Bug#121201: Cease their telephone collection and/or harassment of you.

2004-10-29 Thread agustin gonzales
Being concerned about getting out of debt 24hrs a day can be extremely stressful, both on you and your family so take a few minutes right now and educate yourself about your options. For the rest of the story about destroying debt, visit us here http://bkqr.YYv.globalmallproducts.com/e3/ In the p

Bug#278777: xsok: unfixed buffer overflow (CAN-2004-0074)

2004-10-29 Thread Thomas Wana
Package: xsok Severity: critical Justification: security hole This orphaned package still contains the local buffer overflow described in http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0074 which leads to privilege escalation (group games). Tom -- System Information: Debian Release:

Reduces stress

2004-10-29 Thread georgetta murray
When I hear about a new supplement that can help me look and feel younger, I get excited, but I don't lose my head, I like to hear what medical doctors have to say about it to make sure it's safe. I'm going to imagine you're the same way, so here are some doctors and their amazing stories about a s

Bug#278777: xsok: unfixed buffer overflow (CAN-2004-0074)

2004-10-29 Thread Frank Lichtenheld
tags 278777 moreinfo thanks On Fri, Oct 29, 2004 at 12:22:11PM +0200, Thomas Wana wrote: > This orphaned package still contains the local buffer overflow described > in http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0074 which > leads to privilege escalation (group games). Hmm, the pa

Bug#278777: xsok: unfixed buffer overflow (CAN-2004-0074)

2004-10-29 Thread Thomas Wana
Frank Lichtenheld wrote: Hmm, the patch from the DSA is included in the package... Or do you mean that the patch is flawed? Do you mean DSA-405-1 (http://lwn.net/Articles/64725/)? That DSA is refering to CAN-2003-0949, which indeed seems to be fixed, but CAN-2004-0074 (which this bug is about)

Processed: tagging 278777

2004-10-29 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: > # Automatically generated email from bts, devscripts version 2.8.4 > tags 278777 moreinfo Bug#278777: xsok: unfixed buffer overflow (CAN-2004-0074) There were no tags set. Tags added: moreinfo > End of message, stopping processing here. Please contact

Bug#278777: xsok: unfixed buffer overflow (CAN-2004-0074)

2004-10-29 Thread Frank Lichtenheld
On Fri, Oct 29, 2004 at 09:21:09PM +0200, Thomas Wana wrote: > Frank Lichtenheld wrote: > >Hmm, the patch from the DSA is included in the package... Or do you > >mean that the patch is flawed? > > Do you mean DSA-405-1 (http://lwn.net/Articles/64725/)? That DSA > is refering to CAN-2003-0949, whic

Bug#278862: libcap2-dev: please include static library (.a) in the package

2004-10-29 Thread Lennart Poettering
Package: libcap2-dev Version: 0.cvs.20010529-4 Severity: normal Please include the static library (.a file) in the package libcap2-dev. Thank you, Lennart -- System Information: Debian Release: 3.1 APT prefers testing APT policy: (990, 'testing'), (500, 'unstable'), (1, 'experimenta

Bug#278777: xsok: unfixed buffer overflow (CAN-2004-0074)

2004-10-29 Thread Thomas Wana
Frank Lichtenheld wrote: But you too, since that was the wrong part ;) The LANG vuln is fixed in the current package (the patch is in debian/patches and gets applied at build time). I guess the -xsokdir vuln could be not fixed, I will check that. oh - oh - fsck :) Yes, I didn't check the patch

Processed: Re: Bug#278777: xsok: unfixed buffer overflow (CAN-2004-0074)

2004-10-29 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: > tags 278777 security Bug#278777: xsok: unfixed buffer overflow (CAN-2004-0074) Tags were: moreinfo Tags added: security > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrat

Bug#278777: xsok: unfixed buffer overflow (CAN-2004-0074)

2004-10-29 Thread Frank Lichtenheld
tags 278777 security thanks On Fri, Oct 29, 2004 at 09:46:00PM +0200, Thomas Wana wrote: > Frank Lichtenheld wrote: > > > >But you too, since that was the wrong part ;) The LANG vuln is fixed in > >the current package (the patch is in debian/patches and gets applied at > >build time). I guess the