Bug#557948: ssmtp: Fails to send any mail with send-mail: Cannot open mailhub:25

2009-12-07 Thread Alec Berryman
severity 557948 serious thanks It is not OK to break the system's mail silently on upgrade and this should not have gone into testing. There was no README.Debian entry that apt-listchanges could have alerted me to, no changelog entry noting the implication of the fix for bug #500454, and no docum

Bug#535232: zsh: segfaults while trying to free in hend

2009-06-30 Thread Alec Berryman
Package: zsh Version: 4.3.10-2 Severity: important Recently (one or two weeks, probably when I upgraded to the current version of zsh), I've been seeing intermittent segfaults - I'll run a command like less or cd and my terminal will die on me. I've never seen it happen in a long-running shell; i

Bug#517765: sound-juicer: cannot submit track listings

2009-03-23 Thread Alec Berryman
Josselin Mouette on 2009-03-23 19:35:53 +0100: > Le dimanche 01 mars 2009 à 17:40 -0500, Alec Berryman a écrit : > > I tried to submit track listings by filling them in, going to the Disc > > menu, and choosing Submit Track Names. I get the following error: > > &g

Bug#517765: sound-juicer: cannot submit track listings

2009-03-01 Thread Alec Berryman
Package: sound-juicer Version: 2.22.0-2 Severity: normal I tried to submit track listings by filling them in, going to the Disc menu, and choosing Submit Track Names. I get the following error: "Could not open URL Sound Juicer could not open the submission URL Reason: There was an error launchi

Bug#511856: rzip: Corruption

2009-01-14 Thread Alec Berryman
Steve Fosdick on 2009-01-14 22:47:03 +: > Package: rzip > Version: 2.1-1 > Severity: important Thanks for the bug report! > I attempted to unzip using a command similar to the following: > > rzip -d -o dir/disk.img disk.img.rz > > This produced the error: > > Bad checksum 0x3b2bfb2a - expect

Bug#464713: fix for "Malformed network data" in git-svn

2008-09-14 Thread Alec Berryman
The patch with http://marc.info/?l=git&m=122142754428597&w=2 fixes the issue for me. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Bug#489980: llvm: please include emacs and vim syntax modes

2008-07-08 Thread Alec Berryman
Package: llvm Version: 2.2-8 Severity: wishlist -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 llvm includes emacs and vim syntax modes for LLVM assembly files and TableGen description files in the utils/ subdirectory; it'd be great if the Debian package included them. - -- System Information: De

Bug#485523: resolvconf: mistakes runit for daemontools in dnscache update script

2008-06-09 Thread Alec Berryman
Package: resolvconf Version: 1.40 Severity: normal Tags: patch -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 The code for restarting dnscache in the script /etc/resolvconf/update.d/dnscache guesses between runit and daemontools by looking at dnscache's parent directory. It assumes runit when it

Bug#461835: followup on "crm114: mailreaver.crm occasionally fails; unable to read-open priolist.mfp"

2008-03-20 Thread Alec Berryman
Milan Zamazal on 2008-03-15 10:38:54 +0100: > Before I report the problem upstream, would you please try the current > version when it hits archives? I'll give it a shot this weekend and let you know how it goes. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". T

Bug#461835: followup on "crm114: mailreaver.crm occasionally fails; unable to read-open priolist.mfp"

2008-03-03 Thread Alec Berryman
I've been seeing this problem; it started for me over the past week or two. I haven't changed my copy of crm114 in that time, but I have done a regular regimin of apt-get updates for testing. The only interesting data point I have is that it happened after a kernel upgrade; the host is Xen 3.0 an

Bug#467317: cvs2svn: new version 2.1.0

2008-02-24 Thread Alec Berryman
Package: cvs2svn Version: 2.0.1-1 Severity: wishlist -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 2.1.0 was released last week. The new version supports the fastimport format used by git and bzr. - -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (990, 'test

Bug#467210: etckeeper: Ignore non-FHS-compliant files from djbdns

2008-02-23 Thread Alec Berryman
NLryc= =bFbb -END PGP SIGNATURE- >From ef29d3aef254067a5a18cdc2592a3de2da1e1dce Mon Sep 17 00:00:00 2001 From: Alec Berryman <[EMAIL PROTECTED]> Date: Sat, 23 Feb 2008 13:51:20 -0500 Subject: [PATCH] Ignore non-FHS-compliant files from djbdns --- init.d/50vcs-ignore | 11 +

Bug#437094: uswsusp: s2disk fails with kernels 2.6.21 and 2.6.22 - nolapic does help

