Bug#346347: use nmu from other ftbfs bug

2006-05-29 Thread Steffen Joeris
Hi >> gpsim-0.20.14 >gui_regwin.c:1795: error: 'GTK_SHEET_CLIP_TEXT' undeclared (first use >in this fu This problem won't raise up if you build against libgtkextra17-dev as you need this header file gtkextra/gtksheet.h So I guess we can just use the patch from http://bugs.debian.org/cgi-bin/bugr

Bug#244126: nmu for both ftbfs bugs

2006-05-29 Thread Steffen Joeris
s* | -rhapsody* | -darwin* | -opened* \ | -openstep* | -oskit* | -conix* | -pw32* | -nonstopux* \ | -storm-chaos* | -tops10* | -tenex* | -tops20* | -its* \ | -os2* | -vos* | -palmos* | -uclinux* | -nucleus* \ | -morphos* | -superux* | -rtmk* | -rtmk-nova* | -windiss* \

Bug#346745: nmu for ftbfs bug

2006-06-02 Thread Steffen Joeris
ysV) + echo i386-pc-xenix + exit ;; +i*86:skyos:*:*) + echo ${UNAME_MACHINE}-pc-skyos`echo ${UNAME_RELEASE}` | sed -e 's/ .*$//' + exit ;; +i*86:rdos:*:*) + echo ${UNAME_MACHINE}-pc-rdos + exit ;; esac #echo '(No uname command or uname output not recognized.)' 1>

Bug#346736: nmu for ftbfs bug

2006-06-02 Thread Steffen Joeris
Hi Now the blocking bug is removed and I have prepared a NMU for gpsim-lcd. I simply removed the xlibs-dev build-dependency. You can find the finish NMU under http://developer.skolelinux.org/~white/debs/nmu/gpsim-lcd/ I also attached the whole patch. Greetings Steffen diff -u gpsim-lcd-0.1.1/con

Bug#233275: nmu for both bugs

2006-06-02 Thread Steffen Joeris
Hi I have prepared a NMU for gpsim-led to fix both RC bugs. It fixes this bug by removing xlibs-dev from build-depends and the other one by applying the patch to prevent segfaulting (see http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=233275) You can find the NMU under http://developer.skoleli

Bug#346742: nmu for both bugs

2006-06-02 Thread Steffen Joeris
Hi I have prepared a NMU for gpsim-led to fix both RC bugs. It fixes this bug by removing xlibs-dev from build-depends and the other one by applying the patch to prevent segfaulting (see http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=233275) You can find the NMU under http://developer.skoleli

Bug#370197: waiting for confirmation

2006-06-06 Thread Steffen Joeris
Hi The packages are prepared and should be ready for upload. Let's wait for Florian to confirm it. Packages available under: http://developer.skolelinux.org/~white/debs/italc/ Greetings Steffen pgp64Ucj5PVqr.pgp Description: PGP signature

Bug#350036: binaries in orig.tar.gz

2006-01-26 Thread Steffen Joeris
Package: polyglot Severity: serious Hi In polyglot's orig.tar.gz I found the following file: polyglot.exe file tells me: polyglot.exe: PE executable for MS Windows (console) Intel 80386 32-bit This is a binary and binaries are not allowed in orig.tar.gz's Please remove all binaries from orig Gr

Bug#350033: binary in orig.tar.gz

2006-01-26 Thread Steffen Joeris
Package: fruit Severity: serious Hi I just downloaded the source package and inside the orig.tar.gz I found a file called fruit_21_static file fruit_21_static tells me: fruit_21_static: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), for GNU/Linux 2.2.5, statically linked, not stripp

Bug#350033: add patch explanation

2006-04-29 Thread Steffen Joeris
package provided a binary without source, which broke the DFSG I had to repack the old orig.tar.gz and bumped the version number to 2.1.0.1dfsg. Upstream only uses the first two digits so there should never be a versioning problem. (Closes: #350033) -- Steffen Joeris <[EMAIL PROTEC

Bug#335719: add patch explanation

2006-04-29 Thread Steffen Joeris
Hi Here is the patch for the build-dependency to make sure that your package builds from source. The problem is that uudecode is not available which is part of the package sharutils. Here is the change in the control file: --- control.old 2006-04-29 15:44:19.0 +0200 +++ control 200

Bug#341251: kdissert needs rebuild against kdelibs4c2a

2005-11-29 Thread Steffen Joeris
Package: kdissert Version: 1.0.5.debian-2 Severity: serious Hi The package needs to be rebuild against the new kdelibs4-dev so that the dependency against kdelibs4c2 changes to kdelibs4c2a. (This is because of the libstdc++ allocation transition). Greetings Steffen -- System Information: Debian

