Bug#402289: bochsbios

2007-02-15 Thread Marc Deslauriers
On Wed, 2007-02-14 at 18:09 +0100, Robert Millan wrote: > bochsbios is part of the bochs source package, so Bochs is always going > to be in proper sync with it, no matter what we do. > > So, why not just updating bochs to CVS version? Actually, after investigating a little further, it's not that

Bug#402289: using -kernel-kqemu causes kernel panics in guest OS

2007-02-02 Thread Marc Deslauriers
This is caused by qemu using the PC-BIOS from the bochsbios package instead of the one packages with the qemu tarball. It's from bochs, but a much more recent CVS version. Marc. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Bug#604706: pbuilder: manpage tests fail if locale isn't setup

2010-11-23 Thread Marc Deslauriers
Package: pbuilder Version: 0.199 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu natty ubuntu-patch *** /tmp/tmppAGg53 In Ubuntu, we've applied the attached patch to achieve the following: * debian/rules: install temporary locale so man page tests don'

Bug#604706: Acknowledgement (pbuilder: manpage tests fail if locale isn't setup)

2010-11-23 Thread Marc Deslauriers
Whoops, I forgot to clean up the temporary directory. Here's a second patch that does that. Marc. diff -Nru pbuilder-0.199ubuntu3/debian/rules pbuilder-0.199ubuntu4/debian/rules --- pbuilder-0.199ubuntu3/debian/rules 2010-11-23 11:36:33.0 -0500 +++ pbuilder-0.199ubuntu4/debian/rules 2010

Bug#731262: gem2deb: DH_RUBY_IGNORE_TESTS no longer handled correctly

2013-12-03 Thread Marc Deslauriers
Package: gem2deb Version: 0.6.0 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu trusty ubuntu-patch *** /tmp/tmpeovyma/bug_body In Ubuntu, the attached patch was applied to achieve the following: * lib/gem2deb/dh_ruby.rb: properly handle test failures

Bug#683403: ca-certificates: Missing Verisign md2 certs due to broken extract script

2013-12-05 Thread Marc Deslauriers
Package: ca-certificates Version: 20130906 Followup-For: Bug #683403 User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu trusty ubuntu-patch *** /tmp/tmpG_KsCC/bug_body Openssl doesn't appear to correctly handle not having both versions of the same signed roots. I have decided that we n

Bug#731480: hplip: CVE-2013-6427: insecure (undocumented) auto update feature

2013-12-12 Thread Marc Deslauriers
Package: hplip Version: 3.13.11-1 Followup-For: Bug #731480 User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu trusty ubuntu-patch -- Package-specific info: *** /tmp/tmp2P2w3P/bug_body In Ubuntu, the attached patch was applied to achieve the following: * debian/non-shipped-files.t

Bug#732705: gnupg: Patch for CVE-2013-4576 not being applied in 1.4.15-2

2013-12-20 Thread Marc Deslauriers
Package: gnupg Severity: normal Tags: security gnupg 1.4.15-2 claims to fix CVE-2013-4576, but the patch isn't actually being applied during build. It is in the wrong directory, and isn't listed in the series file. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a sub

Bug#732710: openssl: rdrand should be disabled by default

2013-12-20 Thread Marc Deslauriers
Package: openssl Version: 1.0.1e-4 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu trusty ubuntu-patch *** /tmp/tmpVmJEAg/bug_body OpenSSL uses rdrand exclusively if it is available. http://seclists.org/fulldisclosure/2013/Dec/99 http://wiki.openssl.org

Bug#732714: ca-certificates: New version of certdata.txt distrusts AC DG Tresor SSL CA

2013-12-20 Thread Marc Deslauriers
Package: ca-certificates Severity: normal Tags: security Mozilla has released nss 3.15.3.1 that specifically distrusts the AC DG Tresor SSL CA. ca-certificates needs to be updated to the new certdata.txt. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of

Bug#729006: FTBFS: missing libmockito-java dependency

2013-11-07 Thread Marc Deslauriers
Package: maven-javadoc-plugin Version: 2.9.1-1 Severity: serious Tags: patch Justification: fails to build from source (but built successfully in the past) User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu trusty ubuntu-patch *** /tmp/tmpvJaNhd/bug_body In Ubuntu, the attached patch w

Bug#729006: FTBFS: missing libmockito-java dependency

2013-11-07 Thread Marc Deslauriers
On 13-11-07 04:05 PM, Emmanuel Bourg wrote: > The tests are ignored in maven-javadoc-plugin (maven.test.skip is set to > true in debian/maven.properties), so adding this dependency will make no > difference. Do you have a log of the build failure? > Here is the build log we were getting: https:/

