Re: should the Release Notes be updated concerning trixie security

2025-07-13 Thread Holger Levsen
On Sun, Jul 13, 2025 at 01:17:36AM +0200, Santiago Ruano Rincón wrote: > (CCing the actual security team address - team@s.d.o) being lazy I'm replying to this mail though this is actual an reply to > El 12/07/25 a las 22:04, Paul Gevers escribió: > > The text about golang and rustc and chromium

Re: Resurrecting the Securing Debian Manual

2025-06-11 Thread Holger Levsen
hi, I also should have thrown in some more URLs, namely: https://jenkins.debian.net/userContent/debian-edu-doc/debian-edu-doc-en/debian-edu-bookworm-manual.html https://jenkins.debian.net/userContent/debian-edu-doc/debian-edu-doc-en/debian-edu-bookworm-manual.pdf https://jenkins.debian.net/userCon

Re: Resurrecting the Securing Debian Manual

2025-06-11 Thread Holger Levsen
On Mon, Jun 09, 2025 at 04:43:47PM +, Holger Levsen wrote: > https://wiki.debian.org/DebianEdu/Documentation/Trixie (or Bookworm or many > earlier relases) is an example where this is being done, using translations > via > .po files (nowadays mostly translated via weblate

Re: Resurrecting the Securing Debian Manual

2025-06-09 Thread Holger Levsen
Hi Noah, On Mon, Jun 09, 2025 at 12:20:36PM -0400, Noah Meyerhans wrote: > Most basically, I wonder if folks think this is a worthy idea. I do think so! Thanks for your initiative, I do hope it will fly! > My inclination is to primarily focus on general principles rather than > try to document

Bug#1040914: dev-ref: update best practices around security (Re: Securing Debian Manual too old?)

2023-07-12 Thread Holger Levsen
package: developers-reference x-debbugs-cc: debian-security@lists.debian.org hi, On Tue, Jul 11, 2023 at 10:46:20PM +0200, Moritz Mühlenhoff wrote: > > I found the Securing Debian Manual > > (https://www.debian.org/doc/manuals/securing-debian-manual/index.en.html). > > This version is from 2017.

Re: CVE-2017-5715

2022-03-30 Thread Holger Levsen
On Wed, Mar 30, 2022 at 09:36:58AM +0200, Sylvestre Ledru wrote: > Le 30/03/2022 à 07:07, Salvatore Bonaccorso a écrit : > > Sylvestre and Holger, would you have time to include the bugfix as > > well in the future bullseye point release? > Sure, should be easy. > Is there a timeline? as the last

thank *you*, team@security.d.o! (was Re: [SECURITY] [DSA 5000-1] openjdk-11 security update)

2021-11-01 Thread Holger Levsen
hey hey, hear hear! On Mon, Nov 01, 2021 at 07:44:34PM +, Moritz Muehlenhoff wrote: > - > Debian Security Advisory DSA-5000-1 secur...@debian.org WHHO! that's *something* to *celebrate*!!1 Very

Re: sources.list 4 bullseye-security

2021-06-28 Thread Holger Levsen
On Sun, Jun 27, 2021 at 04:52:26PM -0400, Boyuan Yang wrote: > Besides, I believe end users are not supposed to know deb-src line for > security repos. sure, they do! and of course we provide source for our security updates! > Adding such info provides zero benefit except for confusing > users.

Bug#989307: DSA-4923-1: upgrading libwebkit2gtk-4.0-37 on buster pulls in xdg-desktop-portal

2021-05-31 Thread Holger Levsen
Package: libwebkit2gtk-4.0-37 Version: 2.32.1-1~deb10u1 Severity: normal Dear Maintainer, from #debian-security today, Salvatore asked me to file this as a bug. < h01ger> DSA 4923 causes xdg-desktop-portal(-gtk) to be installed here, much to my surprise and unhappyness < h01ger> its a recommend

Re: "Version less than 0.0" in OVAL definitions

2021-05-16 Thread Holger Levsen
On Sun, May 16, 2021 at 05:21:50PM +0300, Serkan Özkan wrote: > We are using Debian OVAL definitions but there are many tests, and states, > that test for dpkg versions being less than 0.0 which is impossible in > practice (right?). no, it's possible: 0~1 is a valid version. It's smaller than zer

fun with mailinglists (was Re: Is chromium updated?)

