Bug#851774: [Bug 1754075] Re: apt-setup uses apt-key but probably should not anymore

2019-05-10 Thread Moritz Mühlenhoff
On Mon, Apr 09, 2018 at 01:14:37PM +0200, Lars Kollstedt wrote: > On Monday, 9 April 2018 12:56:12 CEST Lars Kollstedt wrote: > [...] > > This patch should IMHO work, but I have no opportunity to test it without > > your help, since we're in udeb and testing preseed issues. ;-) > > Hi again, > >

Bug#851774: Bug#928931: more info

2019-07-01 Thread Moritz Mühlenhoff
On Mon, Jul 01, 2019 at 08:40:22PM +0200, Raphaël Halimi wrote: > Hi Cyril, > > Le 29/06/2019 à 16:20, Cyril Brulebois a écrit : > >> If installing gnupg is what it takes to fix the bug, IMHO it should be > >> done; anyway, with this patch, it would be installed only if a local > >> repository wit

Re: Bug#932175: stretch-pu: package openssh/1:7.4p1-10+deb9u7

2019-08-05 Thread Moritz Mühlenhoff
On Sat, Jul 27, 2019 at 12:34:38PM +0200, Cyril Brulebois wrote: > Adam D. Barratt (2019-07-26): > > On 2019-07-16 06:36, Moritz Muehlenhoff wrote: > > > This update for OpenSSH fixes a dead lock in AuthorizedKeysCommand > > > (#905226). > > > > > > The fixed package is running fine on a formerly

Re: Scheduling final Jessie point release, 8.11

2018-05-14 Thread Moritz Mühlenhoff
On Mon, May 14, 2018 at 06:26:08PM +0100, Jonathan Wiltshire wrote: > Hi, > > According to my records main security support for Jessie can end any time > after 17th June. > > So to the security team: do you have a date in mind? The 17th :-) Cheers, Moritz

Bug#875858: pkgsel: Offer to install/manage unattended-upgrades

2018-05-18 Thread Moritz Mühlenhoff
retitle 875858 Revert default installation of unattended-upgrades thanks [Resending since the earlier unarchive wasn't effective yet, so the followup got lost] Moritz Mühlenhoff wrote: > On Thu, Jan 04, 2018 at 01:31:25PM +0100, Raphael Hertzog wrote: > > OK, putting team@securi

Bug#875858: pkgsel: Offer to install/manage unattended-upgrades

2018-05-27 Thread Moritz Mühlenhoff
On Fri, May 18, 2018 at 11:53:42PM +0200, Cyril Brulebois wrote: Sorry for the late reply, busy and backlogged in my inbox. > > > That's pointless until testing becomes stable and by then it's too > > > late, this needs to be disabled now. > > Do you have minutes/rationales or something that ca

Bug#918846: busybox: CVE-2018-20679

2019-02-08 Thread Moritz Mühlenhoff
On Wed, Jan 09, 2019 at 09:39:33PM +0100, Salvatore Bonaccorso wrote: > Source: busybox > Version: 1:1.27.2-3 > Severity: normal > Tags: patch security upstream > Forwarded: https://bugs.busybox.net/show_bug.cgi?id=11506 > > Hi, > > The following vulnerability was published for busybox. > > CVE-

Re: Bug#922179: shim-signed depends on packages not repos

2019-02-26 Thread Moritz Mühlenhoff
On Fri, Feb 15, 2019 at 07:28:57PM +0100, Cyril Brulebois wrote: > Right, this also breaks the build of the debian-installer source package > on amd64 since its build dependencies cannot be satisfied. Is there an ETA for a fix? Cheers, Moritz

Bug#1035854: Bookworm netboot image fails in VM

2023-05-10 Thread Moritz Mühlenhoff
Moritz Muehlenhoff wrote: > call. $MENU is set to '/usr/bin/main-menu' and in fact running > > "debconf -o d-i /usr/bin/main-menu" tries to emit some output (I can see the > cursor > moving), but drops back to the shell right away. > > I'm not familiar with cdebconf, if there's some suggested st