Bug#729006: closed by Emmanuel Bourg (Bug#729006: fixed in maven-javadoc-plugin 2.9.1-2)

2013-11-08 Thread Marc Deslauriers
Thank you Emmanuel! -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#726601: libcommons-fileupload-java: CVE-2013-218

2013-11-13 Thread Marc Deslauriers
Package: libcommons-fileupload-java Version: 1.3-2 Followup-For: Bug #726601 User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu trusty ubuntu-patch *** /tmp/tmpA8shKI/bug_body In Ubuntu, the attached patch was applied to achieve the following: * SECURITY UPDATE: arbitrary file overw

Bug#740255: python2.7: backported ssl.match_hostname() should support RFC 6125

2014-02-27 Thread Marc Deslauriers
Package: python2.7 Version: 2.7.6-5 Severity: normal Python 2.7 in Debian/Ubuntu has a patch that backports ssl.match_hostname(). Upstream has modified that function in recent python versions to match RFC 6125 as a security improvement. This should be added to the patch in the python2.7 package.

Bug#738024: scid: please provide a desktop file and icons

2014-04-04 Thread Marc Deslauriers
Package: scid Version: 1:4.3.0.cvs20120311-1 Followup-For: Bug #738024 User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu trusty ubuntu-patch *** /tmp/tmpzrF_88/bug_body In Ubuntu, the attached patch was applied to achieve the following: * Added .desktop file (LP: #1277520) Thanks

Bug#746663: opensc: SmartCard-HSM card does not list RSA 2048 public keys

2014-05-02 Thread Marc Deslauriers
Package: opensc Version: 0.13.0-3 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu utopic ubuntu-patch *** /tmp/tmpsB0qMw/bug_body OpenSC 0.13.0 does not list RSA public keys which are of 2048 bits in size on a SmartCard-HSM smart card. Although the keys

Bug#746694: opensc: Support for Feitian ePass2003

2014-05-02 Thread Marc Deslauriers
Package: opensc Version: 0.13.0-3 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu utopic ubuntu-patch *** /tmp/tmprA8Vep/bug_body In Ubuntu, the attached patch was applied to achieve the following: * debian/patches/0002-fix-epass2003-support-from-upst

Bug#698963: libssh: CVE-2013-0176 NULL dereference denial of service

2013-01-25 Thread Marc Deslauriers
Package: libssh Version: 0.5.3-1 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu raring ubuntu-patch *** /tmp/tmpWGDf6_/bug_body In Ubuntu, the attached patch was applied to achieve the following: * SECURITY UPDATE: denial of service via NULL derefere

Bug#692345: tiff: CVE-2012-4564

2012-11-15 Thread Marc Deslauriers
Package: tiff Version: 4.0.2-4 Followup-For: Bug #692345 User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu raring ubuntu-patch *** /tmp/tmpm0_BMg/bug_body In Ubuntu, the attached patch was applied to achieve the following: * SECURITY UPDATE: denial of service and possible code exec

Bug#692791: members of lpadmin can read every file on server via cups

2012-11-27 Thread Marc Deslauriers
FYI, as a security fix for our stable releases in Ubuntu, we plan on disabling cupsd.conf modification in the web interface entirely. Attached is the patch we plan on using. Marc. Description: fix privilege escalation by disabling config file editing via the web interface Author: Marc

Bug#692791: members of lpadmin can read every file on server via cups

2012-11-27 Thread Marc Deslauriers
On 12-11-27 03:51 PM, Didier 'OdyX' Raboud wrote: > Le mardi, 27 novembre 2012 15.30:46, Marc Deslauriers a écrit : >> FYI, as a security fix for our stable releases in Ubuntu, we plan on >> disabling cupsd.conf modification in the web interface entirely. >> Attache

Bug#659748: tomcat6: regression fix for CVE-2012-0022

2012-02-13 Thread Marc Deslauriers
Package: tomcat6 Version: 6.0.35-1 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu precise ubuntu-patch *** /tmp/tmpQZSwrL/bug_body In Ubuntu, the attached patch was applied to achieve the following: * debian/patches/0011-CVE-2012-0022-regression-fix.p

Bug#659983: dhcpcd: Fix for CVE-2011-0996

2012-02-15 Thread Marc Deslauriers
Package: dhcpcd Version: 1:3.2.3-9 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu precise ubuntu-patch *** /tmp/tmpYPCJL7/bug_body In Ubuntu, the attached patch was applied to achieve the following: * SECURITY UPDATE: dhcpcd before 5.2.12 allows re

Bug#659035: mumble: Fix certificate validation with QT 4.8.0

2012-02-07 Thread Marc Deslauriers
-demand root cert loading is not working with mumble. +Author: Marc Deslauriers +Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/mumble/+bug/928296 + +Index: mumble-1.2.3/src/SSL.cpp +=== +--- mumble-1.2.3.orig/src/SSL.cpp 2012-02

Bug#659039: mumble: Mumble database is world-readable

2012-02-07 Thread Marc Deslauriers
Package: mumble Version: 1.2.3-2 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu precise ubuntu-patch *** /tmp/tmpbbtG6M/bug_body By default, Mumble creates it's config file and database with world-readable permissions. The database may contain passwords.