2020-11-13 Thread Holger Levsen
On Fri, Nov 13, 2020 at 12:06:50PM +0200, Georgi Guninski wrote: > On Fri, Nov 13, 2020 at 10:21 AM Pavlos Ponos wrote: > > BUT we should not forget to say a THANK YOU to these guys which give their > > best in order all of us to use this OS for free ;-) > I believe I am debian contributor too, s

how to deal with widely used packages unsuitable for stable (was Re: [Git][security-tracker-team/security-tracker][master] Add radare2 to dla-needed.txt with comments.)

2019-08-29 Thread Holger Levsen
hi, (this started as a discussion whether to update radare2 in (old)stable and has since then evolved into a discussion about the problem summarized well by Raphael.) On Thu, Aug 29, 2019 at 01:48:14PM +0200, Raphael Hertzog wrote: > On Thu, 29 Aug 2019, Moritz Mühlenhoff wrote: > > The upstream

Re: [Git][security-tracker-team/security-tracker][master] Add radare2 to dla-needed.txt with comments.

2019-08-16 Thread Holger Levsen
On Fri, Aug 16, 2019 at 08:11:58PM +, Markus Koschany wrote: > Markus Koschany pushed to branch master at Debian Security Tracker / > security-tracker > > Commits: > bc35662f by Markus Koschany at 2019-08-16T20:11:47Z > Add radare2 to dla-needed.txt with comments. > > - - - - - > 1 changed f

Re: Intel Microcode updates

2019-06-11 Thread Holger Levsen
On Wed, Jun 12, 2019 at 03:05:13AM +1000, Andrew McGlashan wrote: > Exploiting the flaws needs malicious code to be running on your box. If > you are in total control over all VMs and processes on the box, then you > should be good. do you use a webbrowser with javascript enabled? -- tschau,

Re: rssh security update breaks rsync via Synology's "hyper backup"

2019-02-14 Thread Holger Levsen
Hi Roman, the security team is not responsible for Debian LTS, I've thus added debian-lts@lists.d.o to the mail recipients, so that they become aware of your issue. On Thu, Feb 14, 2019 at 06:06:34PM +0100, Roman Medina-Heigl Hernandez wrote: > Hi security-fellows, > > I applied recent rssh sec

Re: Should easter eggs be disabled in Debian's php packages?

2019-01-18 Thread Holger Levsen
On Fri, Jan 18, 2019 at 01:58:12PM +0800, Paul Wise wrote: > > To answer my own question, after PHP 5.5 the easter egg was removed already. > So the issue would only be present in wheezy. I guess the ELTS folks > might like to disable them. I don't think the behaviour of php should be changed at t

Re: Gaps in security coverage?

2018-11-06 Thread Holger Levsen
On Tue, Nov 06, 2018 at 07:08:20PM +0800, Paul Wise wrote: > Bug#908678: security-tracker - Breaks salsa.d.o thank you. -- cheers, Holger --- holger@(debian|reproducible-builds|layer-acht).org

Re: Gaps in security coverage?

2018-11-06 Thread Holger Levsen
On Tue, Nov 06, 2018 at 02:42:59PM +0800, Paul Wise wrote: > Also, a much more important task is restructuring the git repo so that > it doesn't cause responsiveness and resource usage issues with salsa. is there a bug or wiki page describing the issues/requirements for that and what has been trie

Re: powerpc update for amd64

2018-03-04 Thread Holger Levsen
On Sun, Mar 04, 2018 at 04:07:14PM +0100, SZÉPE Viktor wrote: > Why should one using an amd64 hardware update its kernel/reboot when changes > are only for powerpc? you should not. (or maybe you should so your monitoring will not complain about running an outdated kernel.) however, because the s

Re: retpoline-enabled GCC build for jessie

2018-02-17 Thread Holger Levsen
On Sat, Feb 17, 2018 at 02:35:22PM +0100, Moritz Mühlenhoff wrote: > The update for gcc-4.9 has just been released. > Test packages for gcc-6/stretch are now available at > https://people.debian.org/~jmm/gcc6/ Thanks for your work on this, Moritz. I have a stupid/uninformed question: is this gc

Re: Is packages build without verifying the source package signatures?

