Bug#910279: ITP: optimesh -- Mesh optimization, mesh smoothing.

2018-10-04 Thread Steve Kemp
> Description : Mesh optimization, mesh smoothing. > > Several mesh smoothing/optimization methods with one simple interface. > optimesh > - is fast, > - preserves submeshes, > - only works for triangular meshes (for now; upvote this issue if you're > interested in tetrahedral mes

Bug#865105: gitlab: leaves stale systemd service symlinks after purge

2018-05-26 Thread Steve Kemp
Your bug report is correct, but it is really just a more specific example of the problem already reported in #863960: https://bugs.debian.org/863960 Steve -- https://steve.fi/

Bug#890816: ITP: autovpn -- Connect to a VPN in a country of your choice

2018-02-19 Thread Steve Kemp
On Mon Feb 19, 2018 at 12:44:40 +0100, Michael Meskes wrote: > > * It relies upon the external VPNGate.net site/service. If this > > goes away in the lifetime of a stable Debian release users will > > be screwed. > > That is actually a good point. I wonder if using a local copy might b

Bug#890816: ITP: autovpn -- Connect to a VPN in a country of your choice

2018-02-19 Thread Steve Kemp
> Version : 0.0~git20170129.72dd7f6-1 > Upstream Author : Adhityaa C > * URL : https://github.com/adtac/autovpn .. > autovpn is a tool to automatically connect you to a random VPN > in a country of your choice. It uses openvpn to connect you to a server > obtained from VPN

Bug#883075: ITP: memleax -- debug a running process for memoy leaks without recompiling or restarting

2017-11-29 Thread Steve Kemp
> Description : debug a running process for memoy leaks without > recompiling or restarting Typo: "memory", not "memoy". > Memleax debugs a program for memory leaks by attaching to a running process, > similarly to how gdb's does. It then hooks into the target process's > invocation of m

Bug#873292: facter: Bogus output received with interface named 'master'.

2017-08-26 Thread Steve Kemp
Package: facter Version: 2.4.6-1 Severity: minor Dear Maintainer, Since upgrading a virtual-machine host from jessie to stretch I started seeing this email every hour, when puppet ran: To: root From: root(Cron Daemon) Cc: Subject: Cron /usr/bin/puppet agent --onetime .. Co

Bug#854585: Acknowledgement (evilvte: Allows executing (unexpected) commands via mouse-clicks)

2017-02-08 Thread Steve Kemp
Tags: patch One approach at solving this problem would be to stop highlighting the URL at the first "'" character. This matches what gnome-terminal, and others, do already even though I don't believe this character _should_ be escaped. This can be achieved by updating the regexp: deagol ~/evil

Bug#854585: evilvte: Allows executing (unexpected) commands via mouse-clicks

2017-02-08 Thread Steve Kemp
Package: evilvte Version: 0.5.1-1 Severity: important Tags: security Dear Maintainer, Although a terminal is designed to execute commands it is unexpected that clicking on hyperlinks would execute arbitrary code, and unfortunately that is trivially possible. Consider the following hyperlink:

Bug#843120: ITP: freight -- easy-to-understand shell script to handle APT repositories

2016-11-04 Thread Steve Kemp
On Fri Nov 04, 2016 at 02:10:56 +0100, Nicolas Braud-Santoni wrote: > Description : easy-to-understand shell script to handle APT repositories > freight is an easy-to-use and to understand shell script for > building packages and keeping them in an up-to-date and signed > reporitory. M

Bug#820373: w3m: SEGFAULT on bogus HTML

2016-04-07 Thread Steve Kemp
> Fixed, thank you. > > - > https://anonscm.debian.org/cgit/collab-maint/w3m.git/commit/?id=5a159af05d8556a3f9f8f1a42d8fc153ffbc9694 > I confirm that fixes the problem. Thanks once more for your prompt attention. > Welcome to add more info, so that I'll confirm the problems are > really

Bug#820373: w3m: SEGFAULT on bogus HTML

2016-04-07 Thread Steve Kemp
Package: w3m Version: 0.5.3-19 Severity: important Tags: security Dear Maintainer, Please find attached a pair of files, each of these cause w3m to segfault when run as follows: cat $file | w3m -dump The crash is a segfault, which is probably not exploitable but may be to somebody who puts

Bug#820162: w3m: SEGFAULT on bogus HTML

2016-04-06 Thread Steve Kemp
On Thu Apr 07, 2016 at 06:51:52 +0900, Tatsuya Kinoshita wrote: > > Confirmed, thank you. > > Fixed in the development repo. > > - > https://anonscm.debian.org/cgit/collab-maint/w3m.git/commit/?id=7bb2a4671503c41d63989dcef9ef54dea0c73b43 > > Will be fixed in the next upload for unstable.