Bug#681219: freemind: Patch to make data files open properly

2012-07-11 Thread Marc Deslauriers
Package: freemind Version: 0.9.0+dfsg-2 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu quantal ubuntu-patch *** /tmp/tmpVn1uqL/bug_body In Ubuntu, the attached patch was applied so users can double click on data files and get the application to open them

Bug#682115: tiff: CVE-2012-3401 heap overflow in tiff2pdf

2012-07-19 Thread Marc Deslauriers
Package: tiff Version: 4.0.2-1 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu quantal ubuntu-patch *** /tmp/tmpgGHwFf/bug_body In Ubuntu, the attached patch was applied to achieve the following: * SECURITY UPDATE: possible arbitrary code execution via

Bug#682115: tiff: CVE-2012-3401 heap overflow in tiff2pdf

2012-07-21 Thread Marc Deslauriers
On Sat, 2012-07-21 at 20:57 -0400, Jay Berkenbilt wrote: > Marc Deslauriers wrote: > > > *** /tmp/tmpgGHwFf/bug_body > > In Ubuntu, the attached patch was applied to achieve the following: > > > > * SECURITY UPDATE: possible arbitrary code execution via hea

Bug#683403: ca-certificates: Missing Verisign md2 certs due to broken extract script

2012-07-31 Thread Marc Deslauriers
Package: ca-certificates Version: 20111211 Severity: normal Verisign shipped G1 PCA Roots with md2 signatures on them. At some point, they resigned those roots using SHA1, but requested that the original certs keep shipping in Mozilla's cert list as they had issued intermediates with AKIs that poi

Bug#683403:

2012-08-01 Thread Marc Deslauriers
OK, I am now convinced that we don't need the md2 certs, applications should be able to validate using the sha1 certs. I believe a bug in libsoup/glib-networking is causing the sha1 certs to not be used. We still should improve ca-certificates to make _sure_ that we're shipping the sha1 certs inst

Bug#684300: policykit-1-gnome: Authentication dialog window loses focus easily

2012-08-08 Thread Marc Deslauriers
Package: policykit-1-gnome Version: 0.105-1 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu quantal ubuntu-patch *** /tmp/tmpxkPNXr/bug_body In Ubuntu, the attached patch was applied to achieve the following: * debian/patches/08-fresh-x11-timestamps.pa

Bug#692791: members of lpadmin can read every file on server via cups

2012-11-28 Thread Marc Deslauriers
On 12-11-27 11:38 PM, Michael Sweet wrote: > After looking at this patch in detail, it doesn't actually prevent users in > the lpadmin group from modifying cupsd.conf and performing the specified > privilege escalation. > > An alternate fix for cups-1.5 and earlier that specifically addresses th

Bug#692791: #692791 - CVE-2012-5519 - cups lpadmin-to-root privilege escalation - Proposed solutions

2012-11-29 Thread Marc Deslauriers
On 12-11-29 05:30 AM, Didier 'OdyX' Raboud wrote: > B) Disable any remote configuration by lpadmin users > > This has been attempted by Marc on [1]. For now, it is incomplete as it still > allows lpadmin users to HTTP PUT updates to the configuration files. > > Pros: + Addresses the problem in a

Bug#692791: members of lpadmin can read every file on server via cups

2012-11-29 Thread Marc Deslauriers
Michael, On 12-11-29 10:12 AM, Michael Sweet wrote: >> So, your alternate fix doesn't actually solve the problem as I can still >> do something like: >> >> PageLog /var/log/cups/../../../etc/shadow > > Adding a check for "../" in the path will catch that, easy fix... > >> Also, there are a lot o

Bug#710344: (no subject)

2013-06-05 Thread Marc Deslauriers
Here's what I did...not sure if it's the best way to fix it though: --- libxcb-1.8.1.orig/tests/Makefile.am +++ libxcb-1.8.1/tests/Makefile.am @@ -12,9 +12,6 @@ check_PROGRAMS = check_all check_all_SOURCES = check_all.c check_suites.h check_public.c -all-local:: - $(RM) CheckLog*.xml -

