Bug#740898: [9e1ed7f] Fix for Bug#740898 committed to git

2015-03-21 Thread Giuseppe Iuculano
tags 740898 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano on Sat, 21 Mar 2015 12:05:27 +0100. The fix will be in the next upload. = Ignore Suckit false positive

Bug#777583: Incorrect debian/copyright for smartmontools

2015-02-14 Thread Giuseppe Iuculano
retitle -1 debian/copyright for smartmontools is too restrictive severity -1 wishlist Il 14/02/2015 06:57, Mark H Weaver ha scritto: > Every package must be accompanied by a verbatim copy of its > copyright information and distribution license in the file > /usr/share/doc//copyright. > > N

Bug#766178: [12d5f9d] Fix for Bug#766178 committed to git

2014-10-21 Thread Giuseppe Iuculano
tags 766178 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano on Tue, 21 Oct 2014 13:28:29 +0200. The fix will be in the next upload. = Correct maintscript syntax

Bug#754684: [c2c3369] Fix for Bug#754684 committed to git

2014-10-18 Thread Giuseppe Iuculano
tags 754684 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano on Sat, 18 Oct 2014 16:53:15 +0200. The fix will be in the next upload. = Fix FTBFS on kfreebsd

Bug#765659: /etc/default/chromium removed in postinst

2014-10-17 Thread Giuseppe Iuculano
Package: chromium Version: 37.0.2062.120-3 Severity: grave Hi, debian/chromium.postinst line 12 Really you cannot remove /etc/default/chromium file without asking or warning user... You have to move in /etc/chromium-browser/default This is what happens when you push huge commits and nobody c

Bug#764180: /etc/default/chromium removed in postinst

2014-10-06 Thread Giuseppe Iuculano
Package: chromium Version: 37.0.2062.120-3 Severity: grave Hi, debian/chromium.postinst line 12 Really you cannot remove /etc/default/chromium file without asking... You have to move it in /etc/chromium-browser/default This is what happens when you push huge commits and nobody can double che

Bug#757758: [9064776] Fix for Bug#757758 committed to git

2014-10-04 Thread Giuseppe Iuculano
tags 757758 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano on Sat, 4 Oct 2014 19:28:19 +0200. The fix will be in the next upload. = Fixed "sed without op

Bug#761728: [49fccbc] Fix for Bug#761728 committed to git

2014-10-04 Thread Giuseppe Iuculano
tags 761728 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano on Sat, 4 Oct 2014 19:11:13 +0200. The fix will be in the next upload. = Depends on kmod | kldutils

Bug#745646: chromium: certificate revocation is not checked

2014-05-01 Thread Giuseppe Iuculano
tags 745646 unreproducible notfound 745646 34.0.1847.116-2 severity 745646 normal thanks Il 2014-04-30 20:30 Jonathan Nieder ha scritto: However Vincent is right that the CRLSets[1] are a different mechanism than OCSP revocation checking and that CRLSet checking is enabled by default. Yes, t

Bug#745646: [Pkg-chromium-maint] Bug#745646: closed by Michael Gilbert (Re: Bug#745646: chromium: certificate revocation is not checked)

2014-04-30 Thread Giuseppe Iuculano
On 30/04/2014 19:49, Vincent Lefevre wrote: > Bug 745646 is a different bug, specifically about the CRLSet system, > which is very broken. What you write is not a bug, if you want to do revocation check you must enable it in settings. chromium --temp-profile Go to settings and enable revocation

Bug#745646: [Pkg-chromium-maint] Bug#745646: closed by Michael Gilbert (Re: Bug#745646: chromium: certificate revocation is not checked)

2014-04-30 Thread Giuseppe Iuculano
Hi, On 30/04/2014 02:28, Vincent Lefevre wrote: > No, Chromium developers tell users not to enable it, and consider > it as an obsolete option that will be removed. Indeed, in case of > real MITM attack, the attacker can block the OCSP server, in which > case Chromium will silently consider the ce

Bug#741908: extplorer: CVE-2013-5951

2014-03-17 Thread Giuseppe Iuculano
Hi Thomas, On 17/03/2014 08:34, Thomas Goirand wrote: > I've been waiting for comments on my security upload for 5 months now. > The issue was supposed to be embargoed (in fact, just waiting on > Debian...). Please review the fixed packages!!! If you don't have time > to review it, just accept tha

Bug#728823: [Pkg-chromium-maint] Bug#728823: Fails to start: Running without the SUID sandbox!

