Bug#903474: openssh-server: ~/.ssh/authorized_keys no longer accepts environment option with underscores in name

2018-07-10 Thread Bas van Sisseren
-key This stricter checking is added in openssh 7.7. As a result of this stricter check, I am no longer allowed to login with this key. Imho this is too restrictive and underscores should be allowed. The bug is fixed upstream here: https://bugzilla.mindrot.org/show_bug.cgi?id=2851 Best Regards

Bug#787630: libstdc++6: unsafe rm -rf on __pycache__ dir can wipe all filesystems

2015-06-03 Thread Bas van Sisseren
Package: libstdc++6 Version: 5.1.1-9 Severity: grave Justification: causes non-serious data loss The postinst script of libstdc++6 attempts to remove all __pycache__ dirs from /usr/share/gcc-4.9/python, but doesn't do this in a secure way. If you accidentally had created files in /usr/share/gcc-4

Bug#777158: Text functions segfault on i386

2015-05-08 Thread Bas van Sisseren
Package: libimage-magick-perl Version: 8:6.8.9.9-5 Severity: normal The PerlMagick/quantum/Makefile.PL was using the wrong magick/magick-baseconfig.h file. I've attached a patch to fix this problem. Regards, Bas van Sisseren -- Bas van Sisseren Quarantainenet Description: Fix include

Bug#764476: vde2: Segfaults due to race condition between find_in_hash() and hash_gc()

2014-10-08 Thread Bas van Sisseren
tting the new 'delayed_hash_gc' flag. ps. Afaics, it is now also safe to remove all qtime_csenter()/qtime_csexit() calls in hash.c, but I'll leave that to the author of vde2 to verify that. Regards, Bas van Sisseren -- System Information: Debian Release: jessie/sid APT

Bug#706074: less: Incorrect hilighting of search results

2013-04-24 Thread Bas van Sisseren
Package: less Version: 436-1 Severity: minor When searching for lines starting with some characters, less also sometimes hilight parts which match the regexp, except for that they do not start at the start of the line. Searching itself is not effected. Searching for the previous or next matching

Bug#556388: Problem with cyrus-common-2.2.postinst script

2011-09-27 Thread Bas van Sisseren
atement in the front, just all files are printed, user cyrus or not.. If another security update will be released for oldstable, I would really like this fix. Without the fix, the upgrade took me more than 1.5 hours downtime. With the fix, this will probably be only 5 minutes. Regards, Bas

Bug#586207: metacity-common: metacity breaks with 17+ workspaces

2010-06-17 Thread Bas van Sisseren
Package: metacity-common Version: 1:2.30.1-2 Severity: normal Tags: patch metacity aborts on an assertion when using more than 16 workspaces. (workspace_names[i] != NULL) See also: https://bugs.launchpad.net/ubuntu/+source/metacity/+bug/583847 According to this link, metacity allows max. 36 wo

Bug#516717: coreutils: Missing conflict with package timeout

2009-02-23 Thread Bas van Sisseren
Package: coreutils Version: 7.1-1 Severity: normal Since coreutils 7.1, the coreutils package contains a binary 'timeout'. This conflicts with the package 'timeout', which contains an almost identical utility 'timeout'. A 'Conflicts: timeout' would be nice. -- System Information: Debian Release

Bug#495788: perl: pending signals are processed in both the parent and child process after a fork()

2008-08-20 Thread Bas van Sisseren
Package: perl Version: 5.10.0-13 Severity: normal When system-calls are processed, all signals are enqueued until the next perl instruction is executed. When the fork() system-call is processed, and the parent receives a signal just before the fork() call, both the parent and the child will proces

Bug#321132: bind9-host: fails with "INSIST(..)" when using -w and specify a dns-server

2008-06-25 Thread Bas van Sisseren
Package: bind9-host Version: 1:9.5.0.dfsg-3 Followup-For: Bug #321132 'host -w aavso.org' works ok, but 'host -w aavso.org 10.20.30.40' still fails: $ host -w aavso.org 10.20.30.40 timer.c:721: INSIST(result == 0 || result == 2) failed. Aborted 10.20.30.40 is a dummy ip address. I've tried sever