Bug#700098: cfingerd: CVE-2013-1049 remote buffer overflow

2013-02-08 Thread Marc Deslauriers
Package: cfingerd Version: 1.4.3-3 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu raring ubuntu-patch *** /tmp/tmpntc4Ea/bug_body In Ubuntu, the attached patch was applied to achieve the following: * SECURITY UPDATE: fix buffer overflow in rfc1413 (i

Bug#700098: (no subject)

2013-02-08 Thread Marc Deslauriers
severity 700098 grave -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#701929: quilt push leaves behind files in /tmp

2013-02-28 Thread Marc Deslauriers
Package: quilt Version: 0.60-7 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu raring ubuntu-patch *** /tmp/tmprMnRKR/bug_body The push_timeskew patch leaves behind temp files in /tmp when quilt push is used. In Ubuntu, the attached patch was applied to

Bug#576680: rkhunter: Fix false positive Xzibit rootkit detection

2010-04-06 Thread Marc Deslauriers
Package: rkhunter Version: 1.3.6-3 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu lucid ubuntu-patch *** /tmp/tmpxR3xQ8 In Ubuntu, we've applied the attached patch to achieve the following: * debian/patches/20_fix_strings_check.diff: fix hdparm false

Bug#629830: gimp vulnerable to CVE-2011-1782

2011-06-08 Thread Marc Deslauriers
Package: gimp Version: 2.6.11-2 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu oneiric ubuntu-patch *** /tmp/tmphuxFni In Ubuntu, the attached patch was applied to achieve the following security fix: * SECURITY UPDATE: denial of service and possible c

Bug#636168: gcstar: Version 1.6.2 is now available

2011-07-31 Thread Marc Deslauriers
Package: gcstar Severity: normal Tags: sid Upstream has released version 1.6.2 on july 10th. Please update the version in unstable. Thanks! -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#625966: libmodplug <= 0.8.8.2 .abc Stack-Based Buffer Overflow

2011-08-05 Thread Marc Deslauriers
Package: libmodplug Version: 1:0.8.8.2-3 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu oneiric ubuntu-patch *** /tmp/tmpNcrGvL In Ubuntu, the attached patch was applied to fix the security issue: * SECURITY UPDATE: multiple security issues in ABC loa

Bug#717272: apache2: Fix for CVE-2013-1896

2013-07-18 Thread Marc Deslauriers
Package: apache2 Version: 2.4.4-6 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu saucy ubuntu-patch *** /tmp/tmp5THIhe/bug_body In Ubuntu, the attached patch was applied to achieve the following: * SECURITY UPDATE: denial of service via MERGE request

Bug#717910: apache2: incorrect lbmethod_* module dependency

2013-07-26 Thread Marc Deslauriers
Package: apache2 Version: 2.4.6-2 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu saucy ubuntu-patch *** /tmp/tmpJJNbzc/bug_body In Ubuntu, the attached patch was applied to achieve the following: * Fixed module dependencies (LP: #1205314) - debia

Bug#721772: puppet: autopkgtest runs tests in wrong order

2013-09-03 Thread Marc Deslauriers
Package: puppet Version: 3.2.4-3 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu saucy ubuntu-patch *** /tmp/tmpDyephT/bug_body In Ubuntu, the attached patch was applied to achieve the following: * debian/tests/control: invert order of tests, or else

Bug#721976: ca-certificates contains both server and email certificates

2013-09-06 Thread Marc Deslauriers
Package: ca-certificates Version: 20130610 Severity: normal The ca-certificates package ships certificates which are trusted for either CKA_TRUST_SERVER_AUTH or CKA_TRUST_EMAIL_PROTECTION. Some of those CA certs are only valid for one or the other, and bundling them together is problematic. For

Bug#722335: sudo init script should set date to epoch, not 1985-01-01

2013-09-10 Thread Marc Deslauriers
Package: sudo Version: 1.8.6p3-0ubuntu3 Severity: normal Tags: security Sudo treats filestamps set to epoch as invalid, so the init script should set the contents of /var/lib/sudo to epoch, and not 19850101. ie: find /var/lib/sudo -exec touch -d @0 '{}' \; instead of: find /var/lib/sudo -exec t

Bug#703251: gcstar 1.7.0

2013-08-07 Thread Marc Deslauriers
FYI, I've just uploaded a gcstar 1.7.0 package to Ubuntu. It contains 1.7.0, plus a couple of plugin fixes for the sites I use. Perhaps you could base your Debian package on it. Thanks, Marc. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe"

Bug#635901: stereograph: fix for FTBFS

2011-07-29 Thread Marc Deslauriers
Package: stereograph Version: 0.30a-6 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu oneiric ubuntu-patch *** /tmp/tmpbOzU85 In Ubuntu, the attached patch was applied to fix a FTBFS: * Changed library references, changed and updated parameters to

