Re: unnecessary adoption by QA-team

2004-08-07 Thread Nico Golde
Hello Andreas,

* Andreas Barth <[EMAIL PROTECTED]> [2004-08-07 22:40]:
> > A ready package, that solve this bug is already available.
> > Why did QA-group adopt this package instead to sponsor my upload?
> 
> Well, finding a sponsor is sometimes rather difficult. I'm sorry, but
> that's just the current situation. I know that it's rather frustrating
> (and I can well remember the time where it was frustrating for me, and
> I had to trap sponsors on IRC). I know that this answer is not as
> nice as it should be, and I feel sorry for this.

yes you are right. i think it is a pity. specially for new contributors
of the debian project it can be very frustrating.
bug i think if 50% of the current developers would sponsor 2 packages it
doesnt have to be such a problem (maybe i am too optimistic)
regards nico
-- 
Nico Golde - [EMAIL PROTECTED]
[EMAIL PROTECTED] | [EMAIL PROTECTED] | http://www.ngolde.de
GPG: FF46 E565 5CC1 E2E5 3F69  C739 1D87 E549 7364 7CFF
Is there life after /sbin/halt -p?


signature.asc
Description: Digital signature


Bug#242117: still not ready?

2005-09-19 Thread Nico Golde
Hi,
ist cabot still not ready for testing?
Regards Nico

-- 
Nico Golde - JAB: [EMAIL PROTECTED] | GPG: 0x73647CFF
http://www.ngolde.de | http://www.muttng.org | http://grml.org


pgpGsGXrSrQeO.pgp
Description: PGP signature


cdrw-taper stable update for #496380

2008-10-02 Thread Nico Golde
Hi,
an insecure temporary file creation was reported to the cdrw-taper some time 
ago.
This is Debian bug #496380.

Unfortunately the vulnerability is not important enough to get it fixed via
regular security update in Debian stable. It does not warrant a DSA.

However it would be nice if this could get fixed via a regular point update[0].
Please contact the release team for this.

This is an automatically generated mail, in case you are already working on an
upgrade this is of course pointless.

For further information:
[0] http://www.debian.org/doc/developers-reference/pkgs.html#upload-stable

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.


pgpFvRLvezBjw.pgp
Description: PGP signature


xmcd stable update for #496416

2008-10-03 Thread Nico Golde
Hi,
an insecure temporary file creation was reported to the xmcd some time ago.
This is Debian bug #496416.

Unfortunately the vulnerability is not important enough to get it fixed via
regular security update in Debian stable. It does not warrant a DSA.

However it would be nice if this could get fixed via a regular point update[0].
Please contact the release team for this.

This is an automatically generated mail, in case you are already working on an
upgrade this is of course pointless.

For further information:
[0] http://www.debian.org/doc/developers-reference/pkgs.html#upload-stable

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.


pgpMhCodRhhtf.pgp
Description: PGP signature


Bug#404235: segfault patch for 404235

2006-12-29 Thread Nico Golde
Hi,
the provided patch is actually not fixing the issue really.
I attached 2 patches for trr_update and trr_format which 
should fix this.
Please test them before you upload the changes since I don't 
use emacs and have no idea of the program.
But it would be a good idea to do a complete rewrite of the 
code, its really ugly.
Kind regards
NIco

-- 
Nico Golde - http://www.ngolde.de
JAB: [EMAIL PROTECTED] - GPG: 0x73647CFF
Forget about that mouse with 3/4/5 buttons,
gimme a keyboard with 103/104/105 keys!
--- /home/nion/build/trr19-1.0beta5/trr_format.c	2006-12-29 17:54:11.0 +0100
+++ trr_format.c	2006-12-29 18:27:26.0 +0100
@@ -18,6 +18,7 @@
 
 #include 
 #include 
+#include 
 #include 
 #include 
 #include 
@@ -40,27 +41,25 @@
 
 
 main(int argc, char **argv){
-  char textfile[256], formattedfile[256], lockfile[256], *tmpfname;
-  char command[256], line[1024];
+  char textfile[_POSIX_PATH_MAX], formattedfile[_POSIX_PATH_MAX], lockfile[_POSIX_PATH_MAX], *tmpfname;
+  char command[_POSIX_PATH_MAX], line[_POSIX_PATH_MAX];
   FILE *fd, *tmpfd;
   int i;
   struct passwd *pw = NULL;
 