Bug#358813: providing file which is also distributed by another package

2006-03-24 Thread Steffen Joeris
Package: php-log Severity: serious Hi While installing php-log on sid I got the following error: sudo apt-get install php-log Reading package lists... Done Building dependency tree... Done Suggested packages: php4-sqlite php5-sqlite The following NEW packages will be installed php-log 0 upgr

Bug#359208: horde3 is not installable on sid

2006-03-27 Thread Steffen Joeris
Package: horde3 Severity: serious Tags: patch Hi Currently the horde3 package is not installable on sid. I got the following error: apt-get install horde3 Reading Package Lists... Done Building Dependency Tree... Done Some packages could not be installed. This may mean that you have requested an

Bug#373629: add patch for get rid of cd device

2006-06-20 Thread Steffen Joeris
Hi I tried to get rid of the cd device to make sure that autopartkit doesn't try to do partitioning on this read-only device. I am using the ped_device_destroy() function from libparted, please have a look and comment, I guess this is a good workaround to exclude the cd device from the list. G

Bug#374874: Segmentation fault while printing partition list

2006-06-21 Thread Steffen Joeris
Package: autopartkit Severity: grave Hi The second problem with autopartkit raises up when it tries to call the print_list() function. As far as I can see it goes into the if-clause and then gets a segmentation fault. I need to do some further debugging to provide a patch, but I wanted to report

Bug#337907: unnecessary and "broken" depends on libqt3c102-mt

2005-11-06 Thread Steffen Joeris
Package: vym Version: 1.7.0+cvs1.7.4-2 Severity: grave Hi There is a dependency on libqt3c102-mt which makes vym uninstallable on i386 . I think a rebuild is necessary. Greetings Steffen -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable'

Bug#338206: can't install, because of dependency?

2005-11-08 Thread Steffen Joeris
Package: libgnomeprint15 Severity: serious Hi I can't install the package libgnomeprint15, because it depends on a specific version of libgnomeprint-data, but the version of libgnomeprint-data in unstable is newer than the dependency. This makes libgnomeprint15 and other packages which are dependi

Bug#339492: uninstallable

2005-11-16 Thread Steffen Joeris
Package: guile-gnome0-dev Severity: serious Hi Sorry but guile-gnome0-dev is uninstallable. I need it for a package and under sid it failed to install with the following warning: The following packages have unmet dependencies: guile-gnome0-dev: Depends: g-wrap (>= 1.9.4) but it is not going to

Bug#339720: never call debian/control rule and build this file during the build

2005-11-18 Thread Steffen Joeris
Package: cdbs Version: 0.4.32 Severity: serious Hi It should never be possible to call a target named debian/control , which will build a control file during the build. But this is possible with cdbs, because the target has the name of a file which exists and then the rules will call this target.

Bug#340149: guile-1.6-slib has a wrong dependency

2005-11-21 Thread Steffen Joeris
Package: guile-1.6-slib Severity: serious Hi The package depends on slib, but slib conlicts with guile-1.6-slib. The changelog entry of the slib maintainer is: * Conflict with libguile9 <= 1:1.4-26 and guile-1.6-libs <= 1.6.7-1.1. These both contain a "slib.scm" (which is their version of the sli

Bug#340208: uninstallable, needs rebuild

2005-11-21 Thread Steffen Joeris
Package: samba Version: 3.0.20b-2 Severity: serious Hi The samba package is currently uninstallable, because the package libdb4.1 is removed from the archive. Greetings Steffen -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable') Archite

Bug#340210: uninstallable, needs rebuild

2005-11-21 Thread Steffen Joeris
Package: yelp Version: 2.10.0-3 Severity: serious Hi The package needs to be rebuild, because the package libdb4.1 is removed from the archive and now your package is uninstallable. Greetings Steffen -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (

Bug#340212: uninstallable, needs rebuild

2005-11-21 Thread Steffen Joeris
Package: totem-xine Version: 1.0.5-1 Severity: serious Hi The package needs to be rebuild, because the package libdb4.1 is removed from the archive and now your package is uninstallable. Greetings Steffen -- System Information: Debian Release: testing/unstable APT prefers unstable APT poli

Bug#340213: uninstallable, needs rebuild

2005-11-21 Thread Steffen Joeris
Package: sound-juicer Version: 2.10.1-3 Severity: serious Hi The package needs to be rebuild, because the package libdb4.1 is removed from the archive and now your package is uninstallable. Greetings Steffen -- System Information: Debian Release: testing/unstable APT prefers unstable APT p

Bug#340214: uninstallable, needs rebuild

2005-11-21 Thread Steffen Joeris
Package: python2.4-gnome2 Version: 2.10.0-4 Severity: serious Hi The package needs to be rebuild, because the package libdb4.1 is removed from the archive and now your package is uninstallable. Greetings Steffen -- System Information: Debian Release: testing/unstable APT prefers unstable A

Bug#344403: confirmed

2005-12-22 Thread Steffen Joeris
Hi Thanks for the hint ( shit i missed reading the mail on debian-devel ;( ). I rebuild it and made the changelog entry, but i am not a DD so i can't upload it and now i am waiting for my sponsor. Package is available at: http://developer.skolelinux.no/~white/debs/kgeography/ Greetings Steffen

Bug#347381: RM: kgeography -- geography learning tool

2006-01-10 Thread Steffen Joeris
Package: ftp.debian.org Severity: serious Hi Please remove this package because the provided binary now exists in kdeedu from kde 3.5 which is now in unstable. Greetings Steffen -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable') Archit

Bug#391608: missing dependency against python?

