[Bug 528925] Re: apt-get hangs with "Waiting for headers" for exactly two minutes on dl.google.com apt line

2010-04-01 Thread spinkham
The google Chromium bug, which is linked above, claims the real fix on their end should be out in the next few days. -- apt-get hangs with "Waiting for headers" for exactly two minutes on dl.google.com apt line https://bugs.launchpad.net/bugs/528925 You received this bug notification because yo

[Bug 513903] Re: Must be run as root, which is not secure

2010-03-22 Thread spinkham
Fixed in Debian as of package version 1.2.6-2, one version after the one currently in Lucid. See changelog here: http://packages.debian.org/changelogs/pool/main/w/wireshark/wireshark_1.2.6-5/changelog -- Must be run as root, which is not secure https://bugs.launchpad.net/bugs/513903 You receive

[Bug 288358] Re: Nmap package missing lua libraries, also doesn't look in debian locations

2009-04-14 Thread spinkham
This is the bug tracker for the Ubuntu nmap package. Please take all discussion of the merits of distribution packaging vs DIY to a different location, as they are orthogonal to this bug. Thank you. -- Nmap package missing lua libraries, also doesn't look in debian locations https://bugs.launchp

[Bug 288358] [NEW] Nmap package missing lua libraries, also doesn't look in debian locations

2008-10-23 Thread spinkham
Public bug reported: "nmap -A example.com" fails on hosts that find a HTTP(S) port due to missing LUA libraries. Problem found in package nmap-4.62-1ubuntu1. nmap should either include the necessary lua libraries like they do for the scripts of previous versions(in the/usr/share/nmap/nselib and

[Bug 227464] Re: Please roll out security fixes from PHP 5.2.6

2008-08-05 Thread spinkham
We're way off topic now (sorry) but in fact Ubuntu does seem to realize there is a problem and is addressing it. My biggest complaint is that there was no news, and no clear way for me to help. They are now advertising for more security engineers, and I am applying. http://webapps.ubuntu.com/emplo

[Bug 207454] Re: Firefox is VERY slow rendering pragprog.com; becomes almost unusable

2008-07-31 Thread spinkham
I can confirm that under the same kernel, linux-generic 2.6.24.18.41, "restricted" nvidia driver has the 10 second or so screen freezing delay, and the free nv driver has no delay. I am unable to get linux-generic 2.6.24.19.21 working with the restricted driver at the moment, so I can't report on

[Bug 207454] Re: Firefox is VERY slow rendering pragprog.com; becomes almost unusable

2008-07-31 Thread spinkham
I must correct my above software list. I forgot that due to other problems with the latest nvidia driver, I was really running: Software: Ubuntu 8.04 64 bit Firefox 3.0.1+build1+nobinonly-0ubuntu0.8.04.3 linux-generic 2.6.24.18.41 linux-restricted-modules-generic 2.6.24.18.41 nvidia restricted dri

[Bug 207454] Re: Firefox is VERY slow rendering pragprog.com; becomes almost unusable

2008-07-31 Thread spinkham
I have the same problem with Firefox 3.0.1, 64 bit on 64 bit Ubuntu 8.04. Problem exists with all extensions disabled, and also with noscript enabled, so I don't believe it's a javascript problem. I am running the restricted nvidia driver, I will later try and see if it improves by switching to t

[Bug 227464] Re: Please roll out security fixes from PHP 5.2.6

2008-07-10 Thread spinkham
This has been addressed in Intrepid by updating to PHP 5 here: https://launchpad.net/ubuntu/intrepid/+source/php5/5.2.6-1ubuntu1 Minimal patch above in this post https://bugs.launchpad.net/ubuntu/+source/php5/+bug/227464/comments/15 Re: test cases: I've not yet seen widely published exploit code,

[Bug 227464] Re: Please roll out security fixes from PHP 5.2.6

2008-07-10 Thread spinkham
This has been addressed in Intrepid buy updating to PHP 5 here: https://launchpad.net/ubuntu/intrepid/+source/php5/5.2.6-1ubuntu1 Minimal patch above in this post https://bugs.launchpad.net/ubuntu/+source/php5/+bug/227464/comments/15 Re: test cases: I've not yet seen widely published exploit code

[Bug 227464] Re: Please roll out security fixes from PHP 5.2.6

2008-07-10 Thread spinkham
Impact: Fixed possible stack buffer overflow in FastCGI SAPI Impact:Potential DOS and remote code execution if using FastCGI Updated PCRE to deal with issues fixed in USN-581-1 Impact:potential DOS and code execution Fixes CVE-2008-0599 Impact:Potential DOS and remote code execu

[Bug 227464] Re: Please roll out security fixes from PHP 5.2.6

2008-07-10 Thread spinkham
Sorry, my listing of cURL exploit is not quite accurate, here's an updated version with that and some other fixes (let that be a lesson for you, not to post hastefully and in anger ;-) Impact: Fixed possible stack buffer overflow in FastCGI SAPI Impact:Potential DOS and remote code executio

[Bug 227464] Re: Please roll out security fixes from PHP 5.2.6

2008-07-10 Thread spinkham
I'm sorry for whining to the people who are subscribed to and care about this bug, but over 2 months since the release of a package with 3 claimed remotely exploitable code injection bugs makes me VERY hesitant to ever recommend Ubuntu for server use ever again. By this time even the slow moving

[Bug 227464] Re: Please roll out security fixes from PHP 5.2.6

2008-07-10 Thread spinkham
Another month has passed, no release for Hardy. I'm not savvy enough with the Ubuntu release procedures to even know who to contact about this. Could someone tell me what it would take to get these bugs fixed in the current stable, advertised for server use Ubuntu? There are 3 remote code execut

[Bug 227464] Re: PHP 5.2.6 fixes important security bugs

2008-05-14 Thread spinkham
Fix released in Debian onMay 11. Fixes are available both upstream in Debian and upstream in main package. How can I help move this bug along? -- PHP 5.2.6 fixes important security bugs https://bugs.launchpad.net/bugs/227464 You received this bug notification because you are a member of Ubuntu Bu

[Bug 227464] Re: PHP 5.2.6 fixes important security bugs

2008-05-14 Thread spinkham
** Bug watch added: Debian Bug tracker #479723 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=479723 ** Also affects: php5 (Debian) via http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=479723 Importance: Unknown Status: Unknown -- PHP 5.2.6 fixes important security bugs https:/

[Bug 227464] [NEW] PHP 5.2.6 fixes important security bugs

2008-05-06 Thread spinkham
*** This bug is a security vulnerability *** Public security bug reported: Binary package hint: php5 PHP 5.2.6 fixes important security bugs >From the release log: Security Fixes * Fixed possible stack buffer overflow in FastCGI SAPI. (Andrei Nigmatulin) * Properly address incomplete m

[Bug 210687] Re: Wireshark 1.0 is available- Fixes Multiple Vulnerabilities

2008-04-02 Thread spinkham
** Summary changed: - Wireshark 1.0 is available + Wireshark 1.0 is available- Fixes Multiple Vulnerabilities ** This bug has been flagged as a security issue -- Wireshark 1.0 is available- Fixes Multiple Vulnerabilities https://bugs.launchpad.net/bugs/210687 You received this bug notification

[Bug 210687] Re: Wireshark 1.0 is available

2008-04-02 Thread spinkham
Note that this bug might be badly named, as there are multiple exploitable vulnerabilities in the current version, and the previous releases should also be patched ASAP. http://www.wireshark.org/security/wnpa-sec-2008-02.html http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1561 http://cve.