Bug#386098: fluxbox: doesn't work properly with a borderless Eterm

2006-09-05 Thread Henri Salo
debconf information I tested that and you are right. I forward this to fluxbox -community. -- Henri Salo | [EMAIL PROTECTED] -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Bug#386098: [Fluxbox-users] Bug#386098: fluxbox: doesn't work properly with a borderless Eterm

2006-09-05 Thread Henri Salo
Pierrick Brossin wrote: On Tue, Sep 05, 2006 at 01:30:34PM +0300, Henri Salo wrote: if I add option -x to Eterm because I want it to be borderless .. Eterm -x -O --shade 40 --font-fx none --buttonBar no --scrollBar no it doesn't appear on the toolbar, [..] I tested that and yo

Bug#719811: comment

2013-12-27 Thread Henri Salo
Useful software. We already do have http://packages.debian.org/wheezy/python-ply which is dependency. I can help maintaining this package. --- Henri Salo -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Conta

Bug#734107: web2ldap: CVE-2013-7258: XSS vulnerability in displaying group DN and entry data in group administration UI

2014-01-03 Thread Henri Salo
Package: web2ldap Version: 1.1.43~dfsg-1 Severity: important Tags: security, fixed-upstream http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7258 http://www.web2ldap.de/changes-1.1.html http://secunia.com/advisories/56160 Please import new upstream version to unstable, thanks. --- Henri

Bug#734647: update

2014-02-16 Thread Henri Salo
Could not reproduce with upstream version 2014.02.13 (SHA1: d406caf93792a2c7378a691bf108df96b5012c11), which might be plausible solution. signature.asc Description: Digital signature

Bug#739229: arora: Supports insecure SSL ciphers

2014-02-16 Thread Henri Salo
Package: arora Version: 0.11.0-1 Severity: important Tags: security Arora is using insecure SSL ciphers. Please consider disabling following: TLS_DHE_RSA_WITH_DES_CBC_SHA TLS_DHE_DSS_WITH_DES_CBC_SHA TLS_RSA_WITH_DES_CBC_SHA TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_

Bug#711692: status

2014-02-16 Thread Henri Salo
This bug needs more information. What URL were you browsing and/or what Arora functionality did you use at the time of that error? signature.asc Description: Digital signature

Bug#737048: udd: import CVE identifiers from secure-testing SVN

2014-01-29 Thread Henri Salo
a given CVE identifier fixed > in? Questions are currently answered in Debian security tracker[1]. Maybe same code/logic can be used in other services and interfaces too. Please let me know if I can assist creating better UDD. 1: https://security-tracker.debian.org/tracker/ --- Henri Salo

Bug#738647: jansson: CVE-2013-6401: hash collision issue

2014-02-11 Thread Henri Salo
/42016a35c8907e477be73b0b5d06cc09af231ee4 --- Henri Salo signature.asc Description: Digital signature

Bug#731999: typo3-src: TYPO3-CORE-SA-2013-004

2013-12-11 Thread Henri Salo
-2013-7081 CVE-2013-7082 I'm happy to help if there is any questions about these issues. --- Henri Salo signature.asc Description: Digital signature

Bug#726934: questions

2013-10-20 Thread Henri Salo
How is this security related and why severity is serious? --- Henri Salo signature.asc Description: Digital signature

Bug#726936: more information needed

2013-10-20 Thread Henri Salo
What do you mean by this bug report? Please provide more information. --- Henri Salo signature.asc Description: Digital signature

Bug#727094: tritium: Usage not available

2013-10-22 Thread Henri Salo
Package: tritium Version: 0.3.8-2 Severity: normal user@unstable:~$ tritium -h Traceback (most recent call last): File "/usr/bin/tritium", line 170, in usage() NameError: name 'usage' is not defined Also the man page does not help at all. -- System Information: Debian Release: jessie/sid

Bug#727067: details

2013-10-22 Thread Henri Salo
.6, (C) 2005 by folk...@vanheusden.com Passphrase is:=20 """ You might want to use Python + paramiko to bruteforce the password. --- Henri Salo signature.asc Description: Digital signature

Bug#727067: status

2013-10-23 Thread Henri Salo
m package and I noticed all the same problems. --- Henri Salo signature.asc Description: Digital signature

Bug#735880: cxxtools: denial of service issue

2014-01-18 Thread Henri Salo
ttp://www.openwall.com/lists/oss-security/2014/01/18/5 --- Henri Salo signature.asc Description: Digital signature