Bug#820162: w3m: SEGFAULT on bogus HTML

2016-04-05 Thread Steve Kemp
Package: w3m Version: 0.5.3-19 Severity: important Tags: security Dear Maintainer, Please find attached a tarball which contains two files, a generated one, and one which has been reduced to the smallest possible test-case. Each of those files causes w3m to segfault when run as follows: cat

Bug#816277: gawk: Invalid program crashes the parser

2016-02-29 Thread Steve Kemp
Package: gawk Version: 1:4.1.1+dfsg-1 Severity: important Dear Maintainer, The following wonderful program causes an immediate segfault in the parse-process of gawk: for (i = ) in foo bar baz For example: shelob ~ $ cat t.gawk for (i = ) in foo bar baz shelob

Bug#816271: gawk: It should not be possible to segfault gawk

2016-02-29 Thread Steve Kemp
Package: gawk Version: 1:4.1.1+dfsg-1 Severity: important Dear Maintainer, While I appreciate that passing untrusted code to gawk is not a common thing to do, I do not believe that it should be possible to trigger a segfault though. The following "program" will crash gawk though: $ echo

Bug#810883: catdoc: Invalid memory access and segfaulting

2016-01-14 Thread Steve Kemp
> Fair enough. In any case, I am going to upload to backports as soon as > the version in sid stabilises. Great. > Well, I think a DSA would be too much for a tool like this :) Specially > since there has not been any PoC to show a real security issue. I won't try to force it, but I'd certai

Bug#810883: catdoc: Invalid memory access and segfaulting

2016-01-14 Thread Steve Kemp
On Wed Jan 13, 2016 at 18:08:44 -0300, Martín Ferrari wrote: > > When running under valgrind we see that an attempt is made to access > > an invalid pointer: > > This is a known issue (#679877), it was fixed when I took over this > package, and it has already reached testing. Having the fixed

Bug#810883: catdoc: Invalid memory access and segfaulting

2016-01-13 Thread Steve Kemp
Package: catdoc Version: 0.94.4-1.1 Severity: important Tags: security Dear Maintainer, The attached word document will cause catdoc to crash when executed: catdoc x.doc When running under valgrind we see that an attempt is made to access an invalid pointer: ==6875== Invalid read of siz

Bug#809252: node-cli: insecure use of temporary files

2015-12-28 Thread Steve Kemp
Package: node-cli Version: 0.4.4~20120516-1 Severity: critical Tags: security Dear Maintainer, The `node-cli` library makes insecure use of the following two temporary files: lock_file = '/tmp/' + cli.app + '.pid', log_file = '/tmp/' + cli.app + '.log'; These allow overwriting

Bug#808730: stalin: Insecure use of temporary files

2015-12-22 Thread Steve Kemp
Package: stalin Version: 0.11-5 Severity: critical Tags: security When `stalin` launches it attempts to detect its environment via the following code in /usr/lib/stalin/QobiScheme.sc: (system "uname -m >/tmp/QobiScheme.tmp") ... (system "rm -f /tmp/QobiScheme.tmp")) This is a p

Bug#801530: openssh-client: Segfault on malformed keys - possible security impact

2015-10-13 Thread Steve Kemp
The following patch seems to me to be a reasonable stab at fixing the NULL pointer dereference. Tested on Debian Jessie (amd64), against keys of type: * dsa * ecdsa * ed25519 * rsa * rsa1 On a valid key it shows the fingerprint. On my bogus sample it shows: line 2

Bug#801530: openssh-client: Segfault on malformed keys - possible security impact)

2015-10-12 Thread Steve Kemp
> .. and the exciting-looking address is apparently a typical load address > for the ssh binary. Yes. It was in the ascii-range, which made me more optimistic. (I'm too used to using AAA..AAA as input and seeing 0x41. 0x55 looks close enough to be plausible.) Steve --

Bug#801530: openssh-client: Segfault on malformed keys - possible security impact

2015-10-12 Thread Steve Kemp
I'm almost embarrassed to say that I submitted the wrong reproducer in my original bug report. The previous key does trigger the fault, but it is needlessly complex. The attachment to this mail should be considered a saner example, as it still triggers the crash, but it is is significantly

Bug#801530: openssh-client: Segfault on malformed keys - possible security impact

2015-10-11 Thread Steve Kemp
Package: openssh-client Version: 1:6.7p1-5 Severity: important Tags: security Dear Maintainer, I believe that the sanest way to generate an SSH fingerprint, for display to users, etc, is via executing: ssh-keygen -l -f path/to/public.key This is the rationale behind the following blog-post:

Bug#772473: Acknowledgement (xbindkeys-config: Insecure use of temporary files)

2014-12-11 Thread Steve Kemp
Sorry for the slow reply, I wasn't Cc'd so I didn't see your reply. > Did you request a CVE for it already? No, I did not. > make me believe that the trust boundaries are not crossed here, thus > I suppose it will be tracked as a secuirity hardening issue, and not a > flaw. > What do you t

