Hi Florian,
On Fri, Oct 31, 2014 at 12:41:34PM +0100, Florian Lohoff wrote:
Package: debian-installer
Version: daily-20141030
Architecture: amd64
Hi,
i am using the daily build of the netboot images as of yesterday.
The Documentation at:
Package: debian-installer
Severity: important
Tags: d-i
Hi
Trying to preseed RAID1 partitioning leads always to have to confirm
question before partitioning. The error is like
---(error)--
Partition disks
---
Before RAID
Hi
One further note: I will try to provide more information tomorrow
again having access to machine on which I tested this.
Bests
Salvatore
signature.asc
Description: Digital signature
severity 609704 normal
tag 609704 + patch
thanks
Hi
I'm lowering the severity for the bugreport I have opened, it surely
more 'normal' with the following. Documentation is if I see correctly
the 'issue' missing the partman-md/confirm_nooverwrite and
partman-lvm/confirm_nooverwrite parts.
If I
Hi Christian
On Wed, Jan 12, 2011 at 06:04:36PM +0100, Christian PERRIER wrote:
reassign 609704 installation-guide
retitle 609704 Please document how to use preseed values to skip RAID1
confirmation question
thanks
Quoting Salvatore Bonaccorso (car...@debian.org):
severity 609704 normal
Package: installation-guide
Version: 20120826
Severity: minor
Tags: patch
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi
There is a small typo in the network configuration preseed example
snipped where we read the commented out entry as
#di netcfg/link_detection_timeout string 10
where
Package: installation-guide
Severity: normal
Tags: patch
Hi
During re-reading the installation-guide appendix it looks like there
are some reference to the old dhcp3-server package, renamed to
isc-dhcp-server.
Attached is proposed patch for the english version.
Regards,
Salvatore
Index:
Hi
I have a very similar problem, adding it here as it seems to have the same
origin. As mentioned by Petter, 1.86 introduced the follwoing change:
grub-installer (1.86) unstable; urgency=low
[ Vincent McIntyre ]
* Support menu selection of GRUB boot disk. Closes: #706112
-- Cyril
Hi KiBi, hi Petter,
On Thu, Oct 17, 2013 at 02:26:49PM +0200, Cyril Brulebois wrote:
Petter Reinholdtsen p...@hungry.com (2013-06-20):
Package: grub-installer
Version: 1.86
Severity: important
User: debian-...@lists.debian.org
Usertags: debian-edu
We discovered this in
Package: rootskel
Version: 1.92
Severity: normal
Hi
Installing squeeze (kfreebsd-amd64) with d-i Squeeze installer, beta2
when using method to continue installation remotely via SSH result
then in a 'broken' looking terminal, after logging in via ssh, giving
an error like:
S40term-kfreebsd:
Source: busybox
Version: 1:1.20.0-7
Severity: normal
Tags: security patch upstream fixed-upstream
Hi,
the following vulnerability was published for busybox.
CVE-2014-9645[0]:
modprobe wrongly accepts paths as module names
Upstream report is at [1] with fix at [2].
If you fix the vulnerability
Hi Sam,
On Sat, Mar 07, 2015 at 09:02:17AM +1100, Sam McLeod wrote:
Thanks Cyril, I did indeed miss that, that's great - I'll test it today.
It looks like the example pressed hasn't been updated to include this
feature: https://www.debian.org/releases/jessie/example-preseed.txt
This seems
Hi Samuel,
On Mon, Apr 06, 2015 at 10:03:22PM +0200, Samuel Thibault wrote:
Hello,
Salvatore Bonaccorso, le Sat 04 Apr 2015 11:14:24 +0200, a écrit :
I prepared an update adding the two additional commits which seem
required as basis for the patch for CVE-2014-3660.
They seem
Hi Cyril, hi Samuel,
On Fri, Apr 03, 2015 at 11:34:06PM +0200, Cyril Brulebois wrote:
Hi people,
(adding debian-boot@ for reference.)
Samuel Thibault sthiba...@debian.org (2015-03-26):
Samuel Thibault, le Thu 26 Mar 2015 02:17:01 +0100, a écrit :
Control: found -1
On Sat, Apr 04, 2015 at 11:14:24AM +0200, Salvatore Bonaccorso wrote:
Hi Cyril, hi Samuel,
On Fri, Apr 03, 2015 at 11:34:06PM +0200, Cyril Brulebois wrote:
Hi people,
(adding debian-boot@ for reference.)