Bug#735881: tntnet: denial of service issue

2014-01-18 Thread Henri Salo
thew Daley CVE request: http://www.openwall.com/lists/oss-security/2014/01/18/5 --- Henri Salo signature.asc Description: Digital signature

Bug#728235: info

2013-11-05 Thread Henri Salo
Confirmed. Maintainer do you know reason for this already or do you need help? --- Henri Salo signature.asc Description: Digital signature

Bug#730254: xen: CVE-2013-6375: Insufficient TLB flushing in VT-d (iommu) code

2013-11-23 Thread Henri Salo
Package: xen Version: 4.0.1-5.11 Severity: important Tags: security, patch, fixed-upstream http://www.openwall.com/lists/oss-security/2013/11/21/2 Description: An inverted boolean parameter resulted in TLB flushes not happening upon clearing of a present translation table entry. Retaining stale

Bug#725876: update

2013-11-27 Thread Henri Salo
Also reported in https://bugzilla.novell.com/show_bug.cgi?id=852368 --- Henri Salo signature.asc Description: Digital signature

Bug#730752: horizon: CVE-2013-6406: persistent XSS vulnerability

2013-11-28 Thread Henri Salo
Package: horizon Version: 2013.2-1 Severity: normal Tags: security, fixed-upstream Chris Chapman of Cisco PSIRT reports: The OpenStack web user interface (horizon) is vulnerable to XSS: While launching (or editing) an instance, injecting

Bug#731035: info

2013-12-01 Thread Henri Salo
I can help maintain this package (I'm not a Debian Developer yet). I have already been using these scripts with x220t device. --- Henri Salo signature.asc Description: Digital signature

Bug#751867: CVE-2014-3973: frontaccounting: multiple SQL injection vulnerabilities

2014-06-17 Thread Henri Salo
/mercurial/ci/7ab9e443a8eb9d1b03cbed33006b7665bda9383e http://frontaccounting.com/wb3/pages/posts/release-2.3.21201.php Please use CVE in changelog. I'm happy to help in case you need PoC / reproduce or some other help. --- Henri Salo signature.asc Description: Digital signature

Bug#751894: update

2014-06-17 Thread Henri Salo
Sorry I made copypaste mistake with version numbers. I haven't checked other versions than sid. I can check others if needed. signature.asc Description: Digital signature

Bug#751894: xen: CVE-2014-4021 / XSA-100

2014-06-17 Thread Henri Salo
Package: xen Version: 4.0.1-5.11 Severity: important Tags: security, fixed-upstream Please see for details: http://www.openwall.com/lists/oss-security/2014/06/17/6 Patch: http://seclists.org/oss-sec/2014/q2/att-549/xsa100.patch --- Henri Salo signature.asc Description: Digital signature

Bug#751902: duplicity: CVE-2014-3495: improper verification of SSL certificates

2014-06-17 Thread Henri Salo
used a wildcard certificate, and the hostname does not match the wildcard, it would still consider the connection valid. 1: https://bugs.launchpad.net/duplicity/+bug/1314234 I have no access to that bug item, but I can contact upstream if needed. --- Henri Salo signature.asc Description

Bug#751910: zabbix: CVE-2014-3005: local file inclusion via XXE

2014-06-17 Thread Henri Salo
Package: zabbix Version: 1:2.2.3+dfsg-1 Severity: grave Tags: security Advisory: http://seclists.org/fulldisclosure/2014/Jun/87 Below might be the fix, but please verify. --- Henri Salo svn diff -r46596:46600 Index: frontends/php/include/defines.inc.php

Bug#751940: update

2014-06-17 Thread Henri Salo
Do you have any more information about this? It is quite hard to fix security vulnerability without any details. --- Henri Salo signature.asc Description: Digital signature

Bug#751910: update

2014-06-17 Thread Henri Salo
Upstream bug report: https://support.zabbix.com/browse/ZBX-8151 signature.asc Description: Digital signature

Bug#751946: CVE-2014-4165: ntop: XSS in rrdPlugin

2014-06-18 Thread Henri Salo
Package: ntop Version: 3:5.0.1+dfsg1-2 Severity: normal Tags: security Original advisory: http://packetstormsecurity.com/files/127043/ntop-xss.txt PoC: http://127.0.0.1:3000/plugins/rrdPlugin?action=list&key=interfaces/eth0&title=interface%20eth0%3C/title%3E%3Cmarquee%3E --- He

