[Bug 35528] Re: security hole in 2.0.2/2.0.3

2007-01-07 Thread Kees Cook
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sun, 7 Jan 2007 06:53:48 +0100 Source: gallery2 Binary: gallery2 Architecture: source Version: 2.0.2-1ubuntu0.1 Distribution: dapper-security Urgency: low Maintainer: Michael C. Schultheiss <[EMAIL PROTECTED]> Changed-By: Stefan Poty

[Bug 35528] Re: security hole in 2.0.2/2.0.3

2007-01-07 Thread Kees Cook
** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2006-1219 -- security hole in 2.0.2/2.0.3 https://launchpad.net/bugs/35528 -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 35528] Re: security hole in 2.0.2/2.0.3

2007-01-06 Thread StefanPotyra
Security review notified, waiting for approval. ** Changed in: gallery2 (Ubuntu Dapper) Status: In Progress => Fix Committed -- security hole in 2.0.2/2.0.3 https://launchpad.net/bugs/35528 -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinf

[Bug 35528] Re: security hole in 2.0.2/2.0.3

2007-01-06 Thread StefanPotyra
Debdiff with updated manifest file as well... btw.: it's not md5sums, but rather crc32. ** Attachment added: "gallery2_2.0.2-1_to_2.0.2-1ubuntu0.1_final.debdiff" http://librarian.launchpad.net/5621520/gallery2_2.0.2-1_to_2.0.2-1ubuntu0.1_final.debdiff -- security hole in 2.0.2/2.0.3 https://

[Bug 35528] Re: security hole in 2.0.2/2.0.3

2007-01-06 Thread StefanPotyra
The above debdiff is the minimal code changes needed for the upgrade. However I still need to test the changes (maybe I'll need to recreate the manifest files containing md5sums as well). -- security hole in 2.0.2/2.0.3 https://launchpad.net/bugs/35528 -- ubuntu-bugs mailing list ubuntu-bugs@li

[Bug 35528] Re: security hole in 2.0.2/2.0.3

2007-01-06 Thread StefanPotyra
** Changed in: gallery2 (Ubuntu Dapper) Assignee: (unassigned) => StefanPotyra ** Changed in: gallery2 (Ubuntu Dapper) Status: Unconfirmed => In Progress ** Attachment added: "debdiff 2.0.2-1_to_2.0.2-1ubuntu0.1" http://librarian.launchpad.net/5621346/gallery2_2.0.2-1_to_2.0.2-1u

[Bug 35528] Re: security hole in 2.0.2/2.0.3

2007-01-06 Thread StefanPotyra
** Changed in: gallery2 (Ubuntu) Assignee: (unassigned) => StefanPotyra -- security hole in 2.0.2/2.0.3 https://launchpad.net/bugs/35528 -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 35528] Re: security hole in 2.0.2/2.0.3

2007-01-06 Thread StefanPotyra
Anyone from motu-swat working on the dapper one yet? If so, please make yourself assignee. If not, I'll look into getting dapper fixed probably this night. -- security hole in 2.0.2/2.0.3 https://launchpad.net/bugs/35528 -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.u

[Bug 35528] Re: security hole in 2.0.2/2.0.3

2007-01-06 Thread StefanPotyra
Rejecting from breezy, gallery2 was never in breezy. ** Changed in: gallery2 (Ubuntu Breezy) Status: Unconfirmed => Rejected -- security hole in 2.0.2/2.0.3 https://launchpad.net/bugs/35528 -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinf

[Bug 35528] Re: [Bug 35528] Re: security hole in 2.0.2/2.0.3

2006-08-24 Thread Dennis Kaarsemaker
Well, for security issues that are remotely exploitable I'd say yes. If someone prepares fixed packages or requests backports (just open a dapper-backports task on this bug) the bug can be closed. -- security hole in 2.0.2/2.0.3 https://launchpad.net/bugs/35528 -- ubuntu-bugs mailing list ubunt

[Bug 35528] Re: security hole in 2.0.2/2.0.3

2006-08-24 Thread Barry deFreese
OK resetting to confirmed. No, it was not an 'easy' fix because Edgy has a much newer release of gallery2. If the rationale for leaving bugs open is 'fixed in all distros' will we ever close most of these bugs? Thanks. ** Changed in: gallery2 (Ubuntu) Status: Fix Released => Confirmed --

[Bug 35528] Re: [Bug 35528] Re: security hole in 2.0.2/2.0.3

2006-08-24 Thread Dennis Kaarsemaker
> So what I should be doing, if I understand the two channels correctly, > and if the bug is severe enough, is to add a dapper-security task to > this bug. Is that correct? Actually, I would not consider this bug 'fix released' without a fix in all supported distros. But since the package is in un

[Bug 35528] Re: security hole in 2.0.2/2.0.3

2006-08-23 Thread Luis Villa
Hrm. Let me clarify the terminology a bit, then: * dapper-backports: something that I as a dapper user assume is optional to subscribe to, and which if subscribed to, gives me new features, etc. * dapper-security: something that I as a dapper user assume is effectively mandatory to subscribe to,

[Bug 35528] Re: [Bug 35528] Re: security hole in 2.0.2/2.0.3

2006-08-23 Thread Dennis Kaarsemaker
> I don't know what Dapper's security policy is, so I can't be specific, > but wouldn't a potential remote exploit pretty much automatically > qualify for a backport? A backport requires that the source package builds without modification on dapper. If that's not the case, a fixed package will ne

[Bug 35528] Re: security hole in 2.0.2/2.0.3

2006-08-23 Thread Luis Villa
I don't know what Dapper's security policy is, so I can't be specific, but wouldn't a potential remote exploit pretty much automatically qualify for a backport? (And isn't the point of all this malone complexity to handle the distinction between dapper and edgy, so that opening another bug is not

[Bug 35528] Re: security hole in 2.0.2/2.0.3

2006-08-23 Thread Barry deFreese
Fixed in Edgy. If you feel that this is severe enough, please file a new bug requesting a backport for Dapper. Thank you. ** Changed in: gallery2 (Ubuntu) Status: Confirmed => Fix Released -- security hole in 2.0.2/2.0.3 https://launchpad.net/bugs/35528 -- ubuntu-bugs mailing list ubu