2013-11-07 Thread Giuseppe Iuculano
Hi, commit 64b895bf23943f8c72a49216d24e36b128213167 Author: Giuseppe Iuculano Date: Mon Oct 21 13:05:14 2013 +0200 Move chrome_sandbox to chrome-sandbox, chromium reads that file Your -2 uploads didn't contain my -1 changes. Michael, please, please, update your local git copy *b

Bug#717567: [8251afb] Fix for Bug#717567 committed to git

2013-09-05 Thread Giuseppe Iuculano
tags 717567 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano on Thu, 5 Sep 2013 13:34:36 +0200. The fix will be in the next upload. = Fix FTBFS[kfreebsd] Closes

Bug#706909: [5ae3fa9] Fix for Bug#706909 committed to git

2013-06-02 Thread Giuseppe Iuculano
tags 706909 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano on Sun, 2 Jun 2013 10:08:14 +0200. The fix will be in the next upload. = Use /var/lib/smartmontools

Bug#702261: libv8: CVE-2012-5153 CVE-2013-0836

2013-03-08 Thread Giuseppe Iuculano
On 04/03/2013 16:39, Moritz Muehlenhoff wrote: > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5153 Fix: https://code.google.com/p/v8/source/detail?r=13161 > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0836 Fix: https://code.google.com/p/v8/source/detail?r=12543 Cheers, Gi

Bug#699887: Security fix for #699887, CVE-2013-0169

2013-02-10 Thread Giuseppe Iuculano
Hi Roland, On 07/02/2013 22:58, Roland Stigge wrote: > I prepared a security upload for stable (attached debdiff). Should I > upload it to stable-security(security-master)? Thanks for contacting us. please upload to security-master (please make sure to include the .orig.tar.gz in the upload, -sa

Bug#695224: Locale::Maketext security fix: real world breakage?

2013-02-06 Thread Giuseppe Iuculano
Hi Dominic, On 04/02/2013 21:28, Dominic Hargreaves wrote: > I had no replies about this, so I think it's time to bite the bullet > and decide whether we should target this fix at > > - stable-security > - stable > - neither of the above. > > I think I'm leaning towards stable on the basis that

Bug#695703: [Pkg-chromium-maint] Bug#695703: chromium-browser: diff for NMU version 22.0.1229.94~r161065+dfsg-0.1

2013-01-02 Thread Giuseppe Iuculano
On 02/01/2013 12:15, David Prévot wrote: > I've prepared an NMU for chromium-browser (versioned as > 22.0.1229.94~r161065+dfsg-0.1) and > uploaded it to DELAYED/2. No, you haven't uploaded it to DELAYED/2. signature.asc Description: OpenPGP digital signature

Bug#696179: [Pkg-mediawiki-devel] Bug#696179: mediawiki-extensions-base: RSS_Reader Javascript injection

2012-12-19 Thread Giuseppe Iuculano
Hi, On 17/12/2012 18:21, Jonathan Wiltshire wrote: > Security team: is it too late to get a CVE through you now that a public > bug has been filed? And should a DSA be prepared, as I have not looked > but can be fairly sure this will affect stable. yes, if it is public, we cannot assign a CVE. yo

Bug#677393: [f10872d] Fix for Bug#677393 committed to git

2012-07-16 Thread Giuseppe Iuculano
tags 677393 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano on Mon, 16 Jul 2012 14:30:09 +0200. The fix will be in the next upload. = Really fix FTBFS on kfreebsd

Bug#677393: [743e0f4] Fix for Bug#677393 committed to git

2012-07-16 Thread Giuseppe Iuculano
tags 677393 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano on Mon, 16 Jul 2012 12:00:06 +0200. The fix will be in the next upload. = Fixed FTBFS in kfreebsd

Bug#679848: [Pkg-chromium-maint] Bug#679848: chromium: everything related to chrome:// is broken

2012-07-07 Thread Giuseppe Iuculano
Hi Norbert! On 07/02/2012 04:53 AM, Norbert Preining wrote: > In short, everything that > starts with > chromium:// Did you mean chrome:// ? Cheers, Giuseppe. signature.asc Description: OpenPGP digital signature

Bug#676142: [16216c8] Fix for Bug#676142 committed to git

2012-06-13 Thread Giuseppe Iuculano
tags 676142 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano on Wed, 13 Jun 2012 16:29:49 +0200. The fix will be in the next upload. = Fixed FTBFS on kfreebsd

Bug#676636: [c0e9499] Fix for Bug#676636 committed to git

2012-06-12 Thread Giuseppe Iuculano
tags 676636 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano on Tue, 12 Jun 2012 11:06:24 +0200. The fix will be in the next upload. = Improved sqlite patch. Thanks

Bug#676636: [e2adf90] Fix for Bug#676636 committed to git

2012-06-11 Thread Giuseppe Iuculano
tags 676636 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano on Mon, 11 Jun 2012 16:16:37 +0200. The fix will be in the next upload. = Applied sqlite patch and fixed