Bug#554759: gupnp-ui: Fix for FTBFS

2011-07-29 Thread Marc Deslauriers
Package: gupnp-ui Version: 0.1.1-3 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu oneiric ubuntu-patch *** /tmp/tmp8b36Ny In Ubuntu, the attached patch was applied to fix the FTBFS: * configure, configure.ac: add libgupnp libraries to LIBS in ord

Bug#714363: libgd2: Wrong quoting in version strings

2013-06-28 Thread Marc Deslauriers
Package: libgd2 Version: 2.1.0-1 Severity: important Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu saucy ubuntu-patch *** /tmp/tmp_IJ9Y5/bug_body In Ubuntu, the attached patch was applied to achieve the following: * debian/patches/fix-compiled-in-version.patch: upda

Bug#661849: virtinst: Fix path to qemu-dm

2012-03-01 Thread Marc Deslauriers
4 15:52:46.0 -0500 @@ -0,0 +1,20 @@ +Description: fix path to the qemu-dm binary +Author: Marc Deslauriers +Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/virtinst/+bug/936048 + +Index: virtinst-0.600.1/virtinst/Guest.py +===

Bug#648038: tomcat6: CVE-2011-1184 and CVE-2011-2526 fixes

2011-11-08 Thread Marc Deslauriers
Package: tomcat6 Version: 6.0.32-6 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu precise ubuntu-patch *** /tmp/tmpibvEX2 In Ubuntu, the attached patch was applied to achieve the following: Fixes two security issues (CVE-2011-1184 and CVE-2011-2526)

Bug#651844: libarchive: fix for CVE-2011-1777 and CVE-2011-1778

2011-12-12 Thread Marc Deslauriers
Package: libarchive Version: 2.8.5-3 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu precise ubuntu-patch *** /tmp/tmp_Ru6Y6 In Ubuntu, the attached patch was applied to achieve the following: * SECURITY UPDATE: arbitrary code execution via iso9660 ove

Bug#648311: use of pkexec

2011-12-14 Thread Marc Deslauriers
I didn't submit the Ubuntu patch as the Debian synaptic package uses su-to-root, and not gksu as Ubuntu does. Would it be ok to unconditionally use pkexec as the wrapper instead of su-to-root in Debian? -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "

Bug#652105: python-httplib2: Patch to use system ca certs instead of bundled ones

2011-12-14 Thread Marc Deslauriers
atch 2011-12-14 15:21:35.0 -0500 @@ -0,0 +1,31 @@ +Description: Use system ca certificates, not the bundled ones +Author: Marc Deslauriers +Forwarded: No, distro-specific +Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/python-httplib2/+bug/882027 + +Index: python-htt

Bug#652105: Better patch

2011-12-15 Thread Marc Deslauriers
Here's a better patch for the issue. Thanks. Description: Use system ca certificates, not the bundled ones Author: Marc Deslauriers Forwarded: No, distro-specific Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/python-httplib2/+bug/882027 Index: python-httplib2-0.7.2/python2/htt

Bug#652649: jasper: Fix for CVE-2011-4516 and CVE-2011-4517

2011-12-19 Thread Marc Deslauriers
Package: jasper Version: 1.900.1-12 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu precise ubuntu-patch *** /tmp/tmpCx1dv3 In Ubuntu, the attached patch was applied to achieve the following: * SECURITY UPDATE: denial of service and possible code execu

Bug#657445:

2012-01-26 Thread Marc Deslauriers
Looks like this: http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/auth-options.c.diff?r1=1.53;r2=1.54 -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#664990: libzip1: CVE-2012-1162 CVE-2012-1163 Incorrect loop construct and numeric overflow

2012-03-28 Thread Marc Deslauriers
Package: libzip Version: 0.10-1 Followup-For: Bug #664990 User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu precise ubuntu-patch *** /tmp/tmpvDE7OS/bug_body In Ubuntu, the attached patch was applied to achieve the following: * SECURITY UPDATE: arbitrary code execution or information

Bug#673451: lintian: improve use of readelf

2012-05-28 Thread Marc Deslauriers
On Sun, 2012-05-27 at 09:21 +0200, Niels Thykier wrote: > tags 673451 + moreinfo > thanks > > > On 2012-05-18 20:50, Marc Deslauriers wrote: > > [...] > > > > *** /tmp/tmpiekV9j/bug_body > > In Ubuntu, the attached patch was applied to achieve the fol

