bug#322825: Partial fix

2005-08-19 Thread Martin Schulze
Looks like the redesign of the BTS broke reportbug horribly since it depends on a certain set of URLs and content. As both has been altered, reportbug fails. The fix for the --mbox failure is simple, and indeed attached to this message. The fix for the 'No report available' problem is more diffi

Bug#322133: CAN-2005-2558: arbitrary binary libraries call execution

2005-08-20 Thread Martin Schulze
sean finney wrote: > hi joey, martin, > > (christian may already be on vacation, so i'll try and field some > responses from what i think is going on) [..] > christian forwarded the bug information to mysql asking for a > clarification (http://bugs.mysql.com/bug.php?id=12575) and we're > waitin

Bug#318463: Proposed update to e2fsprogs for stable

2005-08-22 Thread Martin Schulze
Steve Langasek wrote: > On Sun, Aug 21, 2005 at 11:20:49PM -0400, Theodore Ts'o wrote: > > > I would like to upload the following release to sarge to fix a grave bug > > (#318463), and taking the opportunity to fix a few other potential > > core-dumping inducing bugs. All of these are cherry pick

Bug#322352: pdns and pdns-doc both contain /usr/share/doc-base/pdns (sarge security update version)

2005-08-22 Thread Martin Schulze
Christoph Haas wrote: > On Tue, Aug 16, 2005 at 12:06:48PM +0200, Jeremie Koenig wrote: > > I've not tested anything but I may have found the cause for this > > problem. Freshly extracted, the source package contains some cruft which > > gets removed upon running debian/rules clean. Specifically, >

Bug#322352: pdns and pdns-doc both contain /usr/share/doc-base/pdns (sarge security update version)

2005-08-22 Thread Martin Schulze
Christoph Haas wrote: > Check the upstream archive (pdns_2.9.17.orig.tar.gz) again: > There are files like debian/doc-base that cause trouble. We are > currently removing these files in the "clean:" target. But if that > target isn't called before building the package we get this error. Ah, now I

Bug#324652: nzb: Description is a non-description

2005-08-23 Thread Martin Schulze
Package: nzb Version: 0.1-1 Package: nzb Description: An nzb based Usenet binary grabber Mind writing a description? A real one, not such self-depending thing? Regards, Joey -- MIME - broken solution for a broken design. -- Ralf Baechle Please always Cc to me when replying to me on

Bug#319526: MySQL security bug in sarge (CAN-2005-1636)

2005-08-23 Thread Martin Schulze
Martin Schulze wrote: > Christian Hammers wrote: > > Hello Security Team > > > > Are you aware of this bug? The "interdiff" patch are already in the BTS. > > > > http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=319526 > > Applied the upst

Bug#324531: pcre3: patch for CAN-2005-2491

2005-08-24 Thread Martin Schulze
Martin Pitt wrote: > Hi! > > Here is the relevant change from pcre3 6.1-> 6.2, ported to 5.0: > > http://patches.ubuntu.com/patches/pcre3.CAN-2005-2491.diff Patch originally sent by Marcus Meissner from SuSE. Regards, Joey -- It's time to close the windows. Please always Cc to me

Bug#324531: PCRE3: CAN-2005-2491 for oldstable

2005-08-24 Thread Martin Schulze
Martin Pitt wrote: > Hi! > > Since I have to fix apache2 2.0.50 for Ubuntu, which still has an > embedded pcre 3.x, I also took a look at the woody version. I took a > look at the code and played with the test suite, and it seems to me > that the capture part works ok; just the integer underflow m

Bug#310327: patch

2005-08-26 Thread Martin Schulze
Aidas Kasparas wrote: > Please find bellow a patch which check EOF condition instead of no > input. Without fix for this bug package is virtually not useable (I > experienced mysterious attachment cuts, so I can not relay on it at it's > present form :-( Please consider importance of this bug as "s

Bug#325254: kdegraphics packages broken on sarge/powerpc because of kdelibs4 dependency