Bug#675563: [Pkg-chromium-maint] Bug#675563: chromium: builds against embedded binary binutils-gold that does not include source

2012-06-02 Thread Giuseppe Iuculano
On 02/06/2012 08:15, shawn wrote: > I noticed this while trying to get this package to build on armel. Could you patch debian/control and try to build on armel again please? --- a/debian/control +++ b/debian/control @@ -64,7 +64,7 @@ Build-Depends: cdbs, libxt-dev, libxtst-dev,

Bug#674081: [16893a8] Fix for Bug#674081 committed to git

2012-05-28 Thread Giuseppe Iuculano
tags 674081 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano on Mon, 28 May 2012 10:41:13 +0200. The fix will be in the next upload. = Support serial UPS connection

Bug#671994: [8cb8e89] Fix for Bug#671994 committed to git

2012-05-19 Thread Giuseppe Iuculano
tags 671994 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano on Sat, 19 May 2012 10:22:05 +0200. The fix will be in the next upload. = Use gcc 4.6 for the moment

Bug#665012: CVE-2012-1570: maradns deleted domain record cache persistance flaw

2012-03-22 Thread Giuseppe Iuculano
Package: maradns Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 It was reported that MaraDNS suffers from a flaw where it is susceptible to spoofing attacks. Due to an error in the cache update policy, which does not properly handle revoked domain names, a remote

Bug#665007: CVE-2012-1185 / CVE-2012-1186: incomplete ImageMagick fixes for CVE-2012-0247 / CVE-2012-0248

2012-03-22 Thread Giuseppe Iuculano
Package: imagemagick Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, The original fixes for the ImageMagick issues CVE-2012-0247 and CVE-2012-0248 are incomplete. Please see: http://seclists.org/oss-sec/2012/q1/685 https://bugzilla.redhat.com/show_bug.cgi?id=

Bug#660159: [b88a849] Fix for Bug#660159 committed to git

2012-02-19 Thread Giuseppe Iuculano
tags 660159 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano on Sun, 19 Feb 2012 20:18:27 +0100. The fix will be in the next upload. = Remove ardcoded dependency on

Bug#656057: CVE-2011-2830

2012-01-16 Thread Giuseppe Iuculano
On 16/01/2012 09:43, Giuseppe Iuculano wrote: > This is not for libv8, CVE description is wrong, this affects webkit: > http://trac.webkit.org/changeset/93495 Or better, the issue is in the V8 binding source in webkit. We use that code only in chromium, I will check if stable is affected.

Bug#654534: Patch

2012-01-04 Thread Giuseppe Iuculano
tag 654534 patch thanks CVE-2011-3892 http://src.chromium.org/viewvc/chrome?view=rev&revision=107489 CVE-2011-3893 this is due to http://llvm.org/bugs/show_bug.cgi?id=7554 http://src.chromium.org/viewvc/chrome?view=rev&revision=106599 http://src.chromium.org/viewvc/chrome?view=rev&revision=10662

Bug#516394: [CVE-2008-4392]

2012-01-03 Thread Giuseppe Iuculano
Dear Sergiusz, it seems my reply to your private email didn't convince you, so replying again on behalf of the Security Team. > Dear Security Team, > > CVE-2008-4392 has "Candidate" status and is being reviewed for almost > three years now, and still must accepted by the CVE Editorial > Board[

Bug#640591: smbind: diff for NMU version 0.4.7-5.1

2011-12-10 Thread Giuseppe Iuculano
On 12/10/2011 02:27 PM, gregor herrmann wrote: > Dear maintainer, > > I've prepared an NMU for smbind (versioned as 0.4.7-5.1) and > uploaded it to DELAYED/2. Please feel free to tell me if I > should delay it longer. Gregor, thanks for your NMU. Please upload to DELAYED/0 Cheers, Giuseppe. s

Bug#643648: CVE-2011-2834 and CVE-2011-2821

2011-09-28 Thread Giuseppe Iuculano
Package: libxml2 Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, two libxml2 issues were fixed in the latest chrome updates: CVE-2011-2821 Double free vulnerability in libxml2, as used in Google Chrome before 13.0.782.215, allows remote attackers to cause a de

Bug#639744: Compromised certificates for *.google.com issued by DigiNotar Root CA

2011-09-06 Thread Giuseppe Iuculano
Hi, On 09/04/2011 09:20 PM, Raphael Geissert wrote: > NSS now ships modified certs of DigiNotar, their name is "Explicitly Disabled > DigiNotar " > In chromium, for example, if you browse a DigiNotar-signed website and check > the certificate chain you will see the Explicitly Disabled cert there