Bug#673449: lintian: fix Ubuntu compatibility in binaries-hardening test

2012-05-18 Thread Marc Deslauriers
Package: lintian Version: 2.5.7 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu quantal ubuntu-patch *** /tmp/tmphAWAWQ/bug_body In Ubuntu, the attached patch was applied to achieve the following: * t/tests/binaries-hardening/debian/Makefile: stack pro

Bug#673451: lintian: improve use of readelf

2012-05-18 Thread Marc Deslauriers
Package: lintian Version: 2.5.7 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu quantal ubuntu-patch *** /tmp/tmpiekV9j/bug_body In Ubuntu, the attached patch was applied to achieve the following: * collection/objdump-info: objdump-info switched from o

Bug#672492: CVE-2012-2141

2012-05-23 Thread Marc Deslauriers
Package: net-snmp Version: 5.4.3~dfsg-2.4 Followup-For: Bug #672492 User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu quantal ubuntu-patch *** /tmp/tmp7KXNLG/bug_body In Ubuntu, the attached patch was applied to achieve the following: * SECURITY UPDATE: denial of service via SNMP GE

Bug#775421: logrotate: manpage refers to /var/lib/logrotate.status

2015-09-15 Thread Marc Deslauriers
Package: logrotate Version: 3.8.7-2 Followup-For: Bug #775421 User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu wily ubuntu-patch *** /tmp/tmpaYlMlo/bug_body In Ubuntu, the attached patch was applied to achieve the following: * debian/patches/manpage.patch: fix state file path in F

Bug#858564: (no subject)

2017-03-24 Thread Marc Deslauriers
We're hitting the same issue in Ubuntu: https://bugs.launchpad.net/ubuntu/+source/samba/+bug/1675698 "follow symlinks = no" is required to reproduce it.

Bug#786555: sudo: time stamp files no longer invalidated at boot

2015-05-22 Thread Marc Deslauriers
Package: sudo Version: Severity: normal Tags: security Sudo 1.8.10 switched to a new time stamp file format that uses the monotonic clock. Timestamp files moved from /var/lib/sudo to /var/lib/sudo/ts. At boot, the contents of the /var/lib/sudo/ts directory needs to be deleted, as per the warning

Bug#784773: icu: CVE-2015-8146 and CVE-2015-8147

2015-05-08 Thread Marc Deslauriers
Package: icu Version: 52.1-8 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu wily ubuntu-patch *** /tmp/tmp8_oq5o/bug_body In Ubuntu, the attached patch was applied to achieve the following: * SECURITY UPDATE: heap overflow via incorrect isolateCount

Bug#786555: sudo: time stamp files no longer invalidated at boot

2015-06-05 Thread Marc Deslauriers
Package: sudo Version: 1.8.12-1 Followup-For: Bug #786555 User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu wily ubuntu-patch *** /tmp/tmp8y8IwQ/bug_body In Ubuntu, the attached patch was applied to achieve the following: * Use tmpfs location to store timestamp files (LP: #1458031)

Bug#772648: graphviz: format string vulnerability (CVE-2014-9157)

2014-12-09 Thread Marc Deslauriers
Package: graphviz Version: 2.38.0-6 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu vivid ubuntu-patch *** /tmp/tmp5q_TKj/bug_body In Ubuntu, the attached patch was applied to achieve the following: * SECURITY UPDATE: Format string vulnerability may a

Bug#776589: unzip: CVE-2014-9636 heap overflow via mismatched block sizes

2015-01-29 Thread Marc Deslauriers
Package: unzip Version: 6.0-13 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu vivid ubuntu-patch *** /tmp/tmp7DfOwv/bug_body In Ubuntu, the attached patch was applied to achieve the following: * SECURITY UPDATE: heap overflow via mismatched block siz

Bug#776947: nut: Default ups.conf should have maxretry setting above examples section

2015-02-03 Thread Marc Deslauriers
Package: nut Version: 2.7.1-1 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu vivid ubuntu-patch *** /tmp/tmpvfdwEw/bug_body In Ubuntu, the attached patch was applied to achieve the following: Default/sample ups.conf has maxretry setting at end. Above t

Bug#781526: tiff: More security-relevant commits

2015-03-30 Thread Marc Deslauriers
Package: tiff Version: 4.0.3-12.3 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu vivid ubuntu-patch *** /tmp/tmpy2ySAQ/bug_body In Ubuntu, the attached patch was applied to achieve the following: * SECURITY UPDATE: Backport more security-relevant com

Bug#795429: CVE-2015-5177

2015-08-28 Thread Marc Deslauriers
Package: openslp-dfsg Version: 1.2.1-10 Followup-For: Bug #795429 User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu wily ubuntu-patch *** /tmp/tmpHzlE84/bug_body In Ubuntu, the attached patch was applied to achieve the following: * SECURITY UPDATE: denial of service via double free

