debian-security
Thread
Date
Earlier messages
Messages by Thread
Keyserver for gpg.conf ?
Francesco Poli
Re: Keyserver for gpg.conf ?
Gunnar Wolf
Re: Keyserver for gpg.conf ?
Holger Levsen
Re: Keyserver for gpg.conf ?
debianmailinglists . hz5zm
Re: Keyserver for gpg.conf ?
Gunnar Wolf
Re: Keyserver for gpg.conf ?
Jeremy Stanley
Re: Keyserver for gpg.conf ?
Jeffrey Walton
Re: Keyserver for gpg.conf ?
Gunnar Wolf
Re: Keyserver for gpg.conf ?
Francesco Poli
Re: Keyserver for gpg.conf ?
Gunnar Wolf
Re: Keyserver for gpg.conf ?
Jeffrey Walton
Re: Keyserver for gpg.conf ?
Francesco Poli
Re: Keyserver for gpg.conf ?
Jeremy Stanley
Re: Keyserver for gpg.conf ?
debianmailinglists . hz5zm
Fips Module Config
Robert A Wooldridge
Re: Fips Module Config
bhaskarvilles
Upcoming stable point release (13.2)
Jonathan Wiltshire
Re: Upcoming stable point release (13.2)
Adam D. Barratt
Status of Intel CET in Debian
Stephan Verbücheln
Re: Status of Intel CET in Debian
Stephan Verbücheln
Re: Status of Intel CET in Debian
Emanuele Rocca
On the status of rust/go packages
Sly
Re: On the status of rust/go packages
Fabian Grünbichler
BerkeleyDB CVEs
Tomáš Macák
Re: BerkeleyDB CVEs
debianmailinglists . hz5zm
Re: BerkeleyDB CVEs
Carlos Henrique Lima Melara
Re: BerkeleyDB CVEs
Sylvain Beucler
Re: BerkeleyDB CVEs
Jeremy Stanley
Re: Re: BerkeleyDB CVEs
Juraj Longauer
Re: Re: BerkeleyDB CVEs
Jeffrey Walton
Re: ftp.debian.org: remove armel from forky and unstable
Thorsten Glaser
Re: ftp.debian.org: remove armel from forky and unstable
Sylvain Beucler
Re: ftp.debian.org: remove armel from forky and unstable
Thorsten Glaser
Re: ftp.debian.org: remove armel from forky and unstable
Sylvain Beucler
Re: ftp.debian.org: remove armel from forky and unstable
Thorsten Glaser
Re: ftp.debian.org: remove armel from forky and unstable
Jochen Sprickerhof
Upcoming (old)stable point releases: 13.1 and 12.12
Jonathan Wiltshire
Re: Upcoming (old)stable point releases: 13.1 and 12.12
Adam D. Barratt
Why Does Debian Use PGP to Sign Packages
fosres
Re: Why Does Debian Use PGP to Sign Packages
Jeffrey Walton
Re: Why Does Debian Use PGP to Sign Packages
Simon Josefsson
Re: Why Does Debian Use PGP to Sign Packages
Simon Josefsson
Re: Why Does Debian Use PGP to Sign Packages
kpcyrd
Re: [SECURITY] [DSA 5973-1] linux security update
Stephan Seitz
Re: [SECURITY] [DSA 5973-1] linux security update
Salvatore Bonaccorso
Re: [SECURITY] [DSA 5973-1] linux security update
Stephan Seitz
Re: [SECURITY] [DSA 5973-1] linux security update
Salvatore Bonaccorso
Why Do Developers Continue to Sign with GNUPG
fosres
Re: Why Do Developers Continue to Sign with GNUPG
Adam D. Barratt
Re: Why Do Developers Continue to Sign with GNUPG
Jeremy Stanley
Re: Why Do Developers Continue to Sign with GNUPG
Simon Josefsson
Re: Why Do Developers Continue to Sign with GNUPG
Malte
Re: Why Do Developers Continue to Sign with GNUPG
Gunnar Wolf
should the Release Notes be updated concerning trixie security
Paul Gevers
Re: should the Release Notes be updated concerning trixie security
Santiago Ruano Rincón
Re: should the Release Notes be updated concerning trixie security
Holger Levsen
Security tracker suggestions
Adrian Bunk
Re: Security tracker suggestions
Roberto C . Sánchez
Resurrecting the Securing Debian Manual
Noah Meyerhans
Re: Resurrecting the Securing Debian Manual
Michael Lazin
Re: Resurrecting the Securing Debian Manual
Holger Levsen
Re: Resurrecting the Securing Debian Manual
Holger Levsen
Re: Resurrecting the Securing Debian Manual
Holger Levsen
Re: Resurrecting the Securing Debian Manual
Jeffrey Chimene
Re: Resurrecting the Securing Debian Manual
Rob Ward
Re: Resurrecting the Securing Debian Manual
Vladislav Kurz
Re: Resurrecting the Securing Debian Manual
debianmailinglists . hz5zm
Re: Resurrecting the Securing Debian Manual
Dave P.