Bug#751902: update

2014-06-19 Thread Henri Salo
y they've not opened it up yet.""" RedHat issue tracker has enough information to understand this security issue. If you want I can contact upstream too. --- Henri Salo signature.asc Description: Digital signature

Bug#751902: update

2014-06-19 Thread Henri Salo
I contacted upstream. Reference URL is now open. signature.asc Description: Digital signature

Bug#752622: mediawiki: 1.19.17 fixes security vulnerabilities

2014-06-25 Thread Henri Salo
etween 20:00-22:00 UTC we will release security and maintenance updates for all current and supported branches of the MediaWiki software. Downloads and patches will be available at that time. """ I don't yet have CVEs for these issues. --- Henri Salo signature.asc Description: Digital signature

Bug#744017: elfutils: CVE-2014-0172: Heap-based buffer overflow in libdw/elfutils

2014-04-09 Thread Henri Salo
Package: elfutils Version: 0.157-3 Severity: important Tags: security, fixed-upstream Details: http://www.openwall.com/lists/oss-security/2014/04/09/12 Contact me in case I can help somehow. --- Henri Salo signature.asc Description: Digital signature

Bug#732087: status

2014-04-22 Thread Henri Salo
Confirmed. Package is not in testing anymore. signature.asc Description: Digital signature

Bug#745595: wireshark: CVE-2014-2907: RTP dissector crash

2014-04-23 Thread Henri Salo
Package: wireshark Version: 1.10.6-1 Severity: important Tags: security, fixed-upstream http://www.wireshark.org/security/wnpa-sec-2014-06.html signature.asc Description: Digital signature

Bug#745619: dompdf: CVE-2014-2383: arbitrary file read

2014-04-23 Thread Henri Salo
Package: php-dompdf Version: 0.6.0~beta3+dfsg0-1 Severity: normal Tags: security, fixed-upstream https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-2383/ https://github.com/dompdf/dompdf/releases User is in risk if he/she has enabled DOMPDF_ENABLE_REM

Bug#742695: status

2014-03-26 Thread Henri Salo
Hello Mones, If you need help to fix this issue please contact me (I kept the unofficial repos for a while years ago). --- Henri Salo signature.asc Description: Digital signature

Bug#742857: mediawiki: login CSRF in Special:ChangePassword

2014-03-28 Thread Henri Salo
/SpecialChangePassword.php CVE request: http://www.openwall.com/lists/oss-security/2014/03/28/1 I have not verified this issue and I have not tested this in stable. Please ask if you need help. --- Henri Salo signature.asc Description: Digital signature

Bug#743033: vlc: CVE-2014-1684: crafted ASF file handling integer divide-by-zero DoS

2014-03-30 Thread Henri Salo
Package: vlc Version: 2.1.2-2 Severity: important Tags: security, fixed-upstream Patch available: http://git.videolan.org/gitweb.cgi/vlc.git/?p=vlc.git;a=commitdiff;h=98787d0843612271e99d62bee0dfd8197f0cf404 --- Henri Salo signature.asc Description: Digital signature

Bug#746738: CVE-2014-0181: Linux network reconfiguration due to incorrect netlink checks

2014-05-02 Thread Henri Salo
Source: linux Version: 3.14.2-1 Severity: important Tags: security, fixed-upstream Please see for details: http://www.openwall.com/lists/oss-security/2014/04/22/11 https://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=90f62cf30a78721641e08737bda787552428061e https://git.kernel.org/

Bug#513536: status

2014-05-03 Thread Henri Salo
What is the status with these issues in version currently in unstable? "It creates temporary files insecurely" are handled in different bug report so no need to comment about it :) --- Henri Salo signature.asc Description: Digital signature

Bug#747166: CVE-2014-0196: pty layer race condition memory corruption

2014-05-06 Thread Henri Salo
--- Henri Salo signature.asc Description: Digital signature

Bug#747280: python-soappy: CVE-2014-3242/CVE-2014-3243

2014-05-06 Thread Henri Salo
Package: python-soappy Version: 0.12.0-4 Severity: important Tags: security References: http://www.openwall.com/lists/oss-security/2014/05/06/1 http://www.pnigos.com/?p=260 Please contact me in case you need help with testing etc. --- Henri Salo signature.asc Description: Digital signature