Bug#789686: putty: Security fix may get optimized away by compiler

2015-06-23 Thread Marc Deslauriers
Package: putty Version: 0.62-9+deb7u2 Severity: normal Tags: security -- System Information: Debian Release: jessie/sid APT prefers vivid-updates APT policy: (500, 'vivid-updates'), (500, 'vivid-security'), (500, 'vivid-proposed'), (500, 'vivid'), (100, 'vivid-backports') Architecture: amd6

Bug#789686: (no subject)

2015-06-23 Thread Marc Deslauriers
Whoops, that's not the official repo, this is the right URL: http://tartarus.org/~simon-git/gitweb/?p=putty.git;a=commit;h=aa5bae89 -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#803012: tar ftbfs everywhere (test suite errors)

2015-11-03 Thread Marc Deslauriers
Package: tar Version: 1.28-2 Followup-For: Bug #803012 User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu xenial ubuntu-patch *** /tmp/tmp70_1Po/bug_body In Ubuntu, the attached patch was applied to achieve the following: * debian/patches/use-sort-in-t-dir-tests.diff: upstream patch

Bug#751860: (no subject)

2014-11-10 Thread Marc Deslauriers
I've attached a patch to the upstream bug I've filed about this issue: https://bugzilla.gnome.org/show_bug.cgi?id=739895 -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#717058: Cannot set nonstandard baudrates on /dev/ttyACMn devices

2014-10-29 Thread Marc Deslauriers
Package: pyserial Version: 2.6-1.1 Followup-For: Bug #717058 User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu vivid ubuntu-patch *** /tmp/tmpYJUV0X/bug_body In Ubuntu, the attached patch was applied to achieve the following: * Adding patch for accepting any speed (Debian #717058)

Bug#767403: chkrootkit: incorrect PID length smashes stack

2014-10-30 Thread Marc Deslauriers
Package: chkrootkit Version: 0.50-2 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu vivid ubuntu-patch *** /tmp/tmptrJm3i/bug_body In Ubuntu, the attached patch was applied to achieve the following: * debian/patches/fix-stack-smash.patch: Fix segfault

Bug#766005: xchat only supports SSLv3

2014-10-20 Thread Marc Deslauriers
t-2.8.8/debian/patches/dont_force_sslv3.patch 2014-10-20 11:39:17.0 -0400 @@ -0,0 +1,32 @@ +Description: Don't force the use of SSLv3 +Author: Marc Deslauriers +Bug: http://sourceforge.net/p/xchat/bugs/1598/ +Bug-Ubuntu: https://bugs.launchpad.net/xchat-gnome/+bug/1381484 +Forwarded:

Bug#766065: xchat-gnome: Should not force the use of SSLv3

2014-10-20 Thread Marc Deslauriers
2-31 19:00:00.0 -0500 +++ xchat-gnome-0.30.0~git20131003.d20b8d+really20110821/debian/patches/dont_force_sslv3.patch 2014-10-20 10:14:37.0 -0400 @@ -0,0 +1,28 @@ +Description: Don't force the use of SSLv3 +Author: Marc Deslauriers +Bug: https://bugzilla.gnome.org/show_bug.cgi?id=73

Bug#770033: partman-efi: Should force umask in mount options

2014-11-18 Thread Marc Deslauriers
Package: partman-efi Version: 25 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu vivid ubuntu-patch *** /tmp/tmpryAK4b/bug_body In Ubuntu, the attached patch was applied to achieve the following: * fstab.d/efi: force umask in mount options to ensure

Bug#870273: imagemagick: regression in 8:6.8.9.9-5+deb8u10

2017-07-31 Thread Marc Deslauriers
Package: imagemagick Version: 8:6.8.9.9-5+deb8u10 Severity: normal Ubuntu imagemagick security updates are based on Debian security updates. The latest round of jessie updates introduced a regression. Please see the downstream bug report for a reproducer script: https://bugs.launchpad.net/ubuntu

Bug#527474: pango1.0: integer overflow in heap allocation size calculations

2009-05-08 Thread Marc Deslauriers
Here is the upstream commit: http://git.gnome.org/cgit/pango/commit/?id=4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#524806: poppler: multiple vulnerabilities

2009-05-13 Thread Marc Deslauriers
Here are the patches Ubuntu used: http://patches.ubuntu.com/by-release/extracted/intrepid-security/p/poppler/0.8.7-1ubuntu0.2/64_security_jbig2.patch http://patches.ubuntu.com/by-release/extracted/hardy-security/p/poppler/0.6.4-1ubuntu3.2/104_security_jbig2.patch http://patches.ubuntu.com/by-relea