Bug#1055307: busybox: CVE-2023-39810

2023-11-03 Thread Moritz Mühlenhoff
Source: busybox X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for busybox. CVE-2023-39810[0]: | An issue in the CPIO command of Busybox v1.33.2 allows attackers to | execute a directory traversal. https://www.pentagrid.ch

Bug#1059049: busybox: CVE-2022-48174

2023-12-19 Thread Moritz Mühlenhoff
Source: busybox X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for busybox. CVE-2022-48174[0]: | There is a stack overflow vulnerability in ash.c:6030 in busybox | before 1.35. In the environment of Internet of Vehicles, th

Bug#1059051: busybox: CVE-2023-42364

2023-12-19 Thread Moritz Mühlenhoff
Source: busybox X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for busybox. CVE-2023-42364[0]: | A use-after-free vulnerability in BusyBox v.1.36.1 allows attackers | to cause a denial of service via a crafted awk pattern i

Bug#1059050: busybox: CVE-2023-42363

2023-12-19 Thread Moritz Mühlenhoff
Source: busybox X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for busybox. CVE-2023-42363[0]: | A use-after-free vulnerability was discovered in xasprintf function | in xfuncs_printf.c:344 in BusyBox v.1.36.1. https://bug

Bug#1059052: busybox: CVE-2023-42365

2023-12-19 Thread Moritz Mühlenhoff
Source: busybox X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for busybox. CVE-2023-42365[0]: | A use-after-free vulnerability was discovered in BusyBox v.1.36.1 | via a crafted awk pattern in the awk.c copyvar function.

Bug#1059053: busybox: CVE-2023-42366

2023-12-19 Thread Moritz Mühlenhoff
Source: busybox X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for busybox. CVE-2023-42366[0]: | A heap-buffer-overflow was discovered in BusyBox v.1.36.1 in the | next_token function at awk.c:1159. https://bugs.busybox.ne

Bug#782573: Installation on Thinkpad X250 worked fine

2015-04-14 Thread Moritz Mühlenhoff
On Tue, Apr 14, 2015 at 03:44:37PM +0200, Cyril Brulebois wrote: > I doubt we'll change anything in templates at this point (strings need > to be translated), but we already have: > https://www.debian.org/releases/testing/amd64/ch02s02.html > https://www.debian.org/releases/testing/amd64/ch06s0

Re: Dropping kfreebsd-8?

2013-06-17 Thread Moritz Mühlenhoff
On Mon, Jun 17, 2013 at 12:00:45AM +0100, Steven Chamberlain wrote: > On 16/06/13 19:57, Moritz Mühlenhoff wrote: > > Wheezy has both kfreebsd-8 and kfreebsd-9. Shouldn't kfreebsd-8 be dropped > > now? > > Some other things I'm wondering about are: > > s

Bug#875858: pkgsel: Offer to install/manage unattended-upgrades

2017-12-10 Thread Moritz Mühlenhoff
On Fri, Sep 15, 2017 at 03:27:58PM +0100, Steve McIntyre wrote: > On Fri, Sep 15, 2017 at 11:45:13AM +0200, Raphaël Hertzog wrote: > >Source: pkgsel > >Version: 0.45 > >Severity: wishlist > > > >Ubuntu has a patch adding a "pkgsel/update-policy" debconf question which > >is used to control the inst

Bug#875858: pkgsel: Offer to install/manage unattended-upgrades

2017-12-17 Thread Moritz Mühlenhoff
On Tue, Dec 12, 2017 at 09:23:50AM +0100, Raphael Hertzog wrote: > > But my experience has mostly been with regular package updates. I haven't > > focused much on security updates. Can security updates be applied with out > > generating dependency chains and their updates? > > Yes. I am seriousl

Bug#875858: pkgsel: Offer to install/manage unattended-upgrades

2018-01-02 Thread Moritz Mühlenhoff
Hi, Sorry for the late reply, busy over the holiday season. On Mon, Dec 18, 2017 at 12:12:08PM +0100, Raphael Hertzog wrote: > Hi, > > On Sun, 17 Dec 2017, Moritz Mühlenhoff wrote: > > unattended-upgrades are not an appropriate default. It's okay for a desktop > > syst