Hi Cyril,
On Wed, Jul 16, 2025 at 08:12:28AM +0200, Cyril Brulebois wrote:
> Hi,
>
> Salvatore Bonaccorso (2025-07-16):
> > Ack. But I think then at least 6.12.38-1 needs to follow now. The
> > reason is the following, 6.12.38 was a single commit upload fixing a
>
Hi Cyril
[sorryf or the late reply was not able to do it yesterday]
On Mon, Jul 14, 2025 at 06:35:36PM +0200, Cyril Brulebois wrote:
> Hi kernel and ftp teams,
>
> Salvatore Bonaccorso (2025-07-10):
> > I would like to upload next version of the 6.12.y stable series to
> >
Hi
I would like to upload next version of the 6.12.y stable series to
unstable, which will be 6.12.37-1, though depending on an ack/nack
from SRM and/or debian-boot.
The update contains in particular the mitigations for the Transitive
Scheduler Attacks (TSA) (CVE-2024-36350, CVE-2024-36357). To b
Hi Cyril,
On Thu, Jul 03, 2025 at 07:58:22AM +0200, Salvatore Bonaccorso wrote:
> Hi Cyril,
>
> On Thu, Jul 03, 2025 at 01:33:34AM +0200, Cyril Brulebois wrote:
> > Salvatore Bonaccorso (2025-06-29):
> > > Ack in this case holding back the unstable upload until having yo
Hi Cyril,
On Thu, Jul 03, 2025 at 01:33:34AM +0200, Cyril Brulebois wrote:
> Salvatore Bonaccorso (2025-06-29):
> > Ack in this case holding back the unstable upload until having your
> > "go". Good luck with the next d-i release!
>
> Thanks! Feel free to go ahead
Hi Cyril,
On Sun, Jun 29, 2025 at 02:10:00PM +0200, Cyril Brulebois wrote:
> Hi Salvatore,
>
> Thanks for all those details.
>
> Salvatore Bonaccorso (2025-06-29):
> > I would like to upload next version of the 6.12.y stable series to
> > unstable, which would be
Hi
I would like to upload next version of the 6.12.y stable series to
unstable, which would be 6.12.35-1. This is a bigger one than usual.
The update would consist of two stable series versions 6.12.34 and
6.12.35 which were released in and after the 6.16 merge window.
Depending on upstream timing
; urgency=medium
+
+ * Non-maintainer upload.
+ * os: Check for integer overflow on BigRequest length (CVE-2025-49176)
+(Closes: #1108073)
+
+ -- Salvatore Bonaccorso Fri, 20 Jun 2025 09:47:20 +0200
+
xorg-server (2:21.1.16-1.2) unstable; urgency=medium
* Non-maintainer upload.
diff -u
Hi
I would like to upload next version of the 6.12.y stable series to
unstable, which is 6.12.33-1.
This was a very small release itself consisting of only of 25 commits,
the main reason for this upload is bringing in the packaging changes
mentioned last time about moving the package revision and
Package: release.debian.org
Severity: normal
X-Debbugs-Cc: xorg-ser...@packages.debian.org, Debian X Strike Force
, Emilio Pozuelo Monfort , Timo
Aaltonen , Julien Cristau ,
car...@debian.org, debian-boot@lists.debian.org, k...@debian.org
Control: affects -1 + src:xorg-server
User: release.debia
Hi Cyril,
On Thu, Jun 05, 2025 at 10:23:08PM +0200, Cyril Brulebois wrote:
> Hi,
>
> Salvatore Bonaccorso (2025-06-05):
> > I would like to upload the next version of the 6.12.y stable series to
> > unstable (once linux/6.12.30-1 migrates to testing). There are two
> &g
Hi
I would like to upload the next version of the 6.12.y stable series to
unstable (once linux/6.12.30-1 migrates to testing). There are two
upstream stable versions imported, 6.12.31 and 6.12.32 where 6.12.31
was of considerable size (note there is onging merge window for 6.16
ongoing and from ex
Hi Cyril,
On Wed, May 28, 2025 at 09:38:51PM +0200, Cyril Brulebois wrote:
> Hi,
>
> Looping in debian-kernel@, context being missing touchpad support on an
> amd64 machine, unless an extra module is added to the installer.