2007-11-19 Thread Alec Berryman
Package: uswsusp Followup-For: Bug #437094 -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Just to follow up - I also have a Thinkpad X40 and also saw this problem. For whatever reason, appending nolapic to my kernel options fixes this for me. - -- System Information: Debian Release: lenny/sid

Bug#435748: xkb-data: 0.9-4 -> 1.0~cvs.20070721-1 breaks assigning Alt_R to mod3

2007-08-02 Thread Alec Berryman
Package: xkb-data Version: 1.0~cvs.20070721-1 Severity: normal -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I use the right alt key to generate a mod3 mask for my window manger. >From my ~/.xmodmaprc: add Mod3 = Alt_R It's worked for a year or two now, but stopped working when I upgraded x

Bug#429403: please create this list

2007-07-29 Thread Alec Berryman
I would also like to see this list. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Bug#432123: knowledgetree: CVE-2007-2849: allows remote attackers to log on without the intended authorization check

2007-07-07 Thread Alec Berryman
Package: knowledgetree Severity: grave Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2007-2849 [0]: "KnowledgeTree Document Management (aka KnowledgeTree Open Source) before STABLE 3.3.7 does not require a password for an unregistered user, when the user exists in Active Direc

Bug#432120: ircii-pana: CVE-2007-3360: remote IRC servers can execute arbitrary commands on client

2007-07-07 Thread Alec Berryman
Package: ircii-pana Version: 1:1.1-5 Severity: grave Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2007-3360 [0]: "hook.c in BitchX 1.1-final allows remote IRC servers to execute arbitrary commands by sending a client certain data containing NICK and EXEC strings, which exceed

Bug#432013: freetype: CVE-2007-3506: memory buffer overwrite bug

2007-07-06 Thread Alec Berryman
Package: freetype Severity: grave Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2007-3506 [0]: The ft_bitmap_assure_buffer function in src/base/ftbimap.c in FreeType 2.3.3 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via u

Bug#432008: flac123: CVE-2007-3507: stack-based buffer overflow

2007-07-06 Thread Alec Berryman
Package: flac123 Version: 0.0.9-5 Severity: grave Tags: security patch -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2007-3507 [0]: "Stack-based buffer overflow in the local__vcentry_parse_value function in vorbiscomment.c in flac123 (aka flac-tools or flac) before 0.0.10 allows user-assiste

Bug#432006: sun-java6: CVE-2007-3503: javadoc XSS

2007-07-06 Thread Alec Berryman
Package: sun-java6 Version: 6-00-2 Severity: normal Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2007-3503: "The Javadoc tool in Sun JDK 6 and JDK 5.0 Update 11 can generate HTML documentation pages that contain cross-site scripting (XSS) vulnerabilities, which allows remote

Bug#428205: [Buildd-tools-devel] Bug#428205: sbuild: option documented as --force-orig-source, implemented as --force_orig_source

2007-06-10 Thread Alec Berryman
Roger Leigh on 2007-06-10 11:30:11 +0100: > The following patch fixes this and has been applied in SVN. It will > be included in sbuild 0.56. If you apply the patch to sbuild, does > this restore the old behaviour for you? Yes, it does. Thanks! -- To UNSUBSCRIBE, email to [EMAIL PROTECTED]

Bug#428205: sbuild: option documented as --force-orig-source, implemented as --force_orig_source

2007-06-09 Thread Alec Berryman
Package: sbuild Version: 0.55 Severity: normal -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Somewhere between 0.52 and 0.55, the --force-orig-source option was renamed to --force_orig_source (dashes changed to underscores). The man page still documents the dashed version (twice), but the progra

Bug#416399: uswsusp: image_size honored in latest release

2007-03-27 Thread Alec Berryman
Package: uswsusp Followup-For: Bug #416399 -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 The bug does not appear in 0.6~cvs20070202-1. If it's too late to get a fix into etch, would it be possible to document this in the release notes? I thought uswsusp was broken until I fiddled around with im

Bug#416399: uswsusp: setting image_size to 0 doesn't work as advertised

2007-03-27 Thread Alec Berryman
Package: uswsusp Version: 0.3~cvs20060928-7 Severity: normal -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Setting image_size to 0, either via debconf or manually, does not produce the expected result when running `s2disk`. I expect to see uswsusp attempt to minimize the size of the image and su

Bug#411706: rzip: 411706: followup

2007-02-20 Thread Alec Berryman
Package: rzip Version: 2.1-1 Followup-For: Bug #411706 -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 So I don't forget, this was spotted/reported by Sören Nils Kuklau <[EMAIL PROTECTED]>. - -- System Information: Debian Release: 4.0 APT prefers testing APT policy: (500, 'testing') Architectu

Bug#411706: rzip: confusing error message when attempting to compress a directory