2006-10-07 Thread Steffen Joeris
Package: unsermake Severity: grave Hi I build a package in pbuilder which needs unsermake to build and it stops with the following error message: unsermake /usr/bin/unsermake: line 11: exec: python2.4: not found make: *** [build-stamp] Error 127 pbuilder: Failed autobuilding of package Curren

Bug#431699: debian-edu-artwork: modifies conffile of other package

2007-07-04 Thread Steffen Joeris
Package: debian-edu-artwork Severity: serious Justification: Policy 3.9 # This is not policy compilant, as $kdmrc is a conffile in # the kdm package, and we are editing it in a package # maintainer script. Need to come up with a better way to # do it. This is a quote from the update-artwork scri

Bug#433964: possible security problem with xscreensaver

2007-07-20 Thread Steffen Joeris
Package: xscreensaver Version: 4.24-5 Severity: grave Tags: security Justification: user security hole Hi mate Please have a look at the patch below I found in the Ubuntu version of your package. Your package was showing up on the security tracker and I found a CVE assigned for it. It seems that

Bug#434045: horde3: Cross-site scripting (XSS) vulnerability

2007-07-20 Thread Steffen Joeris
Package: horde3 Severity: grave Tags: security Justification: user security hole Hi mate A possible security hole has been discovered in horde3. The CVE[0] text says: Cross-site scripting (XSS) vulnerability in framework/NLS/NLS.php in Horde Framework before 3.1.4 RC1, when the login page conta

Bug#425546: NMU for removing checks to avoid FTBFS

2007-07-29 Thread Steffen Joeris
4.4.cvs20060709-4.1) unstable; urgency=high + + * Non-maintainer upload + * Set urgency to high due to RC bugfix and getting the package +back into testing soon + * Remove the make tests, because they are causing an FTBFS and they +are no longer needed (Closes: #425546) + + -- Steffen Joeris <

Bug#431526: nmu proposal

2007-07-31 Thread Steffen Joeris
update-inetd was moved into a seperate package (Closes: #43532) + + -- Steffen Joeris <[EMAIL PROTECTED]> Tue, 31 Jul 2007 17:31:11 +1000 + gnats (4.1.0-0.2) unstable; urgency=high * Non-maintainer upload during BSP diff -u gnats-4.1.0/debian/control gnats-4.1.0/debian/control --- gna

Bug#435401: sandbox for vim allows attackers to execute shell commands and write files via modelines

2007-07-31 Thread Steffen Joeris
Package: vim Version: 1:7.1-022+1 Severity: grave Tags: security Justification: user security hole Hi mates I found this CVE[0], which states: The sandbox for vim allows dangerous functions such as (1) writefile, (2) feedkeys, and (3) system, which might allow user-assisted attackers to execute

Bug#435462: add upstream patch

2007-08-05 Thread Steffen Joeris
+ + * Non-maintainer upload + * Fix integer overflow in the StreamPredictor::StreamPredictor +function by adding post-3.5.7-kdegraphics-CVE-2007-3387.diff.dpatch +(Closes: #435462) Fixes: CVE-2007-3387 + + -- Steffen Joeris <[EMAIL PROTECTED]> Sun, 05 Aug 2007 10:03:53 + +

Bug#436099: CVE-2007-3387: Integer overflow in cupsys

2007-08-05 Thread Steffen Joeris
r function +Fixes: CVE-2007-3387 + + -- Steffen Joeris <[EMAIL PROTECTED]> Sun, 05 Aug 2007 11:18:08 + + cupsys (1.2.12-1) unstable; urgency=low * New upstream release only in patch2: unchanged: --- cupsys-1.2.12.orig/debian/patches/CVE-2007-3387.dpatch +++ cupsys-1.2.12/debian/

Bug#435460: add patch

2007-08-05 Thread Steffen Joeris
tags 435460 patch thanks -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Bug#435460: add NMU patch

2007-08-05 Thread Steffen Joeris
/changelog +++ poppler-0.5.4/debian/changelog @@ -1,3 +1,12 @@ +poppler (0.5.4-6.1) unstable; urgency=high + + * Non-maintainer upload + * Include upstream patch to fix integer overflow in the +StreamPredictor::StreamPredictor function +(Closes: #435460) Fixes: CVE-2007-3387 + + -- Steffen