Samuel Thibault sthiba...@debian.org (2015-03-26):
Samuel Thibault, le Thu
Source: busybox
Version: 1:1.20.0-7
Severity: normal
Tags: security upstream fixed-upstream
Hi,
the following vulnerability was published for busybox, filling for
tracking purpose.
CVE-2016-2148[0]:
heap overflow in OPTION_6RD parsing
If you fix the vulnerability please also make sure to
Source: busybox
Version: 1:1.20.0-7
Severity: normal
Tags: security upstream fixed-upstream
Hi,
the following vulnerability was published for busybox, filling for
tracking purpose.
CVE-2016-2147[0]:
OOB heap write due to integer underflow
If you fix the vulnerability please also make sure to
Source: busybox
Version: 1:1.22.0-9
Severity: normal
Tags: security upstream patch
Hi,
the following vulnerability was published for busybox. The config
CONFIG_NTPD is not enabled by default, so this only would affect
rebuild packages. It is thus marked unimportant in the
security-tracker.
Hi Sven,
On Thu, Sep 07, 2017 at 08:20:34PM +0200, Sven Joachim wrote:
> On 2017-09-07 05:32 +0200, Salvatore Bonaccorso wrote:
>
> > Not a must, and note that is just a comment on my side, I'm not a SRM:
> > if possible add a bug closer as well to the changelog entry so that
Hi Sven
On Wed, Sep 06, 2017 at 06:52:36PM +0200, Sven Joachim wrote:
> On 2017-07-19 20:30 +0200, Sven Joachim wrote:
>
> > Control: tags -1 - moreinfo
> >
> > On 2017-07-15 12:50 +0200, Sven Joachim wrote:
> >
> >> Control: tags -1 - confirmed
> >> Control: tags -1 + moreinfo
> >>
> >> On
Source: busybox
Version: 1:1.27.2-1
Severity: grave
Tags: security
Hi,
the following vulnerability was published for busybox. I realize you
know of the issue already but just filling to have a tracking bug as
well in the BTS.
CVE-2017-16544[0]:
| In the add_match function in libbb/lineedit.c in
Hi Cyril,
On Tue, May 15, 2018 at 10:49:46PM +0200, Cyril Brulebois wrote:
> Heya,
>
> Jonathan Wiltshire (2018-05-14):
> > We're due a point release any day now. Please indicate your
> > availablility out of:
> >
> > - May 26th (meaning freeze this coming weekend, which might be a big
> >
Hi
On Mon, Feb 05, 2018 at 11:52:28AM +0100, Chris Boot wrote:
> Version: 1:1.27.2-2
>
> Hi Salvatore,
>
> This was fixed in the last upload of busybox but the bug wasn't closed,
> sorry. I see that the security tracker has been updated already, though.
Thanks for the notice! Yes we did
Source: busybox
Version: 1:1.27.2-3
Severity: normal
Tags: patch security upstream
Forwarded: https://bugs.busybox.net/show_bug.cgi?id=11506
Hi,
The following vulnerability was published for busybox.
CVE-2018-20679[0]:
| An issue was discovered in BusyBox before 1.30.0. An out of bounds read
|
Hi,
On Sun, Aug 11, 2019 at 02:19:47PM +0100, Jonathan Wiltshire wrote:
> Hi,
>
> On Wed, Mar 20, 2019 at 08:43:08PM +0100, Christoph Biedl wrote:
> > Cyril Brulebois wrote...
> >
> > > p-u NEW usually gets frozen a week before the point release. Having the
> > > package to review/test a week
Hi Cyril, hi Adam,
On Wed, Jul 22, 2020 at 07:24:39PM +0200, Cyril Brulebois wrote:
> Adam D. Barratt (2020-07-22):
> > This looks OK to me but, as libinput produces a udeb, it will need a
> > KiBi-ack.
>
> Out of the top of my head, I still haven't managed to get stuff into
> place from a hack
Hi Cyril, Paul,
On Fri, May 28, 2021 at 10:54:32AM +0200, Salvatore Bonaccorso wrote:
> Control: retitle -1 unblock: linux/5.10.40-1
>
> Hi Paul, hi Cyril,
>
> On Thu, May 27, 2021 at 11:04:14AM +0200, Cyril Brulebois wrote:
> > Paul Gevers (2021-05-27):
> > >
Control: retitle -1 unblock: linux/5.10.40-1
Hi Paul, hi Cyril,
On Thu, May 27, 2021 at 11:04:14AM +0200, Cyril Brulebois wrote:
> Paul Gevers (2021-05-27):
> > Control: tags -1 confirmed d-i
> >
> > @boot: needs d-i ACK. As I believe you are aware of, the upload has
> > already happened.