Bug#772473: xbindkeys-config: Insecure use of temporary files

2014-12-07 Thread Steve Kemp
Package: xbindkeys-config Version: 0.1.3-2 Severity: important Tags: security If you use this program and "view generated file" the current output will be saved to the file /tmp/xbindkeysrc-tmp. This allows the corruption of any file the user has permission to write to. Later this predictable fi

Bug#765697: ITP: libtest-tabs-perl -- check the presence of tabs in your project

2014-10-17 Thread Steve Kemp
On Fri Oct 17, 2014 at 15:38:02 +0200, Jonas Smedegaard wrote: > Not sure what it is you suggest: Seems to me like they have _opposite_ > scopes :-) You're right, I'm clearly mistaken/wrong and not being helpful. Sorry for the noise. Steve -- -- To UNSUBSCRIBE, email to debian-bugs-dist

Bug#765697: ITP: libtest-tabs-perl -- check the presence of tabs in your project

2014-10-17 Thread Steve Kemp
On Fri Oct 17, 2014 at 14:38:07 +0200, Jonas Smedegaard wrote: > Test::Tabs scans your project/distribution for any perl files (scripts, > modules, etc) for the presence of tabs. > . > Needed for some uses of Dist::Inkt. > Will be maintained in the Perl team. Looks like a simple/small modul

Bug#761879: fotoxx: Insecure use of temporary files

2014-09-16 Thread Steve Kemp
Package: fotoxx Version: 11.11.1-1.1 Severity: important Tags: security (Irrelevent) Printing Issues All three versions of fotoxx packaged for Debian (squeeze, wheezy, and jessie) make insecure use of a temporary file when printing in the function `wprintp` in zfunc

Bug#761828: fotoxx: Software packaged for Debian should not "phone home"

2014-09-16 Thread Steve Kemp
Package: fotoxx Version: 14.07.1-1 Severity: normal Dear Maintainer, The version of fotoxx available to Jessie, version 14.07.1-1, contains code which runs at startup to: * Phone home. * Attempt to update itself. "Phoning home", no matter how benignly, without explicit consent from the user is

Bug#756565: CVE

2014-09-09 Thread Steve Kemp
On Tue Sep 09, 2014 at 12:52:38 +0300, Henri Salo wrote: > Have you requested CVE already? If you want I can verify this issue and create > the request. I have not, the lack of update to the bug report made it slip my mind. If you'd like to confirm the issues, which shouldn't be hard, and r

Bug#756600: xcfa: Insecure use of temporary files, subject to race conditions

2014-07-31 Thread Steve Kemp
Package: xcfa Version: 4.3.1-1 Severity: important Tags: security xcfa contains several insecure uses of temporary files. For example the file src/get_info.c has code to test that curl is present, in the function GetInfo_wget which essentially runs: wget --user-agent=\"Mozilla 22.0\" --

Bug#756566: libxml-dt-perl: Insecure use of temporary files

2014-07-30 Thread Steve Kemp
Package: libxml-dt-perl Version: 0.62-1 Severity: important Tags: security The libxml-dt-perl package installs the script "/usr/bin/mkxmltype" which blindly overwrites the contents of the file: /tmp/_xml_$$ (Where '$$' corresponds to the PID of the process.) This is insecure and can al

Bug#756565: lives: Numerous insecure temporary files used in smogrify

2014-07-30 Thread Steve Kemp
Package: lives Version: 1.6.2 Severity: important Tags: security lives contains a perl script, smogrify, which is what does a lot of the work. I don't want to point out line-by-line all the issues in the smogrify script, but please consider significantly overhauling it. There are numerous inse

Bug#754899: rawstudio: Insecure use of temporary file.

2014-07-15 Thread Steve Kemp
Package: rawstudio Version: 2.0-1.1 Severity: important Dear Maintainer, The function "rs_filter_graph" located in file ./librawstudio/rs-filter.c contains the following code: g_string_append_printf(str, "}\n"); g_file_set_contents("/tmp/rs-filter-graph", str->str, str->len, NUL

Bug#749846: trafficserver: Insecure command execution and use of temporary filenames.

2014-06-02 Thread Steve Kemp
On Mon Jun 02, 2014 at 10:23:23 +0100, Steven Chamberlain wrote: > http://sources.debian.net/src/trafficserver/3.0.5-1/mgmt/tools/SysAPI.cc > > NOWARN_UNUSED_RETURN(system("/bin/mv -f /tmp/shadow /etc/shadow")); > > Won't that reset the shadow file's ownership to root:root? If default > umas

Bug#749846: trafficserver: Insecure command execution and use of temporary filenames.