Bug#748824: CVE-2014-3801: heat: User's provider templates show up in listing of resource types globally across tenants

2014-05-20 Thread Henri Salo
Package: heat Version: 2014.1-3 Severity: important Tags: security Please see for details: https://launchpad.net/bugs/1311223 --- Henri Salo signature.asc Description: Digital signature

Bug#749585: freerdp: CVE-2014-0250: integer overflows in xf_graphics.c

2014-05-28 Thread Henri Salo
multiplication with 4, the allocation still overflows (on 32 bit and 64 bit). xf_Bitmap_Decompress() appears to have a similar issue. """ --- Henri Salo signature.asc Description: Digital signature

Bug#749840: CVE-2013-4159: ctdb: temporary file vulnerabilities

2014-05-29 Thread Henri Salo
. Feel free to contact me in case you need any help. --- Henri Salo signature.asc Description: Digital signature

Bug#749840: CVE-2013-4159

2014-06-01 Thread Henri Salo
t stable release. --- Henri Salo signature.asc Description: Digital signature

Bug#750527: mediawiki: Javascript inject by anonymous users on private wikis with $wgRawHtml enabled

2014-06-04 Thread Henri Salo
://www.openwall.com/lists/oss-security/2014/06/03/7 --- Henri Salo signature.asc Description: Digital signature

Bug#425775: update

2014-06-11 Thread Henri Salo
Do you still have this issue with version 2.2.2-1? --- Henri Salo signature.asc Description: Digital signature

Bug#747326: CVE-2014-3122: try_to_unmap_cluster() should lock_page() before mlocking

2014-05-07 Thread Henri Salo
Package: linux Version: 3.14.2-1 Severity: important Tags: security, fixed-upstream Introduced by https://git.kernel.org/linus/b291f000393f5a0b679012b39d79fbc85c018233 Fixed by https://git.kernel.org/linus/57e68e9cd65b4b8eb4045a1e0d0746458502554c (v3.15-rc1) --- Henri Salo signature.asc

Bug#747549: CVE-2014-3430: Denial of service vulnerability

2014-05-09 Thread Henri Salo
Package: dovecot Version: 1:2.2.12-3 Severity: important Tags: security, fixed-upstream http://permalink.gmane.org/gmane.mail.imap.dovecot/77499 --- Henri Salo signature.asc Description: Digital signature

Bug#742059: nginx: CVE-2014-0133: SPDY heap buffer overflow

2014-03-18 Thread Henri Salo
Source: nginx Version: 1.4.6-1 Severity: grave Tags: security, fixed-upstream http://nginx.org/en/security_advisories.html http://nginx.org/download/patch.2014.spdy2.txt Not vulnerable: 1.5.12+, 1.4.7+ Vulnerable: 1.3.15-1.5.11 --- Henri Salo signature.asc Description: Digital signature

Bug#698490: CVE needed?

2013-01-19 Thread Henri Salo
Hello, Does this issue have CVE-identifier? I am happy to request one if there isn't one yet. - Henri Salo -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#698490: CVE

2013-01-22 Thread Henri Salo
CVE request http://www.openwall.com/lists/oss-security/2013/01/22/8 -- Henri Salo -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#698916: wordpress: multiple vulnerabilities fixed in 3.5.1

2013-01-25 Thread Henri Salo
Cave of the WordPress security team. - A cross-site scripting vulnerability in the external library Plupload. Thanks to the Moxiecode team for working with us on this, and for releasing Plupload 1.5.5 to address this issue. -- Henri Salo -- To UNSUBSCRIBE, email to debian-bugs-dist-requ

Bug#698916: update

2013-01-25 Thread Henri Salo
I have manually verified this issue with https://github.com/FireFart/WordpressPingbackPortScanner -- Henri Salo -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#698927: update

2013-01-25 Thread Henri Salo
Checked source code of squeeze and sid. Both affected. -- Henri Salo -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#698934: wordpress: CVE-2012-3414: README suggest downloading swfupload.swf with XSS vulnerability

2013-01-25 Thread Henri Salo
f(!self.a)self.a=!alert('horse');// Easy fix: remove those lines and say that "Your lovely Debian server doesn't need flash-files." ;) As far as I know first advisory for this issue is in here: https://nealpoole.com/blog/2012/05/xss-and-csrf-via-swf-applets-swfupload-plupl