Re: Resurrecting the Securing Debian Manual
Javier Fernandez-Sanguino
Re: Resurrecting the Securing Debian Manual
Noah Meyerhans
Re: Resurrecting the Securing Debian Manual
Javier Fernandez-Sanguino
Re: Resurrecting the Securing Debian Manual
debianmailinglists . hz5zm
Re: Resurrecting the Securing Debian Manual
Dave P.
DebCamp 25 Security Tracker sprint - planning announcement
Roberto C . Sánchez
SHH Cipher recommendations and "prohibitions" from Debian?
c . buhtz
Re: SHH Cipher recommendations and "prohibitions" from Debian?
Bartosz Fenski
Re: SHH Cipher recommendations and "prohibitions" from Debian?
Chris Boot
Re: SHH Cipher recommendations and "prohibitions" from Debian?
c . buhtz
Use ~/.ssh/config
Stephan Verbücheln
Clarification Request: Acceptable Scenarios for Submitting CVE Fixes to Debian
Fu, Rong (CN)
Re: Clarification Request: Acceptable Scenarios for Submitting CVE Fixes to Debian
Salvatore Bonaccorso
RE: Clarification Request: Acceptable Scenarios for Submitting CVE Fixes to Debian
Fu, Rong (CN)
Upcoming stable point release: 12.11
Jonathan Wiltshire
Re: Upcoming stable point release: 12.11
Jonathan Wiltshire
Open security issues affecting trixie which are not RC (2025-04-29)
Moritz Mühlenhoff
Re: Open security issues affecting trixie which are not RC (2025-04-29)
Jeffrey Walton
Re: Open security issues affecting trixie which are not RC (2025-04-29)
NoisyCoil
Testmail
hste
Re: Testmail
sylvain
Testmail
Arne Pisch
Re: Testmail
j V
Re: Testmail
Álesson Nunes
Re: Testmail
Jeffrey Walton
Re: Testmail
Meso Security
FWD: Re: Testmail
hste
Strange welcome after a testmail
hste
Re: Strange welcome after a testmail
Pierre-Elliott Bécue
FWD: FWD: FWD: Re: Strange welcome after a testmail
hste
Re: FWD: FWD: FWD: Re: Strange welcome after a testmail
Lupe Christoph
FWD: Re: Strange welcome after a testmail
hste
sbuscribe
Francesco Buscaino
Re: sbuscribe
Povl Ole Haarlev Olsen
Upcoming stable point release: 12.10
Jonathan Wiltshire
Re: Bug#1093650: Prebuilt binaries in QEMU source
Heinrich Schuchardt
Re: Bug#1093650: Prebuilt binaries in QEMU source
Michael Tokarev
Re: Bug#1093650: Prebuilt binaries in QEMU source
Michael Tokarev
Upcoming stable point release: 12.9
Jonathan Wiltshire
Re: [DSA 5824-1] chromium security update
Bjørn Mork
Re: [DSA 5824-1] chromium security update
Santiago Vila
(No Subject)
Sergey S.