Bug#639733: wordpress: Wordpress breaks TinyMCE install

2011-08-30 Thread Giuseppe Iuculano
tags 639733 moreinfo unreproducible thanks Hi, On 08/29/2011 08:43 PM, Laurens Blankers wrote: > Upgrading from 3.0.5+dfsg-1 to 3.2.1+dfsg-1 causes plugin files to be written > to > > /usr/share/tinymce > > which is partily symlinked from > > /usr/share/wordpress/wp-includes/js/tinymce/ >

Bug#639126: [73b0e59] Fix for Bug#639126 committed to git

2011-08-24 Thread Giuseppe Iuculano
tags 639126 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano on Wed, 24 Aug 2011 14:25:06 +0200. The fix will be in the next upload. = Fixed the dummy chromium

Bug#631815: reinstalling didn't fix the issue

2011-06-27 Thread Giuseppe Iuculano
In my case, reinstalling didn't fix the issue (Derbian testing i386) Cheers, Giuseppe. signature.asc Description: OpenPGP digital signature

Bug#631615: CVE-2011-2192: libcurl inappropriate GSSAPI delegation

2011-06-25 Thread Giuseppe Iuculano
Package: curl Version: 7.21.6-1 Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Please see http://curl.haxx.se/docs/adv_20110623.html Cheers, Giuseppe. -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.11 (GNU/Linux) iEYEARECAAYFAk4F07cACgkQNxpp46476aqlfwCeP8tSF

Bug#626445: [Pkg-chromium-maint] Bug#626445: multiple (89!) security issues in chromium

2011-05-13 Thread Giuseppe Iuculano
Hi Antoine, thanks for the bug report. On 05/12/2011 06:14 AM, Antoine Beaupré wrote: > But the version in stable is a much more serious issue. I do not think > there is the possbility of maintaining that branch all by ourselves > here, and I would recommend either dropping the package from stabl

Bug#564853: [0d4b071] Fix for Bug#564853 committed to git

2011-03-20 Thread Giuseppe Iuculano
tags 564853 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano on Sun, 20 Mar 2011 11:11:40 +0100. The fix will be in the next upload. = Fix FTBFS with gcc 4.5 , patch

Bug#617418: CVE

2011-03-10 Thread Giuseppe Iuculano
> # [$1000] [74675] High Invalid memory access in v8. Credit to Christian > Holler. > http://code.google.com/p/v8/issues/detail?id=1146 > Patch: http://code.google.com/p/v8/source/detail?r=6773 This is CVE-2011-1286 > > # [$1000] [74662] High Corruption via re-entrancy of RegExp code. Credit to

Bug#617418: v8 security issues fixed in chromium 10.0.648.127

2011-03-08 Thread Giuseppe Iuculano
Package: libv8 Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, chromium 10.0.648.127 fixed the following security issues in libv8: # [$1000] [74675] High Invalid memory access in v8. Credit to Christian Holler. http://code.google.com/p/v8/issues/detail?id=1146

Bug#612618: [Pkg-chromium-maint] Bug#612618: FTBFS: chrome/common/metrics_helpers.cc:22:20: error: prtime.h: No such file or directory

2011-02-11 Thread Giuseppe Iuculano
Hey Timo, On 02/09/2011 04:42 PM, Timo Juhani Lindfors wrote: > chrome/common/metrics_helpers.cc:22:20: error: prtime.h: No such file or > directory Have you installed libnspr4-dev? Cheers, Giuseppe. signature.asc Description: OpenPGP digital signature

Bug#611518: [Pkg-chromium-maint] Bug#611518: chromium-browser: FTBFS v8/src/arm/macro-assembler-arm.cc:61:3: error: #error "For thumb inter-working we require an architecture which supports blx"

2011-01-30 Thread Giuseppe Iuculano
Hi Timo, On 01/30/2011 01:57 PM, Timo Juhani Lindfors wrote: > the contents of src/v8 seems match what is in libv8. Would it be > possible to avoid compiling src/v8 if chromium-browser is anyway using > external libv8? yes, the version in squeeze already compiles against libv8. The next version i

Bug#610510: CVE-2010-4489: Integer Overflow in VP8 decoding leads to memory corruption

2011-01-19 Thread Giuseppe Iuculano
Package: libvpx Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for libvpx. CVE-2010-4489[0]: | Google Chrome before 8.0.552.215 does not properly handle WebM video, | which allows remote

Bug#608290: CVE-2010-4480 CVE-2010-4481

2010-12-29 Thread Giuseppe Iuculano
Package: phpmyadmin Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities & Exposures) ids were published for phpmyadmin. CVE-2010-4480[0]: | error.php in PhpMyAdmin 3.3.8.1, and other versions before | 3.4.0-beta1, allows r