Bug#697092: charybdis: CVE-2012-6084: remote denial of service

2013-01-01 Thread Henri Salo
/atheme/charybdis/commit/ac0707aa61d9c20e9b09062294701567c9f41595.patch - Henri Salo -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#697093: ircd-ratbox: CVE-2012-6084: remote denial of service

2013-01-01 Thread Henri Salo
://github.com/atheme/charybdis/commit/ac0707aa61d9c20e9b09062294701567c9f41595.patch - Henri Salo -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#697102: sqlite: Segmentation fault

2013-01-01 Thread Henri Salo
Package: sqlite Version: 2.8.17-6 Severity: normal I have following code: """ #!/usr/bin/env python # -*- coding: utf-8 -*- import sqlite print('Sqlite module version: %s' % sqlite.version) conn = sqlite.connect('test.db') connection = conn.cursor() arg = 'foo' connection.execute('insert into

Bug#697102: more info

2013-01-01 Thread Henri Salo
So it also crashes with: connection.execute('insert into test (id, arg) values (1, arg=:arg)', {"arg": arg}) It does not matter if there is a working database or not. I used empty file in the example. - Henri Salo -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lis

Bug#697443: zabbix: CVE-2012-6086: insecure curl usage

2013-01-05 Thread Henri Salo
Package: zabbix Version: 1:2.0.2+dfsg-4 Severity: important Tags: security Please see: https://support.zabbix.com/browse/ZBX-5924 zabbix-2.0.2/src/libs/zbxmedia/eztexting.c is still using curl insecure way. - Henri Salo -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org

Bug#697722: rails: CVE-2013-0156: Multiple vulnerabilities in parameter parsing in Action Pack

2013-01-08 Thread Henri Salo
CVE-2013-0156. Versions Affected: ALL versions Not affected: NONE Fixed Versions: 3.2.11, 3.1.10, 3.0.19, 2.3.15 """ This probably affects squeeze and wheezy too. Please contact me in case you need any help! - Henri Salo -- To UNSUBSCRIBE, email to debian-bugs-dist-r

Bug#696184: fail2ban: CVE-2012-5642: input variable quoting flaw on content

2012-12-17 Thread Henri Salo
http://sourceforge.net/mailarchive/message.php?msg_id=30193056 https://github.com/fail2ban/fail2ban/commit/83109bc https://bugzilla.redhat.com/show_bug.cgi?id=887914 https://bugs.gentoo.org/show_bug.cgi?id=447572 - Henri Salo -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subje

Bug#696187: CVE-2012-5643: cachemgr.cgi denial of service

2012-12-17 Thread Henri Salo
service attack when processing specially crafted requests. - Henri Salo -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#696329: lemonldap-ng: CVE-2012-6426: SAML messages signatures are not verified

2012-12-19 Thread Henri Salo
be released. Bug: http://jira.ow2.org/browse/LEMONLDAP-570 Patch: http://jira.ow2.org/secure/attachment/11153/lemonldap-ng-saml-signature-verification.patch CVE request http://www.openwall.com/lists/oss-security/2012/12/19/6 Checked from code that this is not yet patched in unstable. - Henri

Bug#696868: wordpress: CVE-2012-5868: wordpress_sec session cookie security vulnerability

2012-12-28 Thread Henri Salo
High Authentication: Not required to exploit Impact Type:Allows unauthorized disclosure of information http://whiteoaksecurity.com/blog/2012/12/17/cve-2012-5868-wordpress-342-sessions-not-terminated-upon-explicit-user-logout Please email me in case you need my help. - Henri Salo -- To UNSUBS

Bug#696868: Questions about CVE-2012-5868

2012-12-28 Thread Henri Salo
://osvdb.org/88611 3: http://bugs.debian.org/696868 - Henri Salo -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#696868: wordpress: CVE-2012-5868: wordpress_sec session cookie security vulnerability

2012-12-28 Thread Henri Salo
hiteoaksecurity.com/blog/2012/12/17/cve-2012-5868-wordpress-342-sessions-not-terminated-upon-explicit-user-logout - Henri Salo -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#696948: moin: remote code execution vulnerability

2012-12-29 Thread Henri Salo
Package: moin Version: 1.9.5-2 Severity: important Tags: security Details can be found at: http://moinmo.in/SecurityFixes A fix is available at: http://hg.moinmo.in/moin/1.9/rev/7e7e1cbb9d3f CVE request: http://www.openwall.com/lists/oss-security/2012/12/29/6 - Henri Salo -- To UNSUBSCRIBE