2017-12-03 Thread Holger Levsen
On Sun, Dec 03, 2017 at 01:11:50PM +0100, Bastian Blank wrote: > It would still only need to compromise one machine: The one from where > the keys are handled and distributed. I rest my case. I'd secure the front door even if the side door (atm still) can be compromised easy. -- cheers,

Re: Is packages build without verifying the source package signatures?

2017-12-03 Thread Holger Levsen
On Sun, Dec 03, 2017 at 12:05:51PM +0100, Bastian Blank wrote: > > in practice, this also has obvious flaws. > Please elaborate. for a start: one only needs to compromise one machine instead of many... > > what's the technical reason > > the buildds are n

Re: Is packages build without verifying the source package signatures?

2017-12-03 Thread Holger Levsen
On Sun, Dec 03, 2017 at 12:38:24PM +0800, Paul Wise wrote: > The Debian buildds only do the first verification (due to all Debian > package uploader keys not being installed) but the Debian archive > verifies that all uploads match a known developer key before passing > packages to the buildds. So

Re: [buildd-tools-devel] Some Debian package upgrades are corrupting rsync "quick check" backups

2017-05-13 Thread Holger Levsen
On Sat, May 13, 2017 at 10:48:18PM +0200, Aurelien Jarno wrote: > The above change should now be deployed on most jessie based buildds, > it's only missing on the buildds that are currently down. cool, thank you! -- cheers, Holger signature.asc Description: Digital signature

Re: [buildd-tools-devel] Some Debian package upgrades are corrupting rsync "quick check" backups

2017-05-13 Thread Holger Levsen
On Sat, May 13, 2017 at 05:52:04PM +0200, Mattia Rizzolo wrote: > On Sat, May 13, 2017 at 03:44:57PM +0100, Chris Lamb wrote: > > a) Has anything changed in the meantime? > > Yes: sbuild stopped repeating the changelog time taking it from the last > entry, and will instead generate a new timestam

Re: Some Debian package upgrades are corrupting rsync "quick check" backups

2017-01-30 Thread Holger Levsen
On Mon, Jan 30, 2017 at 02:47:45PM +0100, Johannes Schauer wrote: > > (the sbuild maintainer reads the above list which has been cc:ed so he > > should be able to comment…) > > You were talking about buildd-tools-de...@lists.alioth.debian.org yes > You forgot to CC that one (I understood that wa

Re: Some Debian package upgrades are corrupting rsync "quick check" backups

2017-01-30 Thread Holger Levsen
On Mon, Jan 30, 2017 at 01:10:12PM +0100, Mattia Rizzolo wrote: > > Would reproducible-bui...@lists.alioth.debian.org be the correct mailing > > list to discuss this? the debian-buildd list or a bug against sbuild might be more appropriate… (the sbuild maintainer reads the above list which has b

Re: Some Debian package upgrades are corrupting rsync "quick check" backups

2017-01-28 Thread Holger Levsen
On Sat, Jan 28, 2017 at 03:04:56PM +0100, Daniel Reichelt wrote: > I highly suspect this stems from packages' rules files supporting > reproducible builds. I rather think this is due to binNMUs not modifying debian/changelog… (in the source package while it's modified in the binary packages…) --

Re: Handling of "malware" in Debian

2016-11-09 Thread Holger Levsen
On Wed, Nov 09, 2016 at 07:14:45PM +0100, W. Martin Borgert wrote: > If users of testing or unstable have the malware installed now and > the package gets removed from the archive, users are left with the > malware, right? yes > That's why I thought about uploading an empty package to unstable,

Re: Handling of "malware" in Debian

2016-11-09 Thread Holger Levsen
On Wed, Nov 09, 2016 at 05:35:20PM +0100, W. Martin Borgert wrote: > Quoting Holger Levsen : > >I think so. And I also think this should be done. > >and, who's gonna file the RM bug for unstable? > I would RM for buster, because users of stretch might already be affected.