Bug#608289: CVE-2010-3905

2010-12-29 Thread Giuseppe Iuculano
Package: eucalyptus Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for eucalyptus. CVE-2010-3905[0]: | The password reset feature in the administrator interface for | Eucalyptus 2.0.0 and

Bug#608288: CVE-2010-4254

2010-12-29 Thread Giuseppe Iuculano
Package: moon Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for moon. CVE-2010-4254[0]: | Mono, when Moonlight before 2.3.0.1 or 2.99.x before 2.99.0.10 is | used, does not properly valid

Bug#608286: CVE-2010-4312: does not use HTTPOnly for session cookies by default

2010-12-29 Thread Giuseppe Iuculano
Package: tomcat6 Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for tomcat6. CVE-2010-4312[0]: | The default configuration of Apache Tomcat 6.x does not include the | HTTPOnly flag in a Se

Bug#608273: CVE-2010-3853: pam_namespace executes namespace.init with service's environment

2010-12-29 Thread Giuseppe Iuculano
Package: pam Severity: serious Tags: security patch -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Tomas Mraz pointed out that pam_namespace PAM module executes external namespace.init script with an environment settings inherited form the program or service that has pam_namespace configured. Ple

Bug#607922: CVE-2010-4494: memory corruption (double-free) in XPath processing code

2010-12-24 Thread Giuseppe Iuculano
Package: libxml2 Severity: serious Tags: security patch -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for libxml2. CVE-2010-4494[0]: | Double free vulnerability in Google Chrome before 8.0.552.215 allows | remote attacke

Bug#607240: [f29b6ac] Fix for Bug#607240 committed to git

2010-12-17 Thread Giuseppe Iuculano
tags 607240 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano on Fri, 17 Dec 2010 10:59:01 +0100. The fix will be in the next upload. = Use GPL-compliant lyrics in

Bug#602732: [612c23f] Fix for Bug#602732 committed to git

2010-12-06 Thread Giuseppe Iuculano
tags 602732 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano on Mon, 6 Dec 2010 16:51:02 +0100. The fix will be in the next upload. = Remove flv_player.swf from

Bug#602693: Memory corruption in libvpx

2010-11-07 Thread Giuseppe Iuculano
On 11/07/2010 10:27 AM, Giuseppe Iuculano wrote: > Patch: https://review.webmproject.org/#change,928 Please also apply the following regression patch: http://review.webmproject.org/#change,1098 Cheers, Giuseppe. signature.asc Description: OpenPGP digital signature

Bug#602693: Memory corruption in libvpx

2010-11-07 Thread Giuseppe Iuculano
Package: libvpx Version: 0.9.1-1 Severity: serious Tags: security patch -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, Christoph Diehl discovered a memory corruption in libvpx. (see the chromium blog post[0], [$1000] [60055] High Memory corruption in libvpx. Credit to Christoph Diehl.) Patch

Bug#602609: Acknowledgement (CVE-2010-4008: does not well process a malformed XPATH)

2010-11-06 Thread Giuseppe Iuculano
fixed 602609 2.7.8.dfsg-1 thanks It was fixed in 2.7.8 Cheers, Giuseppe signature.asc Description: OpenPGP digital signature

Bug#602609: CVE-2010-4008: does not well process a malformed XPATH

2010-11-06 Thread Giuseppe Iuculano
Package: libxml2 Version: 2.7.7.dfsg-4 Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, it was discovered that libxml2 does not well process a malformed XPATH, causing crash and allowing arbitrary code execution. Patch: http://git.gnome.org/browse/libxml2/commi

Bug#597856: CVE-2010-3412: memory overrun issue in CPU profiler

2010-09-23 Thread Giuseppe Iuculano
On 09/23/2010 06:18 PM, Jérémy Lal wrote: > Thank you Giuseppe, > i'll fix this tonight. You are welcome. Feel free to ping me if you need a sponsor. Cheers, Giuseppe. signature.asc Description: OpenPGP digital signature

Bug#597856: CVE-2010-3412: memory overrun issue in CPU profiler

2010-09-23 Thread Giuseppe Iuculano
Package: libv8 Severity: serious Tags: security patch -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for libv8. CVE-2010-3412[0]: | Race condition in the console implementation in Google Chrome before | 6.0.472.59 has uns

Bug#590296: wget: diff for NMU version 1.12-2.1

2010-09-05 Thread Giuseppe Iuculano
ad to +overwriting arbitrary files. Thanks to Marc Deslauriers and the Ubuntu +Security team (Closes: #590296) + + -- Giuseppe Iuculano Sun, 05 Sep 2010 15:33:19 +0200 + wget (1.12-2) unstable; urgency=low * acknoledge NMUs. Thanks for your work/help Matt and Anthony diff -Nru wget-1.12/d