>
> Feel free to steal the bug report away from us and adjust
> debian/i
Hi Cyril,
On Wed, May 28, 2025 at 01:43:10PM +0200, Cyril Brulebois wrote:
> Hi Salvatore,
>
> Salvatore Bonaccorso (2025-05-27):
> > I would like to upload the next version of the 6.12.y. stable series
> > to unstable, this time with the aim to really have it migrating to
Hi,
I would like to upload the next version of the 6.12.y. stable series
to unstable, this time with the aim to really have it migrating to
testing (covering the previous ITS mitigations, but blocked by
#1106070).
There is one new version imported 6.12.30.
The most important change on packaging
> > this issue, and whether Severity: important was appropriate. But I got
> > busy with other things and let this fly…
> >
> > Salvatore Bonaccorso (2025-05-25):
> > > I see your point and having though the ITS mitigations in my opinion
> > > is more important. B
Hi Roland,
Thanks for your feedback.
On Sun, May 25, 2025 at 11:37:17AM +0200, Roland Clobus wrote:
> Hi,
>
> I saw in the PTS that an unblock was granted. Please block linux-image
> 6.12.29 again and wait for the pending upload instead.
>
> Should the priority be raised to the next level above
Hi
With the knowledge of beeing now in the hard freeze (i.e this will
later on require as well an unblock request): I would like to upload
the next version of the 6.12.y stable series to unstable, with the aim
that this should migrate to trixie.
Two new stable versions are imported 6.12.28 and 6.
Hi
[not yet trimming the CC list to give a short update]
On Mon, May 12, 2025 at 10:34:51PM +0200, Salvatore Bonaccorso wrote:
> Control: severity -1 serious
>
> Hi Robert,
>
> On Mon, May 12, 2025 at 04:38:19PM +0100, Robert Shearman wrote:
> > Package: src:linux
&
don't send signals with root privileges (CVE-2025-46805)
+
+ -- Salvatore Bonaccorso Fri, 16 May 2025 17:46:51 +0200
+
screen (4.9.1-2) unstable; urgency=medium
* Team upload (debian/ namespace).
diff -Nru
screen-4.9.1/debian/patches/fix-CVE-2025-46802-attacher.c-prevent-temporary-066
Hi Cyril,
On Tue, May 13, 2025 at 08:38:00PM +0200, Cyril Brulebois wrote:
> Hi Salvatore,
>
> Debian FTP Masters (2025-05-07):
> > Closes: 1081338
> > Changes:
> > xorg-server (2:21.1.16-1.1) unstable; urgency=medium
> > .
> >* Non-maintainer upload.
> >* dix: Hold input lock for Atta
On Mon, May 12, 2025 at 10:34:51PM +0200, Salvatore Bonaccorso wrote:
> Control: severity -1 serious
>
> Hi Robert,
>
> On Mon, May 12, 2025 at 04:38:19PM +0100, Robert Shearman wrote:
> > Package: src:linux
> > Version: 6.1.137-1
> > Severity: important
>
Control: severity -1 serious
Hi Robert,
On Mon, May 12, 2025 at 04:38:19PM +0100, Robert Shearman wrote:
> Package: src:linux
> Version: 6.1.137-1
> Severity: important
> X-Debbugs-Cc: r...@graphiant.com
>
> rob@graph-dev-bookworm:~$ sudo modprobe watchdog
> modprobe: ERROR: could not in
Hi Cyril,
On Mon, May 12, 2025 at 08:02:50PM +0200, Cyril Brulebois wrote:
> Hi Salvatore,
>
> (ftp team dropped)
>
> Salvatore Bonaccorso (2025-05-06):
> > Thanks, I have uploaded 6.1.27-1 to unstable and is now in the NEW
> > queue. I think we will not be able to
Hi Cyril,
On Tue, May 06, 2025 at 11:26:39PM +0200, Cyril Brulebois wrote:
> Salvatore Bonaccorso (2025-05-06):
> > Thanks, I have uploaded 6.1.27-1 to unstable and is now in the NEW
> > queue. I think we will not be able to make it in time to have it
> > migrated within t
Hi Cyril,
On Tue, May 06, 2025 at 01:28:23AM +0200, Cyril Brulebois wrote:
> Hi Salvatore,
>
> Salvatore Bonaccorso (2025-05-05):
> > Following the tradition to keep up with upstream stable releases and
> > aiming to have a trixie close to upstream, this is to declare
Hi
Following the tradition to keep up with upstream stable releases and
aiming to have a trixie close to upstream, this is to declare the
intention of uploading another linux version 6.12.26-1 to unstable
(planned 6.12.26-1, but might be 6.12.27-1 depending on progress in
next days)
linux/6.12.25
Source: busybox
Version: 1:1.37.0-4
Severity: important
Tags: security upstream
Forwarded: https://bugs.busybox.net/show_bug.cgi?id=16018
X-Debbugs-Cc: car...@debian.org, Debian Security Team
Hi,
The following vulnerability was published for busybox.