Bug#434308: any problems

2007-08-07 Thread Steffen Joeris
Hi Are there any problems with the upload? Is there anything blocking you? The security fix is still blocked for testing this way :/ Cheers Steffen -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Bug#436701: CVE-2007-1614: DoS and execution of arbitary code

2007-08-08 Thread Steffen Joeris
Package: zziplib Severity: grave Tags: security Justification: user security hole Hi The following CVE[0] has be issued against zziplib. The text says: Stack-based buffer overflow in the zzip_open_shared_io function in zzip/file.c in ZZIPlib Library before 0.13.49 allows user-assisted remote att

Bug#436701: CVE-2007-1614: DoS and execution of arbitary code

2007-08-08 Thread Steffen Joeris
Hi > http://www.securitylab.ru/forum/read.php?FID=21&TID=40858&MID=326187#messag >e326187 > > Basically "zzcat $longfilename" crashes. I wouldn't have thought > this would require a DSA. Yes you are right, although I understood the CVE text in a different way. I will downgrade the bug to "nor

Bug#436166: lirc FTBFS

2007-08-09 Thread Steffen Joeris
Hi The linux/compiler.h file was in the linux-kernel-headers package, which got removed from unstable. The file as available for all archs, although afaik the code is not absoluteley arch-indep. The best way would probably be to put some ifdef conditions into the code and only use it, if it is

Bug#435735: NMU proposal for postfix-policyd

2007-08-10 Thread Steffen Joeris
long SMTP commands +(apply directly, because no patch system is used so far) +(Closes: #435735) Fixes: CVE-2007-3791 + + -- Steffen Joeris <[EMAIL PROTECTED]> Wed, 08 Aug 2007 14:49:16 + + postfix-policyd (1.80-2.1) unstable; urgency=medium * Non-maintainer upload. only in

Bug#416696: bug status?416696

2007-08-10 Thread Steffen Joeris
Hi Any news on this one? viewvc does not make it into testing atm, because of this bug and a missing build-depends. Can this patch be included? I noticed that upstream changed the code in the trunk. I would very much like to get that issue fixed for unstable and testing. Thanks a lot for your e

Bug#428202: subversion builds fine here

2007-08-10 Thread Steffen Joeris
Hi I just built subversion in a sid-chroot and in my pbuilder/cowbuilder on i386. It built through. The build log said that a few tests were skipped, but I do not see any errors. Can we at least lower the severity of this bugreport, because it blocks the migration of a security fix (CVE-2007-244

Bug#437621: CVE-2007-2030: unsecure tempfile handling

2007-08-13 Thread Steffen Joeris
Package: lha Severity: grave Tags: security Justification: user security hole Hi There is a CVE[0] issued against lha. It also leads to a patch[1], which apparently fixes the problem. Could you please investigate this. The CVE text says: lharc.c in lha does not securely create temporary files, w

Bug#433861: nmu patch

2007-08-21 Thread Steffen Joeris
33861) + + -- Steffen Joeris <[EMAIL PROTECTED]> Tue, 21 Aug 2007 05:23:01 + + emacs21 (21.4a+1-5) unstable; urgency=low * Move man pages back to emacs21-common. (closes: #414321) [rlb] diff -u emacs21-21.4a+1/debian/control emacs21-21.4a+1/debian/control --- emacs21-21.4a+1/deb

Bug#439240: forwarded to upstream and lowering severity

2007-08-24 Thread Steffen Joeris
severity 439240 important forwarded 439240 [EMAIL PROTECTED] thanks Hi I tried it again here on an amd64 machine and a friend of mine started it on an i386 machine and it worked without any problems. Therefore, I dare lowering the bugreport to "important", so that it is not blocking the testing

Bug#448873: upload lost

2007-11-18 Thread Steffen Joeris
Hi This upload got lost in ftp-master's crash. Can you please reupload? Cheers Steffen signature.asc Description: This is a digitally signed message part.

Bug#453280: CVE-2007-6103: remote DoS

2007-11-28 Thread Steffen Joeris
Package: ihu Severity: grave Tags: security Justification: user security hole Hi The following CVE[0] has been issued against ihu. CVE-2007-6103: I Hear U (IHU) 0.5.6 and earlier allows remote attackers to cause (1) a denial of service (infinite loop) via a packet that contains zero in the siz

Bug#453283: CVE-2007-6061: possible symlink attack

2007-11-28 Thread Steffen Joeris
Package: audacity Severity: grave Tags: security Justification: user security hole Hi The following CVE[0] has been issued against audacity. CVE-2007-6061: Audacity 1.3.2 creates a temporary directory with a predictable name without checking for previous existence of that directory, which allo

Bug#455737: more CVEs

2007-12-11 Thread Steffen Joeris
Hi > Patch: http://lists.mysql.com/commits/37098 > Patch: http://bugs.mysql.com/bug.php?id=29908 Please rather check the full bugreports, instead of the individual commit messages, because there was more. For references: http://bugs.mysql.com/bug.php?id=28597 http://bugs.mysql.com/bug.php?id=29

