Bug#502925: xfce4-terminal: new fonts are not available until all terminals closed

2008-10-20 Thread Michael S. Gilbert
Package: xfce4-terminal Version: 0.2.8-5 Severity: normal if new fonts are installed, xfce4-terminal will not recognize them until all of its processes are stopped. this can be problematic because user's will expect the new options to be available immediately. also, if the user is running a long

Bug#502928: mozilla-plugin-gnash: finance.google.com currently unsupported

2008-10-20 Thread Michael S. Gilbert
Package: mozilla-plugin-gnash Version: 0.8.3-6 Severity: important fyi, it appears that certain aspects of finance.google.com are currently unsupported by gnash. for example, at [1], gnash does not draw the stock graph. thanks for the hard work. [1] http://finance.google.com/finance?q=INDEXDJX

Bug#503148: histogram(x, bin): x-axis range should be based on bin.min() and bin.max() when bin is a sequence

2008-10-22 Thread Michael S. Gilbert
Package: python-matplotlib Version: 0.98.3-4 Severity: normal the following python code creates a histogram with an x-axis range of 0.1 min to 0.3 max (based on the mins and maxes of the x rather than bin). the bins should be used to size the axis since the user specified that he wanted to see tho

Bug#506919: vim: multiple vulnerabilities (CVE-2008-3074, CVE-2008-3075, and CVE-2008-3076)

2008-11-25 Thread Michael S. Gilbert
Package: vim Version: 1:7.0.109 Severity: grave Tags: security Justification: user security hole redhat has just released an update that fixes multiple security flaws in vim [1]. these issues are currently reserved in the CVE tracker, but redhat describes the probems as: Multiple security flaw

Bug#502139: etch -> lenny upgrade failure

2008-10-13 Thread Michael S. Gilbert
Package: anjuta Version: 1.2.4a-5 Severity: grave i just tested the etch -> lenny transition, and anjuta failed to upgrade properly. the error follows: Preparing to replace anjuta 1:1.2.4a-5 (using .../anjuta_2%3a2.4.2-1_amd64.deb) ... Unpacking replacement anjuta ... dpkg: error processing

Bug#502140: cannot unlock screen during etch -> lenny transition

2008-10-13 Thread Michael S. Gilbert
Package: xscreensaver Version: 5.05-3 Severity: grave i just tested the etch -> lenny transition on two of my systems, and xscreensaver ended up locking me out of both of them. version 4.24 of the xscreensaver daemon was running when i started the upgrade. i went off to work on some other thin

Bug#524373: linux-2.6: /dev/mem rootkit vulnerability

2009-04-16 Thread Michael S. Gilbert
package: linux-2.6 severity: grave tags: security as seen in recent articles and discussions, the linux kernel is currently vulnerable to rootkit attacks via the /dev/mem device. one article [1] mentions that there is an existing patch for the problem, but does not link to it. perhaps this fix c

Bug#524373: linux-2.6: /dev/mem rootkit vulnerability

2009-04-16 Thread Michael S. Gilbert
On Thu, 16 Apr 2009 12:43:07 -0400, Noah Meyerhans wrote: > On Thu, Apr 16, 2009 at 11:55:05AM -0400, Michael S. Gilbert wrote: > > as seen in recent articles and discussions, the linux kernel is > > currently vulnerable to rootkit attacks via the /dev/mem device. one > >

Bug#524373: linux-2.6: /dev/mem rootkit vulnerability

2009-04-16 Thread Michael S. Gilbert
reopen 524373 thanks On Thu, 16 Apr 2009 16:53:38 -0400 Noah Meyerhans wrote: > On Thu, Apr 16, 2009 at 04:21:10PM -0400, Michael S. Gilbert wrote: > > > > i think that any flaw that allows an attacker to elevate his pwnage from > > root to hidden should always be consid

Bug#524373: linux-2.6: /dev/mem rootkit vulnerability

2009-04-16 Thread Michael S. Gilbert
btw, redhat-based distros are thought to be invulnerable to these attacks due their incorporation of execshield (in particular, due to address space randomization). perhaps it's high time that debian consider doing the same? i know that execshield is not in the vanilla kernel, but when it comes to

Bug#523917: libquantum3: new upstream

2009-04-19 Thread Michael S. Gilbert
this is the only libquantum3 bug on its page [1]. maybe you can get the bugs.debian.org maintainers to change their presentation to include all source bugs when looking at the binary package pages? [1] http://bugs.debian.org/cgi-bin/pkgreport.cgi?pkg=libquantum3 On Sun, 19 Apr 2009 12:18:06 +0100

Bug#523475: xine-lib: CVE-2009-0385 arbitrary code execution

2009-04-19 Thread Michael S. Gilbert
fyi, see upstream changelog as well: http://sourceforge.net/project/shownotes.php?group_id=9655&release_id=673233 -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#523475: xine-lib: CVE-2009-0385 arbitrary code execution