CVE-2025-46394[0]:
| In tar in BusyBox throu
Source: busybox
Version: 1:1.37.0-4
Severity: important
Tags: security upstream
Forwarded: https://bugs.busybox.net/show_bug.cgi?id=15922
X-Debbugs-Cc: car...@debian.org, Debian Security Team
Hi,
The following vulnerability was published for busybox.
CVE-2024-58251[0]:
| In netstat in BusyBox t
Control: tags -1 + fixed-upstream
On Fri, Nov 03, 2023 at 08:26:28PM +0100, Moritz Mühlenhoff wrote:
> Source: busybox
> X-Debbugs-CC: t...@security.debian.org
> Severity: important
> Tags: security
>
> Hi,
>
> The following vulnerability was published for busybox.
>
> CVE-2023-39810[0]:
> | An
Hi all,
On Mon, Apr 21, 2025 at 02:02:19PM +0200, Salvatore Bonaccorso wrote:
> Hi
>
> Following the tradition to keep up with upstream stable releases and
> aiming to have a trixie close to upstream, I would like to upload
> linux version 6.12.24-1 to unstable.
>
> 6.12.2
Hi Adrian,
On Mon, Apr 21, 2025 at 06:45:49PM +0200, John Paul Adrian Glaubitz wrote:
> Hi Salvatore,
>
> On Mon, 2025-04-21 at 14:02 +0200, Salvatore Bonaccorso wrote:
> >* [arm64,powerpc,ppc64,ppc64el,riscv64,s390x] Enable KALLSYMS_ALL on
> > all architectures wh
Hi
Following the tradition to keep up with upstream stable releases and
aiming to have a trixie close to upstream, I would like to upload
linux version 6.12.24-1 to unstable.
6.12.22-1 has moved already to testing so far.
Debian Boot, Release team how is the timing with respect potential d-i
wor
Hi
I would like to upload linux version 6.12.22-1 to unstable.
It imports 6.12.22 on top of the current packaging and is a rather
small stable series upload. The next one will actually be the big bump
after the 6.15 merge window closed, so I would like to have that
separated. There are on top add
Hi
I would like to upload linux version 6.12.21-1 to unstable.
It imports 6.12.21 only on top of the current packaging, which
includes security fixes. There are on top additional changes for the
packaging and adding support. In details they are the following:
* lintian: Restore override for p
Hi
I would like to upload linux version 6.12.20-1 to unstable. 6.12.19-1
has migrated to testing.
It imports 6.12.20 on top of the current packaging. On top there are
some packaging changes as follows:
* drivers/nvme/target: Enable NVME_TARGET_PASSTHRU
* drivers/nvme/target: Enable NVME_TA
Hi Emilio,
On Tue, Mar 18, 2025 at 04:18:32PM +0100, Emilio Pozuelo Monfort wrote:
> On 15/03/2025 07:27, Salvatore Bonaccorso wrote:
> > Hi
> >
> > I would like to upload linuxversion 6.12.19-1 to unstable (with the
> > aim that this should migrate to testing for t
Hi Cyril,
On Wed, Jan 01, 2025 at 01:07:10PM +0100, Cyril Brulebois wrote:
> Cyril Brulebois (2024-12-26):
> > Perfect, thanks. I've hinted the linux-* lot a few britney ago and they
> > migrated. I'm currently busy discovering and tying up loose ends… I'm
> > not sure how many of them there are,
Hi Sebastian,
[trimming bit recipents list + adding debian-kernel]
On Sat, Nov 02, 2024 at 06:35:53PM +0100, Sebastian Ramacher wrote:
> Dear toolchain, debian-installer, and image maintainers,
>
> We, as the release team, are aware that we are late with the
> announcement of the freeze timeline
Hi Cyril,
On Wed, Dec 25, 2024 at 10:10:52AM +0100, Cyril Brulebois wrote:
> Hi Salvatore,
>
> Salvatore Bonaccorso (2024-12-20):
> > I would like to upload linux version 6.12.6-1 to unstable.