2007-02-20 Thread Alec Berryman
Package: rzip Version: 2.1-1 Severity: normal -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 rzip returns a confusing error message when the user attempts to compress a directory. It also leaves behind a small .rz file, on which runzip will hang. $ mkdir foo $ rzip foo Failed to map buffer in rz

Bug#399915: libghc6-network-dev: please include HTML documentation

2006-11-22 Thread Alec Berryman
Package: libghc6-network-dev Version: 2.0-2 Severity: wishlist -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 When this package was part of ghc, ghc6-doc included haddock-generated HTML documentation for network. It would be great if the new libghc6-network-dev would include this documentation or

Bug#396982: stgit: 0.11 released

2006-11-03 Thread Alec Berryman
Package: stgit Version: 0.10-1 Severity: wishlist -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 stgit-0.11 was released 2006-10-21; it supports easy patch reordering and allows the user to configure the low-level pull command in addition to various other new features and bug fixes. It'd be great

Bug#373269: lxdoom: failed assertion

2006-10-21 Thread Alec Berryman
Package: lxdoom Version: 1.4.4main-0.1 Severity: grave Followup-For: Bug #373269 -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I also get that message and am running an AMD64. This error makes the package mostly unusable since it doesn't start. - -- System Information: Debian Release: testing/u

Bug#384534: [patch] http authentication for ikiwiki

2006-10-02 Thread Alec Berryman
Joey Hess on 2006-10-02 18:53:43 -0400: > Applied Thanks so much! signature.asc Description: Digital signature

Bug#384534: [patch] http authentication for ikiwiki

2006-10-02 Thread Alec Berryman
Joey Hess on 2006-10-02 13:42:42 -0400: > Alec Berryman wrote: > > I have been using this for several days to allow users with LDAP > > accounts full read/write access to a wiki. The only problem I have > > encountered is that the Preferences page does not work corre

Bug#384534: [patch] http authentication for ikiwiki

2006-10-02 Thread Alec Berryman
Attached is a patch enabling ikiwiki to optionally use HTTP authentication in place of storing usernames and passwords for each user. If 'httpauth' is set to 1 in the setup file, the CGI wrapper will silently use the REMOTE_USER ENV variable as the CGI::Session's "name" parameter instead of redire

Bug#385088: glurp: can't recognize glurp.svg file format

2006-08-28 Thread Alec Berryman
Package: glurp Version: 0.11.6-4 Severity: minor -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 When I start glurp from the command line, I see many of these warnings: (glurp:12946): libglade-WARNING **: Error loading image: Couldn't recognize the image file format for file '/usr/share/pixmaps/g

Bug#384534: ikiwiki: HTTP authentication

2006-08-24 Thread Alec Berryman
Package: ikiwiki Severity: wishlist Please consider adding HTTP authentication to ikiwiki's CGI wrapper. HTTP authentication would allow the reuse of the accounts and passwords users likely already have for RCS access, whatever that account system be - LDAP, Kerberos, or otherwise. -- To UNSUBS

Bug#378406: patch for "checkbashisms: fails to warn about exec -a"

2006-08-17 Thread Alec Berryman
Package: devscripts Version: 2.9.20 Tags: patch Followup-For: Bug #378406 -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Attached is a patch to implement the desired behavior. I tried it on two scripts; /usr/bin/beagle-search (which contains an 'exec -a') and /usr/bin/artsdsp (which contains an '

Bug#383574: libmodplug: CVE-2006-4192: buffer/heap overflow -> arbitrary code execution as user

2006-08-17 Thread Alec Berryman
Package: libmodplug Version: 1:0.7-4 1:0.7-5 Severity: grave Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2006-4192: "Multiple buffer overflows in MODPlug Tracker (OpenMPT) 1.17.02.43 and earlier and libmodplug 0.8 and earlier allow user-assisted remote attackers to execute ar

Bug#296340: lynx: severity raise rational

2006-08-17 Thread Alec Berryman
My rational wasn't included with the severity increase (used bts but didn't escape the comment): If this was serious enough to issue a DSA for woody/sarge, it will again be serious enough to issue a DSA for etch; this vulnerability should be taken care of before the release. signature.asc Descri

Bug#383407: dpsyco-cfengine: please convert to using cfengine2

2006-08-17 Thread Alec Berryman
Ola Lundqvist on 2006-08-17 10:13:34 +0200: > > cfengine has been superseded by cfengine2 and is dead upstream. #367057 > > requests cfengine be removed from the archive. Would you please > > convert dpsyco-cfengine to use cfengine2? > > What is the difference between them? I don't know; I've