Bug#534712: apache2.2-common: DOS possible with mod_deflate

2009-07-09 Thread Marc Deslauriers
This is CVE-2009-1891: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1891 Upstream patch: http://svn.apache.org/viewvc?view=rev&revision=791454 -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists

Bug#510205: buffer overflow in libaudiofile

2009-06-16 Thread Marc Deslauriers
The SUSE update simply contains the patch from: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=510205#17 -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#542218: backuppc: Security hole when using rsync and multiple users

2009-10-05 Thread Marc Deslauriers
The patch included in 3.1.0-7 doesn't actually fix the problem. Normal users can still set the ClientNameAlias by adding something like "&override_ClientNameAlias=1&v_zZ_ClientNameAlias=" to their POST. Marc. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a sub

Bug#542218: backuppc: Security hole when using rsync and multiple users

2009-10-05 Thread Marc Deslauriers
Included is a patch that moves the previous fix to a location before the settings get applied. Marc. diff -Naur backuppc-3.1.0.ori/lib/BackupPC/CGI/EditConfig.pm backuppc-3.1.0/lib/BackupPC/CGI/EditConfig.pm --- backuppc-3.1.0.ori/lib/BackupPC/CGI/EditConfig.pm 2009-10-05 08:04:01.0 -040

Bug#537254: mimetex: patch to fix security issues

2009-10-08 Thread Marc Deslauriers
Package: mimetex Version: 1.50-1 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu karmic ubuntu-patch *** /tmp/tmpXGbr7m In Ubuntu, we've applied the attached patch to achieve the following: * SECURITY UPDATE: arbitrary code execution via long picture,

Bug#542621: aide: new feature: ignore files changed by system updates

2009-08-20 Thread Marc Deslauriers
Package: aide Version: 0.13.1-10 Severity: wishlist Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu karmic ubuntu-patch I have added a new feature to the aide package: a new option to remove files that were changed by system updates from the daily e-mail report. *** /tmp/t

Bug#542623: apache2: segfaults when using mod_deflate

2009-08-20 Thread Marc Deslauriers
2-2.2.12/debian/patches/203_fix_legacy_ap_rputs_segfaults.dpatch @@ -0,0 +1,36 @@ +#! /bin/sh /usr/share/dpatch/dpatch-run +## 203_fix_legacy_ap_rputs_segfaults.dpatch by Marc Deslauriers +## +## All lines beginning with `## DP:' are a description of the patch. +## DP: Description: Fix

Bug#541735: libssl0.9.8: unknown message digest algorithm error in heirloom-mailx

2009-09-09 Thread Marc Deslauriers
Here's the upstream patch that disables signature checking on self-signed certs. This is needed when the CVE-2009-2409 patch is used. http://marc.info/?l=openssl-cvs&m=124508133203041&w=2 Marc. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscri

Bug#567554: samba: Ubuntu patch for the issue

2010-02-07 Thread Marc Deslauriers
Package: samba Version: 2:3.4.0-3 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu lucid ubuntu-patch *** /tmp/tmpUnTGqJ In Ubuntu, we've applied the attached patch in our current releases: * SECURITY UPDATE: privilege escalation via mount.cifs race

Bug#586926: Can't authenticate with Google reader

2010-06-25 Thread Marc Deslauriers
Package: liferea Version: 1.6.3-1 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu maverick ubuntu-patch *** /tmp/tmpHXo8qP In Ubuntu, we've applied the attached patch to achieve the following: * debian/patches/google-reader-auth.patch: fix Google reade

Bug#584516: [Re: CVE-2010-1628: allows context-dependent attackers to execute arbitrary code

2010-07-22 Thread Marc Deslauriers
Package: ghostscript Version: 8.63.dfsg.1-2 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu maverick ubuntu-patch *** /tmp/tmpQ4x52y In Ubuntu, we've applied the attached patch to achieve the following: * SECURITY UPDATE: arbitrary code execution via u

Bug#590296: wget: Fix for CVE-2010-2252

2010-09-03 Thread Marc Deslauriers
Package: wget Version: 1.12-1.1 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu maverick ubuntu-patch In Ubuntu, we've applied the attached patch to achieve the following: * SECURITY UPDATE: arbitrary file overwrite via 3xx redirect - debian/patches/

Bug#619526: sbuild: Quirk to work around wrong build-essential entry on Ubuntu Lucid

2011-03-24 Thread Marc Deslauriers
Package: sbuild Version: 0.60.9-1 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu natty ubuntu-patch *** /tmp/tmpVBaqZt In Ubuntu, the attached patch was applied to achieve the following: * lib/Sbuild/Build.pm: work around Lucid issue that has diff list

  1   2   >