Bug#472181: librpc-xml-perl: RPC::XML support for empty base64 data

2008-03-22 Thread Bas van Sisseren
Package: librpc-xml-perl Version: 0.59-1 Severity: normal The RPC::XML package returns an error when encoding or decoding empty strings of type base64. Example code: use strict; use RPC::XML; my $b64 = RPC::XML::base64->new(''); if ($RPC::XML::ERROR) { print "xmlrpc error: ".$RPC::XML::ERR

Bug#471358: race condition in /etc/network/if-up.d/ntpdate with many interfaces

2008-03-18 Thread Bas van Sisseren
Package: ntpdate Version: 1:4.2.2.p4+dfsg-2 Severity: important When after a reboot all interfaces are brought up, the /etc/network/if-up.d/ntpdate script spawns a 'ntpdate &' for every interface. With many interfaces and an incorrectly set hardware-clock, this can result in a mayor time-shift:

Bug#468313: libfrontier-rpc-perl: fails to report faults correctly when using 'use-objects'

2008-02-28 Thread Bas van Sisseren
Package: libfrontier-rpc-perl Version: 0.07b4-3 Severity: normal Tags: patch When using Frontier::Client to call an XMLRPC method and the method returned a fault, the fault is not readable when using 'use_objects': Fault returned from XML RPC Server, fault code Frontier::RPC2::Integer=SCAL

Bug#309954: xmlrpc-c: Curl support still not linked in

2007-11-02 Thread Bas van Sisseren
Package: xmlrpc-c Version: 1.06.18-1 Followup-For: Bug #309954 The xmlrpc-c packages were probably built on a system without the libcurl4-openssl-dev package. I think adding this package to the source-dependencies should be enough. (i've locally rebuilt the xmlrpc-c packages with the libcurl4-ope

Bug#356810: Acknowledgement (libcrypt-cbc-perl: behaviour-change; header_iv bugs (both sending as receiving))

2006-03-14 Thread Bas van Sisseren
'', and my test failed. I've retested the library with: my $encrypted = $crypt->encrypt("some data"); $encrypted = 'RandomIV'.$crypt->iv.$encrypted; This worked without any problems, so scrap bugreport item 4 :) -- Bas van Sisseren <[EMAIL PR

Bug#356810: libcrypt-cbc-perl: behaviour-change; header_iv bugs (both sending as receiving)

2006-03-14 Thread Bas van Sisseren
Package: libcrypt-cbc-perl Version: 2.12-1sarge1 Severity: grave Justification: renders package unusable I've detected 4 problems with the security update of libcrypt-cbc-perl; 1. I'm using Crypt::CBC between several systems; the one system encrypts data and the other decrypts data. In this secur

Bug#322145: libopensc1 0.9.6-2 triggers assertion in card.c

2006-01-15 Thread Bas van Sisseren
. On Sat, 14 Jan 2006, Eric Dorland wrote: Are you still seeing this with the 0.10 series? * Bas van Sisseren ([EMAIL PROTECTED]) wrote: On 10/08/05 23:39, Eric Dorland wrote: * Bas van Sisseren ([EMAIL PROTECTED]) wrote: Package: opensc Version: 0.9.6-2 Severity: important I'm using a

Bug#322145: libopensc1 0.9.6-2 triggers assertion in card.c

2005-08-11 Thread Bas van Sisseren
On 10/08/05 23:39, Eric Dorland wrote: > * Bas van Sisseren ([EMAIL PROTECTED]) wrote: > >>Package: opensc >>Version: 0.9.6-2 >>Severity: important >> >> >>I'm using a recompiled ssh-agent with opensc support on debian unstable. >>(using it for

Bug#322145: libopensc1 0.9.6-2 triggers assertion in card.c

2005-08-09 Thread Bas van Sisseren
Package: opensc Version: 0.9.6-2 Severity: important I'm using a recompiled ssh-agent with opensc support on debian unstable. (using it for my cryptoflex e-gate 32k token) With libopensc1 version 0.9.6-1 everything works perfectly: (ssh-agent -d output:) debug1: type 20 debug1: sc_get_keys call