> >
> > It imports 6.12.6 on top of what is currently in unstable, it fixe
Source: busybox
Source-Version: 1:1.37.0-1
- Forwarded message from Debian FTP Masters
-
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sun, 06 Oct 2024 10:20:49 +0300
Source: busybox
Architecture: source
Version: 1:1.37.0-1
Distribution: unstable
Urgency: medium
Mai
Hi,
On Sun, Sep 22, 2024 at 10:16:11AM +0100, Steve McIntyre wrote:
> Hey Salvatore!
>
> On Fri, Sep 20, 2024 at 03:46:29PM +0200, Salvatore Bonaccorso wrote:
> >
> >Hope you and family are doing better already now.
>
> Thanks!
>
> >Just double-checking as w
Hi Steve,
On Sun, Sep 15, 2024 at 09:26:07PM +0100, Steve McIntyre wrote:
> On Sun, Sep 15, 2024 at 12:31:12AM +0200, Cyril Brulebois wrote:
> >Steve McIntyre (2024-09-14):
> >>
> >> That looks great for me, thanks.
> >
> >Then I think my work here is done:
> >
> >kibi@respighi:~$ dak ls deb
Control: reassign -1 src:linux 6.9.2-1~exp1
On Sat, Jul 13, 2024 at 03:13:23PM +0100, Tj wrote:
> Source: debian-installer
> Followup-For: Bug #1075713
> X-Debbugs-Cc: tj.iam...@proton.me
>
> Finally managed to build the v6.8.12 initrd; process is quite convoluted
> due to having to manually id
Control: reassign -1 src:debian-installer
Hi Cyril,
On Wed, Jul 03, 2024 at 11:34:30PM +0200, Cyril Brulebois wrote:
> Hi,
>
> Tj (2024-07-03):
> > Source: linux
> > Followup-For: Bug #1075713
> > X-Debbugs-Cc: tj.iam...@proton.me debian-boot@lists.debian.org
> >
> > I've inspected the arch-la
Hi Jonathan,
On Thu, Jun 20, 2024 at 10:35:35PM +0100, Jonathan Wiltshire wrote:
> Hi,
>
> A finally-final point release is required for bullseye, and we're a bit
> constrained on dates. The security team (CC) wish to cease security support
> from Wednesday 14th August and hand over to LTS as soo
Hi,
On Sat, Feb 03, 2024 at 12:32:08AM +0100, Cyril Brulebois wrote:
> Salvatore Bonaccorso (2024-02-02):
> > One thing is still unresolved, thus additonally to the explicit CC to
> > kibi, as well including debian-boot. We have the armel d-i situation
> > not yet resolved,
Hi,
I would like to upload linux version 6.6.15-1 ideally over the weekend
to unstable. The new version imports two versions of the 6.6.y stable
series (which is upstream an LTS) up to 6.6.15. It contains a larger
amount of changes as it consisted of versions released after the merge
window upstr
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: li...@packages.debian.org, k...@debian.org,
debian-boot@lists.debian.org, b...@debian.org, car...@debian.org
Control: affects -1 + src:linux
Hi Release team, hi Cyril for debi
Hi,
On Mon, May 01, 2023 at 06:36:01PM +0200, Cyril Brulebois wrote:
> Hi,
>
> Salvatore Bonaccorso (2023-04-30):
> > [ Other info ]
> > As beeing the firmware-nonfree package, I'm explicitly CC'ing as well
> > Cyril on this pre-approval request.