Bug#332433: Processed: severity of 332433 is serious

2006-08-16 Thread Alec Berryman
Steve Langasek on 2006-08-16 18:07:36 -0700: > Alec, > > On Wed, Aug 16, 2006 at 03:04:51PM -0700, Debian Bug Tracking System > wrote: > > > > severity 332433 serious > > Why? The original bug was filed by a member of the security team, and > he tagged the bug as "important". Please don't cha

Bug#383407: dpsyco-cfengine: please convert to using cfengine2

2006-08-16 Thread Alec Berryman
Package: dpsyco-cfengine Severity: wishlist -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 cfengine has been superseded by cfengine2 and is dead upstream. #367057 requests cfengine be removed from the archive. Would you please convert dpsyco-cfengine to use cfengine2? Thanks, Alec -BEGIN

Bug#375617: any movement on CVE-2006-3118?

2006-08-15 Thread Alec Berryman
Hi Michael, Just a friendly reminder that #375617 is an outstanding security issue with spread. There's a patch in the BTS. It would be great to have this fixed for etch. Thanks, Alec signature.asc Description: Digital signature

Bug#382364: libghc6-missingpy-dev: not installable (wants missingh 14.4, has missingh14.5)

2006-08-10 Thread Alec Berryman
Package: libghc6-missingpy-dev Version: 0.8.5 Severity: grave -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Log from install: [EMAIL PROTECTED] ~ :( $ apt-get -f install Reading package lists... Done Building dependency tree... Done 0 upgraded, 0 newly installed, 0 to remove and 4 not upgraded.

Bug#380364: cheesetracker: CVE-2006-3814: arbitrary code execution

2006-07-29 Thread Alec Berryman
Package: cheesetracker Version: 0.9.9-1 0.9.9-5 Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2006-3814: "Buffer overflow in the Loader_XM::load_instrument_internal function in loader_xm.cpp for Cheese Tracker 0.9.9 and earlier allows user-assisted attackers t

Bug#380361: tomcat5: CVE-2006-3835: remote directory listing

2006-07-29 Thread Alec Berryman
Package: tomcat5 Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2006-3835: "Apache Tomcat 5 before 5.5.17 allows remote attackers to list directories via a semicolon (;) preceding a filename with a mapped extension, as demonstrated by URLs ending with /;index.j

Bug#380063: krusader: CVE-2006-3816: more info (sarge)

2006-07-28 Thread Alec Berryman
Package: krusader Version: 1.51-1 Followup-For: Bug #380063 I tested this with sarge's krusader and can't reproduce this exploit. Although the file krbookmarks.xml is created group- and world-readable (that can and should be easily fixed), the directory it is in is not. For the path /home/alec/.k

Bug#379444: libc6-xen: please provide version for amd64

2006-07-23 Thread Alec Berryman
Package: libc6-xen Severity: wishlist -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Debian offers a Xen hypervisor for amd64; it would be great if libc6-xen was also built for that platform. Thanks! -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.3 (GNU/Linux) iD8DBQFEw5+BAud/2YgchcQRAo8AAJ0

Bug#379064: dumb: CVE-2006-3668: arbitrary code execution

2006-07-20 Thread Alec Berryman
Package: libdumb Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2006-3668: "Heap-based buffer overflow in the it_read_envelope function in Dynamic Universal Music Bibliotheque (DUMB) 0.9.3 and earlier, and current CVS as of 20060716, allows user-complicit attac

Bug#379060: hyperestraier: CVE-2006-3671: cross-site request forgery

2006-07-20 Thread Alec Berryman
Package: hyperestraier Version: 1.2.5-1 Severity: serious Tags: security fixed-upstream -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2006-3671: "Cross-site request forgery (CSRF) vulnerability in the communicate function in estmaster.c for Hyper Estraier before 1.3.3 allows remote attackers

Bug#379062: armagetron: CVE-2006-3673 and CVE-2006-3674: remote denial of service

2006-07-20 Thread Alec Berryman
Package: armagetron Version: 0.2.7.0-1.1 Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2006-3673: "nNetObject.cpp in Armagetron Advanced 2.8.2 and earlier allows remote attackers to cause a denial of service (application crash) via a large owner value, which c

Bug#378962: konqueror: CVE-2006-3672: not found in sarge

2006-07-19 Thread Alec Berryman
Package: konqueror Version: 4:3.3.2-1sarge1 Followup-For: Bug #378962 I am unable to reproduce this in Sarge with the previously-mentioned sample exploit. -- System Information: Debian Release: 3.1 Architecture: i386 (i686) Kernel: Linux 2.6.8-2-386 Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO

Bug#378962: konqueror: CVE-2006-3672: remote denial of service (crash)

