Thank you for your report. I'm waiting for my sponsor to get back from
vacation. Then I'll be able to upload version compatible with new
directory structure of postgresql libraries in Debian.
Regards,
Primoz Bratanic
On Sun, 2005-08-14 at 14:22 +0200, Andreas Jochens wrote:
>
Hello,
> I don't think this will need a DSA. Please double-check!
Default compile option is without mysql and you didn't change that (so
your binaries are not vulnerable, even if source is)
Primoz
signature.asc
Description: This is a digitally signed message part
Package: mailutils
Followup-For: Bug #308031
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Woody is affected too. Just check MySql/MySql.c (just that there is no
escaping ... )
- -- System Information:
Debian Release: 3.1
APT prefers unstable
APT policy: (500, 'unstable'), (1, 'experimenta
ection.
Solution: add \ to list of characters to be escaped.
Primoz Bratanic
- -- System Information:
Debian Release: 3.1
APT prefers unstable
APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Kernel: Linux 2.6.10-1-686-smp
Locale: LANG=en_US.UT
On Sat, 2005-05-07 at 13:48 +0200, Micha Lenk wrote:
> Severity #307366 Grave
> Merge #307784 #307366
> Thanks dear bugtracking system.
>
> On Fri, May 06, 2005 at 09:10:17PM +0200, Primoz wrote:
> > Is there a way to revert the upload to the NMUed one (which had security
&g
Is there a way to revert the upload to the NMUed one (which had security
problems fixed), so package stays in sarge. I would need at least a week
to 14 days to port pam-mysql to pgsql (which seems like the best way to
go).
Primoz
On Fri, 2005-05-06 at 16:03 +0200, Joerg Wendland wrote:
> On
> On Thu, May 05, 2005 at 03:41:13PM +0200, Primoz Bratanic wrote:
> > Package: pam-pgsql
> > Severity: critical
> > Tags: security
> > Justification: root security hole
>
> > The problem reported in BUG#230875 and marked as fixed (NMU upload) was open
>
Package: xtradius
Severity: grave
Tags: security
Justification: user security hole
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
There is no user input verification whatsoever. In
/contrib/authmysql/authmysql.c username
supplied by user is fed directly to database.
Primoz Bratanic
regarding sql injection problem with changing password (easy
impact would be changing uid to 0 ... root compromise).
Primoz Bratanic
- -- System Information:
Debian Release: 3.1
APT prefers unstable
APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
t and I'll resubmit it when I finish PoC.
Best regards,
Primoz
- -- System Information:
Debian Release: 3.1
APT prefers unstable
APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Kernel: Linux 2.6.8-1-686
Locale: LANG=en_US.UTF-8,
10 matches
Mail list logo