2014-05-30 Thread Steve Kemp
Package: trafficserver Version: 3.0.5-1 Severity: important Tags: security Dear Maintainer, The binary `/usr/bin/traffic_shell` contains the following strings, which should be sufficient to explain the issue: /bin/mv -f /tmp/shadow /etc/shadow /bin/sort /tmp/zonetab.tmp > /tmp/zonetab

Bug#748766: scheme48: Insecure use of temporary file for communication.

2014-05-20 Thread Steve Kemp
Package: scheme48 Version: 1.8+dfsg-1 Severity: important Tags: security The function `scheme48-send-definition` in cmuscheme48.el blindly overwrites the file /tmp/s48lose.tmp prior to sending it to the inferior scheme process. This action will blindly overwrite files the user has permission to m

Bug#747100: bug#17428: Bug#747100: emacs23: Insecure use of temporary files in included lisp libraries/packages

2014-05-08 Thread Steve Kemp
Clearly I'm an idiot, the correct link is this: http://www.openwall.com/lists/oss-security/2014/05/07/7 Steve -- http://www.steve.org.uk/

Bug#747100: bug#17428: Bug#747100: emacs23: Insecure use of temporary files in included lisp libraries/packages

2014-05-08 Thread Steve Kemp
These issues have now had several CVE identifiers associated with them, for future tracking: http://www.openwall.com/lists/oss-security/2014/03/14/5 Steve -- http://www.steve.org.uk/

Bug#747100: emacs23: Insecure use of temporary files in included lisp libraries/packages

2014-05-05 Thread Steve Kemp
Package: emacs23 Version: 23.4+1-4 Severity: important There are several tempfile-vulnerabilities present in the Emacs Lisp bundled and distributed with the emacs23 package. Here are four brief pointers to unsafe code: lisp/gnus/gnus-fun.el: In the function `gnus-grab-cam-face` the file "/tmp/

Bug#741953: libreadline6: Insecure use of temporary files - in _rl_trace

2014-03-17 Thread Steve Kemp
Package: libreadline6 Version: 6.2+dfsg-0.1 Severity: important Tags: security Dear Maintainer, I noticed that GNU Readline version 6.x makes insecure use of files when outputting debugging information via the _rl_trace function. The details were reported here: http://www.openwall.com/lists/

Bug#741627: insecure temporary file usage in apt-extracttemplates

2014-03-14 Thread Steve Kemp
Package: apt Version: 0.9.7.9+deb7u1 Severity: important Tags: security When installing/upgrading packages via `apt-get` a child process is invoked against the downloaded .deb-file to extract any templates which might be contained in that package. For example I was recently upgrading my lighttpd

Bug#741370: pen: security issues with pen

2014-03-13 Thread Steve Kemp
CVE-2014-2387 has been allocated for the two hardcoded/insecure uses of temporary files. ("/tmp/webfile.html", and "/tmp/penctl.cgi".) Steve -- -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.or

Bug#741370: pen: security issues with pen

2014-03-13 Thread Steve Kemp
On Thu Mar 13, 2014 at 14:46:37 +0100, Ulric Eriksson wrote: > The control socket and the configuration file use the exact same > syntax by design. I see that is currently the case, yes.. > If it is impossible or impractical to limit > access to the socket, the same level of control over a run

Bug#741370: pen: security issues with pen

2014-03-13 Thread Steve Kemp
[Apologies for bouncing your mails. Fixed now.] > The core issue being that it is possible to run pen with remote > control from untrusted hosts (or any host), should the administrator so > desire. Agreed. I did think of limiting the control-socket to 127.0.0.1:XX but that a) reduces flex

Bug#741370: pen: security issues with pen

2014-03-11 Thread Steve Kemp
Package: pen Version: 0.18.0-1 Severity: minor Tags: security There are four issues to report here; 1. Predictable filename in pen itself. 2. Insecure temporary filename in the contributed CGI script. 3. File overwrite / disclosure issues in pen. 4. Information disclosure. Predictable file

Bug#733505: rush: Allows reading arbitrary files

2013-12-29 Thread Steve Kemp
Package: rush Version: 1.7+dfsg-1 Severity: important From the package description: "GNU Rush is a restricted shell designed for sites providing only limited access to resources for remote users". Much like sudo the shell allows a configuration file to limit the commands the user(s

Bug#730189: ruby1.8: CVE-2013-4164

2013-11-28 Thread Steve Kemp
The patches seem to work successfully for me: * The test-suite that runs at compile-time still passes. * The reproducer stops segfaulting. The reproducer I'm using is: -- #!/usr/bin/ruby1.8 require 'json' JSON.parse("[1."+"1"*30+"]") -- Steve -- http://www.steve.org.uk/

Bug#291844: Info received (gtetrinet: have key for "send special to self")

2013-09-26 Thread Steve Kemp
Drop the file attached into ./debian/patches/special-to-self.diff, and add it to debian/patches/series. et voila. Steve -- Index: gtetrinet-0.7.11/src/config.c === --- gtetrinet-0.7.11.orig/src/config.c 2013-09-26 20:14:19.0

Bug#291844: gtetrinet: have key for "send special to self"

2013-09-26 Thread Steve Kemp
I knocked up a patch to do this, bound to 's' by default. If there is interest I'm happy to report it here, I'm only resisting because this is an 8 year old bug and my patch doesn't use quilt. Steve -- http://www.steve.org.uk/

Bug#714421: fabric: No fabric package in wheezy?