2006-07-19 Thread Alec Berryman
Package: konqueror Version: 4:3.5.3-2 Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2006-3672: "KDE Konqueror 3.5.1 and earlier allows remote attackers to cause a denial of service (application crash) by calling the replaceChild method on a DOM object, which t

Bug#378960: awstats: CVE-2006-3681 CVE-2006-3682: multiple vulnerabilities

2006-07-19 Thread Alec Berryman
Package: awstats Version: 6.5-2 Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2006-3681: "Multiple cross-site scripting (XSS) vulnerabilities in awstats.pl in AWStats 6.5 build 1.857 and earlier allow remote attackers to inject arbitrary web script or HTML via

Bug#378956: liblog-log4perl-perl: new version (1.06)

2006-07-19 Thread Alec Berryman
Package: liblog-log4perl-perl Version: 1.04-1 Severity: wishlist -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Just as a heads-up, log4perl 1.06 was recently released. - -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable') Architecture: a

Bug#378281: horde3: CVE-2006-3548 and CVE-2006-3549: multiple vulnerabilities

2006-07-14 Thread Alec Berryman
Package: horde3 Version: 3.0.4-4sarge4 3.1.1-3 Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2006-3548: "Multiple cross-site scripting (XSS) vulnerabilities in Horde Application Framework 3.0.0 through 3.0.10 and 3.1.0 through 3.1.1 allow remote attackers to i

Bug#378279: adplug: CVE-2006-3582 and CVE-2006-3581: remote stack-based buffer overflow

2006-07-14 Thread Alec Berryman
Package: adplug Version: 2.0-3 1.5.1-6 Severity: serious Tags: security patch -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2006-3582: "Multiple stack-based buffer overflows in AdPlug 2.0 and earlier allow remote user-complicit attackers to execute arbitrary code via the size specified in the

Bug#378059: proposed patch for CVE-2006-3379 (hiki)

2006-07-12 Thread Alec Berryman
Package: hiki Followup-For: Bug #378059 -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Attached is my backport of the patch in 0.8.6 for 0.6.5. The recommended timeout is 30 seconds; this is set in a configuration option in hiki 0.8.x, but that configuration framework doesn't seem to be present i

Bug#378059: hiki: CVE-2006-3379 remote denial of service

2006-07-12 Thread Alec Berryman
Package: hiki Version: 0.8.3-1 0.6.5-1 Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2006-3379: "Algorithmic complexity vulnerability in Hiki Wiki 0.6.0 through 0.6.5 and 0.8.0 through 0.8.5 allows remote attackers to cause a denial of service (CPU consumption

Bug#377748: phpmyadmin: CVE-2006-3388: cross-site scripting

2006-07-10 Thread Alec Berryman
Package: phpmyadmin Version: 4:2.8.1-1 4:2.6.2-3sarge1 Severity: serious Tags: security patch -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2006-3388: "Cross-site scripting (XSS) vulnerability in phpMyAdmin before 2.8.2 allows remote attackers to inject arbitrary web script or HTML via the ta

Bug#337937: CVEs for quake3

2006-07-07 Thread Alec Berryman
Please address CVE-2006-3325 and CVE-2006-3324 before uploading quake3. Thanks, Alec signature.asc Description: Digital signature

Bug#377298: libpng: CVE-2006-3334: DoS/buffer overflow to code execution

2006-07-07 Thread Alec Berryman
Package: libpng Version: 1.2.8rel-5.1 1.0.18-1 1.0.12-3.woody.9 Severity: grave Tags: security patch -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2006-3334: "Buffer overflow in the png_decompress_chunk function in pngrutil.c in libpng before 1.2.12 allows context-dependent attackers to cause

Bug#377299: sitebar: CVE-2006-3320: cross-site scripting

2006-07-07 Thread Alec Berryman
Package: sitebar Version: 3.3.8-1 3.2.6-7 Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2006-3320: "Cross-site scripting (XSS) vulnerability in command.php in SiteBar 3.3.8 and earlier allows remote attackers to inject arbitrary web script or HTML via the comm

Bug#376444: hashcash: CVE-2006-3251: buffer overflow

2006-07-02 Thread Alec Berryman
Package: hashcash Version: 1.17-1 Severity: serious Tags: security patch -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2006-3251: "Heap-based buffer overflow in the array_push function in hashcash.c for Hashcash before 1.22 might allow attackers to execute arbitrary code via crafted entries."