>
&
ices to it
+(Closes: #1035282)
+ * Update to linux-support 6.1.0-8
+
+ -- Salvatore Bonaccorso Sun, 30 Apr 2023 07:31:54 +0200
+
firmware-nonfree (20230210-4) unstable; urgency=medium
* iwlwifi: Add missing files entry for iwlwifi-so-a0-hr-b0-72.ucode.
diff -Nru firmware-nonfree-20230
Hi Cyril,
On Sun, Apr 09, 2023 at 11:45:42PM +, Cyril Brulebois wrote:
> Control: tag -1 pending
>
> Hello,
>
> Bug #1031643 in preseed reported by you has been fixed in the
> Git repository and is awaiting an upload. You can see the commit
> message below and you can check the diff of the f
Hi,
On Sun, Feb 19, 2023 at 07:39:02PM +0100, Cyril Brulebois wrote:
> Package: preseed
> Version: 1.113
> Severity: normal
> X-Debbugs-Cc: Salvatore Bonaccorso
>
> Filing this against preseed for visibility, after Salvatore Bonaccorso
> reported that D-I Bookworm Alp
Hi,
On Thu, Apr 28, 2022 at 09:04:52AM +0200, Moritz Muehlenhoff wrote:
> On Wed, Apr 27, 2022 at 11:29:00PM -0400, Theodore Ts'o wrote:
> > Neither seems to be security related. Are you sure this was correctly
> > filed against e2fsprogs?
>
> Apologies, I reported multiple incoming new issues f
Hi Bernhard,
On Tue, Feb 22, 2022 at 07:34:17AM +, Bernhard wrote:
> Hello Holger
> Hello Salvatore
>
> This bugfix also closes my installation report #1005693.
> Do you think, you can release 5.16.10-2 with this bugfix in the next
> days?
> Without this bugfix, installation of sid with iwlwi
Source: apt-setup
Version: 1:0.166
Severity: wishlist
Tags: d-i
X-Debbugs-Cc: car...@debian.org
Dear Debian Install System Team,
When installing bullseye with the current RC3 I noticed that while the
debconf menu suggests (and has selected) to add release updates suites
($codename-updates) to the
HI Cyril,
On Mon, Jul 26, 2021 at 06:14:09AM +0200, Cyril Brulebois wrote:
> @KT:
>
> I haven't uploaded it since I'm seeing iwlwifi requesting what appears
> to be a debug-only firmware (iwl-debug-yoyo.bin), that's even requested
> via an aptly-named firmware_request_nowarn() function in linux.g
Hi,
On Tue, May 19, 2020 at 08:24:27PM +0200, Valentin Vidić wrote:
> On Tue, May 19, 2020 at 07:23:21PM +0200, John Paul Adrian Glaubitz wrote:
> > Please see #926539 [1].
>
> Thanks, I have sent the patch for the driver instead:
>
> https://lkml.org/lkml/2020/5/19/854
This appears to be app
Control: retitle -1 unblock: linux/5.10.46-2
On Sun, Jul 11, 2021 at 10:35:15PM +0200, Paul Gevers wrote:
> Control: tags -1 d-i
>
> Hi,
>
> On 10-07-2021 22:15, Salvatore Bonaccorso wrote:
> > Hi release team, hi Cyril (specifically for d-i)
>
> So, le
Hi Cyril, Paul,
On Fri, May 28, 2021 at 10:54:32AM +0200, Salvatore Bonaccorso wrote:
> Control: retitle -1 unblock: linux/5.10.40-1
>
> Hi Paul, hi Cyril,
>
> On Thu, May 27, 2021 at 11:04:14AM +0200, Cyril Brulebois wrote:
> > Paul Gevers (2021-05-27):
> > >
Control: retitle -1 unblock: linux/5.10.40-1
Hi Paul, hi Cyril,
On Thu, May 27, 2021 at 11:04:14AM +0200, Cyril Brulebois wrote:
> Paul Gevers (2021-05-27):
> > Control: tags -1 confirmed d-i
> >
> > @boot: needs d-i ACK. As I believe you are aware of, the upload has
> > already happened.
> >
Is this bug still valid to be open?
The mentioned commit landed in 5.3-rc1, 4.19.54 and as well 4.9.183.
Regards,
Salvatore
Hi Cyril, hi Adam,
On Wed, Jul 22, 2020 at 07:24:39PM +0200, Cyril Brulebois wrote:
> Adam D. Barratt (2020-07-22):
> > This looks OK to me but, as libinput produces a udeb, it will need a
> > KiBi-ack.