Bug#445475: CVE-2007-5198: Buffer overflow in the redir function in check_http.c

2007-10-05 Thread Steffen Joeris
Package: nagios-plugins Severity: grave Tags: security Justification: user security hole Hi The following CVE[0] has been issued against nagios-plugins. CVE-2007-5198: Buffer overflow in the redir function in check_http.c in Nagios Plugins before 1.4.10 allows remote web servers to execute arbi

Bug#445475: patch for nagios-plugins

2007-10-06 Thread Steffen Joeris
NULL pointer, which leads +to a segfault + + -- Steffen Joeris <[EMAIL PROTECTED]> Sat, 06 Oct 2007 09:12:18 + + nagios-plugins (1.4.8-2) unstable; urgency=low * fix typo in upstream configure script which caused some plugins diff -u nagios-plugins-1.4.8/debian/patches/00list

Bug#436249: package status

2007-10-06 Thread Steffen Joeris
Hi Just wondering about the packaging progress of the new upstream version. Looking over the pennmush upstream changelog, it seems that a few buffer overflows were fixed as well. It would be really nice to get the newest upstream version into unstable (and then testing). Cheers Steffen signa

Bug#429177: backporting progress

2007-10-06 Thread Steffen Joeris
Hi I was just wondering, what the progress of the backporting effort is. Does it work for you to backport the changes and upload a new package version to unstable? Thanks in advance for your efforts. Cheers Steffen signature.asc Description: This is a digitally signed message part.

Bug#445883: NMU patch

2007-10-09 Thread Steffen Joeris
xy-1.0.5/debian/changelog @@ -1,3 +1,12 @@ +dircproxy (1.0.5-5.1) unstable; urgency=high + + * Non-maintainer upload by the testing-security team + * Backport upstream patch to fix a NULL pointer reference, which +can lead to a DoS (Closes: #445883) +Fixes: CVE-2007-5226 + + -- Steffe

Bug#446354: dhcp: stack-based buffer overflow (CVE-2007-5365)

2007-10-12 Thread Steffen Joeris
+ * Fix stack-based buffer overflow in options.c, which allows arbitrary +code execution or cause of a DoS through remote attackers +Fixes: CVE-2007-5365 + + -- Steffen Joeris <[EMAIL PROTECTED]> Fri, 12 Oct 2007 12:33:17 + + dhcp (2.0pl5dfsg1-20) unstable; urgency=medium * Takin

Bug#445475: upload?

2007-10-12 Thread Steffen Joeris
Hi We were just wondering, if you need help with the upload. I think you said that you want to upload yourself, but I thought quickly checking with you would be a good idea :) Cheers Steffen signature.asc Description: This is a digitally signed message part.

Bug#445582: CVE-2007-5373 issued

2007-10-12 Thread Steffen Joeris
Hi There has been a CVE[0] issued for this bug. Please add a line to your changelog file, when you close this bug by an upload and state that it fixes the CVE. Thanks in advance. Cheers Steffen [0]: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5373 signature.asc Description: This i

Bug#446451: phpmyadmin: CVE-2007-5386 XSS vulnerability

2007-10-12 Thread Steffen Joeris
vulnerability in scripts/setup.php +Fixes: CVE-2007-5386 + + -- Steffen Joeris <[EMAIL PROTECTED]> Sat, 13 Oct 2007 05:12:44 + + phpmyadmin (4:2.11.1-1) unstable; urgency=low * New upstream release. diff -u phpmyadmin-2.11.1/debian/patches/00list phpmyadmin-2.11.1/debian/p

Bug#444928: NMU patch for whitelisting

2007-10-14 Thread Steffen Joeris
team + * Changed FCKeditor blacklists to whitelists in order to make sure +that remote attackers cannot upload arbitrary PHP code via a file +whose name contains unknown extensions (Closes: #444928) +Fixes: CVE-2007-5156 + + -- Steffen Joeris <[EMAIL PROTECTED]> Sun, 14 Oct 20

Bug#445582: ldapscripts shows passwords in the clear on the command line

2007-10-21 Thread Steffen Joeris
Hi Today, I had a look at the new upstream version 1.7.1, in order to fix unstable and testing. Thew new upstream version uses a function called mktempf () . There you generate the tempfile. However, you do not use the "mktemp" program. I did not try it so far, but I think that it is possible

Bug#445582: ldapscripts shows passwords in the clear on the command line

2007-10-21 Thread Steffen Joeris
Hi > > I would suggest using mktemp instead, which creates unique temporary > > filenames, which cannot be guessed. > > what would be the point ? $TMPDIR is 0700. Bah, I overlooked the umask call. Thanks for the pointer. Cheers Steffen signature.asc Description: This is a digitally signed mes