Re: Handling of "malware" in Debian

2016-11-09 Thread Holger Levsen
On Wed, Nov 09, 2016 at 04:17:58PM +0100, W. Martin Borgert wrote: > Would NEWS.Debian be sufficient? I think so. And I also think this should be done. and, who's gonna file the RM bug for unstable? -- cheers, Holger signature.asc Description: Digital signature

Re: flashplugin-nonfree and latest Flash security updates

2016-08-03 Thread Holger Levsen
On Thu, Aug 04, 2016 at 02:14:55AM +, Nick Boyce wrote: > > Just don't use that crap. With the amount of zero days in Flash > > you're subject to serious vulnerabilities even with an up-to-date > > plugin. > [...] Also I > believe there are quite a few corporate intranet use-cases that *depend

Re: flash plugin from ubuntu (was: flashplugin-nonfree and latest Flash security updates)

2016-08-03 Thread Holger Levsen
On Wed, Aug 03, 2016 at 10:46:33PM +0200, Stefan Fritsch wrote: > Maybe the flashplugin-nonfree package should even be replaced by a package > that > installs the ubuntu archive signing key, sets up the sources.list line, and > tweaks the unattended-updates config to allow automatic updates from

Re: Call for testing: upcoming wordpress security update

2016-08-02 Thread Holger Levsen
On Tue, Aug 02, 2016 at 04:37:31PM +0200, Jakub Wilk wrote: > Wiki is world-writable. It's safe to assume that everything there is > nonsense unless proven otherwise. It's also safe to assume that we'll al die one day, though that's also not very helpful. A useful first step to assess the qualil

Re: httpoxy efforts?

2016-07-20 Thread Holger Levsen
Hi Christoph, your email doesnt mention whether you searched the BTS for relevant bugs about these issues. Have you? And if there are no bugs filed yet, someone should file bugs. :-) -- cheers, Holger signature.asc Description: Digital signature

Re: the frustrated administrivia and misdirection hose lacks any abatement visible to mortals

2016-05-24 Thread Holger Levsen
Hi Drake, On Tue, May 24, 2016 at 01:32:08PM +0800, Paul Wise wrote: > > Lacking any obvious way to talk to the security team without potentially > > making my > > message look more urgent than it was, I leave it to whoever else can > > navigate the > > Debian social structure to take it up in t

Re: Which Debian packages leak information to the network?

2016-05-18 Thread Holger Levsen
On Wed, May 18, 2016 at 06:33:52PM +0200, Jakub Wilk wrote: > Could you explain how any of these tools leak any information "without a > user's consent/expectation"? gnome-calculator contacts a web page/service with currency exchange information *on every start*, I think that's a good example of t

Re: Should Debian ask for a CPE when a CVE in Debian is found?

2016-02-15 Thread Holger Levsen
Hi, On Samstag, 13. Februar 2016, Paul Wise wrote: > On Sat, Feb 13, 2016 at 2:51 AM, Wheeler, David A wrote: > > Should Debian's security team ask for a Common Platform Enumeration (CPE) > > id when a related CVE is found/reported fixed? > > The debian-security list is a general Debian security

Re: Security support incomplete? (was: Re: [SECURITY] [DSA 3455-1] curl security update)

2016-02-02 Thread Holger Levsen
Hi Wolfgang, On Dienstag, 2. Februar 2016, Wolfgang Jeltsch wrote: > • Where does the tracker talk about security policies? (I actually > doubt that such information is in the tracker at all.) That's out of scope for the tracker indeed, however right now I dont know where to find such poli

Re: [SECURITY] [DSA 3448-1] linux security update

2016-01-20 Thread Holger Levsen
Hi, On Mittwoch, 20. Januar 2016, Bjoern Nyjorden wrote: > Most appreciated. So, just to confirm; my take away on this is: > > * 1. "Wheezy" Linux kernels are NOT AFFECTED. > > * 2. "Wheezy" & "Jessie" BACKPORTS Linux kernels are VUNERABLE. > > If I have understood correctly? yes! cheer

Re: [SECURITY] [DSA 3448-1] linux security update

2016-01-19 Thread Holger Levsen
Hi Bjoern (bcc:ed), On Mittwoch, 20. Januar 2016, Bjoern Nyjorden wrote: > Are the "Wheezy" Linux kernels affected as well, or are they currently > okay as far as you know? on debian-backports@l.d.o Ben wrote: > [...] It's fixed in jessie and sid, > and doesn't affect anything older. {wheezy,j

Re: apt-build - Authentication warning overridden. - security issue?