Bug#696949: moin: path traversal vulnerability

2012-12-29 Thread Henri Salo
Package: moin Version: 1.9.5-2 Severity: important Tags: security Details can be found at: http://moinmo.in/SecurityFixes A fix is available at: http://hg.moinmo.in/moin/1.9/rev/3c27131a3c52 CVE request: http://www.openwall.com/lists/oss-security/2012/12/29/8 - Henri Salo -- To UNSUBSCRIBE

Bug#675379: CVE-request

2012-10-06 Thread Henri Salo
CVE-request for this issue in here: http://www.openwall.com/lists/oss-security/2012/10/05/6 - Henri Salo -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#680034: testing

2012-10-06 Thread Henri Salo
I haven't previously used this package but I am happy to test this after upload. I hope new upload also fixed open security issues. - Henri Salo -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#672880: CVE-2012-2132: does not indicate whether or not an SSL certificate is valid

2012-10-09 Thread Henri Salo
gi?bug=672880#25 I can test other packages as well if needed. - Henri Salo -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#690118: CVE-2012-5166: Specially crafted DNS data can cause a lockup in named

2012-10-10 Thread Henri Salo
Package: bind9 Version: 1:9.7.3.dfsg-1~squeeze7 Severity: important Tags: security References: https://www.isc.org/software/bind/advisories/cve-2012-5166 https://kb.isc.org/article/AA-00801 - Henri Salo -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of

Bug#689031: CVE-2012-4448

2012-10-16 Thread Henri Salo
bugs.gentoo.org/show_bug.cgi?id=436198 https://secunia.com/advisories/50715/ http://osvdb.org/85731 - Henri Salo -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#688009: unreproducable

2012-09-20 Thread Henri Salo
Hello, I could not reproduce this issue in squeeze with amd64-machine using monkey package 0.9.3-1. Could you tell me more about your virtualization environment? - Henri Salo -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe"

Bug#688007: CVE-request done

2012-09-20 Thread Henri Salo
CVE request: http://www.openwall.com/lists/oss-security/2012/09/20/7 - Henri Salo -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#688009: unreproducable

2012-09-21 Thread Henri Salo
On Thu, Sep 20, 2012 at 01:37:35PM -0500, John Lightsey wrote: > On 09/20/2012 11:39 AM, Henri Salo wrote: > > I could not reproduce this issue in squeeze with amd64-machine > > using monkey package 0.9.3-1. Could you tell me more about your > > virtualization environment?

Bug#688008: CVE requested

2012-09-21 Thread Henri Salo
CVE-requested in oss-security: http://www.openwall.com/lists/oss-security/2012/09/21/8 - Henri Salo -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#688956: dracut: CVE-2012-4453: creates non-world readable initramfs images

2012-09-27 Thread Henri Salo
http://git.kernel.org/?p=boot/dracut/dracut.git;a=commit;h=e1b48995c26c4f06d1a71 Information from: http://www.openwall.com/lists/oss-security/2012/09/27/3 - Henri Salo -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble?

Bug#693391: claws-mail-vcalendar-plugin: credentials exposed on interface

2012-11-15 Thread Henri Salo
thin the status tray. """ No upstream fix for this yet. CVE-request by Ricardo Mones in here http://www.openwall.com/lists/oss-security/2012/11/15/5 Please contact me in case of any questions. Haven't verified this in Debian-package yet, but I can do that and even try to backport th

Bug#683283: Fixed in upstream

2012-11-16 Thread Henri Salo
This is now fixed in upstream. For more information: http://www.thewildbeast.co.uk/claws-mail/bugzilla/show_bug.cgi?id=2782#c4 -- Henri Salo -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#683283: .