Bug#429205: nmu patch

2007-10-21 Thread Steffen Joeris
+ * Include upstream patch to enable whitelisting, instead of +insufficient blacklisting for file uploads (Closes: #429205) +Fixes: CVE-2007-5156, CVE-2007-3163, CVE-2007-2630, CVE-2006-0658 + + -- Steffen Joeris <[EMAIL PROTECTED]> Sun, 21 Oct 2007 14:43:37 + + moin (1.5.8-4) un

Bug#446906: security related issue, CVE assigned

2007-10-24 Thread Steffen Joeris
+ + -- Steffen Joeris <[EMAIL PROTECTED]> Wed, 24 Oct 2007 13:08:36 + + gnome-screensaver (2.20.0-1) unstable; urgency=low [ Riccardo Setti ] only in patch2: unchanged: --- gnome-screensaver-2.20.0.orig/src/gs-manager.c +++ gnome-screensaver-2.20.0/src/gs-manager.c @@ -1045,7 +

Bug#423606: segmentation fault of k3dsurf on start up

2007-10-31 Thread Steffen Joeris
On Thu, 1 Nov 2007 05:37:43 am Robin Haunschild wrote: > Hi, thanks for the answer, > > I forgot to check it, but today I noticed that by the upgrades in the > meantime the seg faults disappeared. > Therefore, the bug can be closed. > > Am Montag, 29. Oktober 2007 19:38 schrieb Cyril Brulebois: > >

Bug#448873: [Secure-testing-team] Bug#448873: iscsitarget: ietd.conf public readable and contains passwords

2007-11-01 Thread Steffen Joeris
d.conf is 640 (Closes: #448873) +(init script sets 600, when called with dump anyway) + + -- Steffen Joeris <[EMAIL PROTECTED]> Fri, 02 Nov 2007 03:23:17 + + iscsitarget (0.4.15-4) unstable; urgency=low [ Frederik Schüler ] diff -u iscsitarget-0.4.15/debian/rules iscsitarget-0.4.15/d

Bug#449008: package upload?

2007-11-02 Thread Steffen Joeris
Hi Anyone preparing a package upload or is a sponsor needed? Cheers Steffen signature.asc Description: This is a digitally signed message part.

Bug#449108: CVE-2007-3920: bypass password authentication

2007-11-02 Thread Steffen Joeris
+ + -- Steffen Joeris <[EMAIL PROTECTED]> Sat, 03 Nov 2007 00:33:48 + + compiz (0.5.2-2) unstable; urgency=low * oops, shipping copies of a few .h and .pc files in both compiz-dev diff -u compiz-0.5.2/debian/patches/series compiz-0.5.2/debian/patches/series --- compiz-0.5.2/debian/patches/

Bug#448866: patch for off-by-one error

2007-11-02 Thread Steffen Joeris
prevent +possible DoS attack (Closes: #448866) +Fixes: CVE-2007-4351 + + -- Steffen Joeris <[EMAIL PROTECTED]> Sat, 03 Nov 2007 06:43:25 + + cupsys (1.3.2-1) unstable; urgency=low * New upstream bug fix release. diff -u cupsys-1.3.2/debian/patches/00list cupsys-1.3.2/debian/p

Bug#449008: package upload?

2007-11-02 Thread Steffen Joeris
On Sat, 3 Nov 2007 06:49:17 pm Romain Francoise wrote: > Steffen Joeris <[EMAIL PROTECTED]> writes: > > Anyone preparing a package upload or is a sponsor needed? > > I can NMU if necessary. Do we have a CVE id for this? Please go for it, saves me some time :) Number is CVE-2

Bug#448157: CVE-2007-5585 authentication bypass (FTBFS with patch)

2007-11-05 Thread Steffen Joeris
With this patch, xscreensaver fails to build: lock.c: In function ‘update_passwd_window’: lock.c:1082: error: ‘saver_screen_info’ has no member named ‘root_depth’ make[2]: *** [lock.o] Error 1 make[2]: Leaving directory `/home/white/white/debian/debs/security/xscreensaver/new/xscreensaver-5.03/dr

Bug#448157: CVE-2007-5585 authentication bypass (FTBFS with patch)

2007-11-05 Thread Steffen Joeris
On Tue, 6 Nov 2007 01:52:56 pm Jamie Zawinski wrote: > On Nov 5, 2007, at 4:11 PM, Steffen Joeris wrote: > > With this patch, xscreensaver fails to build: > > Sorry, typo: pw->prompt_screen should have been pw->prompt_screen- > > >screen. Revised patch: The patch w

Bug#449497: [Foo2zjs-maintainer] Bug#449497: foo2zjs: application depends on non-free firmware