Bug#591195: [e8a913f] Fix for Bug#591195 committed to git

2010-09-01 Thread Giuseppe Iuculano
tags 591195 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano on Wed, 1 Sep 2010 23:43:44 +0200. The fix will be in the next upload. = Remove swfupload.swf from the

Bug#594304: CVE-2010-2790: Multiple cross-site scripting (XSS) vulnerabilities

2010-08-25 Thread Giuseppe Iuculano
Package: zabbix Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for zabbix. CVE-2010-2790[0]: | Multiple cross-site scripting (XSS) vulnerabilities in the formatQuery | function in frontend

Bug#594301: CVE-2010-2809: The default configuration does not properly use the @SELECTED_URI feature

2010-08-25 Thread Giuseppe Iuculano
Package: uzbl Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for uzbl. CVE-2010-2809[0]: | The default configuration of the binding in Uzbl before | 2010.08.05 does not properly

Bug#594300: CVE-2010-2810: Heap-based buffer overflow

2010-08-25 Thread Giuseppe Iuculano
Package: lynx-cur Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for lynx-cur. CVE-2010-2810[0]: | Heap-based buffer overflow in the convert_to_idna function in | WWW/Library/Implementatio

Bug#591204: lvm2: diff for NMU version 2.02.66-2.1

2010-08-19 Thread Giuseppe Iuculano
On 08/19/2010 04:29 PM, Bastian Blank wrote: > Sorry, this is not acceptable. The patch > - differes in comments, > - used path, > - removes autoconf parts without reason, autoreconf is called anyway, and > - is incomplete. Well, FWIW this is instead acceptable from a NMUer point of view, anyway t

Bug#591204: lvm2: diff for NMU version 2.02.66-2.2

2010-08-19 Thread Giuseppe Iuculano
On 08/19/2010 03:27 PM, Mehdi Dogguy wrote: > I'm sure "dcut cancel $changes_files" works :) oh, it worked, thanks! :-) Cheers, Giuseppe. signature.asc Description: OpenPGP digital signature

Bug#591204: lvm2: diff for NMU version 2.02.66-2.2

2010-08-19 Thread Giuseppe Iuculano
On 08/19/2010 02:11 PM, Mehdi Dogguy wrote: > Why two NMUs for a single patch? Can't you drop the first one, fix it and > re-upload? Because dcut rm --searchdirs lvm2* didn't work, now I'm trying with rm DELAYED/1-day/libvm2* Cheers, Giuseppe. signature.asc Description: OpenPGP digital signatu

Bug#591204: lvm2: diff for NMU version 2.02.66-2.2

2010-08-19 Thread Giuseppe Iuculano
11:56:57.0 +0200 +++ lvm2-2.02.66/debian/changelog 2010-08-19 13:48:52.0 +0200 @@ -1,3 +1,10 @@ +lvm2 (2.02.66-2.2) unstable; urgency=high + + * Non-maintainer upload by the Security Team. + * CVE-2010-2526: Also check permission on restart. + + -- Giuseppe Iuculano Thu, 19 Aug 2010

Bug#591204: lvm2: diff for NMU version 2.02.66-2.1

2010-08-19 Thread Giuseppe Iuculano
On 08/19/2010 01:29 PM, Giuseppe Iuculano wrote: > It is the same patch without the configure and Makefile stuff (upstream > added --with-default-run-dir configure argument, I instead hardcoded it > to /var/run/clvmd.sock ). I removed that part to avoid autoreconf I just noted

Bug#591204: lvm2: diff for NMU version 2.02.66-2.1

2010-08-19 Thread Giuseppe Iuculano
On 08/19/2010 12:54 PM, Bastian Blank wrote: > Please describe the changes you made. It even differs in the comments. > This only shows the annoncement, the patch is in > https://bugzilla.redhat.com/attachment.cgi?id=434982 It is the same patch without the configure and Makefile stuff (upstream

Bug#591204: lvm2: diff for NMU version 2.02.66-2.1

2010-08-19 Thread Giuseppe Iuculano
On 08/19/2010 12:26 PM, Bastian Blank wrote: > Where does this patch come from? It is not included into the upstream > source this way. As long as this is not known: NACK. It comes from upstream, I used the essential part of the patch. Please see: https://www.redhat.com/archives/linux-lvm/2010-Ju

Bug#591204: lvm2: diff for NMU version 2.02.66-2.1

2010-08-19 Thread Giuseppe Iuculano
ation between lvm2 and clvmd +(Closes: #591204) + + -- Giuseppe Iuculano Thu, 19 Aug 2010 11:56:07 +0200 + lvm2 (2.02.66-2) unstable; urgency=medium * Make libdevmapper1.02.1 depend on dmsetup. libdevmapper needs new enough diff -Nru lvm2-2.02.66/debian/patches/CVE-2010-2526.patch