2009-04-19 Thread Michael S. Gilbert
On Fri, 10 Apr 2009 18:18:00 +0100 Darren Salt wrote: > This does not apply to xine-lib. You mean CVE-2009-0698, which is fixed in > unstable (and should soon be fixed in, at least, stable too; it probably > applies to oldstable too, but I've not looked yet). not that i nor anyone else should trus

Bug#524799: ffmpeg-debian: CVE-2009-0385 integer signedness error

2009-04-19 Thread Michael S. Gilbert
package: ffmpeg-debian severity: important tags: security Hi, The following CVE (Common Vulnerabilities & Exposures) id was published for ffmpeg-debian. CVE-2009-0385[0]: | Integer signedness error in the fourxm_read_header function in | libavformat/4xm.c in FFmpeg before revision 16846 allows r

Bug#524801: ntop: access.log permissions

2009-04-19 Thread Michael S. Gilbert
package: ntop severity: important tags: security hello, fedora issued the following as a security update for ntop [0]: ls -lh /var/log/ntop/access.log -rw-rw-rw- 1 root root 0 2009-02-04 11:53 /var/log/ntop/access.log Fixed. log world-writable when the --access-log- file option

Bug#524803: ghostscript: multiple vulnerabilities

2009-04-19 Thread Michael S. Gilbert
package: ghostscript severity: grave tags: security Hi, The following CVE (Common Vulnerabilities & Exposures) ids were published for ghostscript. CVE-2007-6725[0]: | The CCITTFax decoding filter in Ghostscript 8.60, 8.61, and possibly | other versions, allows remote attackers to cause a denial

Bug#524804: phpmyadmin: insufficient output sanitizing

2009-04-19 Thread Michael S. Gilbert
package: phpmyadmin severity: important tags: security hello, fedora issued a security update for myphpadmin [0]: Improvements for 3.1.3.2: - [security] Insufficient output sanitizing when generating configuration file http://www.phpmyadmin.net/home_page/security/PMASA-2009-4.php does th

Bug#524805: mplayer: CVE-2009-0385 integer signedness error

2009-04-19 Thread Michael S. Gilbert
package: mplayer severity: important tags: security Hi, The following CVE (Common Vulnerabilities & Exposures) id was published for mplayer. CVE-2009-0385[0]: | Integer signedness error in the fourxm_read_header function in | libavformat/4xm.c in FFmpeg before revision 16846 allows remote | atta

Bug#524806: poppler: multiple vulnerabilities

2009-04-19 Thread Michael S. Gilbert
package: poppler severity: grave tags: security hello, ubuntu recently patched the following poppler issues [0]: CVE-2009-0146, CVE-2009-0147, CVE-2009-0166, CVE-2009-0799, CVE-2009-0800, CVE-2009-1179, CVE-2009-1180, CVE-2009-1181, CVE-2009-1182, CVE-2009-1183, CVE-2009-1187, CVE-2009-1188 the

Bug#524807: cups: multiple vulnerabilities

2009-04-19 Thread Michael S. Gilbert
package: cups severity: grave tags: security hello, redhat recently patched the following cups [0], xpdf [1], and kdegraphics[2] issues: CVE-2009-0146, CVE-2009-0147, CVE-2009-0166, CVE-2009-0799, CVE-2009-0800, CVE-2009-1179, CVE-2009-1180, CVE-2009-1181, CVE-2009-1182, CVE-2009-1183 these are

Bug#524373: linux-2.6: /dev/mem rootkit vulnerability

2009-04-19 Thread Michael S. Gilbert
On Thu, 16 Apr 2009 23:50:54 -0600 dann frazier wrote: > > > The support for dynamically loadable kernel modules in Linux can be > > > abuses similarly. Does that make it a "grave security issue"? > > > > probably...at least until someone comes up with a secure way to do it. > > Oh, come on. >

Bug#517018: responses to no-root login bug

2009-04-19 Thread Michael S. Gilbert
Wouter Verhelst wrote: > There are several ways in which a local attacker can get root access. > 'init=/bin/bash'. boot with the 'emergency' option (which causes > sysvinit to do almost the same thing as 'init=/bin/bash'). Boot a > live-CD, chroot into the target system. Worst case, remove the disk

Bug#524804: more info

2009-04-19 Thread Michael S. Gilbert
i was looking at the link as provided in redhat's announcement. this seems to be CVE-2009-1285, which debian is already tracking as unimportant. however, the phpmyadmin page considers the issue to be critical. perhaps the debian severity is too low? mike -- To UNSUBSCRIBE, email to debian-b

Bug#524804: more info

2009-04-20 Thread Michael S. Gilbert
On Mon, 20 Apr 2009 12:52:28 +0200, Thijs Kinkhorst wrote: > On Mon, April 20, 2009 06:15, Michael S. Gilbert wrote: > > i was looking at the link as provided in redhat's announcement. this > > seems to be CVE-2009-1285, which debian is already tracking as > >