2007-11-05 Thread Steffen Joeris
severity 449497 wishlist tags 449497 wontfix thanks Hi Michael To the best of my knowledge, not all printers need this firmware. Thus, the package is operational without additional firmware. Unfortunately, some printers need firmware, that is right. Please feel free to ask hp or the other prin

Bug#450456: perl: DSA 1400-1: heap overflow

2007-11-07 Thread Steffen Joeris
Package: perl Version: 5.8.8-11.1 Severity: grave Tags: security Justification: user security hole Hi There has been a DSA for perl. Will Drewry and Tavis Ormandy of the Google Security Team have discovered a UTF-8 related heap overflow in Perl's regular expression compiler, probably allowing at

Bug#435709: another CVE

2007-11-17 Thread Steffen Joeris
Hi Another CVE[0] has been issued against bandersnatch. CVE-2007-6001: Multiple cross-site scripting (XSS) vulnerabilities in index.php in Bandersnatch 0.4 allow remote attackers to inject arbitrary web script or HTML via the (1) func or (2) date parameter, or the jid parameter in a (3) log o

Bug#416747: NMU upload

2007-05-18 Thread Steffen Joeris
@@ +gallery (1.5.5-pl1-1.1) unstable; urgency=high + + * Non-maintainer upload during BSP + * Fix unconditional use of debconf in postrm (Closes: #416747) + * Include Spanish debconf translation (Closes: #423703) + + -- Steffen Joeris <[EMAIL PROTECTED]> Fri, 18 May 2007 21:48:30 +1000 + g

Bug#416764: NMU upload

2007-05-18 Thread Steffen Joeris
) +Thanks to Steve Lord Flaubert + * Include German debconf translation (Closes: #413380) +Thanks to Helge Kreutzmann + + -- Steffen Joeris <[EMAIL PROTECTED]> Fri, 18 May 2007 23:15:14 +1000 + hotway (1:0.8.4-2.1) unstable; urgency=low * Non-maintainer upload to fix a longstandi

Bug#416754: NMU upload

2007-05-18 Thread Steffen Joeris
ts (Closes: #416754) + - Add a check in gnats.postrm.in + - Remove the manual debconf calls from gnats-user.postrm.in as they + are added by debhelper automatically + + -- Steffen Joeris <[EMAIL PROTECTED]> Fri, 18 May 2007 22:35:36 +1000 + gnats (4.1.0-0.1) unstable; urgency=low

Bug#416930: NMU upload

2007-05-19 Thread Steffen Joeris
+++ lirc-0.8.0/debian/changelog @@ -1,3 +1,10 @@ +lirc (0.8.0-9.3) unstable; urgency=high + + * Non-maintainer upload during BSP + * Fix unconditional use of debconf in postrm (Closes: #416930) + + -- Steffen Joeris <[EMAIL PROTECTED]> Sat, 19 May 2007 22:24:22 +1000 + lirc (0.8.0-9.2) un

Bug#439927: bumping urgency: t1lib

2007-09-19 Thread Steffen Joeris
Hi All From the testing-security point of view, I would not see any problem with bumping the urgency and letting it migrate to lenny. The ppc buildd still needs to pick it up and I guess that S390 is a matter of time. Thanks for your efforts. Cheers Steffen signature.asc Description: This is

Bug#437148: scponly: deactivating or splitting packages

2007-09-24 Thread Steffen Joeris
Hi I was just wondering about the status of this security bug. Shall we go ahead and deactivate the svn support via NMU and you can decide what to do later or do you likely have the time to do the splitting? Thanks for your feedback. Cheers Steffen signature.asc Description: This is a digitall

Bug#437148: NMU fix

2007-09-25 Thread Steffen Joeris
splitting the packages and providing + a binary package, which enables these features, but warns about + them and one, which is safe and has them disabled, like this + + -- Steffen Joeris <[EMAIL PROTECTED]> Tue, 25 Sep 2007 10:06:31 + + scponly (4.6-1) unstable; urgency=high

Bug#444002: dibbler: several security problems fixed in new upstream version

2007-09-25 Thread Steffen Joeris
Package: dibbler Severity: grave Tags: security Justification: user security hole Hi There are three CVEs issued for dibbler. CVE-2007-5028: Dibbler 0.6.0 on Linux uses weak world-writable permissions for unspecified files in /var/lib/dibbler, which has unknown impact and local attack vectors.

Bug#444014: koffice: CVE-2007-5049 stack based buffer overflow

2007-09-25 Thread Steffen Joeris
Package: koffice Severity: grave Tags: security Justification: user security hole Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for poppler. CVE-2007-5049[0]: | Stack-based buffer overflow in the StreamPredictor::getNextLine | function in xpdf, as used in (1) poppler

Bug#444015: kdegraphics: CVE-2007-5049 stack based buffer overflow

2007-09-25 Thread Steffen Joeris
Package: kdegraphics Version: 4:3.5.7-3 Severity: grave Tags: security Justification: user security hole Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for xpdf. CVE-2007-5049[0]: | Stack-based buffer overflow in the StreamPredictor::getNextLine | function in xpdf, as

Bug#445113: snort: FTBFS on a few archs

2007-10-03 Thread Steffen Joeris
Package: snort Severity: serious Hi When I checked snort for testing migration, I saw that it did not build on a few archs (arm, hppa, ia64, s390 and sparc) and it always has this error message: ps2pdf faq.ps make[1]: *** [faq.pdf] Bus error make[1]: *** Deleting file `faq.pdf' rm faq.ps faq.dvi

Bug#470664: news?

