Re: [SECURITY] [DSA 1719-1] New gnutls13 packages fix certificate validation

2009-02-16 Thread Nicolas Boullis
es should have been expired for long... On the other hand, root certificates are supposed to be long-lasting (a few tens of years), so it's not surprising that some very old root certificates (including X.509v1 ones) are still in use... Regards, -- Nicolas Boullis École Centrale Paris

Re: [SECURITY] [DSA 1719-1] New gnutls13 packages fix certificate validation

2009-02-16 Thread Nicolas Boullis
out of the question.) What's the problem with this patch? As for etch, I don't think the best approach is to keep things broken by a security update. As for lenny, I'd prefer not to have to add the intermediate CA to my trusted list, but it certainly looks like a working solution.

Re: [SECURITY] [DSA 1719-1] New gnutls13 packages fix certificate validation

2009-02-13 Thread Nicolas Boullis
uot; as the root certificate. It apparently is a v1 x509 certificate... What is the solution for me? Should I rebuild all the applications and libraries that use libgnutls, so that they request to accept x509v1 certificates? How? -- Nicolas Boullis -- To UNSUBSCRIBE, email to debian-security-r

Re: [SECURITY] [DSA 1550-1] New suphp packages fix local privilege escalation

2008-05-05 Thread Nicolas Boullis
what it's worth, libapache2-mod-suphp has no such disclaimer, so I considered it safer to use. Anyway, I don't think a security update should break existing setups like this one did. Cheers, Nicolas Boullis, slightly disappointed PS: sorry Adrian for the duplicate message, I did not i

Re: [SECURITY] [DSA 1550-1] New suphp packages fix local privilege escalation

2008-04-28 Thread Nicolas Boullis
tup involves no symlink at all, I think this check exceeds what is required to fix the security flaw. Would it be possible to fix this behaviour? Cheers, Nicolas Boullis -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

[DSA 1494-1] Missing update for user-mode-linux (was: [SECURITY] [DSA 1494-1] New linux-2.6 packages fix privilege escalation)

2008-02-12 Thread Nicolas Boullis
Hi, The update for DSA 1494-1 lacks an update for the user-mode-linux package. Note that I tried the exploit found in the wild. It worked fine with the standard linux-image-2.6.18-6-686 kernel, but lead to a crash both in my user-mode-linux virtual servers and with the linux-image-2.6.18-6-686-big

Re: [SECURITY] [DSA 1430-1] New libnss-ldap packages fix denial of service

2007-12-14 Thread Nicolas Boullis
Hi, Steffen Joeris wrote: >> >>Note from what I can see, the sarge packages (except the i386 version) did >>not depend on 238-1, but the etch packages do. >>cc'ing the maintainer, maybe he knows why. > > I meant that the sarge packages did not depend on libkrb53 of course. Thanks for your answer

Re: [SECURITY] [DSA 1430-1] New libnss-ldap packages fix denial of service

2007-12-14 Thread Nicolas Boullis
Hi, Steve Kemp wrote: > > Debian Security Advisory DSA-1430-1 [EMAIL PROTECTED] > http://www.debian.org/security/ Steve Kemp > December 11, 2007 http://www.de

Re: The same debian - different packages

2003-09-27 Thread Nicolas Boullis
Hi, On Sat, Sep 27, 2003 at 01:24:47AM +0200, Bernd Eckenfels wrote: > My point was refering to the fact that one needs a tool to find those > problems, I know how to fix them :) To find them, try apt-show-versions. Regards, Nicolas

Re: The same debian - different packages

2003-09-27 Thread Nicolas Boullis
Hi, On Sat, Sep 27, 2003 at 01:24:47AM +0200, Bernd Eckenfels wrote: > My point was refering to the fact that one needs a tool to find those > problems, I know how to fix them :) To find them, try apt-show-versions. Regards, Nicolas -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subje

Re: DSA-311-1 New kernel packages - Bug is not fixed!

2003-06-09 Thread Nicolas Boullis
Hi, On Mon, Jun 09, 2003 at 08:25:27PM +0200, Helmar wrote: > I just upgraded my kernel image from 2.4.18-k6 to 2.4.18-1-k6 and i > cannot confirm that the above bug has been fixed. The simple exploit (i > think it has been from bugtraq) is still working fine, giving every > local user easily roo

Re: DSA-311-1 New kernel packages - Bug is not fixed!

2003-06-09 Thread Nicolas Boullis
Hi, On Mon, Jun 09, 2003 at 08:25:27PM +0200, Helmar wrote: > I just upgraded my kernel image from 2.4.18-k6 to 2.4.18-1-k6 and i > cannot confirm that the above bug has been fixed. The simple exploit (i > think it has been from bugtraq) is still working fine, giving every > local user easily roo

Re: Where to install the firewall scripts

2002-12-15 Thread Nicolas Boullis
Hi! On Sun, Dec 15, 2002 at 09:07:21AM -0800, Torrin wrote: > /etc/network/if-pre-up.d/iptables > > #!/bin/sh > > if [ `uname -r | cut -b -3` != "2.4" ]; then > # echo "Not a 2.4 kernel. Exiting iptables firewall script."; >exit 0; > fi > > # This deletes existing tables > iptables -F >

Re: Where to install the firewall scripts

2002-12-15 Thread Nicolas Boullis
Hi! On Sun, Dec 15, 2002 at 09:07:21AM -0800, Torrin wrote: > /etc/network/if-pre-up.d/iptables > > #!/bin/sh > > if [ `uname -r | cut -b -3` != "2.4" ]; then > # echo "Not a 2.4 kernel. Exiting iptables firewall script."; >exit 0; > fi > > # This deletes existing tables > iptables -F >