Bug#520844: evince: ghostscript as a recommends

2009-04-21 Thread Michael S. Gilbert
On Tue, 21 Apr 2009 11:49:57 +0200, Emilio Pozuelo Monfort wrote: > Michael Gilbert wrote: > > it seems like ghostscript support in evince is a bonus feature (rather > > a core component). it would be nice if the libgs8 dependency were > > treated as recommends instead of a depends. this is espec

Bug#520844: evince: ghostscript as a recommends

2009-04-21 Thread Michael S. Gilbert
On Tue, 21 Apr 2009 17:21:20 +0200, Emilio Pozuelo Monfort wrote: > Michael S. Gilbert wrote: > > On Tue, 21 Apr 2009 11:49:57 +0200, Emilio Pozuelo Monfort wrote: > >> Michael Gilbert wrote: > >>> it seems like ghostscript support in evince is a bonus feature (rathe

Bug#520844: evince: ghostscript as a recommends

2009-04-23 Thread Michael S. Gilbert
On Wed, 22 Apr 2009 11:31:44 +0200, Josselin Mouette wrote: > > Maybe if evince doesn't fail miserably if libspectre1 or other dependencies > > of > > the backends aren't found, we could exclude them from Depends and put them > > on > > Recommends, or maybe split the backends into separate packag

Bug#520844: evince: ghostscript as a recommends

2009-04-23 Thread Michael S. Gilbert
On Thu, 23 Apr 2009 16:41:07 +0200, Emilio Pozuelo Monfort wrote: > Michael S. Gilbert wrote: > > recommends are now automatically installed, so this shouldn't happen too > > often. > > Except for new installs AFAIK. i presume that a new install via debian-installer

Bug#520844: evince: ghostscript as a recommends

2009-04-23 Thread Michael S. Gilbert
On Thu, 23 Apr 2009 21:54:14 +0200, Josselin Mouette wrote: > > i presume that a new install via debian-installer does not circumvent > > apt's default behavior. is there any reason to think that this is not > > the case? > > It is disabled during initial installation, but even if it wasn’t, and

Bug#515104: closed by Josselin Mouette (Bug#515104: fixed in nautilus 2.26.2-1)

2009-04-25 Thread Michael S. Gilbert
On Sat, 25 Apr 2009 01:15:11 + Debian Bug Tracking System wrote: > This is an automatic notification regarding your Bug report > which was filed against the nautilus package: > > #515104: nautilus: potential exploits via application launchers awesome! any chance of backporting this to lenny

Bug#517405: stable updates needed

2009-04-07 Thread Michael S. Gilbert
hello, thanks for fixing this security issue. please coordinate with the security team (t...@security.debian.org) to prepare new packages for the stable releases. thank you. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact

Bug#523016: clamav vulnerability

2009-04-07 Thread Michael S. Gilbert
package: clamav severity: grave tags: security hi, ubuntu recently patched a problem in clamav [1]. the description is: It was discovered that ClamAV did not properly verify its input when processing TAR archives. A remote attacker could send a specially crafted TAR file and cause a denia

Bug#523027: mapserver: multiple vulnerabilities

2009-04-07 Thread Michael S. Gilbert
Package: mapserver Severity: important Tags: security Hi, the following CVE (Common Vulnerabilities & Exposures) ids were published for mapserver. CVE-2009-0839[0]: | Stack-based buffer overflow in mapserv.c in mapserv in MapServer 4.x | before 4.10.4 and 5.x before 5.2.2, when the server has a m

Bug#523028: php5: multiple vulnerabilities

2009-04-07 Thread Michael S. Gilbert
Package: php5 Severity: grave Tags: security Hi, the following CVE (Common Vulnerabilities & Exposures) ids were published for php5. CVE-2008-5814[0]: | Cross-site scripting (XSS) vulnerability in PHP, possibly 5.2.7 and | earlier, when display_errors is enabled, allows remote attackers to | inje

Bug#523472: argyll: CVE-2009-0792 integer overflows

2009-04-10 Thread Michael S. Gilbert
package: argyll severity: important tags: security Hi, CVE-2009-0792 has been issued for argyll. The details are: Multiple integer overflows and multiple insufficient upper-bounds checks on certain variable sizes were originally discovered in the Ghostscript's International Color Consorti

Bug#523475: xine-lib: CVE-2009-0385 arbitrary code execution

2009-04-10 Thread Michael S. Gilbert
Package: xine-lib Severity: grave Tags: security Hi, The following CVE (Common Vulnerabilities & Exposures) id was published for xine-lib. CVE-2009-0385[0]: | Integer signedness error in the fourxm_read_header function in | libavformat/4xm.c in FFmpeg before revision 16846 allows remote | attack

Bug#523476: pptp-linux: pptpsetup permissions

2009-04-10 Thread Michael S. Gilbert
package: pptp-linux severity: important tags: security Hello, Fedora issued the following update for pptp-linux, which they have tagged as security-related: This update corrects the behaviour of pptpsetup when its --delete option is used, retaining the permissions of /etc/ppp/chap-secrets

Bug#523917: libquantum3: new upstream

2009-04-13 Thread Michael S. Gilbert
package: libquantum3 severity: wishlist hello, there are now new versions (1.0.0 stable and 1.1.0 developmental) of the libquantum library available upstream. this is a request for a debian package of the new stable version. thanks. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.d

Bug#523028: php4 affected?