2015-03-19 Thread Holger Levsen
Hi, On Donnerstag, 19. März 2015, Patrick Schleizer wrote: > > I think you probably just need to run "apt-get update" before "apt-get > > install"... > I did that, I am sure of it. Reproduced this on two different systems. can you put the output of "apt-get update" and "apt-cache policy" on past

Re: apt-build - Authentication warning overridden. - security issue?

2015-03-19 Thread Holger Levsen
Hi, I think you probably just need to run "apt-get update" before "apt-get install"... It's definitly not a security issue deserving the attention of the security team. cheers, Holger signature.asc Description: This is a digitally signed message part.

Re: Security EOL within Debian Stable

2015-02-07 Thread Holger Levsen
On Samstag, 7. Februar 2015, Jan Wagner wrote: > it would be great if you would open a bug against the > debian-security-support package if there isn't one pending yet. #776904 please mark chromium as unsupported in wheezy signature.asc Description: This is a digitally signed message part.

Re: [SECURITY] [DSA 3148-1] chromium-browser end of life

2015-02-05 Thread Holger Levsen
Hi, On Donnerstag, 5. Februar 2015, Paul van der Vlis wrote: > There was always a year security support for oldstable. you are right with that. cheers, Holger signature.asc Description: This is a digitally signed message part.

Re: [SECURITY] [DSA 3148-1] chromium-browser end of life

2015-02-04 Thread Holger Levsen
Hi, On Donnerstag, 5. Februar 2015, Paul van der Vlis wrote: > Iceweasel support for oldstable stopped at 24 Mar 2009: > Icedove support for oldstable stopped at 12 Jul 2009: > Icedove security support for oldstable stopped at 09 Mar 2011: > The security support of Iceweasel for oldstable stopped

Re: security issues in backports (Re: [SECURITY] [DSA 3027-1] libav security update

2014-09-18 Thread Holger Levsen
Hi, On Donnerstag, 18. September 2014, Holger Levsen wrote: > I'm working on getting > https://security-tracker.debian.org/tracker/status/release/stable-backport > s meaningful for this task. Give me some more days... ;-) for those not familar with the current security-tracker de

security issues in backports (Re: [SECURITY] [DSA 3027-1] libav security update

2014-09-18 Thread Holger Levsen
Hi, On Donnerstag, 18. September 2014, Henrique de Moraes Holschuh wrote: > There is one thing that would be of great value: We need someone to go > over the debian-backports packages for pending security updates, and > notify the maintainers of the backports or the backports ML. I'm working on

Re: concrete steps for improving apt downloading security and privacy

2014-07-22 Thread Holger Levsen
Hi Hans, On Mittwoch, 16. Juli 2014, Hans-Christoph Steiner wrote: > What I'm talking about already exists in Debian, but is rarely used. > dpkg-sig creates a signature that is embedded in the .deb file. So that > means no matter how the .deb file got onto a system, that signature can be > verif

Re: concrete steps for improving apt downloading security and privacy

2014-07-16 Thread Holger Levsen
Hi, On Mittwoch, 16. Juli 2014, Michael Stone wrote: > Yes you are--what you described is exactly how the Release files work. Well, there are (many) other .debs on the net which are not part of our releases, so it still seems to me that making .changes files accessable in standardized ways coul

Re: concrete steps for improving apt downloading security and privacy

2014-07-15 Thread Holger Levsen
Hi, On Dienstag, 15. Juli 2014, Michael Stone wrote: > Except that you haven't addressed *at all* why the current mechanism is > insufficient, except that you don't like it and want to do something > else instead. AIUI Hans-Christoph wants something else _also_, not instead. And technically I t

getting rid of md5 hashes

2014-04-04 Thread Holger Levsen
Hi, as I've just been affected by "#700266 fetchmail: --sslfingerprint uses MD5" I wonder if someone is tracking all the bugs related to using md5 hashes kind of like how we track bugs in software not supporting ipv6. User debian-security@lists.debian.org Usertag 700266 md5 maybe? cheers,