> >
Is this bug still valid to be open?
The mentioned commit landed in 5.3-rc1, 4.19.54 and as well 4.9.183.
Regards,
Salvatore
Source: apt-setup
Version: 1:0.166
Severity: wishlist
Tags: d-i
X-Debbugs-Cc: car...@debian.org
Dear Debian Install System Team,
When installing bullseye with the current RC3 I noticed that while the
debconf menu suggests (and has selected) to add release updates suites
($codename-updates) to
Control: retitle -1 unblock: linux/5.10.46-2
On Sun, Jul 11, 2021 at 10:35:15PM +0200, Paul Gevers wrote:
> Control: tags -1 d-i
>
> Hi,
>
> On 10-07-2021 22:15, Salvatore Bonaccorso wrote:
> > Hi release team, hi Cyril (specifically for d-i)
>
> So
Hi,
On Tue, May 19, 2020 at 08:24:27PM +0200, Valentin Vidić wrote:
> On Tue, May 19, 2020 at 07:23:21PM +0200, John Paul Adrian Glaubitz wrote:
> > Please see #926539 [1].
>
> Thanks, I have sent the patch for the driver instead:
>
> https://lkml.org/lkml/2020/5/19/854
This appears to be
HI Cyril,
On Mon, Jul 26, 2021 at 06:14:09AM +0200, Cyril Brulebois wrote:
> @KT:
>
> I haven't uploaded it since I'm seeing iwlwifi requesting what appears
> to be a debug-only firmware (iwl-debug-yoyo.bin), that's even requested
> via an aptly-named firmware_request_nowarn() function in
Hi Bernhard,
On Tue, Feb 22, 2022 at 07:34:17AM +, Bernhard wrote:
> Hello Holger
> Hello Salvatore
>
> This bugfix also closes my installation report #1005693.
> Do you think, you can release 5.16.10-2 with this bugfix in the next
> days?
> Without this bugfix, installation of sid with
Hi,
On Thu, Apr 28, 2022 at 09:04:52AM +0200, Moritz Muehlenhoff wrote:
> On Wed, Apr 27, 2022 at 11:29:00PM -0400, Theodore Ts'o wrote:
> > Neither seems to be security related. Are you sure this was correctly
> > filed against e2fsprogs?
>
> Apologies, I reported multiple incoming new issues
Hi,
On Sun, Feb 19, 2023 at 07:39:02PM +0100, Cyril Brulebois wrote:
> Package: preseed
> Version: 1.113
> Severity: normal
> X-Debbugs-Cc: Salvatore Bonaccorso
>
> Filing this against preseed for visibility, after Salvatore Bonaccorso
> reported that D-I Bookwor
to it
+(Closes: #1035282)
+ * Update to linux-support 6.1.0-8
+
+ -- Salvatore Bonaccorso Sun, 30 Apr 2023 07:31:54 +0200
+
firmware-nonfree (20230210-4) unstable; urgency=medium
* iwlwifi: Add missing files entry for iwlwifi-so-a0-hr-b0-72.ucode.
diff -Nru firmware-nonfree-20230210/debian
Hi,
On Mon, May 01, 2023 at 06:36:01PM +0200, Cyril Brulebois wrote:
> Hi,
>
> Salvatore Bonaccorso (2023-04-30):
> > [ Other info ]
> > As beeing the firmware-nonfree package, I'm explicitly CC'ing as well
> > Cyril on this pre-approval request.
>
> Th
Hi Cyril,
On Sun, Apr 09, 2023 at 11:45:42PM +, Cyril Brulebois wrote:
> Control: tag -1 pending
>
> Hello,
>
> Bug #1031643 in preseed reported by you has been fixed in the
> Git repository and is awaiting an upload. You can see the commit
> message below and you can check the diff of the
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: li...@packages.debian.org, k...@debian.org,
debian-boot@lists.debian.org, b...@debian.org, car...@debian.org
Control: affects -1 + src:linux
Hi Release team, hi Cyril for
Hi,
I would like to upload linux version 6.6.15-1 ideally over the weekend
to unstable. The new version imports two versions of the 6.6.y stable
series (which is upstream an LTS) up to 6.6.15. It contains a larger
amount of changes as it consisted of versions released after the merge
window
Hi,
On Sat, Feb 03, 2024 at 12:32:08AM +0100, Cyril Brulebois wrote:
> Salvatore Bonaccorso (2024-02-02):
> > One thing is still unresolved, thus additonally to the explicit CC to
> > kibi, as well including debian-boot. We have the armel d-i situation
> > not yet resolved,
42 matches
Mail list logo