2009-04-26 Thread Michael S. Gilbert
does this bug affect php4 at all? asking to determine whether a dsa needs to be issued for php4 in etch. thanks. mike -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#516555: CVE-2008-6059: missing access restriction

2009-04-26 Thread Michael S. Gilbert
On Sun, 26 Apr 2009 10:17:22 +0200 Moritz Muehlenhoff wrote: > On Wed, Feb 25, 2009 at 12:38:12AM -0500, Michael Gilbert wrote: > > does this problem (with cookies) really affect the version of webkit in > > debian, which does not currently support cookies (or more accurately > > the libraries in

Bug#524803: CVE-2008-6679 also fixed

2009-04-26 Thread Michael S. Gilbert
On Tue, 21 Apr 2009 23:54:36 +0200 Nico Golde wrote: > Hi, > turns out CVE-2008-6679 also is fixed since 8.64. > The only unfixed issue in this report is CVE-2009-0196. > > Michael, please better check the code next time, this would > have save me a lot of time this evening. I appologize. I ha

Bug#523028: some info

2009-04-27 Thread Michael S. Gilbert
fyi, ubuntu issued a usn [1] for this issue. not sure if any of their work may be useful to you. [1] http://www.ubuntu.com/usn/USN-761-1 -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#514437: CVE-2009-0579

2009-04-28 Thread Michael S. Gilbert
CVE-2009-0579 looks like a good candidate for a stable/old-stable proposed update since it's not really a security issue, but it would be good for the package to adhere to the administrator's desired policy. please coordinate with the security team (t...@securuty.debian.org) if you plan to work on

Bug#526013: qemu: CVE-2008-1945 media handling vulnerability

2009-04-28 Thread Michael S. Gilbert
Package: qemu Severity: important Tags: security Fixed: 0.9.1-5 Hi, The following CVE (Common Vulnerabilities & Exposures) id was published for qemu. CVE-2008-1945[0]: | QEMU 0.9.0 does not properly handle changes to removable media, which | allows guest OS users to read arbitrary files on the h

Bug#526013: more info

2009-04-28 Thread Michael S. Gilbert
fixed 526013 0.9.1-5 thanks i should have mentioned that qemu > 0.9.1-5 is already in lenny, so the security update will need to be for etch only. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#526040: qemu: CVE-2008-4539 buffer overlflow vulnerability

2009-04-28 Thread Michael S. Gilbert
Package: qemu Severity: important Tags: security Tags: fixed 0.9.1+svn20081101-1 Hi, The following CVE (Common Vulnerabilities & Exposures) id was published for qemu. CVE-2008-4539[0]: | Heap-based buffer overflow in the Cirrus VGA implementation in (1) KVM | before kvm-82 and (2) QEMU on Debian

Bug#526041: clamav: CVE-2008-5525 malware detection bypass

2009-04-28 Thread Michael S. Gilbert
Package: clamav Severity: grave Tags: security Hi, The following CVE (Common Vulnerabilities & Exposures) ids were published for clamav. CVE-2008-5525[0]: | ClamAV 0.94.1 and possibly 0.93.1, when Internet Explorer 6 or 7 is | used, allows remote attackers to bypass detection of malware in an |

Bug#526042: clamav: CVE-2009-1241 malware detection bypass

2009-04-28 Thread Michael S. Gilbert
Package: clamav Severity: important Tags: security Tags: fixed 0.95+dfsg-1 Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for clamav. CVE-2009-1241[0]: | Unspecified vulnerability in ClamAV before 0.95 allows remote | attackers to bypass detection of malware via a mod

Bug#526049: bugs.debian.org: 'Fixed:' as a pseudo-header for bug submission

2009-04-28 Thread Michael S. Gilbert
package: bugs.debian.org severity: wishlist hello, i've recently been submitting some bugs related to security issues in the stable releases that already have fixes in testing/unstable. i would like to be able to tag this information at the time that i submit the report, but it is currently not

Bug#500306: bug done?