2013-07-02 Thread Steve Kemp
I found the jessie package compiled cleanly under wheezy and made it available here: http://packages.steve.org.uk/fabric/ While I don't necessarily expect you to trust a random repository on the internet you can easily get the source(s) and rebuild locally. Steve -- http://www.steve.

Bug#700219: mpc: Playlist numbering is off-by-one

2013-02-09 Thread Steve Kemp
Package: mpc Version: 0.19-2 Severity: normal *** Please type your report below this line *** I regularly use (via a local emacs mode) the formatting optiona available in the playlist-display to choose my next song. This example will make it clear: * I'm trying to dump all songs in the play

Bug#692490: greed: Insecure use of lockfile in /tmp allows file truncation

2012-11-06 Thread Steve Kemp
Package: greed Version: 3.4-2 Severity: normal Usertags: security *** Please type your report below this line *** The setgid(games) binary greed makes insecure use of the file /tmp/Greed.lock - allow arbitrary files that are writeable to the games user. By itself this is not a grave concern, but

Bug#692489: omega-rpg: fails to drop group(games) privileges

2012-11-06 Thread Steve Kemp
Package: omega-rpg Version: 1:0.90-pa9-15 Severity: normal Usertags: security omega-rpg is installed setgid(games). There are two cases where it doesn't drop group(games) privileges: * When creating the help file "omega.doc" * When writing save-games Loading the game, and pressing "S

Bug#675503: summain: Misc. typos in the manpage.

2012-06-01 Thread Steve Kemp
Package: summain Version: 0.13-1 Severity: minor *** Please type your report below this line *** Please find below a diff fixing a couple of typos in the manpage. -- System Information: Debian Release: 6.0.5 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable') Arc

Bug#651896: Acknowledgement (njam: Insecure usage of environmental variable)

2011-12-13 Thread Steve Kemp
Simple patch: --- src/njam.cpp-orig 2011-12-13 17:06:04.0 + +++ src/njam.cpp2011-12-13 17:07:08.0 + @@ -339,7 +339,7 @@ sprintf(linux_sdl_driver, "x11\0"); char *driver_name = getenv("SDL_VIDEODRIVER"); if (driver_name) - sprintf(linux_sdl_driver,

Bug#651896: njam: Insecure usage of environmental variable

2011-12-12 Thread Steve Kemp
Package: njam Version: 1.25-5 Justification: user security hole Severity: grave Tags: security *** Please type your report below this line *** The setgid(games) binary /usr/games/njam makes insecure use of the environmental variable SDL_VIDEODRIVER. This potentially allows the execution of arb

Bug#635617: nanourl: SQL Injection flaw in URL lookup

2011-07-27 Thread Steve Kemp
Package: nanourl Version: 0.1-7.1 Severity: important *** Please type your report below this line *** The lookup of destination URLs uses unescaped parameters from the query string, making a classic SQL Injection security hole. In real terms this package is not security critical, has a low user

Bug#629003: fabric is prone to file-overwrite security issue(s).

2011-06-02 Thread Steve Kemp
Package: fabric Version: 0.9.1-1 Justification: causes serious data loss Severity: important Tags: security *** Please type your report below this line *** Fabric includes two modules which are marked as "contrib", and are included in the main package. These two modules both suffer from the sam

Bug#615292: chronicle: Issues with rendering UTF-8 characters)

2011-02-27 Thread Steve Kemp
On Sun Feb 27, 2011 at 16:16:48 +0100, Kai Wasserb??ch wrote: > Steve Kemp schrieb am 27.02.2011 16:01: > > I've been careful to open all files in a way which seemed to be > > clean - but could you please try the patch below and let me > > know if it helps? > &

Bug#615292: chronicle: Issues with rendering UTF-8 characters)

2011-02-27 Thread Steve Kemp
On Sun Feb 27, 2011 at 15:50:28 +0100, Kai Wasserb??ch wrote: > another side effect of this bug is a broken RSS feed, Indeed. If it is broken it will be broken globally. I've been careful to open all files in a way which seemed to be clean - but could you please try the patch below and let

Bug#612671: A security issue was recently discovered in cgiirc.

