Bug#354267: Debian packages of Haskell crypto and newbinary libraries

2006-05-12 Thread Charles Stevenson
Arjan, On Sat, May 06, 2006 at 09:40:18PM +0200, Arjan Oosting wrote: > I was wondering if you are still working on the packages for Haskell > Crypto and Haskell NewBinary. I haven't been actively working on the packages since I'm about to move to a new job and have been busy interviewing and ge

Bug#307544: vim-scripts: Proposed fix

2006-03-04 Thread Charles Stevenson
Package: vim-scripts Version: 6-3 Followup-For: Bug #307544 I propose changing spellcheck's ss to sS and sl to sL. At least that's the change I've made locally. peace, core -- System Information: Debian Release: testing/unstable APT prefers testing APT policy: (500, 'testing') Architecture

Bug#354273: ITP: mindy -- A Dylan interpreter.

2006-02-24 Thread Charles Stevenson
Package: wnpp Severity: wishlist Owner: Charles Stevenson <[EMAIL PROTECTED]> * Package name: mindy Version : 2.4.1 Upstream Author : Gwydion Dylan Hackers * URL : http://www.gwydiondylan.org/ * License : CMU Description : A Dylan interpreter. Mi

Bug#354272: ITP: gwydion-dylan-dev -- Gwydion Dylan Development Tools

2006-02-24 Thread Charles Stevenson
Package: wnpp Severity: wishlist Owner: Charles Stevenson <[EMAIL PROTECTED]> * Package name: gwydion-dylan-dev Version : 2.4.1 Upstream Author : Gwydion Dylan Hackers * URL : http://www.gwydiondylan.org/ * License : CMU Description : Gwydion

Bug#354271: ITP: gwydion-dylan -- The Gwydion Dylan Runtime Environment

2006-02-24 Thread Charles Stevenson
Package: wnpp Severity: wishlist Owner: Charles Stevenson <[EMAIL PROTECTED]> * Package name: gwydion-dylan Version : x.y.z Upstream Author : Name <[EMAIL PROTECTED]> * URL : http://www.gwydiondylan.org/ * License : CMU Description : The G

Bug#354269: ITP: libghc6-http-dev -- GHC 6 libraries for the Haskell HTTP client library

2006-02-24 Thread Charles Stevenson
Package: wnpp Severity: wishlist Owner: Charles Stevenson <[EMAIL PROTECTED]> * Package name: libghc6-http-dev Version : x.y.z Upstream Author : Name <[EMAIL PROTECTED]> * URL : http://www.example.org/ * License : (GPL, LGPL, BSD, MIT/X, etc.)

Bug#354268: ITP: libghc6-crypto-dev -- GHC 6 libraries for the Haskell Cryptographic Library

2006-02-24 Thread Charles Stevenson
Package: wnpp Severity: wishlist Owner: Charles Stevenson <[EMAIL PROTECTED]> * Package name: libghc6-crypto-dev Version : x.y.z Upstream Author : Name <[EMAIL PROTECTED]> * URL : http://www.example.org/ * License : (GPL, LGPL, BSD, MIT/X, etc.)

Bug#354267: ITP: libghc6-newbinary-dev -- Binary IO Module for ghc

2006-02-24 Thread Charles Stevenson
Package: wnpp Severity: wishlist Owner: Charles Stevenson <[EMAIL PROTECTED]> * Package name: libghc6-newbinary-dev Version : x.y.z Upstream Author : Name <[EMAIL PROTECTED]> * URL : http://www.example.org/ * License : (GPL, LGPL, BSD

Bug#351696: tagtool: does not strip newline (0x0a)

2006-02-06 Thread Charles Stevenson
Package: tagtool Version: 0.12.2-1+b1 Severity: minor In the process of pasting in lines into the tag titles from Mozilla and apparently missing a few cases where a newline was in the paste buffer and then renaming the files based on the tags I created some files which scp and xmms really did not

Bug#341542: perl: Still vulnerable...

2005-12-08 Thread Charles Stevenson
Package: perl Version: 5.8.7-7 Followup-For: Bug #341542 [EMAIL PROTECTED]:~$ perl -e 'printf("%2918905856\$vs")' Segmentation fault I haven't had time yet but I imagine it might be possible to gain root through perl-suid. peace, core -- System Information: Debian Release: testing/unstable A

Bug#341009: tiger: Preconfig fails when no Debian-exim group exists (postfix)

2005-11-27 Thread Charles Stevenson
Package: tiger Version: 1:3.2.1-28 Severity: important I've got postfix setup on my laptop rather than exim. Apparently the package installation fails if there isn't a Debian-exim group. I added a group to appease the package to workaround it. dpkg: syntax error: unknown group `Debian-exim' in

Bug#340471: dillo: Open URL (Ctrl-L) No Longer Works

2005-11-23 Thread Charles Stevenson
Package: dillo Version: 0.8.5-2 Severity: important In previous versions of Dillo, one could open a URL by keying Ctrl-L or clicking the file menu and selecting "Open URL". In either case a small dialog was displayed wherein one could type the URL. This box no longer appears on the screen from

Bug#338312: osh: Environment Variable Input Validation Bug

2005-11-09 Thread Charles Stevenson
://pulltheplug.org/users/core/files/x_osh3.sh Kind Regards, Charles Stevenson -- System Information: Debian Release: testing/unstable APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.14-corezion Locale:

Bug#257256: luasocket: Pretty please? With sugar on top? Or is there another lau variant I should use? Or should I simply abandon lua.

2005-10-14 Thread Charles Stevenson
Package: luasocket Version: 2.0-alpha-2 Followup-For: Bug #257256 Pretty please package the latest version. Or should I move on to greener pastures. I've only been using lua a few weeks and it seems a bit odd. Suggestions, flames, hints? peace, core -- System Information: Debian Release: te

Bug#323482: osh: Stack-based Buffer Overflow

2005-08-16 Thread Charles Stevenson
Package: osh Version: 1.7-13 Severity: critical Tags: security Justification: root security hole http://lists.grok.org.uk/pipermail/full-disclosure/2005-August/036123.html Fully functional exploit works on debian and ubuntu: http://bokeoa.com/~core/x_osh2.pl Kind Regards, Charlie -- System In

Bug#299191: Not suexec

2005-03-12 Thread Charles Stevenson
Apparently I'm too tired to be sending bug reports ;-) It appears that suexec is not involved. My Qube2 finally finished running configure. I think the solution is in apache2.conf to use www-data for User and Group. Fixed the problems here :) Sorry for the bother. I think it has to do with "don't u

Bug#299191: apache2-common: suexec sets incorrect gid and groups

2005-03-12 Thread Charles Stevenson
Package: apache2-common Version: 2.0.53-5 Severity: grave Justification: user security hole I'm fairly certain this is specific to the MIPS port. I looked at the source and did some tests and am a bit perplexed. I thought it was a signedness issue, integer overflow I think they call it. In any