2005-08-27 Thread Martin Schulze
Adeodato Simó wrote: > severity 325254 serious > reassign 325254 kdegraphics,security.debian.org > retitle 325254 kdegraphics 3.3.2-2sarge1/powerpc uninstallable because of > dependency on kdelibs4 (>= 4:3.3.2-6.2) > notfound 325254 4:3.3.2-2 > found 325254 4:3.3.2-2sarge1 > thanks > > * Jochen A

Bug#325135: maildrop: lockmail doesn't drop privileges

2005-08-27 Thread Martin Schulze
Max Vozeler wrote: > Short description: > lockmail.maildrop (setgid mail) lets the user specify a program and > execvp()s it, but does not drop egid mail privilege before doing so. > This opens a trivial privilege escalation (see "poc") to group mail. Thanks a lot for the report. This is CAN-200

Bug#332524: CVE name

2005-10-08 Thread Martin Schulze
== Candidate: CAN-2005-3178 URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3178 Reference: BUGTRAQ:20051005 xloadimage buffer overflow. Reference: URL:http://marc.theaimsgroup.com/?l=bugtraq&m=112862493918840&w=2 Buffer overflow in x

Bug#318286: FTP USER buffer overflow (CAN-2005-2239)

2005-10-08 Thread Martin Schulze
Jeroen van Wolffelaar wrote: > tags 318286 sarge > thanks > > On Thu, Jul 14, 2005 at 05:36:34PM +0300, Joey Hess wrote: > > oftpd is vulnerable to anothere security hole. This time a crafted "FTP > > USER" command can cause a crash. Since a buffer overflow is involved, > > it's possible that this

Bug#332290: horde3: Application is in a severely insecure state during configuration

2005-10-09 Thread Martin Schulze
Ola Lundqvist wrote: > Hello > > On Wed, Oct 05, 2005 at 01:17:37PM -0400, Mike O'Connor wrote: > > Package: horde3 > > Version: 3.0.5-1 > > Severity: critical > > Tags: security > > Justification: root security hole > > > > As part of the installation procedure in README.Debian, you are told to

Bug#332290: horde3: Application is in a severely insecure state during configuration

2005-10-09 Thread Martin Schulze
Ola Lundqvist wrote: > > > > I also would recommend that a password be required do use the > > > > Administration interface. > > > > > > The administration thing will be kept there as it do not have any write > > > permission to any of the configuration files. > > > > > > Or do you have a good su

Bug#332259: spampd fails with 'Error in process_request': Modification of read-only variable in Syslog.pm

2005-10-09 Thread Martin Schulze
Sven Mueller wrote: > > Hence, it's rather "one mail falls through" or something. Doesn't sound > > security-relevant to me. > > Well, it's more of an indirect DoS. The mails are rejected with an SMTP > temporary failure code according to my quick test. This means that those > mails fill up the s

Bug#330198: commit-tool: Description improvement

2005-09-26 Thread Martin Schulze
Package: commit-tool Version: current Severity: minor - Description: GUI commit tool for various Source Control Managment systems + Description: GUI commit tool for various Source Control Management systems Regards, Joey -- Experience is something you don't get until just after you nee

Bug#325135: maildrop: lockmail doesn't drop privileges

2005-08-28 Thread Martin Schulze
Andres Salomon wrote: > On Sat, 2005-08-27 at 11:42 +0100, Steve Kemp wrote: > > On Sat, Aug 27, 2005 at 12:27:51PM +0200, Martin Schulze wrote: > > > > > Thanks a lot for the report. This is CAN-2005-2655. > > > > > > > The bug affects 1.5.3-1

Bug#318946: User expectations and shorewall

2005-09-01 Thread Martin Schulze
Florian Weimer wrote: > As far as I understand it, from the perspective of the security team, > it is not clear if the upstream change breaks existing user > configurations. Users might rely on the current behavior and use it > to deliberately weaken the filter policy. This is a reasonable > ques

Bug#318946: User expectations and shorewall

2005-09-01 Thread Martin Schulze
Florian Weimer wrote: > * Martin Schulze: > > > So a summary would be to leave the package as it is in sarge, right? > > Based on the facts, I reach the opposite conclusion. The upstream > changes should be merged. However, since easy workarounds are > possible, we mig