2011-02-09 Thread Steve Kemp
Subject: A security issue was recently discovered in cgiirc. Package: cgiirc Version: Security issue in CGI::IRC Severity: important *** Please type your report below this line *** Michael Brooks (Sitewatch) discovered a reflective XSS flaw in CGI:IRC. Mozilla have assigned CVE-2011-0050 for th

Bug#610352: security.debian.org: Recent change of advisory subject unhelpful

2011-01-19 Thread Steve Kemp
On Wed Jan 19, 2011 at 07:27:43 +0100, Thijs Kinkhorst wrote: > > For the "old" one I see what package is affected whereas for the new > > one I cannot. > > > > Could you please return to the old subject line? > > I think this is a good point. Maybe not return to the old subject per se, but > m

Bug#596212: python-coverage: use externally-packaged jQuery libraries

2010-10-19 Thread Steve Kemp
On Thu Sep 09, 2010 at 20:49:27 +1000, Ben Finney wrote: > I've followed the instructions in the README.Debian for ???libjs-jquery??? > to use it from HTML files generated by ???python-coverage???, but without > success. Right, I think your specific use-case is non-standard and doesn't really

Bug#580817: chronicle: List of tagged entries show up in reverse order

2010-05-08 Thread Steve Kemp
On Sat May 08, 2010 at 18:02:25 -0400, Felipe Sateler wrote: > When looking at a /tags//, posts are sorted in ascending > chronological order (older entries first). This should be the other way > around. Please consider using the --recent-tags-first command-line argument, or adding that to you

Bug#564829: How to turn off all APT security checking?

2010-02-06 Thread Steve Kemp
On Sun Feb 07, 2010 at 00:47:10 +0800, jida...@jidanni.org wrote: > I can't take it any more, day after day various incomplete apt-get > updates, e.g., bug 564829 and Bug#553533: Seeing BADSIG 9AA38DCD55BE302B > frequently. What apt-get -o option can I use to turn off all this > security or whatev

Bug#566106: Fails to run filter

2010-01-25 Thread Steve Kemp
On Mon Jan 25, 2010 at 14:10:18 +0100, Guido G?nther wrote: > $ perl test.pl > 1. Open a pipe, normally > group > motd > 2. Open a pipe, set the mode > group > motd > 3. Open a handle. > group > motd > 4. Open a handle. binmode > group > motd > 5

Bug#566106: Fails to run filter

2010-01-24 Thread Steve Kemp
On Thu Jan 21, 2010 at 11:08:39 +0100, Guido G??nther wrote: > Failed to run filter: No such file or directory at /usr/bin/chronicle line > 2000. > # Run the command, reading stdout. > # > -open( FILTER, "$cmd|;utf8" ) or > +open( FILTER, "$cmd|" ) or This will work, but mea

Bug#566714: ITP: xen-tools -- Tools to manage Xen virtual servers

2010-01-24 Thread Steve Kemp
On Sun Jan 24, 2010 at 19:25:07 +0100, Axel Beckert wrote: > I know that upstream stopped development since Steve doesn't use > xen-tools (nor xen) anymore. FWIW I support this ITP. I will be happy to "give away" the code - such that this fork becomes official, and all existing references t

Bug#565358: redis-server: Please consider adding command line completion to redis-cli

2010-01-14 Thread Steve Kemp
Package: redis-server Version: 2:1.2.0-1 Severity: wishlist Tags: +patch *** Please type your report below this line *** It would be useful to add a simple bash completion script to this package to ease use - as the manpage doesn't list options. Sample script attached below which you're wel

Bug#555272: jquery: embeds prototype.js

2010-01-14 Thread Steve Kemp
The package does include a copy of the prototype library, but it is only used to run the integrated test-suite and is thus not a concern. It is not included in the binary package, just there for a maintainer who wants to fiddle with the package. Steve -- Debian GNU/Linux System Administrati

Bug#562623: Closing as directed

2010-01-11 Thread Steve Kemp
[Closing as directed] Steve -- Debian GNU/Linux System Administration http://www.debian-administration.org/ -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#524772: Looks like this can be closed

2010-01-11 Thread Steve Kemp
Now that we're on 0.83 it looks like this bug may be closed ..? Steve -- Debian GNU/Linux System Administration http://www.debian-administration.org/ -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debi

Bug#562684: ITP: libtext-vimcolor-perl -- syntax color text in HTML or XML using Vim

2009-12-26 Thread Steve Kemp
Package: wnpp Owner: Steve Kemp Severity: wishlist *** Please type your report below this line *** * Package name: libtext-vimcolor-perl Version : 0.11 Upstream Author : Geoff Richards * URL : http://search.cpan.org/dist/Text-VimColor/ * License : Perl

Bug#561666: RM: xen-shell -- ROM; Obsolete - not supported

2009-12-19 Thread Steve Kemp
Package: ftp.debian.org Severity: normal *** Please type your report below this line *** Please remove from unstable release. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#561667: RM: xen-tools -- ROM; obsolete, unsupported.