2009-04-30 Thread Michael S. Gilbert
it looks like webkit is tagged as not-affected for CVE-2008-3950 in the security tracker [1], but there has been no discussion on the matter in this report. is the tracker data accurate? and if so, i think that this bug can safely be closed. mike [1] http://security-tracker.debian.net/tracker/CVE

Bug#526040: qemu: CVE-2008-4539 buffer overlflow vulnerability

2009-05-03 Thread Michael S. Gilbert
On Sat, 2 May 2009 15:37:52 +0200 Aurelien Jarno wrote: > This is fixed in the lenny branch of the SVN. great to hear. do you plan to work with the security team to issue a DSA for this one, or is it minor enough that it would make more sense to do it in an spu? -- To UNSUBSCRIBE, email to de

Bug#530919: cacti: xss vulnerability

2009-05-28 Thread Michael S Gilbert
package: cacti version: 0.8.6i-3.4 tags: security hello, there is an xss vulnerability in etch's version of cacti [1]. this was fixed in 0.8.7b, which is already in lenny and sid. [1] http://openwall.com/lists/oss-security/2009/05/15/1 -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@list

Bug#467237: closed by Gustavo Noronha (Closing outdated bugs)

2009-06-04 Thread Michael S. Gilbert
reopen 467237 found 467237 2.27.2-2 thank you this bug has been improved, but still exists. middle-click will open tabs in new windows, but there is no "open link in new tab" option in the right-click menu. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject o

Bug#527344: prelude-manager: password world-readable

2009-05-06 Thread Michael S. Gilbert
package: prelude-manager tags: security severity: important hello, fedora recently released a security update for prelude-manager [1]. the text of the issue is: The configuration file of prelude-manager contains a database password and is world readable. This update restricts permissions to

Bug#527475: more info

2009-05-07 Thread Michael S. Gilbert
this bug is submitted to provide a place to discuss/track triage your spu/ospu update for this issue. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#527476: prewikka: password file world-readable

2009-05-07 Thread Michael S. Gilbert
Package: prewikka Severity: important Tags: security Hi, Redhat recently issued security updates for prewikka [0] because the password file is world readable. The text of the issue is: | The permissions on the prewikka.conf file are world readable and contain the sql | database password used b

Bug#527475: mpfr: buffer overflows

2009-05-07 Thread Michael S. Gilbert
Package: mpfr Severity: important Tags: security Hi, The following CVE (Common Vulnerabilities & Exposures) id was published for mpfr. CVE-2009-0757[0]: | Multiple buffer overflows in GNU MPFR 2.4.0 allow context-dependent | attackers to cause a denial of service (crash) via the (1) | mpfr_snpri

Bug#527474: pango1.0: integer overflow in heap allocation size calculations

2009-05-07 Thread Michael S. Gilbert
package: pango severity: grave tags: security Hi, The following CVE (Common Vulnerabilities & Exposures) id was published for pango1.0. CVE-2009-1194[0]: |Pango is a library for laying out and rendering text, with an emphasis |on internationalization. Pango suffers from a multiplicative integer

Bug#527476: prewikka: password file world-readable

2009-05-08 Thread Michael S. Gilbert
On Fri, 8 May 2009 10:46:16 +0200 Pierre Chifflier wrote: > While I appreciate the effort of checking security related things, I'll > just point out that the verification was fairly trivial: thanks for the info. i've found that it is often more effective to defer to the expertise of the maintaine

Bug#527640: opensc: insecure due to wrong public exponent

2009-05-08 Thread Michael S. Gilbert
Package: opensc Severity: grave Tags: security Tags: patch Hi, There is a vulnerability in opensc. Details are: | The security problem in short: you need a combination of | 1.) a tool that startes a key generation with public exponent set to 1 | (an invalid value that causes an insecure rsa

Bug#524803: ghostscript vulns in stable

2009-05-11 Thread Michael S. Gilbert
hello all, any news on the patches for ghostscript in stable (CVE-2007-6725, CVE-2008-6679, and CVE-2009-0196)? these issues have been sitting unfixed for quite a while now. thanks. mike -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Tr

Bug#528252: zoneminder: conf file permissions need to be more restrictive

2009-05-11 Thread Michael S. Gilbert
Package: zoneminder Severity: normal Tags: security Hi, The following CVE (Common Vulnerabilities & Exposures) id was published for zoneminder. CVE-2008-6755[0]: | ZoneMinder 1.23.3 on Fedora 10 sets the ownership of /etc/zm.conf to | the apache user account, and sets the permissions to 0600, wh

Bug#528281: gnutls26: CVE-2009-1417 certificate expiration vulnerability

2009-05-11 Thread Michael S. Gilbert
Package: gnutls26 Severity: grave Tags: security Hi, The following CVE (Common Vulnerabilities & Exposures) ids were published for gnutls26. CVE-2009-1417[0]: | gnutls-cli in GnuTLS before 2.6.6 does not verify the activation and | expiration times of X.509 certificates, which allows remote atta

Bug#523054: Any likely update for mod_jk?

