Bug#571653: libapache2-mod-suphp: suphp not working anymore (squeeze)

2011-04-07 Thread Bruno De Fraine
, -- Bruno De Fraine -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#503184: libapache2-mod-auth-shadow

2009-05-15 Thread Bruno De Fraine
ow -- Apache2 module for authentication using shadow thanks Re: Bruno De Fraine 2008-11-01 > > reopen 503184 > thanks > > As explained in my message, I am aware that the original maintainer > removed this package with bug #489862, but I disagree with that > decision: m

Bug#516948: mlmmj: .diff.gz (partially?) reverts 1.2.15 to 1.2.14

2009-03-10 Thread Bruno De Fraine
introduced by the 1.2.15-1 upload, signed by Stuart Teasdale. The NMU continues the wrong version. Regards, Bruno De Fraine signature.asc Description: Digital signature

Bug#507465: mb2md often misses message boundaries in mbox files

2008-12-03 Thread Bruno De Fraine
Hello, This script intentionally looks for a blank line in between messages in the mbox file. There is no such requirement that I know of; There *is* certainly mention of a blank line in the first few references that turn up when looking for an mbox file specification: http://www.qmail.or

Bug#503645: jhead: CVE-2008-4640, CVE-2008-4641 command injection via filename and insecure file handling

2008-11-04 Thread Bruno De Fraine
Hello Matthias, On 3-nov-08, at 16:04, Matthias Wandel wrote: Ok, I have integrated this patch, plus a temp file patch that was submitted, and uploaded it as the head rev copy on the website. The head rev version number has been changed to 2.85. I have made sure it works under Windows, an

Bug#504194: Bug#503645: jhead: CVE-2008-4640, CVE-2008-4641 command injection via filename and insecure file handling

2008-11-03 Thread Bruno De Fraine
Hello Nico, On 01 Nov 2008, at 16:00, Nico Golde wrote: If I understand correctly it will just delete files with names derived from existing files. I cannot be used to delete arbitrary files. Why is this unlink needed anyway? Any existing file in the position of the temporary output file is

Bug#503184: closed by Christoph Berg <[EMAIL PROTECTED]> (Re: Bug#503184: O: libapache2-mod-auth-shadow -- Apache2 module for authentication using shadow)

2008-11-01 Thread Bruno De Fraine
As explained in my message, I am aware that the original maintainer removed this package with bug #489862, but I disagree with that decision: mod_auth_shadow provided functionality for which there is currently no good alternative in Debian. I think he should have orphaned his package instea

Bug#503645: jhead: CVE-2008-4640, CVE-2008-4641 command injection via filename and insecure file handling

2008-10-30 Thread Bruno De Fraine
Hello, After looking at the documentation of my shell, I propose the following patch for the command injection problem. (I assume this works for other Unix shells as well.) Demo with some maliciously crafted file names: $ ./jhead -cmd "ls &i" foo.jpg* Cmd:ls "foo.jpg\`date\`" foo.jpg`date`

Bug#503645: jhead: CVE-2008-4640, CVE-2008-4641 command injection via filename and insecure file handling

2008-10-29 Thread Bruno De Fraine
s can be avoided if you escape the file name as done by "addslashes" from PHP: by placing a backslash before double quotes, other backslashes, NUL, etc. So in pseudo-code: e += sprintf(ExecString+e, "\"%s\"", addslashes(FileName)); Nico, do you think this would be sufficient to rule out the vulnerability? Best regards, Bruno De Fraine -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Bug#503184: O: libapache2-mod-auth-shadow -- Apache2 module for authentication using shadow

2008-10-23 Thread Bruno De Fraine
is already a working package, I am not submitting this as a "Request For Package". Best regards, Bruno De Fraine -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Bug#438538: mpop: version 1.0.5-1etch1 uninstallable on Etch

2007-10-04 Thread Bruno De Fraine
bgsasl7, libidn11 (>= 0.5.18), libkrb53 (>= 1.4.2), libtasn1-3 (>= 0.3.4), zlib1g (>= 1:1.2.1) I'm CC-ing this to the debian-release list to see if anything can be done to unlock this situation. Thank you, Bruno De Fraine -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] wi

Bug#377308: /usr/bin/id3tag: id3tag and similar commands difficult to find

2006-10-10 Thread Bruno De Fraine
Followup-For: Bug #377308 Package: libid3-3.8.3-dev Version: 3.8.3-4.1 The tools id3tag, id3info, id3cp and id3convert are very useful to non-developers as well and their package is currently difficult to locate. Please go ahead and include their names in the package description. (You could