Re: [Pkg-puppet-devel] Wheezy update of puppet?

2017-05-24 Thread Paul Wise
On Wed, May 24, 2017 at 5:51 PM, Apollon Oikonomopoulos wrote: > So, from my understanding the version in Wheezy cannot be fixed: the 2.7 > agents only use YAML to send out facts and upstream's fix is to simply > not accept anything other than PSON. Whitelisting YAML defeats the > purpose, as

Re: [Pkg-puppet-devel] Wheezy update of puppet?

2017-05-24 Thread Paul Wise
On Wed, May 24, 2017 at 6:24 PM, Paul Wise wrote: > In Python/Perl YAML libraries there are ways to safely load YAML > files, does Ruby not have the same possibilities? After a bit of searching, I wonder if copying the ruby-safe-yaml package from wheezy-backports to wheezy and then patching

Re: [Pkg-puppet-devel] Wheezy update of puppet?

2017-05-24 Thread Apollon Oikonomopoulos
Hi pabs, On 18:30 Wed 24 May , Paul Wise wrote: > On Wed, May 24, 2017 at 6:24 PM, Paul Wise wrote: > > > In Python/Perl YAML libraries there are ways to safely load YAML > > files, does Ruby not have the same possibilities? > > After a bit of searching, I wonder if copying the

Re: [Pkg-puppet-devel] Wheezy update of puppet?

2017-05-24 Thread Apollon Oikonomopoulos
On 23:44 Mon 22 May , Apollon Oikonomopoulos wrote: > On 22:53 Sun 21 May , Ola Lundqvist wrote: > > Dear maintainer(s), > > > > The Debian LTS team would like to fix the security issues which are > > currently open in the Wheezy version of puppet: > >

Re: postgresql-9.1 and postgresql-8.4 in Wheezy

2017-05-24 Thread Christoph Berg
Re: Ola Lundqvist 2017-05-21

Accepted samba 2:3.6.6-6+deb7u13 (source amd64 all) into oldstable

2017-05-24 Thread Mathieu Parent
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Sat, 20 May 2017 23:19:09 +0200 Source: samba Binary: samba samba-common-bin samba-common samba-tools smbclient swat samba-doc samba-doc-pdf libpam-smbpass libsmbclient libsmbclient-dev winbind libpam-winbind libnss-winbind

[SECURITY] [DLA 951-1] samba security update

2017-05-24 Thread Salvatore Bonaccorso
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Package: samba Version: 2:3.6.6-6+deb7u13 CVE ID : CVE-2017-7494 steelo discovered a remote code execution vulnerability in Samba, a SMB/CIFS file, print, and login server for Unix. A malicious client with access to a

May Report

2017-05-24 Thread Brian May
In May I spent all my 10 hours on the following tasks: * Fix broken chroots, that had a broken /dev/ptmx symlink pointing to /dev/pts/ptmx - which has the wrong permissions and was causing problems with some packages. Was worried that broken chroot might be reason Heimdal was failing to