Bug#468643: gnump3d: should this package be removed?

2008-03-22 Thread Steve Kemp
Your objections are interesting, and mostly valid: > * buggy. I'd maintain that isn't the case .. > * no maintainer. True. I wish somebody would adopt it, rather than having it be maintainerless. > * Upstream has stopped development. True. > * Plenty of other alternatives

Bug#444690: debconf template Italian translation

2007-10-18 Thread Steve Kemp
Hi, Thanks very much for offering to supply a translation of the debconf strings for Italian users of Debian GNU/Linux. Unfortunately you didn't actually attach your translation to the bug report you submitted. If you could mail the file to the bug number I'll ensure it is applied in the

Bug#418548: more debbug data

2007-08-25 Thread Steve Kemp
Please try this patch (works for me, amd64 debian sid): --- apt-spy-3.1/benchmark.c 2007-08-26 03:54:21.0 +0100 +++ benchmark.c 2007-08-26 03:47:22.0 +0100 @@ -23,6 +23,7 @@ printf("\nSERVER:\t%s\n", current->hostname); +curl_global_init (CURL_GLOBAL_ALL);

Bug#429191: flyspray phpmailer: not relevant for stable

2007-06-17 Thread Steve Kemp
On Sun Jun 17, 2007 at 18:20:01 +0200, Thijs Kinkhorst wrote: > For stable I've checked whether it's > vulnerable and I believe it's not: the vulnerability is in the SendmailSend() > function. That requires for the calling code to actually use the sendmail > method, which Flyspray does not allo

Bug#398936: libapache2-mod-ifier: The module breaks POST processing

2006-11-16 Thread Steve Kemp
Package: libapache2-mod-ifier Version: 0.8-2 Severity: grave Justification: renders package unusable This module, when installed and enabled, breaks all processing of POST requests. It should be removed from Etch until it can be updated to work correctly. -- System Information: Debian Rel

Bug#278777: xsok: unfixed buffer overflow (CAN-2004-0074)

2004-11-01 Thread Steve Kemp
On Fri, Oct 29, 2004 at 10:12:33PM +0200, Frank Lichtenheld wrote: > Perhaps someone with a little more experience in identifying security > problems should take a look, too. I CC'ed debian-security. Here's a quick summery : To be clear there are three flaws being discussed in xsok: CAN-

Bug#226356: Buffer overflow vulnerability (CAN-2003-0850)

2004-01-06 Thread Steve Kemp
On Mon, Jan 05, 2004 at 06:17:07PM -0800, Matt Zimmerman wrote: > Package: libnids > Severity: grave > > "The TCP reassembly functionality in libnids before 1.18 allows remote > attackers to cause "memory corruption" and possibly execute arbitrary code > via "overlarge TCP packets." > > http://cv