Re: (No Subject)
Povl Ole Haarlev Olsen
Re: (No Subject)
Sergey S.
Securing Debian Manual, Out of Date?
debianmailinglists . hz5zm
Fwd: gnome-settings-daemon breaks existing usbguard rules, allowing all usb device by default
jan kapoli
Re: Bug#539352: /etc/init.d/mountkernfs.sh: Please mount debugfs when available in the kernel
Mark Hindley
I Joined This List
David Campbell
Re: I Joined This List
Jeffrey Walton
dpkg MD5
David Campbell
Re: dpkg MD5
Jonathan Hutchins
Re: dpkg MD5
David Campbell
Re: dpkg MD5
Jeremy Stanley
Re: dpkg MD5
Jeffrey Walton
Re: dpkg MD5
Jeremy Stanley
Re: dpkg MD5
debianmailinglists . hz5zm
Re: dpkg MD5
Jeremy Stanley
Re: dpkg MD5
SZÉPE Viktor
Re: dpkg MD5
Jeremy Stanley
Re: dpkg MD5
Jeffrey Walton
Re: dpkg MD5
Jeffrey Walton
Re: dpkg MD5
Jeffrey Walton
Re: dpkg MD5
Simon Josefsson
Upcoming stable point releases: 12.8 and 12.9
Jonathan Wiltshire
Re: Upcoming stable point releases: 12.8 and 12.9
Adam D. Barratt
Recording for my DebConf talk about CVEs
Samuel Henrique
Re: Recording for my DebConf talk about CVEs
Sylvain Beucler
Re: Recording for my DebConf talk about CVEs
Darren S.
Latent bugs in armel, armhf packages built before t64 transition
Chris Hofstaedtler
Re: Latent bugs in armel, armhf packages built before t64 transition
Emanuele Rocca
Re: Latent bugs in armel, armhf packages built before t64 transition
Martin
Re: Latent bugs in armel, armhf packages built before t64 transition
Leandro Cunha
bind9 update 9.16.50 -- too many record
Guillaume Bienkowski
Re: bind9 update 9.16.50 -- too many record
Lee
Re: bind9 update 9.16.50 -- too many record
Salvatore Bonaccorso
Re: bind9 update 9.16.50 -- too many record
Ondřej Surý
Re: bind9 update 9.16.50 -- too many record
Guillaume Bienkowski
Re: bind9 update 9.16.50 -- too many record
Ondřej Surý
Re: bind9 update 9.16.50 -- too many record
Salvatore Bonaccorso
Re: bind9 update 9.16.50 -- too many record
Guillaume Bienkowski
Upcoming oldstable point release (11.11)
Jonathan Wiltshire
Re: Upcoming oldstable point release (11.11)
Adam D. Barratt
Upcoming stable point release (12.7)
Jonathan Wiltshire
Re: Upcoming stable point release (12.7)
Adam D. Barratt
Bug#1075786: znc.service restarts without warning on upgrade
Jesse Rhodes
Bug#1074468: RM: salt/oldstable-security -- RoSRM; removed from oldstable
Jonathan Wiltshire
Bug#1074467: RM: snort/oldstable-security -- RoSRM; removed from oldstable
Jonathan Wiltshire
RE: Mini-DebConf in Cambridge, UK - October 10-13 2024
Luna Jernberg
CVE applicability
Arul Anand MM
Re: CVE applicability
Salvatore Bonaccorso
Re: CVE applicability
Thomas Hochstein
Upcoming oldstable point release (11.10)
Jonathan Wiltshire
Re: Upcoming oldstable point release (11.10)
Jonathan Wiltshire
Re: Upcoming oldstable point release (11.10)
Adam D. Barratt
Re: golang-github-disintegration-imaging: CVE-2023-36308
Nilesh Patra
Workaround for the GSM privilege escalation vulnerability
Stephan Verbücheln
Re: RFS: paramspider package
Samuel Henrique
Re: RFS: assetfinder package
Samuel Henrique
security-tracker: A proposal to significantly reduce reported false-positives (no affected-code shipped)
Samuel Henrique
Fw: security-tracker: A proposal to significantly reduce reported false-positives (no affected-code shipped)
Meso Security