2009-05-14 Thread Michael S. Gilbert
On Tue, 12 May 2009 13:54:10 +0100, Dominic Hargreaves wrote: > Hi, > > I wondered if any fix is likely to be available for CVE-2008-5519 > (information disclosure, looks potentially quite severe) any time > soon or if any more help is needed? hi, no one has claimed this (that i've seen), and th

Bug#528434: [Secure-testing-team] Bug#528434: cron: Incomplete fix for CVE-2006-2607 (setgid() and initgroups() not checked)

2009-05-14 Thread Michael S. Gilbert
On Tue, 12 May 2009 16:53:41 -0500, Jamie Strandboge wrote: > Package: cron > Version: 3.0pl1-105 > Severity: grave > Tags: patch security > Justification: user security hole > User: ubuntu-de...@lists.ubuntu.com > Usertags: origin-ubuntu jaunty ubuntu-patch > > Hi, > > I was reviewing a list of

Bug#528778: [Secure-testing-team] Bug#528778: eggdrop: incomplete patch for CVE-2007-2807

2009-05-15 Thread Michael S. Gilbert
On Fri, 15 May 2009 14:18:26 +0200, Nico Golde wrote: > Package: eggdrop > Severity: grave > Tags: security > Justification: user security hole > > Hi, > turns out my patch has a bug in it which opens this up for a > buffer overflow again in case strlen(ctcpbuf) returns 0: > http://www.gossamer-th

Bug#528281: closed by Nico Golde (Re: Bug#528281: gnutls26: CVE-2009-1417 certificate expiration vulnerability)

2009-05-15 Thread Michael S. Gilbert
On Tue, 12 May 2009 00:03:05 +, Debian Bug Tracking System wrote: > This is an automatic notification regarding your Bug report > which was filed against the gnutls26 package: > > #528281: gnutls26: CVE-2009-1417 certificate expiration vulnerability does it make sense to close this bug since

Bug#528281: closed by Nico Golde (Re: Bug#528281: gnutls26: CVE-2009-1417 certificate expiration vulnerability)

2009-05-15 Thread Michael S. Gilbert
On Fri, 15 May 2009 20:15:49 +0200, Andreas Metzler wrote: > On 2009-05-15 "Michael S. Gilbert" wrote: > > On Tue, 12 May 2009 00:03:05 +, Debian Bug Tracking System wrote: > > > This is an automatic notification regarding your Bug report > > > which w

Bug#528281: closed by Nico Golde (Re: Bug#528281: gnutls26: CVE-2009-1417 certificate expiration vulnerability)

2009-05-15 Thread Michael S. Gilbert
On Fri, 15 May 2009 20:50:47 +0200, Nico Golde wrote: > Hi, > * Michael S. Gilbert [2009-05-15 19:45]: > > On Tue, 12 May 2009 00:03:05 +, Debian Bug Tracking System wrote: > > > This is an automatic notification regarding your Bug report > > > which was file

Bug#528204: CVE-2008-0388

2009-05-17 Thread Michael S. Gilbert
this is CVE-2008-0388: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0388 -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#529190: drupal: cross-site scripting vulnerability

2009-05-17 Thread Michael S. Gilbert
package: drupal6 severity: important tags: security version: 6.11-1 6.6-3 hi, a cross-site scripting vulnerability has been discovered in drupal. see [1]. please coordinate with the security team to prepare fixes for the stable releases. thanks. [1] http://drupal.org/node/461886 -- To UNS

Bug#529191: drupal: cross-site scripting vulnerability

2009-05-17 Thread Michael S. Gilbert
package: drupal5 severity: important tags: security version: 5.17-1 hi, a cross-site scripting vulnerability has been discovered in drupal. see [1]. please coordinate with the security team to prepare fixes for the stable releases. thanks. [1] http://drupal.org/node/461886 -- To UNSUBSCRI

Bug#529318: linux-2.6: CVE-2007-6514 smbfs information disclosure vulnerability

2009-05-18 Thread Michael S. Gilbert
Package: linux-2.6 Severity: important Tags: security Hi, The following CVE (Common Vulnerabilities & Exposures) id was published for linux-2.6. CVE-2007-6514[0]: | Apache HTTP Server, when running on Linux with a document root on a | Windows share mounted using smbfs, allows remote attackers to

Bug#528204: CVE-2008-0388

2009-05-18 Thread Michael S. Gilbert
On Mon, 18 May 2009 06:49:48 +0200, Ola Lundqvist wrote: > Thanks. However this applies only to the windows version as that > functions do not even exist in the linux/unix version. ok, yes, i see that now. thanks. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a su

Bug#529326: linux-2.6: CVE-2009-0787 information disclosure in ecryptfs

2009-05-18 Thread Michael S. Gilbert
Package: linux-2.6 Version: 2.6.26-15lenny2 Severity: important Tags: security Hi, The following CVE (Common Vulnerabilities & Exposures) id was published for linux-2.6. CVE-2009-0787[0]: | The ecryptfs_write_metadata_to_contents function in the eCryptfs | functionality in the Linux kernel 2.6.2