>
> Out of the top of my head, I still haven't managed to get stuff into
> place from a hack
Hi,
On Sun, Aug 11, 2019 at 02:19:47PM +0100, Jonathan Wiltshire wrote:
> Hi,
>
> On Wed, Mar 20, 2019 at 08:43:08PM +0100, Christoph Biedl wrote:
> > Cyril Brulebois wrote...
> >
> > > p-u NEW usually gets frozen a week before the point release. Having the
> > > package to review/test a week be
Source: busybox
Version: 1:1.27.2-3
Severity: normal
Tags: patch security upstream
Forwarded: https://bugs.busybox.net/show_bug.cgi?id=11506
Hi,
The following vulnerability was published for busybox.
CVE-2018-20679[0]:
| An issue was discovered in BusyBox before 1.30.0. An out of bounds read
| i
Hi Cyril,
On Tue, May 15, 2018 at 10:49:46PM +0200, Cyril Brulebois wrote:
> Heya,
>
> Jonathan Wiltshire (2018-05-14):
> > We're due a point release any day now. Please indicate your
> > availablility out of:
> >
> > - May 26th (meaning freeze this coming weekend, which might be a big
> >
Hi
On Mon, Feb 05, 2018 at 11:52:28AM +0100, Chris Boot wrote:
> Version: 1:1.27.2-2
>
> Hi Salvatore,
>
> This was fixed in the last upload of busybox but the bug wasn't closed,
> sorry. I see that the security tracker has been updated already, though.
Thanks for the notice! Yes we did already
Source: busybox
Version: 1:1.27.2-1
Severity: grave
Tags: security
Hi,
the following vulnerability was published for busybox. I realize you
know of the issue already but just filling to have a tracking bug as
well in the BTS.
CVE-2017-16544[0]:
| In the add_match function in libbb/lineedit.c in
Hi Sven,
On Thu, Sep 07, 2017 at 08:20:34PM +0200, Sven Joachim wrote:
> On 2017-09-07 05:32 +0200, Salvatore Bonaccorso wrote:
>
> > Not a must, and note that is just a comment on my side, I'm not a SRM:
> > if possible add a bug closer as well to the changelog entry so
Hi Sven
On Wed, Sep 06, 2017 at 06:52:36PM +0200, Sven Joachim wrote:
> On 2017-07-19 20:30 +0200, Sven Joachim wrote:
>
> > Control: tags -1 - moreinfo
> >
> > On 2017-07-15 12:50 +0200, Sven Joachim wrote:
> >
> >> Control: tags -1 - confirmed
> >> Control: tags -1 + moreinfo
> >>
> >> On 2017-
Source: busybox
Version: 1:1.22.0-9
Severity: normal
Tags: security upstream patch
Hi,
the following vulnerability was published for busybox. The config
CONFIG_NTPD is not enabled by default, so this only would affect
rebuild packages. It is thus marked unimportant in the
security-tracker. Opened
Source: busybox
Version: 1:1.20.0-7
Severity: normal
Tags: security upstream fixed-upstream
Hi,
the following vulnerability was published for busybox, filling for
tracking purpose.
CVE-2016-2147[0]:
OOB heap write due to integer underflow
If you fix the vulnerability please also make sure to in
Source: busybox
Version: 1:1.20.0-7
Severity: normal
Tags: security upstream fixed-upstream
Hi,
the following vulnerability was published for busybox, filling for
tracking purpose.
CVE-2016-2148[0]:
heap overflow in OPTION_6RD parsing
If you fix the vulnerability please also make sure to includ
Hi Samuel,
On Mon, Apr 06, 2015 at 10:03:22PM +0200, Samuel Thibault wrote:
> Hello,
>
> Salvatore Bonaccorso, le Sat 04 Apr 2015 11:14:24 +0200, a écrit :
> > I prepared an update adding the two additional commits which seem
> > required as basis for the patch for CVE-2014
On Sat, Apr 04, 2015 at 11:14:24AM +0200, Salvatore Bonaccorso wrote:
> Hi Cyril, hi Samuel,
>
> On Fri, Apr 03, 2015 at 11:34:06PM +0200, Cyril Brulebois wrote:
> > Hi people,
> >
> > (adding debian-boot@ for reference.)