Bug#376442: phpqladmin: CVE-2006-3301: cross-site scripting

2006-07-02 Thread Alec Berryman
Package: phpqladmin Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2006-3301: "Multiple cross-site scripting (XSS) vulnerabilities in phpQLAdmin 2.2.7 and earlier allow remote attackers to inject arbitrary web script or HTML via the domain parameter in (1) user

Bug#375782: squirrelmail: CVE-2006-3174: cross-site scripting in search.php when register_globals is on

2006-06-29 Thread Alec Berryman
Thijs Kinkhorst on 2006-06-29 16:27:37 +0200: > I've taken a look, and can't reproduce the issue at all. I'm also not > sure how it should work and how it relates to the register_globals > that was mentioned. The report excells in vagueness. I agree completely. > I've forwarded the issue upstrea

Bug#375782: squirrelmail: CVE-2006-3174: cross-site scripting in search.php when register_globals is on

2006-06-27 Thread Alec Berryman
Package: squirrelmail Severity: important Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2006-3174: "Cross-site scripting (XSS) vulnerability in search.php in SquirrelMail 1.5.1 and earlier, when register_globals is enabled, allows remote attackers to inject arbitrary HTML via t

Bug#359260: csync2 now includes full documentation in distribution

2006-06-23 Thread Alec Berryman
csync2-1.32.tar.gz contains paper.pdf, the documentation the original submitter requested. signature.asc Description: Digital signature

Bug#375052: gnupg: CVE-2006-3082: remote denial of service / crash

2006-06-22 Thread Alec Berryman
Package: gnupg Version: 1.4.3-1 Severity: serious Tags: security patch -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2006-3082: "parse-packet.c in GnuPG (gpg) 1.4.3 and 1.9.20, and earlier versions, allows remote attackers to cause a denial of service (gpg crash) and possibly overwrite memory

Bug#375053: gnupg2: CVE-2006-3082: remote denial of service / crash

2006-06-22 Thread Alec Berryman
Package: gnupg2 Version: 1.9.20-1 1.9.15-6 Severity: serious Tags: security patch -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2006-3082: "parse-packet.c in GnuPG (gpg) 1.4.3 and 1.9.20, and earlier versions, allows remote attackers to cause a denial of service (gpg crash) and possibly overw

Bug#373672: libjpeg-mmx: CVE-2006-3005: memory exhaustion

2006-06-16 Thread Alec Berryman
Moritz Muehlenhoff on 2006-06-15 12:10:15 +0200: > On Wed, Jun 14, 2006 at 05:53:45PM -0500, Alec Berryman wrote: > > > Although the CVE is Gentoo-specific, Debian's libjpeg-mmx is not built > > with --maxmem enabled, making it vulnerable. I have attached a trivial >

Bug#372936: bugs.d.o reports wrongly pending bugs

2006-06-15 Thread Alec Berryman
I also see this behavior. pgpFHYqKpUIJb.pgp Description: PGP signature

Bug#299228: reverse build depends would be really useful

2006-06-15 Thread Alec Berryman
I also miss this feature in apt-rdepends and asked around today on #debian-devel to see if there is an alternate solution. I was provided with the following shell function: apt-rbdepends () { grep-dctrl -F Build-Depends "$1" -s Package /var/lib/apt/lists/*_Sources } I didn't see that thi

Bug#373695: sound-juicer: missing Depend: on gstreamer0.10-gnomevfs

2006-06-14 Thread Alec Berryman
Package: sound-juicer Version: 2.14.4-1 Severity: grave -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I installed sound-juicer without having many other GNOME packages on my system. When I started it up, I received the following error message before the program quit without having displayed the

Bug#373689: dokuwiki: CVE-2006-2945: remote authenticated users read unauthorized files

2006-06-14 Thread Alec Berryman
Package: dokuwiki Severity: important Tags: security patch -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2006-2945: "Unspecified vulnerability the user profile change functionality in DokuWiki, when Access Control Lists are enabled, allows remote authenticated users to read unauthorized files

Bug#373687: overkill: CVE-2006-2971: remote denial of service (daemon crash)

2006-06-14 Thread Alec Berryman
Package: overkill Severity: important Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2006-2971: "Integer overflow in the recv_packet function in 0verkill 0.16 allows remote attackers to cause a denial of service (daemon crash) via a UDP packet with fewer than 12 bytes, which res

Bug#373672: libjpeg-mmx: CVE-2006-3005: memory exhaustion

2006-06-14 Thread Alec Berryman
Package: libjpeg-mmx Severity: important Tags: security patch -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2006-3005: "The JPEG library in media-libs/jpeg before 6b-r7 on Gentoo Linux is built without the -maxmem feature, which could allow context-dependent attackers to cause a denial of ser

Bug#373667: zope-zms: CVE-2006-2997: cross-site scripting

2006-06-14 Thread Alec Berryman
Package: zope-zms Severity: normal Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2006-2997: "Cross-site scripting (XSS) vulnerability in ZMS 2.9 and earlier, when register_globals is enabled, allows remote attackers to inject arbitrary web script or HTML via the raw parameter i