Bug#318946: User expectations and shorewall

2005-09-01 Thread Martin Schulze
Florian Weimer wrote: > * Martin Schulze: > > > What was the behaviour pre-sarge? > > What is the behaviour post-sarge (or rather in sarge)? > > Do you mean "before and after the upstream security update"? The > terms pre-sarge/post-sarge do not make mu

Bug#322352: [Powerdns-debian] Bug#322352: pdns and pdns-doc both contain /usr/share/doc-base/pdns (sarge security update version)

2005-08-12 Thread Martin Schulze
doc-base/pdns, while the package in sarge does not. Looking at the file contents, it shouldn't be an architecture.deb but an all.deb, btw., but that's not an issue we need to fix now. > Martin Schulze: > How did you build the package ? (I'm pretty curious right now becaus

Bug#322352: pdns and pdns-doc both contain /usr/share/doc-base/pdns (sarge security update version)

2005-08-16 Thread Martin Schulze
Christoph Haas wrote: > Hi, Martin... > > On Sat, Aug 13, 2005 at 07:09:02AM +0200, Martin Schulze wrote: > > Please retry in the sarge chroot on gluck or escher. I've just > > rebuilt it in both environments and both times the pdns_*.deb > > contained both /usr/s

Bug#322352: pdns and pdns-doc both contain /usr/share/doc-base/pdns (sarge security update version)

2005-08-16 Thread Martin Schulze
Christoph Haas wrote: > On Tue, Aug 16, 2005 at 10:23:41AM +0200, Martin Schulze wrote: > > That is very strange. I've just rebuilt it on gluck > > (see /tmp/joey for log and packages) and it does still contain > > the doc-base directory. > > I was too slow

Bug#404598: SSL module only configured half

2006-12-26 Thread Martin Schulze
Package: apache2.2-common Version: 2.2.3-3.2 I guess that the file /etc/apache2/mods-available/ssl.conf is missing the statement "Listen 443" to allow Apache 2 to actually listen to the SSL port as well. Regards, Joey -- A mathematician is a machine for converting coffee into theorems.

Bug#397875: CVE assignment

2006-12-27 Thread Martin Schulze
Please use CVE-2006-6318 when referring to this NULL pointer dereference. Regards, Joey -- If nothing changes, everything will remain the same. -- Barne's Law Please always Cc to me when replying to me on the lists. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "u

Bug#404888: glib2.0: cannot go into testing; causes gnucash regrsession

2006-12-29 Thread Martin Schulze
Josselin Mouette wrote: > Le jeudi 28 décembre 2006 à 17:29 -0800, Thomas Bushnell BSG a écrit : > > On Fri, 2006-12-29 at 01:56 +0100, Josselin Mouette wrote: > > > Now, if you don't provide us with the necessary data, we won't be able > > > to fix the regression it introduces in gnucash. > > > >

Bug#404364: Various typos in manpages

2006-12-30 Thread Martin Schulze
Nicolas François wrote: > > > The following list contain all the coded character sets known. This does > > > not necessarily mean that all combinations of these names can be used for > > > the FROM and TO command line parameters. One coded character set can be > > > listed with several different

Bug#403280: [EMAIL PROTECTED]: bad link]

2006-12-15 Thread Martin Schulze
Package: gnome-lokkit - Forwarded message from Bill Ries-Knight <[EMAIL PROTECTED]> - Date: Fri, 15 Dec 2006 08:55:27 -0800 From: Bill Ries-Knight <[EMAIL PROTECTED]> To: debian-www@lists.debian.org Subject: bad link X-Folder: debian-www@lists.debian.org on this page: http://packages.de

Bug#394250: gui-apt-key: please use the stock (delete,close,...) gtk2 buttons and HIG

2006-11-05 Thread Martin Schulze
severity 394250 wishlist thanks Eddy Petri??or wrote: > Package: gui-apt-key > Version: 0.1-3 > Severity: normal > > Hello, > > I just tried gui-apt-key and I managed to erase one of the keys > (thankfully was an expired key) when I wanted to view its properties. I > have seen that regular butto

<    1   2   3   4   5   6   >