> >
> > Samuel Thibault (2015-0
Hi Cyril, hi Samuel,
On Fri, Apr 03, 2015 at 11:34:06PM +0200, Cyril Brulebois wrote:
> Hi people,
>
> (adding debian-boot@ for reference.)
>
> Samuel Thibault (2015-03-26):
> > Samuel Thibault, le Thu 26 Mar 2015 02:17:01 +0100, a écrit :
> > > Control: found -1 2.8.0+dfsg1-7+wheezy3
> > >
>
Hi Sam,
On Sat, Mar 07, 2015 at 09:02:17AM +1100, Sam McLeod wrote:
> Thanks Cyril, I did indeed miss that, that's great - I'll test it today.
>
> It looks like the example pressed hasn't been updated to include this
> feature: https://www.debian.org/releases/jessie/example-preseed.txt
This seem
Source: busybox
Version: 1:1.20.0-7
Severity: normal
Tags: security patch upstream fixed-upstream
Hi,
the following vulnerability was published for busybox.
CVE-2014-9645[0]:
modprobe wrongly accepts paths as module names
Upstream report is at [1] with fix at [2].
If you fix the vulnerability
Hi Florian,
On Fri, Oct 31, 2014 at 12:41:34PM +0100, Florian Lohoff wrote:
>
> Package: debian-installer
> Version: daily-20141030
> Architecture: amd64
>
> Hi,
> i am using the daily build of the netboot images as of yesterday.
>
> The Documentation at:
>
> https://www.debian.org/releases/je
Hi KiBi, hi Petter,
On Thu, Oct 17, 2013 at 02:26:49PM +0200, Cyril Brulebois wrote:
> Petter Reinholdtsen (2013-06-20):
> > Package: grub-installer
> > Version: 1.86
> > Severity: important
> > User: debian-...@lists.debian.org
> > Usertags: debian-edu
> >
> > We discovered this in Debian
Hi
I have a very similar problem, adding it here as it seems to have the same
origin. As mentioned by Petter, 1.86 introduced the follwoing change:
grub-installer (1.86) unstable; urgency=low
[ Vincent McIntyre ]
* Support menu selection of GRUB boot disk. Closes: #706112
-- Cyril Bruleboi
Package: installation-guide
Severity: normal
Tags: patch
Hi
During re-reading the installation-guide appendix it looks like there
are some reference to the old dhcp3-server package, renamed to
isc-dhcp-server.
Attached is proposed patch for the english version.
Regards,
Salvatore
Index: appendi
Package: installation-guide
Version: 20120826
Severity: minor
Tags: patch
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi
There is a small typo in the network configuration preseed example
snipped where we read the commented out entry as
#di netcfg/link_detection_timeout string 10
where th
Hi Christian
On Wed, Jan 12, 2011 at 06:04:36PM +0100, Christian PERRIER wrote:
> reassign 609704 installation-guide
> retitle 609704 Please document how to use preseed values to skip RAID1
> confirmation question
> thanks
>
> Quoting Salvatore Bonaccorso (car...@debian.
severity 609704 normal
tag 609704 + patch
thanks
Hi
I'm lowering the severity for the bugreport I have opened, it surely
more 'normal' with the following. Documentation is if I see correctly
the 'issue' missing the partman-md/confirm_nooverwrite and
partman-lvm/confirm_nooverwrite parts.
If I a
Hi
One further note: I will try to provide more information tomorrow
again having access to machine on which I tested this.
Bests
Salvatore
signature.asc
Description: Digital signature
Package: debian-installer
Severity: important
Tags: d-i
Hi
Trying to preseed RAID1 partitioning leads always to have to confirm
question before partitioning. The error is like
---(error)--
Partition disks
---
Before RAID ca
Package: rootskel
Version: 1.92
Severity: normal
Hi
Installing squeeze (kfreebsd-amd64) with d-i Squeeze installer, beta2
when using method to continue installation remotely via SSH result
then in a 'broken' looking terminal, after logging in via ssh, giving
an error like:
S40term-kfreebsd: line
88 matches
Mail list logo