Bug#529326: patches

2009-05-18 Thread Michael S. Gilbert
tag 529326 patch thank you note that this affects the lenny and squeeze versions of the kernel (2.6.26). even though the kernel changelog says that this problem only affects 2.6.28, it actually affects any version before 2.6.28.9 that has ecryptfs. patches are available here: http://git.kernel.o

Bug#529326: linux-2.6: CVE-2009-0787 information disclosure in ecryptfs

2009-05-18 Thread Michael S. Gilbert
On Mon, 18 May 2009 11:52:04 -0600, dann frazier wrote: > On Mon, May 18, 2009 at 01:28:56PM -0400, Michael S. Gilbert wrote: > > Package: linux-2.6 > > Version: 2.6.26-15lenny2 > > Severity: important > > Tags: security > > > > Hi, > > > > Th

Bug#529342: linux-2.6: ipv6 potential denial-of-service

2009-05-18 Thread Michael S. Gilbert
Package: linux-2.6 Version: 2.6.26 Severity: important Tags: security patch Hi, The following CVE (Common Vulnerabilities & Exposures) id was published for linux-2.6. CVE-2009-1360[0]: | The __inet6_check_established function in net/ipv6/inet6_hashtables.c | in the Linux kernel before 2.6.29, wh

Bug#529518: openoffice.org-common: fails to install (need to use "mkdir -p" to creat missing directory)

2009-05-19 Thread Michael S. Gilbert
package: openoffice.org-common severity: grave version: 1:3.1.0-2 the latest version of openoffice will not install because a mkdir fails: mkdir: cannot create directory '/var/lib/openoffice/share/config': No such file or directory if i manually create the directory, the installation works: $

Bug#535888: reopen

2009-07-10 Thread Michael S. Gilbert
reopen 535888 fixed 535888 5.2.10.dfsg.1-2 thanks thanks for fixing this issue! reopening to continue tracking in etch/lenny, which haven't been fixed yet. mike -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@

Bug#535888: [php-maint] Bug#535888: reopen

2009-07-10 Thread Michael S. Gilbert
On Fri, 10 Jul 2009 10:26:22 -0500, Raphael Geissert wrote: > close 535888 > found 535888 5.2.6.dfsg.1-1+lenny3 > found 535888 5.2.9.dfsg.1-4 > fixed 535888 5.3.0-1 > thanks > > On Friday 10 July 2009 10:14:08 Michael S. Gilbert wrote: > > reopen 535888 > > fixed

Bug#535888: Info received ([php-maint] Bug#535888: reopen)

2009-07-10 Thread Michael S. Gilbert
i probably should have asked whether you think that this issue warrants a DSA, would be good for an SPU, or whether you think it is unimportant. if this can be considered unimportant, then yes, i agree the bug should be closed, but if there do need to be stable updates, then i think that the bug s

Bug#536718: apache2: CVE-2009-1890 denial-of-service vulnerability

2009-07-12 Thread Michael S. Gilbert
Package: apache2 Version: 2.2.3-4+etch6 Severity: serious Tags: security , patch Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for apache2. CVE-2009-1890[0]: | The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy | module in the Apache HTTP Server befo

Bug#535489: [Pkg-cups-devel] Bug#535488: cupsys: CVE-2009-0791 integer overflow vulnerabilities

2009-07-12 Thread Michael S. Gilbert
reopen 535488 reopen 535489 thanks On Sat, 11 Jul 2009 17:20:46 +0200 Martin Pitt wrote: > Hello Michael, > > Michael S. Gilbert [2009-07-02 12:35 -0400]: > > Hi, > > the following CVE (Common Vulnerabilities & Exposures) id was > > published for cups. > >

Bug#536724: wordpress: CORE-2009-0515 priviledges unchecked and multiple information disclosures

2009-07-12 Thread Michael S. Gilbert
package: wordpress version: 2.0.10-1etch3 severity: serious tags: security an advisory, CORE-2009-0515, has been issued for wordpress. there are issues with unchecked privilidges and many potential information disclosures. see [1]. this is fixed in upstream version 2.8.1. please coordinate wit

Bug#536726: mysql: post-authentication format string vulnerability

2009-07-12 Thread Michael S. Gilbert
package: mysql-dfsg-5.0 version: 5.0.32-7etch8 severity: important tags: security hello, it has been disclosed that mysql has a post-authentication format string vulnerability [1]. according to that message, affected versions are claimed to be 5.0.45 and older, which would mean that lenny and sid

Bug#537104: iceweasel: critical 0-day remote shellcode injection

2009-07-14 Thread Michael S. Gilbert
package: iceweasel version: 3.5 severity: critical tags: security hello, a remote shellcode injection has been disclosed for firefox [0], [1]. the advisory says that version 3.5 has been verified as vulnerable, but older versions are very likely susseptable as well. i have not checked. this is c