-
   /* ignore signals */
   signal(SIGHUP, SIG_IGN);
   signal(SIGINT, SIG_IGN);
   signal(SIGQUIT, SIG_IGN);
   signal(SIGTERM, SIG_IGN);
+  if(argc<2){
+fprintf(stderr, "no file specified..\n");
+exit(EXIT_FAILURE);
+  }
 
-  strcpy(textfile, TEXT_DIR);
-  strcat(textfile, argv[1]);
-  strcpy(formattedfile, textfile);
-  strcat(formattedfile, ".formed");
-  strcpy(lockfile, textfile);
-  strcat(lockfile, ".lock");
+  snprintf(line, sizeof(line),  "%s%s%s.formed%s.lock", TEXT_DIR, argv[1], textfile, textfile);
 
-  umask(18);
+  umask(022);
 
   /* if previous process is formatting same target text,
  wait for that process to finish formatting. */
@@ -91,7 +90,7 @@
 /* format a text - fork and exec the processes so we can drop privileges */
 switch( fork() ) {
   case -1:  /* Error */
-	perror(fork);
+	perror("fork");
 	exit(1);
 	break;
   case 0:   /* Child */
@@ -100,9 +99,13 @@
 
 	/* Drop group privileges */
 	pw = getpwuid(getuid());
+if(!pw){
+fprintf(stderr, "You don't exist..go away\n");
+exit(EXIT_FAILURE);
+}
 	setgid(pw->pw_gid);
 
-	sprintf(command, "%s -v '^[ \t]*$' %s | %s 's/\\([.?!;]\\) *$/\\1/' | %s 's/^  *\\(.*\\)$/\\1/' > %s",
+	snprintf(command, sizeof(command), "%s -v '^[ \t]*$' %s | %s 's/\\([.?!;]\\) *$/\\1/' | %s 's/^  *\\(.*\\)$/\\1/' > %s"
 		GREP, textfile, SED, SED, tmpfname);
 	system(command);
 	break;
@@ -111,15 +114,23 @@
 }
 
 tmpfd = fopen(tmpfname, "r");
+if(!tmpfd){
+perror("fopen");
+exit(EXIT_FAILURE);
+}
 fd = fopen(formattedfile, "w");
+if(!fd){
+perror("fopen");
+exit(EXIT_FAILURE);
+}
 
-while(fgets(line, 1024, tmpfd))
+while(fgets(line, sizeof(line), tmpfd))
   fputs(line, fd);
 
 fclose(tmpfd);
 fclose(fd);
 unlink(tmpfname);
-
+free(line);
 /* release lock */
 unlink(lockfile);
 return 0;
--- /home/nion/build/trr19-1.0beta5/trr_update.c	1996-07-03 06:52:08.0 +0200
+++ trr_update.c	2006-12-29 19:05:35.0 +0100
@@ -21,6 +21,7 @@
 #include 
 #include 
 #include 
+#include 
 
 #if defined(HAVE_STRING_H)
 #include 
@@ -45,10 +46,10 @@
 #endif /* HAVE_FCNTL_H */
 
 main(int argc, char **argv){
-  char scorefile[256], lockfile[256], datestr[64];
-  char line[256], savedline[256];
-  const char *user, *scores, *step, *times, *ttime, *token;
-  FILE *fd, *tmpf;
+  char scorefile[_POSIX_PATH_MAX], lockfile[_POSIX_PATH_MAX], datestr[64];
+  char line[_POSIX_PATH_MAX], savedline[_POSIX_PATH_MAX];
+  const char *user=NULL, *scores=NULL, *step=NULL, *times=NULL, *ttime=NULL, *token=NULL;
+  FILE *fd=NULL, *tmpf=NULL;
   int score, tmpscore, i, myself, inserted;
   long datev;
 