Re: Compromising Debian Repositories

2013-08-07 Thread Holger Levsen
Hi Paul, On Montag, 5. August 2013, Paul Henning wrote: > Yes, kick Kurt Roeckx from his admin privileges to start. It's the easiest > most basic thing you can do. [more FUD deleted] are you paid by some three or four letter agency to spread FUD? cheers & sorry, I couldnt resist, Holger

Re: [SECURITY] [DSA 2628-1] nss-pam-ldapd security update

2013-02-19 Thread Holger Levsen
Hi, On Dienstag, 19. Februar 2013, Alex Antener wrote: > > mama fragt ob wir am sonntag zum lasagne essen kommen wollen :-) > Gern! - Ort & Zeit? are we invited as well? Whats the exact address? (But beware, this list has >10k subscribers :-) cheers, Holger -- To UNSUBSCRIBE, email

Re: SELinux on Squeeze?

2011-12-31 Thread Holger Levsen
Dear Russell, On Freitag, 30. Dezember 2011, Russell Coker wrote: > I can't imagine what the benefit would be in using "official" packages that > I created and uploaded to Debian over using "unofficial" packages that I > created and couldn't get in a Squeeze update Frankly, your lack of imaginat

Re: Bug#645881: critical update 29 available

2011-12-11 Thread Holger Levsen
On Sonntag, 11. Dezember 2011, Matthias Klose wrote: > the DLJ bundles were created because you are not allowed to re-distribute > the jdk packages from oracle. Did that change recently? I believe inside an organisation I can rebundle their bundles to my prefered kind of bundle, that is, form of

Re: Bug#645881: critical update 29 available

2011-12-11 Thread Holger Levsen
Hi, I forgot: On Sonntag, 11. Dezember 2011, Holger Levsen wrote: > $ debdiff sun-java6_6.26-3.dsc sun-java6_6.29-1.dsc|diffstat > debian/changelog |8 > debian/rules |6 > jdk-6u26-dlj-linux-amd64.bin |327520 > ---

Re: Bug#645881: critical update 29 available

2011-12-11 Thread Holger Levsen
@@ +sun-java6 (6.29-1) unstable; urgency=low + + * Non-maintainer upload. + * New upstream version to fix + http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html#AppendixJAVA + + -- Holger Levsen Wed, 23 Nov 2011 18:49:02 +0100 + sun-java6 (6.26-3) unstable

Re: DSA-2141-2

2011-01-09 Thread Holger Levsen
Hi, On Montag, 10. Januar 2011, Hugh McDonald wrote: > This advisory would be more useful to an administrator if package "nss" > were known to "http://www.debian.org/packages";, or if it contained > references to the affected debian package or packages. http://packages.qa.debian.org/nss and/or

Re: [SECURITY] [DSA 1747-1] New glib2.0 packages fix arbitrary code execution

2009-03-20 Thread Holger Levsen
Hi, On Freitag, 20. März 2009, Eduardo M KALINOWSKI wrote: > So as if vacation messages were not enough, now we have nonsense replies? and yet more nonsense replies. if you mind those mistakes (which happen because 3 people are subscribed to d-s-a and people are people), why do you annoy 35

Re: Potential expoits via application launchers (aka .desktop files)

2009-02-12 Thread Holger Levsen
Hi, On Donnerstag, 12. Februar 2009, Michael S. Gilbert wrote: > I'll wait for lenny to > get out the door rather than submitting these apparently complex and > difficult security (and hence release-critical) issues at the last > minute. Please dont hesitate to file bugs (unless the issue at hand

Re: Scalable Debian vulnerability tracking [REDUX]

2009-01-07 Thread Holger Levsen
Hi Sheldon, this sounds like an interesting project, please keep us posted! On Mittwoch, 7. Januar 2009, Sheldon Hearn wrote: > On Wednesday 07 January 2009 00:24:09 R. W. Rodolico wrote: > > I have a package that we have been working on for a while that might > > be a good starting point. > > >

Re: Keeping the webserver safe

2008-10-08 Thread Holger Levsen
Hi Kovács, On Wednesday 08 October 2008 10:25, Kovács Zoltán wrote: > I would call the attention to my contributed work, a Wiki at > http://free.coedu.hu/ describing a step-by-step install procedure making > a (relatively) safe Debian Etch LAMP server. The procedure contains: What you write here

Re: Kernel upgrade for 3Ware Driver issues?