Bug#537104: forwarded

2009-07-14 Thread Michael S Gilbert
forwarded 537104 https://bugzilla.mozilla.org/show_bug.cgi?id=504237 thanks -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#537281: dbus: uninstallable due to missing directory

2009-07-16 Thread Michael S. Gilbert
package: dbus version: 1.2.16-1 severity: grave hello, dbus is currently uninstallable on sid; erroring with the following message: chown: cannot access `/usr/lib/dbus-1.0/dbus-daemon-launch-help': No such file or directory this can be fixed with a 'mkdir -p': $ sudo mkdir -p /usr/lib/dbu

Bug#537396: moonlight: doesn't appear to work for microsoft's tuva site

2009-07-17 Thread Michael S. Gilbert
package: moonlight-plugin-mozilla version: 1.0.1-3 severity: important hello, i just tried out the moonlight plugin, but it doesn't appear to work out of the box. steps to reproduce: 1. $ sudo apt-get install moonlight-plugin-mozilla 2. $ iceweasel http://research.microsoft.com/tuva 3. observe e

Bug#537633: libio-socket-ssl-perl: incorrect validation of hostnames

2009-07-19 Thread Michael S. Gilbert
package: libio-socket-ssl-perl version: 1.01-1 severity: serious tags: security , patch a security issue has been fixed in the latest upstream version of libio-socket-ssl-perl [0]. see patch [1]. please coordinate with the security team to prepare updates for the stable releases. thank you. [0

Bug#537634: mediawiki: multiple vulnerabilities fixed in new upstreams

2009-07-19 Thread Michael S. Gilbert
package: mediawiki version: 1:1.15.0-1 severity: serious tags: security hello, multiple vulnerabilies have been fixed in upstream mediawiki 1.15.1 (these problems did not exist before 1.14.0, so lenny/etch are not vulnerable) [0]. please update unstable to this version. thanks. [0] http://lists.w

Bug#537637: htmldoc: buffer overflow in util.cxx's set_page_size()

2009-07-19 Thread Michael S. Gilbert
package: htmldoc version: 1.8.27-2 severity: serious tags: security , patch hello, a security advisory has been issued for htmldoc [0]. patches available from gentoo [1]. please coordinate with the security team to prepare updates for the stable releases. thank you. [0] http://secunia.com/advi

Bug#537409: info

2009-07-19 Thread Michael S Gilbert
while this bug is still open, would it make sense to disable the gcc option/optimization/bug/flaw that allows this vulnerability to exist? the "-fno-delete-null-pointer-checks" flag will completely disable this option kernel-wide [1]. obviously there is a tradeoff here. the null pointer optimizat

Bug#532135: RFP: maniadrive -- 3D stunt driving game

2009-06-06 Thread Michael S. Gilbert
Subject: RFP: maniadrive -- 3D stunt driving game Package: wnpp Severity: wishlist * Package name: maniadrive Version : 1.2 Upstream Author : #raydium on irc.freenode.net * URL : http://maniadrive.raydium.org/ * License : GPL Programming Lang: C, PHP Descrip

Bug#532352: gstreamer0.10-plugins-good: CVE-2009-1932 integer overflows

2009-06-08 Thread Michael S. Gilbert
Package: gstreamer0.10-plugins-good Version: 0.10.8-4.1~lenny1 0.10.4-4 Severity: serious Tags: security patch Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for gstreamer0.10-plugins-good. CVE-2009-1932[0]: | Multiple integer overflows in the (1) user_info_callback,

Bug#532372: ecryptfs-utils: CVE-2009-1296 unencrypted passphrase on disk

2009-06-08 Thread Michael S. Gilbert
package: ecryptfs-utils version: 68-1 version: 75-1 severity: serious tags: security Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for ecryptfs-utils. CVE-2009-1296[0]: |Chris Jones discovered that the eCryptfs support utilities would |report the mount passphrase int

Bug#517639: still present in stable releases

2009-06-09 Thread Michael S. Gilbert
reopen 517639 found 517639 1.8.7.72-3 found 517639 1.8.5-4etch4 thank you hi, this bug is still present in the stable releases. please coordinate with the security team (t...@security.debian.org) to prepare updated packages. thanks. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.

Bug#532514: predictable random number generator used in web browsers

2009-06-09 Thread Michael S. Gilbert
package: webkit severity: serious tags: security hello, it has been discovered that all of the major web browsers use a predictable pseudo-random number generator (PRNG). please see reference [0]. the robust solution is to switch to a provably unpredictable PRNG such as Blum Blum Shub [1,2]. [0

Bug#532720: dbus: CVE-2009-1189 incomplete fix for CVE-2008-3834

2009-06-10 Thread Michael S. Gilbert
Package: dbus Version: 1.2.1-5 Severity: grave Tags: security , patch Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for dbus. CVE-2009-1189[0]: | The _dbus_validate_signature_with_reason function | (dbus-marshal-validate.c) in D-Bus (aka DBus) before 1.2.14 uses | in

  1   2   3   >