@@ -58,25 +59,34 @@
   signal(SIGQUIT, SIG_IGN);
   signal(SIGTERM, SIG_IGN);
 
-  umask(18);
-  strcpy(scorefile, RECORD_DIR);
+  snprintf(lockfile, sizeof(lockfile), "%s.lock", scorefile);
 
-  /* create a new record file */
-  if (argc == 2){
-strcat(scorefile, argv[1]);
+  if (argc<2) {
+   fprintf(stderr,"too few arguments\n");
+   exit(EXIT_FAILURE);
+  }
 
-if ((fd = fopen(scorefile, "w")) == NULL){
-  perror(scorefile);
-  exit(1);
-} else
+  umask(022);
+  snprintf(scorefile, sizeof(scorefile), RECORD_DIR "%s", argv[1]);
+
+   /* create a new record file */
+   if (argc == 2){
+
+ if ((fd = fopen(scorefile, "w")) == NULL){
+   perror(scorefile);
+   exit(1);
+ } else
   fclose(fd);
-exit(0);
+  exit(0);
   }
 
-  /* upfate high score file */
-  strcat(scorefile, argv[1]);
-  strcpy(lockfile, scorefile);
-  s

Bug#404235: segfault patch for 404235

2006-12-30 Thread Nico Golde
Hey,
* Jens Seidel <[EMAIL PROTECTED]> [2006-12-30 18:19]:
> On Fri, Dec 29, 2006 at 07:08:29PM +0100, Nico Golde wrote:
> > +++ trr_format.c2006-12-29 18:27:26.0 +0100
> >  main(int argc, char **argv){
> > -  char textfile[256], formattedfile[256], lockfile[256], *tmpfname;
> > -  char command[256], line[1024];
> > +  char textfile[_POSIX_PATH_MAX], formattedfile[_POSIX_PATH_MAX], 
> > lockfile[_POSIX_PATH_MAX], *tmpfname;
> > +  char command[_POSIX_PATH_MAX], line[_POSIX_PATH_MAX];
> 
> Please note that this will probably not work with the Hurd. This system
> tries to avoid all useless limitations and _POSIX_PATH_MAX is one of
> these. The proper solution is to create the buffers dynamically ...

Yes that would be better then I didnt do this cause the code 
doesnt really need dinamically allocated buffers. Anyway the 
patch should just show all the other problems that exist in 
the code but I would suggest a documentation of secure 
programming and a complete rewrite of the code to the 
upstream author. Also the substitution of SED and GREP via 
the makefile in the c-files and then calling system() is 
really ugly.
Kind regards, happy new year
Nico
-- 
Nico Golde - http://www.ngolde.de
JAB: [EMAIL PROTECTED] - GPG: 0x73647CFF
Forget about that mouse with 3/4/5 buttons,
gimme a keyboard with 103/104/105 keys!


pgp0ALuNchK2T.pgp
Description: PGP signature


Bug#404235: trr19: segfault when no argument is given

2007-01-21 Thread Nico Golde
Hi Arnaud,
* Arnaud Fontaine <[EMAIL PROTECTED]> [2007-01-21 22:59]:
> Your patch is wrong because you  are using `char *textfile` in the first
> snprintf without initializing it. I made a patch which fixes the bug and
> works on the Hurd.

As said I didnt test it, I just wrote it down very quick 
since I dont care about emacs stuff and just wanted to point 
out the issues.
Kind regards
Nico
-- 
Nico Golde - http://www.ngolde.de
JAB: [EMAIL PROTECTED] - GPG: 0x73647CFF
Forget about that mouse with 3/4/5 buttons,
gimme a keyboard with 103/104/105 keys!


pgp6gorCSJWqX.pgp
Description: PGP signature


Bug#404235: (no subject)

2007-02-02 Thread Nico Golde
Hi,
> Your patch is wrong because you  are using `char 
> *textfile` in the first
> snprintf without initializing it.