2008-04-24 Thread Holger Levsen
Hi, On Wednesday 23 April 2008 13:24, Rolf Kutz wrote: > Ack. But there should be a way to fix rc-bugs even > after release. There is. Even for ("only") important bugs. The howto in short: have a bug with patch in the BTS, send mail to debian-release and ask about this bug to be allowed to be

Re: oCERT

2008-04-14 Thread Holger Levsen
Hi, [removed some of the cc:s] On Sunday 13 April 2008 02:23, Andrea Barisani wrote: > We already agreed that CC-BY-NC is not open enough, that's why we will > consider CC-BY. > > I believe that license address your concerns, right? If its CC-BY 3.0, yes. 2.5 is not good enough, afaik ;) regar

Re: Is oldstable security support duration something to be proud of?

2008-03-11 Thread Holger Levsen
Hi Marc, and everybody else: please dont feed the troll. He was well known from debian-release@, now debian-www@ and debian-security@ know him as well and he will probably proceed to another channel. Business as usual on the internet. I expect you received silly spam today too, do you want to

Re: [SECURITY] [DSA 1378-1] New Linux 2.6.18 packages fix several vulnerabilities

2007-09-28 Thread Holger Levsen
Hi, On Friday 28 September 2007 14:45, Johannes Wiedersich wrote: > IIRC, this should apply only to upgrades from sarge. It's covered in > Etch's release notes [1]. I stand corrected, thanks for pointing this out. > [1] > http://www.de.debian.org/releases/stable/i386/release-notes/ch-upgrading.e

Re: [SECURITY] [DSA 1378-1] New Linux 2.6.18 packages fix several vulnerabilities

2007-09-28 Thread Holger Levsen
Hi, On Friday 28 September 2007 14:32, Marcin Owsiany wrote: > It's just a warning, so not _that_ bad... Not that bad, but everytime I see it, I think "bad QA", which is bad. regards, Holger pgp2YO9Lmyjk8.pgp Description: PGP signature

Re: [SECURITY] [DSA 1378-1] New Linux 2.6.18 packages fix several vulnerabilities

2007-09-28 Thread Holger Levsen
Hi, On Friday 28 September 2007 11:18, Jan Wagner wrote: > > Running postinst hook script /sbin/update-grub. > > You shouldn't call /sbin/update-grub. Please call /usr/sbin/update-grub > > instead! > you need to modify /etc/kernel-img.conf! I believe this happens with a freshly installed etch sys

Re: [SECURITY] [DSA 1258-1] New Mozilla Firefox packages fix several vulnerabilities

2007-02-07 Thread Holger Levsen
Hi Noah, On Wednesday 07 February 2007 17:36, Noah Meyerhans wrote: > The errors have already been corrected: > http://www.debian.org/security/2007/dsa-1258 This is great, as the work of the security team usually is. But still, people are subscribed to the lists and it would be nice, if they cou

Re: [SECURITY] [DSA 1258-1] New Mozilla Firefox packages fix several vulnerabilities

2007-02-07 Thread Holger Levsen
Hi, On Wednesday 07 February 2007 14:07, Martin Schulze wrote: > Lalala WTF? At least you used a proper from:-header... Could you *please* correct your errors (which are no problem per se) correct in a professional way? Thanks. regards, Holger pgpICbKzWByXh.pgp Description: PGP

Re: What's going on with advisory for phpmyadmin?

2005-10-29 Thread Holger Levsen
Hi, On Saturday 29 October 2005 05:53, Horms wrote: > On Fri, Oct 28, 2005 at 04:26:43PM +0100, Steve Kemp wrote: > > If it is useful I could begin sending out a form response, something > > like "Yes we recieved your report, yes we will fix it, please have > > patience". > I think some sort o

Re: Request for example tripwire policy files for "/var"

2005-05-19 Thread Holger Levsen
Hi, On Wednesday 18 May 2005 16:18, Thomas Bushnell BSG wrote: > Declan Mullen <[EMAIL PROTECTED]> writes: > > I need to develop appropriate tripwire policy rules for the files and > > directories under "/var/" on Sarge. Being new to Debian, I would > > appreciate receiving any example policy rule