Bug#373187: sylpheed-gtk1: CVE-2006-2920: URI bypass

2006-06-13 Thread Alec Berryman
Package: sylpheed-gtk1 Severity: important Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2006-2920 has been updated to report sylpheed is vulnerable to the URI bypass I filed bug reports about yesterday. New CVE text: "Sylpheed-Claws before 2.2.2 and Sylpheed before 2.2.6 all

Bug#372889: sylpheed-claws-gtk2: CVE-2006-2920: URI bypass

2006-06-12 Thread Alec Berryman
Ricardo Mones on 2006-06-13 01:27:57 +0200: > Will be handled in the upload of the new 2.3.0 version, released > today. Thanks for your prompt response! pgpt5A5o9nB9l.pgp Description: PGP signature

Bug#373137: knowledgetree: CVE-2006-2886 and CVE-2006-2885: cross site scripting

2006-06-12 Thread Alec Berryman
Package: knowledgetree Severity: important Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2006-2885: "Multiple cross-site scripting (XSS) vulnerabilities in KnowledgeTree Open Source 3.0.3 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) fDoc

Bug#372912: libgd2: CVE-2006-2906: infinte lop via malformed gif

2006-06-12 Thread Alec Berryman
Package: libgd2 Severity: important Tags: security patch -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2006-2906: "The LZW decoding in the gdImageCreateFromGifPtr function in the Thomas Boutell graphics draw (GD) library (aka libgd) 2.0.33 allows remote attackers to cause a denial of service

Bug#372891: sylpheed-claws: CVE-2006-2920: URI bypass

2006-06-12 Thread Alec Berryman
Package: sylpheed-claws Severity: important Tags: security patch -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2006-2920: "Sylpheed-Claws before 2.2.2 allows remote attackers to bypass the URI check functionality and makes it easier to conduct phishing attacks via a URI that begins with a spa

Bug#372889: sylpheed-claws-gtk2: CVE-2006-2920: URI bypass

2006-06-12 Thread Alec Berryman
Package: sylpheed-claws-gtk2 Severity: important Tags: patch security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2006-2920: "Sylpheed-Claws before 2.2.2 allows remote attackers to bypass the URI check functionality and makes it easier to conduct phishing attacks via a URI that begins with

Bug#368780: libspf: CVE-2006-1520: format string vulnerability

2006-05-24 Thread Alec Berryman
Package: libspf Severity: important Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2006-1520: "Format string vulnerability in ANSI C Sender Policy Framework library (libspf) before 1.0.0-p5, when debugging is enabled, allows remote attackers to execute arbitrary code via format

Bug#368595: php5: CVE-2006-1014 and CVE-2006-1015: argument injection in mb_send_mail function

2006-05-23 Thread Alec Berryman
Package: php5 Severity: important Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2006-1014: "Argument injection vulnerability in certain PHP 4.x and 5.x applications, when used with sendmail and when accepting remote input for the additional_parameters argument to the mb_send_ma

Bug#368592: php4: CVE-2006-1014 and CVE-2006-1015: argument injection in mb_send_mail function

2006-05-23 Thread Alec Berryman
Package: php4 Severity: important Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2006-1014: "Argument injection vulnerability in certain PHP 4.x and 5.x applications, when used with sendmail and when accepting remote input for the additional_parameters argument to the mb_send_ma

Bug#368545: php-pear: CVE-2006-0931: PEAR::Archive_Tar directory traversal vulnerability

2006-05-22 Thread Alec Berryman
Package: php-pear Severity: important Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2006-0931: "Directory traversal vulnerability in PEAR::Archive_Tar 1.2 allows remote attackers to create and overwrite arbitrary files via certain crafted pathnames in a TAR archive." This is P

Bug#368402: orpheus: CVE-2005-3863: stack-based buffer overflow

2006-05-21 Thread Alec Berryman
Package: orpheus Severity: important Tags: security patch CVE-2005-3863: "Stack-based buffer overflow in kkstrtext.h in ktools library 0.3 and earlier, as used in products such as (1) centericq, (2) orpheus, (3) motor, and (4) groan, allows local users or remote attackers to execute arbitrary code

Bug#368400: motor: CVE-2005-3863: stack-based buffer overflow

2006-05-21 Thread Alec Berryman
Package: motor Severity: important Tags: security patch CVE-2005-3863: "Stack-based buffer overflow in kkstrtext.h in ktools library 0.3 and earlier, as used in products such as (1) centericq, (2) orpheus, (3) motor, and (4) groan, allows local users or remote attackers to execute arbitrary code v