Re: security-tracker: A proposal to significantly reduce reported false-positives (no affected-code shipped)
Gian Piero Carrubba
Re: security-tracker: A proposal to significantly reduce reported false-positives (no affected-code shipped)
Samuel Henrique
Re: security-tracker: A proposal to significantly reduce reported false-positives (no affected-code shipped)
Gian Piero Carrubba
Re: security-tracker: A proposal to significantly reduce reported false-positives (no affected-code shipped)
Samuel Henrique
Re: security-tracker: A proposal to significantly reduce reported false-positives (no affected-code shipped)
Samuel Henrique
Re: security-tracker: A proposal to significantly reduce reported false-positives (no affected-code shipped)
Samuel Henrique
Re: security-tracker: A proposal to significantly reduce reported false-positives (no affected-code shipped)
Emilio Pozuelo Monfort
Re: security-tracker: A proposal to significantly reduce reported false-positives (no affected-code shipped)
Samuel Henrique
Re: security-tracker: A proposal to significantly reduce reported false-positives (no affected-code shipped)
Salvatore Bonaccorso
Re: security-tracker: A proposal to significantly reduce reported false-positives (no affected-code shipped)
Samuel Henrique
Re: security-tracker: A proposal to significantly reduce reported false-positives (no affected-code shipped)
Samuel Henrique
Re: security-tracker: A proposal to significantly reduce reported false-positives (no affected-code shipped)
Salvatore Bonaccorso
Re: security-tracker: A proposal to significantly reduce reported false-positives (no affected-code shipped)
Samuel Henrique
Re: security-tracker: A proposal to significantly reduce reported false-positives (no affected-code shipped)
Samuel Henrique
Re: security-tracker: A proposal to significantly reduce reported false-positives (no affected-code shipped)
Salvatore Bonaccorso
Re: security-tracker: A proposal to significantly reduce reported false-positives (no affected-code shipped)
Samuel Henrique
Re: security-tracker: A proposal to significantly reduce reported false-positives (no affected-code shipped)
Salvatore Bonaccorso
Re: security-tracker: A proposal to significantly reduce reported false-positives (no affected-code shipped)
Samuel Henrique
Re: security-tracker: A proposal to significantly reduce reported false-positives (no affected-code shipped)
Santiago Ruano Rincón
Re: security-tracker: A proposal to significantly reduce reported false-positives (no affected-code shipped)
Salvatore Bonaccorso
Re: security-tracker: A proposal to significantly reduce reported false-positives (no affected-code shipped)
Roberto C . Sánchez
xz backdoor prevention and hosts.deny?
Nick Sal
Re: xz backdoor prevention and hosts.deny?
Gian Piero Carrubba
CVE-2023-41105 not fixed in bookworm
Richard van den Berg
Re: CVE-2023-41105 not fixed in bookworm
Salvatore Bonaccorso
Re: CVE-2023-41105 not fixed in bookworm
StealthMode Hu
Re: CVE-2023-41105 not fixed in bookworm
piorunz
Upcoming stable point release (12.6)
Jonathan Wiltshire
Re: Upcoming stable point release (12.6)
Adam D. Barratt
Re: Upcoming stable point release (12.6)
Gian Piero Carrubba
Re: Upcoming stable point release (12.6)
Joerg Jaspert
Upcoming stable point release (12.6)
Jonathan Wiltshire
Earlier messages