Bug#587732: protobuf: diff for NMU version 2.3.0-2.1

2010-07-11 Thread Giuseppe Iuculano
On 07/11/2010 12:55 PM, Iustin Pop wrote: > Giuseppe, you didn't answer my other question. Can you confirm the > package builds fine and the java parts work with gcj? Yes I can. Cheers, Giuseppe signature.asc Description: OpenPGP digital signature

Bug#587732: protobuf: diff for NMU version 2.3.0-2.1

2010-07-11 Thread Giuseppe Iuculano
On 07/11/2010 12:27 PM, Julien Cristau wrote: > Because there's no requirement anywhere that says arch:all packages need > to be buildable on all architectures. "The binary target must be all that is necessary for the user to build the binary package(s) produced from this source package." So I th

Bug#587732: protobuf: diff for NMU version 2.3.0-2.1

2010-07-11 Thread Giuseppe Iuculano
On 07/11/2010 11:45 AM, Julien Cristau wrote: > On Sun, Jul 11, 2010 at 09:05:49 +0200, Giuseppe Iuculano wrote: > >> If you put openjdk-6 in b-d-i, protobuf can't be built on those archs >> that hasn't openjdk-6, and imho this can be considered an FTBFS even if >&g

Bug#587732: protobuf: diff for NMU version 2.3.0-2.1

2010-07-11 Thread Giuseppe Iuculano
On 07/11/2010 01:51 AM, Iustin Pop wrote: > I'm not sure I understand what you mean. The jdk is *not* used during > the binary build, except for unittests (if present). The jdk *is* used > during the indep build, for the java part. What do you see here as an > abuse? > Sorry, let me rephrase a bi

Bug#587732: protobuf: diff for NMU version 2.3.0-2.1

2010-07-10 Thread Giuseppe Iuculano
Hi Iustin, On 07/10/2010 08:39 PM, Iustin Pop wrote: > I was planning to revert the move of the openjdk-6 from b-d-i to b-d, as > an alternative to depend on default-jdk. The move was done simply to > have 'jar' available during the build time for a few optional unittests > which need it. I think

Bug#587732: protobuf: diff for NMU version 2.3.0-2.1

2010-07-10 Thread Giuseppe Iuculano
/debian/changelog 2010-07-10 19:35:10.0 +0200 @@ -1,3 +1,11 @@ +protobuf (2.3.0-2.1) unstable; urgency=high + + * Non-maintainer upload. + * Build-depends on on default-jdk and set JAVA_HOME to +/usr/lib/jvm/default-java (Closes: #587732) + + -- Giuseppe Iuculano Sat, 10 Jul 20

Bug#587732: protobuf should B-D on default-jdk

2010-07-06 Thread Giuseppe Iuculano
> Since openjdk-6-jdk was available before on those arches, I hoped it > will come back. Do you think it won't? It wasn't available, protobuf was built in those archs because you had openjdk-6-jdk in Build-Depends-Indep instead of Build-Depends Cheers, Giuseppe. signature.asc Description: Open

Bug#585757: libglewmx1.5: 1.5.4-1 makes libglc0 crash

2010-07-06 Thread Giuseppe Iuculano
> Well, since the problem is somewhere in Quesoglc, I built a version of glc > with > debug symbols, to see where exactly the error is. And surprise, that version > worked. The locally rebuilt package without debug symbols also works. Not sure > what exactly is the problem, maybe libglc0 was built

Bug#588138: CVE-2010-1625: Cross-site scripting (XSS) vulnerability

2010-07-05 Thread Giuseppe Iuculano
Package: lxr Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for lxr. CVE-2010-1625[0]: | Cross-site scripting (XSS) vulnerability in LXR Cross Referencer | before 0.9.7 allows remote attac

Bug#588137: CVE-2010-1625: Cross-site scripting (XSS) vulnerability

2010-07-05 Thread Giuseppe Iuculano
Package: lxr-cvs Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for lxr-cvs. CVE-2010-1625[0]: | Cross-site scripting (XSS) vulnerability in LXR Cross Referencer | before 0.9.7 allows remo

Bug#588036: CVE-2010-1448: Cross-site scripting (XSS) vulnerability

2010-07-04 Thread Giuseppe Iuculano
Package: lxr-cvs Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Ciao Giacomo, the following CVE (Common Vulnerabilities & Exposures) id was published for lxr-cvs. CVE-2010-1448[0]: | Cross-site scripting (XSS) vulnerability in lib/LXR/Common.pm in LXR | Cross Ref

Bug#584946: [Pkg-chromium-maint] Bug#584946: chromium-browser: segfault on startup on armel (openmoko freerunner)