2009-12-19 Thread Steve Kemp
Package: ftp.debian.org Severity: normal *** Please type your report below this line *** Please remove from unstable. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#553948: winkeydaemon: Symlink attack allows creation of arbitrary files

2009-11-02 Thread Steve Kemp
Package: winkeydaemon Version: 1.0.1-3 Justification: user security hole Severity: grave Tags: security *** Please type your report below this line *** This is probably not a hugely exploitable issue, but reporting regardless: winkeydaemon.pl: if (-d "/tmp/.winkey") { # ok, no action re

Bug#553945: ttylog: Doesn't test length of device.

2009-11-02 Thread Steve Kemp
Package: ttylog Version: 0.1.c-1 Severity: normal *** Please type your report below this line *** The script uses strcpy to copy the specified device name into a fixed buffer. This program isn't a security-sensitive one so the issue is minor, but the bug should be fixed: s...@gold:$ /us

Bug#524772: Finish supporting prefork

2009-10-25 Thread Steve Kemp
> 0.81-1 included prefork, which was usable via editing the init.d script, but > couldn't be selected through debconf, because prefork didn't as of 0.81 > support listening on multiple interfaces, and hence would have broken some > deployed setups. The current release is 0.83, and the changelog

Bug#548684: oping allows reading arbitrary files upon the local system - security issue

2009-09-27 Thread Steve Kemp
Package: oping Version: 1.3.2-1 Justification: user security hole Severity: grave Tags: security *** Please type your report below this line *** oping is setuid root and one of the command line arguments allows a configuration file to be specified. This file is read and *reported* to the con

Bug#546178: planet: [CVE-2009-2937] - Insufficient escaping of input feeds

2009-09-18 Thread Steve Kemp
On Fri Sep 18, 2009 at 14:06:44 +0200, Arnaud Fontaine wrote: > No I didn't, I could not find this discussion, could you please point it > me out? As soon as all these issues will have been addressed, I will > prepare a package (debian-security team: please do not upload the > package f

Bug#546178: planet: [CVE-2009-2937] - Insufficient escaping of input feeds

2009-09-18 Thread Steve Kemp
On Fri Sep 18, 2009 at 13:38:39 +0200, Arnaud Fontaine wrote: > I have prepared yesterday a package for Lenny including this patch. At > the moment, I'm waiting for a reply from the debian-security team. Great. Don't forget etch to. > Thank you very much for the patch and bug report. Did

Bug#546178: Updated patch

2009-09-15 Thread Steve Kemp
The patch doesn't account for case variations, so it shold be updated: + +for i in xrange (len (attrs)): +k,v = attrs[i] +if (( k == "src" ) or ( k == "href" ) ) and (v.lower().find("javascript:" ) <> -1 ): +del attrs[i] + return attrs S

Bug#546178: planet: [CVE-2009-2937] - Insufficient escaping of input feeds

2009-09-11 Thread Steve Kemp
Subject: planet: [CVE-2009-2937] - Insufficient escaping of input feeds Package: planet Justification: user security hole Severity: grave Tags: security *** Please type your report below this line *** The planet feed aggregator attempts to remove malicious content from user-submitted feeds. It d

Bug#546179: planet-venus: [CVE-2009-2937] - Insufficient escaping of input feeds

2009-09-11 Thread Steve Kemp
Subject: planet-venus: [CVE-2009-2937] - Insufficient escaping of input feeds Package: planet-venus Justification: user security hole Severity: grave Tags: security *** Please type your report below this line *** The planet feed aggregator attempts to remove malicious content from user-submitted

Bug#545198: Use of uninitialized value

2009-09-08 Thread Steve Kemp
On Sat Sep 05, 2009 at 18:41:36 +0200, Guido G??nther wrote: > $ chronicle > Use of uninitialized value $site > in concatenation (.) or string at /usr/bin/chronicle line 1613. > Use of uninitialized value $site > in concatenation (.) or string at /usr/bin/chronicle line 1638. > at

Bug#535481: offlineimap: Error at installation time

2009-07-02 Thread Steve Kemp
Package: offlineimap Version: 6.1.0 Severity: important The upgrade today resulted in this: Setting up libgail-common (2.16.4-1) ... Setting up gtk2-engines-pixbuf (2.16.4-1) ... Setting up libgtk2.0-bin (2.16.4-1) ... Setting up offlineimap (6.1.0) ... Setting up python-gdbm (2.5.2-1.1) ... P

Bug#531456: ITP: libmoose-policy-perl -- module to specify your project-wide or even company-wide Moose meta-policy