2012-11-16 Thread Henri Salo
Sorry. Last message came for wrong bug-report. :( -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#693391: Fixed in upstream

2012-11-16 Thread Henri Salo
This is now fixed in upstream. For more information: http://www.thewildbeast.co.uk/claws-mail/bugzilla/show_bug.cgi?id=2782#c4 -- Henri Salo -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#693977: gimp: memory corruption vulnerability affecting 2.8.2

2012-11-22 Thread Henri Salo
=2873262fccba12af144ed96ed91be144d92ff2e1 (fixed in master and gimp-2-8) References: https://bugzilla.gnome.org/show_bug.cgi?id=687392 Details from CVE request: http://www.openwall.com/lists/oss-security/2012/11/21/2 Please note that other versions might be vulnerable as well. - Henri Salo -- To UNSUBSCRIBE, email to debian

Bug#684694: emacs24: CVE-2012-3479: GNU Emacs file-local variables

2012-08-12 Thread Henri Salo
2 I haven't manually verified this in Debian packages. Please ask in case you want me to do it. - Henri Salo -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#684695: emacs23: CVE-2012-3479: GNU Emacs file-local variables

2012-08-13 Thread Henri Salo
2 I haven't manually verified this in Debian packages. Please ask in case you want me to do it. - Henri Salo ps. another bug-report for emacs24 -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#685581: inn: CVE-2012-3523 prone to STARTTLS plaintext command injection

2012-08-21 Thread Henri Salo
ugzilla.redhat.com/show_bug.cgi?id=850478 Relevant upstream patch (the 'diff -Nurp inn-2.5.2/nnrpd/misc.c inn-2.5.3/nnrpd/misc.c' part): [4] ftp://ftp.isc.org/isc/inn/inn-2.5.2-2.5.3.diff.gz http://www.openwall.com/lists/oss-security/2012/08/21/8 http://www.openwall.com/lists/oss-security

Bug#651510: gpw does not generate full length passwords sometimes

2012-01-17 Thread Henri Salo
This is security issue as as some people are using this via wrappers/scripts. Also has impact to policies set by organizations. - Henri Salo -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#656247: phpmyadmin: Local File Inclusion via XXE-injection (CVE-2011-4107)

2012-01-17 Thread Henri Salo
Package: phpmyadmin Version: 4:3.3.7-6 Severity: normal Vulnerability in phpmyadmin in squeeze has been exploited wildly in public. Spion from #debian-security asked this to be handled quickly. Tracker: http://security-tracker.debian.org/tracker/CVE-2011-4107 Exploit: http://www.exploit-db.com/e

Bug#656247: phpmyadmin: Local File Inclusion via XXE-injection (CVE-2011-4107)

2012-01-17 Thread Henri Salo
tags security severity critical -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#656388: tucan

2012-01-19 Thread Henri Salo
CVE-2012-0063 is assigned to this case. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#678998: libpython3.1: python3.1 disables workaround for CVE-2011-3389 (#678998)

2012-06-25 Thread Henri Salo
What is status of this issue? Is there something I can do to help? - Henri Salo -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#679443: CVE-2012-2737: local file disclosure flaw

2012-06-28 Thread Henri Salo
Package: accountservice Version: 0.6.15-4 Severity: important Tags: security Hello, There is a new security vulnerability in accountservice. http://www.openwall.com/lists/oss-security/2012/06/28/9 http://cgit.freedesktop.org/accountsservice/commit/?id=69b526a6cd4c078732068de2ba393cf9242a404b htt

Bug#659339: imagemagick: Invalid validation DoS CVE-2012-0247/CVE-2012-02478

2012-02-10 Thread Henri Salo
Package: imagemagick Version: 8:6.6.0.4-3 Severity: important Tags: security Concerning ImageMagick 6.7.5-0 and earlier: CVE-2012-0247: When parsing a maliciously crafted image with incorrect offset and count in the ResolutionUnit tag in EXIF IFD0, ImageMagick copies two bytes into an invalid a

Bug#659379: uzbl: world-readable (and writable!) cookie jar

2012-02-11 Thread Henri Salo
On Sat, Feb 11, 2012 at 01:25:18PM +0100, Jakub Wilk wrote: > * Henri Salo , 2012-02-11, 14:11: > >>$ ls -ld ~/.local/{,share/{,uzbl/{,cookies.txt}}} > >>drwxr-xr-x 3 user users 4096 Feb 9 23:29 /home/user/.local/ > >>drwxr-xr-x 4 user users 4096 Feb 9 23:29 /home/u

Bug#659379: [Secure-testing-team] Bug#659379: uzbl: world-readable (and writable!) cookie jar

2012-02-11 Thread Henri Salo
ers to steal cookies (and tamper with them). > > -- > Jakub Wilk Does this security-issue have CVE-identifier? I can request one from oss-security mailing list if ID hasn't been assigned. - Henri Salo -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org w

  1   2   3   4   >