2010-06-25 Thread Giuseppe Iuculano
On 06/25/2010 06:50 PM, Timo Juhani Lindfors wrote: > Giuseppe Iuculano writes: >> Could you try version 5.0.375.86~r49890-1 when it will be available in >> armel please? > > Sure but the blx instructions in libv8 will still be a problem, right? > Yes, please open a b

Bug#584946: [Pkg-chromium-maint] Bug#584946: chromium-browser: segfault on startup on armel (openmoko freerunner)

2010-06-25 Thread Giuseppe Iuculano
Hi Timo, On 06/25/2010 05:41 PM, Timo Juhani Lindfors wrote: > version 5.0.375.70~r48679-2 seems to start on openmoko! > > I can use the menus but trying to load any page results in a dialog > that shows an error message that can not be copy&pasted. It says > something about "The following page(s

Bug#581265: [Pkg-chromium-maint] Bug#581265: release blocking bug

2010-06-12 Thread Giuseppe Iuculano
block 581265 by 583826 thanks On 05/18/2010 10:21 PM, Moritz Muehlenhoff wrote: > The situation has changed a bit: Chromium might still be part of Squeeze. > Guiseppe is currently checking with upstream on the feasibility of a > upstream support lifetime suitable for the lifetime of Squeeze. > >

Bug#584517: CVE-2010-0404: Multiple SQL injection vulnerabilities

2010-06-07 Thread Giuseppe Iuculano
On 06/06/2010 06:16 PM, Olivier Berger wrote: > Thanks for caring. > > I've tried and fix the most obvious problems reported by lintian and > update the changelog, and have re-uploaded an updated package to > mentors. If you can upload it for me, many thanks in advance. > > Best regards, I've ad

Bug#581280: [387779e] Fix for Bug#581280 committed to git

2010-06-04 Thread Giuseppe Iuculano
tags 581280 + pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano on Fri, 4 Jun 2010 13:05:09 +0200. The fix will be in the next upload. = Remove *.moc.cpp files on clean

Bug#584517: CVE-2010-0404: Multiple SQL injection vulnerabilities

2010-06-04 Thread Giuseppe Iuculano
On 06/04/2010 12:44 PM, Olivier Berger wrote: > Here : > http://mentors.debian.net/cgi-bin/sponsor-pkglist?action=details;package=phpgroupware Please add the "Closes" entries for the security bugs and add the source format (W: phpgroupware source: missing-debian-source-format). Cheers. Giuseppe.

Bug#584517: CVE-2010-0404: Multiple SQL injection vulnerabilities

2010-06-04 Thread Giuseppe Iuculano
Hi Christian, On 06/04/2010 11:24 AM, christian bac wrote: > -the unstable version : 1:0.9.16.016+dfsg-1 that is uploaded on > mentors. > do you need a sponsor ? Cheers, Giuseppe signature.asc Description: OpenPGP digital signature

Bug#584518: CVE-2010-0403: Directory traversal vulnerability

2010-06-04 Thread Giuseppe Iuculano
Package: phpgroupware Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for phpgroupware. CVE-2010-0403[0]: | Directory traversal vulnerability in about.php in phpGroupWare (phpgw) | before 0

Bug#584517: CVE-2010-0404: Multiple SQL injection vulnerabilities

2010-06-04 Thread Giuseppe Iuculano
Package: phpgroupware Severity: grave Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for phpgroupware. CVE-2010-0404[0]: | Multiple SQL injection vulnerabilities in phpGroupWare (phpgw) before | 0.9.16.016

Bug#584516: CVE-2010-1628: allows context-dependent attackers to execute arbitrary code

2010-06-04 Thread Giuseppe Iuculano
Package: ghostscript Severity: grave Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for ghostscript. CVE-2010-1628[0]: | Ghostscript 8.64, 8.70, and possibly other versions allows | context-dependent attack

Bug#584402: CVE-2010-1457: allows local users to read arbitrary files

2010-06-03 Thread Giuseppe Iuculano
Package: gnustep-base Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for gnustep-base. CVE-2010-1457[0]: | Tools/gdomap.c in gdomap in GNUstep Base before 1.20.0 allows local | users to re

Bug#584401: CVE-2010-1620: Integer overflow

2010-06-03 Thread Giuseppe Iuculano
Package: gnustep-base Version: 1.19.3-3 Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for gnustep-base. CVE-2010-1620[0]: | Integer overflow in the load_iface function in Tools/gdomap.c i

Bug#584400: CVE-2010-1626

2010-06-03 Thread Giuseppe Iuculano
Package: mysql-dfsg-5.0 Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for mysql-dfsg-5.0. CVE-2010-1626[0]: | MySQL before 5.1.46 allows local users to delete the data and index | files o

  1   2   3   4   >