Bug#392016: Further security patching of ELOG

2006-12-02 Thread Ulf Harnhammar
visories/18124/ o http://secunia.com/advisories/22057/ Regards, Ulf Harnhammar --- src/elogd.c.old 2006-11-28 12:25:59.0 +0100 +++ src/elogd.c 2006-12-02 20:37:44.0 +0100 @@ -9685,7 +9685,7 @@ void show_edit_form(LOGBOOK * lbs, int m rsprintf("- %s -\n&

Bug#392016: elog in stable is also vulnerable

2006-11-08 Thread Ulf Harnhammar
I've just verified that elog in stable is vulnerable to all issues mentioned in bug #392016. // Ulf -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Bug#392016: ELOG security audit

2006-10-31 Thread Ulf Harnhammar
as well as in the upstream ELOG-2.6.2 version. I haven't checked any other versions (but the upstream SVN trunk looks like it also has these bugs). // Ulf Harnhammar, Debian Security Audit Project http://www.debian.org/security/audit/ -- ___

Bug#392016: Perhaps

2006-10-18 Thread Ulf Harnhammar
I'll see what I can do. // Ulf -- ___ Surf the Web in a faster, safer and easier way: Download Opera 9 at http://www.opera.com Powered by Outblaze

Bug#391388: zabbix-server-mysql: remote security problems

2006-10-06 Thread Ulf Harnhammar
Subject: zabbix-server-mysql: remote security problems Package: zabbix-server-mysql Version: 1:1.1.2-2 Severity: grave Justification: user security hole Tags: security patch Hello, Max Vozeler and Ulf Harnhammar from the Debian Security Audit Project have found a number of format string bugs and

Bug#340842: acknowledged by developer (Re: unalz: buffer overflow when extracting archives)

2006-03-16 Thread Ulf Harnhammar
> > The bug appears to still apply to the version of the package in unstable, > > and is marked as such. > > The bug looks closed to me. It still looks closed (in all versions) to me. Are you sure that that is what you want, instead of - say - fixing it? // Ulf -- __

Bug#340842: acknowledged by developer (Re: unalz: buffer overflow when extracting archives)

2006-03-15 Thread Ulf Harnhammar
> This bug was fixed in a security upload to stable; marking as closed in that > version. > > The bug appears to still apply to the version of the package in unstable, > and is marked as such. The bug looks closed to me. // Ulf -- ___ Surf the Web

Bug#354461: zoo: buffer overflow when processing archives

2006-02-26 Thread Ulf Harnhammar
://seclists.org/lists/fulldisclosure/2006/Feb/0572.html The full-disclosure post includes a patch. // Ulf Harnhammar -- System Information: Debian Release: testing/unstable APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Li

Bug#340842: unalz: buffer overflow when extracting archives

2005-11-26 Thread Ulf Harnhammar
no debconf information oflow333.alz Description: Binary data oflow1621.alz Description: Binary data #!/usr/bin/perl -- # alzgen # by Ulf Harnhammar in 2005 # I hereby place this program in the public domain. die "usage: $0 \n" unless @ARGV == 2; $len = shift; $lenhi = int($len /

Bug#332919: No

2005-10-12 Thread Ulf Harnhammar
> > No, you don't need to set up a rogue CDDB server, as CDDB servers > > let anyone add or modify information about records. > > But according to the freedb.org FAQs every submission is reviewed before being > applied to the database. So it seems quite unlikely submissions of > crafted entries

Bug#332919: No

2005-10-11 Thread Ulf Harnhammar
No, you don't need to set up a rogue CDDB server, as CDDB servers let anyone add or modify information about records. http://www.freedb.org/modules.php?name=Sections&sop=viewarticle&artid=26 // Ulf -- ___ Surf the Web in a faster, safer and easier

Bug#323099: wget: non-free documentation [NONFREE-DOC:GFDL-1.2]

2005-08-14 Thread Ulf Harnhammar
orm to the DFSG, so these files must be removed from main. As an aside, the debian/copyright file for wget only lists the license for the wget program and not the license for the wget documentation. // Ulf Harnhammar -- System Information: Debian Release: testing/unstable APT prefers testing

Bug#322535: Patch

2005-08-13 Thread Ulf Harnhammar
If you don't want to upgrade to 2.3.7, which is unstable, you can use our unofficial patch: o http://www.sitic.se/dokument/evolution.formatstring.patch // Ulf -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Bug#308282: [phpbb2 #308282] upstream patch

2005-05-10 Thread Ulf Harnhammar
(Sorry for not doing this as a real reply with the correct mail headers, but I'm not subscribed to debian-security, I only read it on the web.) > > | + $text = preg_replace('#(script|about|applet|activex|chrome):#is', > > "\\1:", $text); > It looks like this is about preventing URL's like src="