2009-06-01 Thread Steve Kemp
On Mon Jun 01, 2009 at 19:19:28 +0200, Salvatore Bonaccorso wrote: > This is still an release of this module and it should not be considered to be > complete by any means. It is very basic implemenation at this point and will "implementation" would fix that typo. Steve -- Managed Anti-Spam

Bug#530615: ITP: libfile-temp-perl -- return name and handle of a temporary file safely

2009-05-26 Thread Steve Kemp
On Tue May 26, 2009 at 08:11:06 -0300, Brian Cassidy wrote: > * Package name: libfile-temp-perl > Version : 0.21 > Upstream Author : Tim Jenness > * URL : http://search.cpan.org/dist/File-Temp/ > * License : Artistic | GPL-1+ > Programming Lang: Perl > Desc

Bug#526228: fixed in jquery 1.3.3-1

2009-05-20 Thread Steve Kemp
On Wed May 20, 2009 at 11:56:25 +0200, Steve Langasek wrote: > >[ Steve Kemp ] > >* Re-upload with orig.tar.gz file present, unfortunately this means > > bumping the release number, but that is a small price to pay. > > (Closes: #526228) > > H

Bug#526047: [namecheck]: pod documentation formating

2009-04-29 Thread Steve Kemp
On Wed Apr 29, 2009 at 17:00:21 +0100, Adam D. Barratt wrote: > The patch looks fine to me; thanks. As we're not upstream for the > script, I've BCCed the original author to make him aware of the patch, > and in case he has any issues / comments with it. Thanks for the notification, the patch

Bug#519339: ITP: tmux -- an alternative to screen, licensed under 3-BSD

2009-03-12 Thread Steve Kemp
On Thu Mar 12, 2009 at 22:37:41 +0100, Karl Ferdinand Ebert wrote: > - a more usable status line syntax, with the ability to display the first line > of output of a specific command; That is also possible in GNU Screen. > - a cleaner, modern, easily extended, BSD-licensed codebase. That w

Bug#518122: Acknowledgement (Security issue in mantis)

2009-03-04 Thread Steve Kemp
Looks like I filed this too soon - the bug is fixed in Lenny's package already. Steve -- -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#518122: Security issue in mantis

2009-03-04 Thread Steve Kemp
Package: mantis Severity: grave Tags: security Version: 1.1.6+dfsg-2 There's a security issue in the mantis version in lenny, at least, which allows registered users to run commands on the server. Details here: http://secunia.com/advisories/32314/ Patch here: http://mantisb

Bug#515762: ITP: libjs-jqueryui -- jQuery UI provides abstractions for low-level interaction and animation, advanced effects and high-level, themeable widgets, built on top of the jQuery JavaScript Li

2009-02-17 Thread Steve Kemp
On Tue Feb 17, 2009 at 11:52:10 -0300, Walter Cruz wrote: > > a. renamed to be libjs-jquery-ui > > Should I fill another ITP? I think there's no need, just rename the package prior to the upload. I don't think people would get too pedantic if you were changing the name to fit in with e

Bug#515762: ITP: libjs-jqueryui -- jQuery UI provides abstractions for low-level interaction and animation, advanced effects and high-level, themeable widgets, built on top of the jQuery JavaScript Li

2009-02-17 Thread Steve Kemp
On Tue Feb 17, 2009 at 11:36:11 -0300, Walter Cruz wrote: > * Package name: libjs-jqueryui > Version : 1.5.3 > Upstream Author : Paul Bakaus > * URL : http://jqueryui.com/ > * License : GPL, MIT/X > Programming Lang: JavaScript > Description : jQuery UI

Bug#493719: Confirming 493719

2009-01-21 Thread Steve Kemp
On Wed Jan 21, 2009 at 14:22:37 +, brian m. carlson wrote: >> Brian are you able to test the package uploaded to experimental, >> version 1.5.19-1? > > Yes. Great, thanks! >> That has had a couple of minor IMAP changes relating to handling >> NULL pointers, and I'd be curious to know if

Bug#509980: mutt: Mail-Followup-To removed when recalling postponed messages

2009-01-20 Thread Steve Kemp
This bug is a duplicate of 482883: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=482883 "mutt: removes custom headers on postpone+resume" I will merge the two bugs together for improved tracking. Steve -- # The Debian Security Audit Project. http://www.debian.org/security/aud

Bug#509581: $sendmail option unconditionally and wrongly uses --

2009-01-20 Thread Steve Kemp
The patch below might prevent this from happening. s...@gold:~/git/mutt/mutt-1.5.19$ diffs --- sendlib.c-orig 2009-01-20 22:57:28.0 + +++ sendlib.c 2009-01-20 22:57:57.0 + @@ -2206,7 +2206,11 @@ args = add_option (args, &argslen, &argsmax, "-R"); args = add_o

  1   2   3   4   5   >