Bug#368397: fastjar: CVE-2005-3990: directory traversal vulnerability

2006-05-21 Thread Alec Berryman
Package: fastjar Version: 1:4.1.0-4 Severity: normal Tags: security CVE-2005-3990: "Directory traversal vulnerability in FastJar 0.93 allows remote attackers to overwrite arbitrary files via a .jar file containing filenames with "../" sequences." I can reproduce this with the following steps (mod

Bug#368305: jsboard: CVE-2006-2109: cross-site scripting

2006-05-21 Thread Alec Berryman
Package: jsboard Severity: important Tags: security CVE-2006-2109: "Cross-site scripting (XSS) vulnerability in the parse_query_str function in include/print.php in JSBoard 2.0.10 and 2.0.11, and possibly other versions before 2.0.12, allows remote attackers to inject arbitrary web script or HTML

Bug#368202: [Pkg-dia-team] Bug#368202: dia: CVE-2006-2480: format string vulnerability

2006-05-21 Thread Alec Berryman
Roland Stigge on 2006-05-20 23:26:28 -0500: > Unfortunately, I can't reproduce this in full length. I can see the > error message popup (which I consider natural), but neither dia > crashing nor executing the "malicious code" (printing "DIA"). I see the following behavior with dia 0.95.0-3: $ to

Bug#368268: pdnsd: CVE-2006-2076 and CVE-2006-2077: remote denial of service

2006-05-20 Thread Alec Berryman
Package: pdnsd Severity: serious Tags: security CVE-2006-2076: "Memory leak in Paul Rombouts pdnsd before 1.2.4 allows remote attackers to cause a denial of service (memory consumption) via a DNS query with an unsupported (1) QTYPE or (2) QCLASS, as demonstrated by the OUSPG PROTOS DNS test suite.

Bug#368237: binutils: CVE-2006-2362: buffer overflow in libbfd

2006-05-20 Thread Alec Berryman
Package: binutils Version: 2.16.1cvs20060413-1 Severity: normal Tags: security patch CVE-2006-2362: "Buffer overflow in getsym in tekhex.c in libbfd in Free Software Foundation GNU Binutils before 20060423, as used by GNU strings, allows context-dependent attackers to cause a denial of service (ap

Bug#368207: mp3info: CVE-2006-2465: buffer overflow via command-line argument

2006-05-20 Thread Alec Berryman
Package: mp3info Version: 0.8.4-9 Severity: normal Tags: security patch CVE-2006-2465: "Buffer overflow in MP3Info 0.8.4 allows attackers to execute arbitrary code via a long command line argument. NOTE: if mp3info is not installed setuid or setgid in any reasonable context, then this issue might

Bug#368202: dia: CVE-2006-2480: format string vulnerability

2006-05-20 Thread Alec Berryman
Package: dia Version: 0.95.0-3 Severity: normal Tags: security patch CVE-2006-2480: "Format string vulnerability in Dia 0.94 allows user-complicit attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in a .bmp filename. NOTE: since the exp

Bug#368193: nagios: CVE-2006-2489: remote DoS and possible code execution

2006-05-20 Thread Alec Berryman
Package: nagios Severity: grave Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2006-2489: "Integer overflow in CGI scripts in Nagios 1.x before 1.4.1 and 2.x before 2.3.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a conte

Bug#368159: gnunet: CVE-2006-2413: remote denial of service via empty UDP datagram

2006-05-19 Thread Alec Berryman
Package: gnunet Severity: serious Tags: security patch -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2006-2413: "GNUnet before SVN revision 2781 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an empty UDP datagram, possibly involving FIONREAD erro

Bug#367500: RFS: quackle, a graphical Scrabble-like crossword game and analysis tool

2006-05-19 Thread Alec Berryman
Hi debian-devel-games, I've packaged up quackle [1] [2] [3]. Quackle is a QT4-based Scrabble-like crossword game and analysis tool. It includes a computer opponent, move generator, and simulator and may be used with any board layout, alphabet, lexicon, and tile distribution. It's fun, colorful,

Bug#368082: phpmyadmin: CVE-2006-2417 and CVE-2006-2418: XSS

2006-05-19 Thread Alec Berryman
Package: phpmyadmin Severity: important Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 PMASA-2006-2 [1] details two cross-site-scripting vulnerabilities in several versions of phpMyAdmin. The advisory reports that all 2.8.0.x releases are affected but older ones may be as well - fo

Bug#367973: twiki: CVE-2006-1387: DoS with INCLUDE

2006-05-18 Thread Alec Berryman
Package: twiki Severity: important Tags: patch -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2006-1387: "TWiki 4.0, 4.0.1, and 20010901 through 20040904 allows remote authenticated users with edit rights to cause a denial of service (infinite recursion leading to CPU and memory consumption) v

  1   2   >