2008-05-12 Thread Steffen Joeris
Hi Any news on this bug yet? Cheers Steffen signature.asc Description: This is a digitally signed message part.

Bug#481186: CVE-2008-2149: buffer overflows

2008-05-14 Thread Steffen Joeris
Package: wordnet Severity: grave Tags: security Justification: user security hole Hi The following CVE(0) has been issued against wordnet. CVE-2008-2149: Stack-based buffer overflow in the searchwn function in Wordnet 2.0, 2.1, and 3.0 might allow context-dependent attackers to execute arbitrar

Bug#481164: patch for python-django XSS

2008-05-14 Thread Steffen Joeris
81164) + + -- Steffen Joeris <[EMAIL PROTECTED]> Wed, 14 May 2008 13:01:46 + + python-django (0.96.1-3) unstable; urgency=low * Fix for bash completion (Upstream bug 6661) only in patch2: unchanged: --- python-django-0.96.1.orig/debian/patches/04_XSS_fix.diff +++ python-django-0.96.1/deb

Bug#481164: patch for python-django XSS

2008-05-15 Thread Steffen Joeris
On Thu, 15 May 2008 01:42:21 am Raphael Hertzog wrote: > On Wed, 14 May 2008, Steffen Joeris wrote: > > Attached you will find the patch from upstream. Please let me know, if > > you have time for it or want me to upload. > > Don't worry, I will wait a few days. >

Bug#481186: CVE-2008-2149: buffer overflows

2008-05-16 Thread Steffen Joeris
Hi Andreas Sorry for the late reply. > I've got no answer to this question for nearly 24 hours. Because I > consider it more important to fix a known issue _now_ instead of doing a > long research for other issues for perhaps weeks I will upload packages > with the proposed fix in the next hour.

Bug#481504: patch proposal for mantis CSRF

2008-05-18 Thread Steffen Joeris
e; urgency=high + + * Non-maintainer upload by the security team + * Fix Cross-site request forgery (CSRF) vulnerability that allowed +certain actions via HTTP requests without performing any validity +checks (Closes: #481504) Fixes: CVE-2008-2276 + + -- Steffen Joeris <[EMAIL PROTECT

Bug#481504: CVE-2008-2276: Cross-site request forgery (CSRF) vulnerability

2008-05-20 Thread Steffen Joeris
Somehow the mail was just sent to the maintainer, here is a copy for the bugreport. Hi Patrick > I haven't looked deeper in your patch, but it seems reasonable. > I have forwarded it to the developers, because they are currently > or has been working on this issue recently and I wanted to hear t

Bug#480011: full nmu patch

2008-05-20 Thread Steffen Joeris
"format=raw" parameter for raw disk images +- Fixes possible privilege escalation, which could allow guest users + to read arbitrary files on the host by modifying the header to identify + a different format (Closes: #481204) Fixes: CVE-2008-2004 + + -- Steffen Joeris <[

Bug#482518: libvorbis0a: possible integer overflows and DoS attacks

2008-05-23 Thread Steffen Joeris
Package: libvorbis0a Version: 1.2.0.dfsg-3.1 Severity: grave Tags: security, patch Justification: user security hole Hi The following CVEs(0,1,2) have been issued against libvorbis. CVE-2008-1423: Integer overflow in a certain quantvals and quantlist calculation in Xiph.org libvorbis 1.2.0 and

Bug#482664: CVE-2008-1767: buffver overflow in pattern.c

2008-05-24 Thread Steffen Joeris
Package: libxslt1.1 Version: 1.1.23-1 Severity: grave Tags: security, patch Justification: user security hole Hi The following CVE(0) has been issued against libxslt. CVE-2008-1767: Buffer overflow in pattern.c in libxslt before 1.1.24 allows context-dependent attackers to cause a denial of ser

Bug#482664: [xml/sgml-pkgs] Bug#482664: CVE-2008-1767: buffver overflow in pattern.c

2008-05-24 Thread Steffen Joeris
Hi Mike On Sun, 25 May 2008 01:01:52 am Mike Hommey wrote: > On Sat, May 24, 2008 at 08:16:05PM +1000, Steffen Joeris wrote: > > Package: libxslt1.1 > > Version: 1.1.23-1 > > Severity: grave > > Tags: security, patch > > Justification: user security hole >

  1   2   3   >