I didnt check what you said when I replied last time.
However what you say is wrong since there is no char pointer 
textfile in my patch, its an array which is initialized when 
snprintf is called.
Nico

-- 
Nico Golde - http://www.ngolde.de
JAB: [EMAIL PROTECTED] - GPG: 0x73647CFF
Forget about that mouse with 3/4/5 buttons,
gimme a keyboard with 103/104/105 keys!


pgpWPRS3StMZI.pgp
Description: PGP signature


Bug#252760: FTBFS: architecture missing

2007-04-14 Thread Nico Golde
Hi,
I don't really understand your bugreport please help me a 
bit :)
You write that the package fails to build from source (I 
guess on amd64) but you want amd64 to be added to the
Architectures field.
So does it build and work on amd64 or not?
Kind regards
Nico

-- 
Nico Golde - http://ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.


pgpBJa6rgHTuJ.pgp
Description: PGP signature


Bug#252760: FTBFS: architecture missing

2007-04-15 Thread Nico Golde
Hi,
no it suggests them and since they are not needed to run 
mkrboot...
Kind regards
Nico

-- 
Nico Golde - http://ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.


pgpRZPpxY73wQ.pgp
Description: PGP signature


Bug#273634: ffingerd: adds to xinetd.conf instead of creating file in xinetd.d

2007-04-19 Thread Nico Golde
Hi,
> As there exist a /etc/xinetd.d directory where services are added as separate
> files, would it not be more appropriate to add the service configuration
> here instead of in /etc/xinetd.conf?

Why?
Kind regards
Nico
-- 
Nico Golde - http://ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.


pgpl5ZFq2tblv.pgp
Description: PGP signature


Bug#348006: xfonts-artwiz - no german characters linke ä.ö.ü.ß

2007-06-30 Thread Nico Golde
severity 348006 minor
tags 348006 moreinfo
thanks

Hi,
did you try the .de fonts in the artwiz package? Try them
by using xfontsel I think they should work for you.
I will close this bug in 1 month if I get no feedback by 
you.
Cheers
Nico

-- 
Nico Golde - http://ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.


pgp4mgounBV6C.pgp
Description: PGP signature


Bug#435421: myphpmoney: can't install, remove or purge

2007-12-02 Thread Nico Golde
Hi Christian,
this is a ping, looks like you forogt about this item :)
Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.


pgpmke9JDJmJd.pgp
Description: PGP signature


openmotif oldstable update for CVE-2004-0914, CVE-2005-0605, CVE-2005-3964

2007-12-31 Thread Nico Golde
Hi,
the following CVE (Common Vulnerabilities & Exposures) ids were
published for openmotif some time ago.

CVE-2004-0914[0]:
| Multiple vulnerabilities in libXpm for 6.8.1 and earlier, as used in
| XFree86 and other packages, include (1) multiple integer overflows,
| (2) out-of-bounds memory accesses, (3) directory traversal, (4) shell
| metacharacter, (5) endless loops, and (6) memory leaks, which could
| allow remote attackers to obtain sensitive information, cause a denial
| of service (application crash), or execute arbitrary code via a certain
| XPM image file. NOTE: it is highly likely that this candidate will be
| SPLIT into other candidates in the future, per CVE's content
| decisions.

CVE-2005-0605[1]:
| scan.c for LibXPM may allow attackers to execute arbitrary code via a
| negative bitmap_unit value that leads to a buffer overflow.

CVE-2005-3964[2]:
| Multiple buffer overflows in libUil (libUil.so) in OpenMotif 2.2.3,
| and possibly other versions, allows attackers to execute arbitrary
| code via the (1) diag_issue_diagnostic function in UilDiags.c and (2)
| open_source_file function in UilSrcSrc.c.

Unfortunately the vulnerabilities described above are not important enough
to get them fixed via regular security update in Debian oldstable. It does
not warrant a DSA.

However it would be nice if they could get fixed via a regular point update.
Please contact the release time for this.

This is an automatically generated mail, in case you are already working on an
upgrade this is of course pointless.

You can see the status of this vulnerabilities on:
http://security-tracker.debian.net/tracker/CVE-2004-0914
http://security-tracker.debian.net/tracker/CVE-2005-0605
http://security-tracker.debian.net/tracker/CVE-2005-3964

For further information:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0914
[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0605
[2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3964

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.


pgpBQO84etzxL.pgp
Description: PGP signature