Package: xen-tools Version: 4.8-1 Severity: serious File: /usr/share/xen-tools/debian.d/20-setup-apt User: debian-de...@lists.debian.org Usertags: bullseye-security
With the release of Debian bullseye and later, security updates are provided in the bullseye-security suite instead of bullseye/updates. The above hook script references ${dist}/updates but when bullseye is released that should be replaced by ${dist}-security so it looks like the script would generate an incorrect sources.list using /updates instead of -security which would cause the new Xen guest to not get security updates from bullseye in a timely manner. I suggest that this hook check the version of the Debian release in question using distro-info and then if the release is 11 or higher, then use ${dist}-security otherwise use ${dist}/updates as before. It is much better to use distro-info than to hard-code the release version numbers. It might even be a good idea to include the security suite information in distro-info itself and look it up there. $ grep -B12 -A3 /updates /usr/share/xen-tools/debian.d/20-setup-apt # # If the host system has security support then enable that here, too, # except if we're installing Debian Unstable. # if ( test "${dist}" "!=" "sid" && test "${dist}" "!=" "unstable" && \ test -e /etc/apt/sources.list && \ grep ^deb.*security -r /etc/apt/sources.list /etc/apt/sources.list.d >/dev/null 2>/dev/null ) ; then cat <<E_O_APT >> ${prefix}/etc/apt/sources.list # # Security updates # deb http://security.debian.org/ ${dist}/updates main contrib non-free deb-src http://security.debian.org/ ${dist}/updates main contrib non-free E_O_APT else cat <<E_O_APT >> ${prefix}/etc/apt/sources.list # # Security updates - Uncomment to enable. # # deb http://security.debian.org/ ${dist}/updates main contrib non-free # deb-src http://security.debian.org/ ${dist}/updates main contrib non-free E_O_APT fi -- System Information: Debian Release: bullseye/sid APT prefers testing-debug APT policy: (900, 'testing-debug'), (900, 'testing'), (800, 'unstable-debug'), (800, 'unstable'), (790, 'buildd-unstable'), (700, 'experimental-debug'), (700, 'experimental'), (690, 'buildd-experimental') Architecture: amd64 (x86_64) Kernel: Linux 5.9.0-1-amd64 (SMP w/4 CPU threads) Locale: LANG=en_AU.utf8, LC_CTYPE=en_AU.utf8 (charmap=UTF-8), LANGUAGE=en_AU:en Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages xen-tools depends on: ii debootstrap 1.0.123 ii libconfig-inifiles-perl 3.000003-1 ii libdata-validate-domain-perl 0.10-1 pn libdata-validate-ip-perl <none> pn libdata-validate-uri-perl <none> ii libfile-slurp-perl 9999.32-1 ii libfile-which-perl 1.23-1 ii libsort-versions-perl 1.62-1 ii libtext-template-perl 1.59-1 ii openssh-client 1:8.3p1-1 ii perl 5.30.3-4 Versions of packages xen-tools recommends: ii debian-archive-keyring 2019.1 ii e2fsprogs 1.45.6-1 pn libexpect-perl <none> ii lvm2 2.03.09-3 pn rinse <none> pn ubuntu-keyring | ubuntu-archive-keyring <none> pn xen-hypervisor <none> pn xen-utils <none> Versions of packages xen-tools suggests: ii btrfs-progs 5.7-1 pn cfengine2 <none> pn grub-xen-host <none> ii reiserfsprogs 1:3.6.27-4 pn xfsprogs <none> -- bye, pabs https://wiki.debian.org/PaulWise
signature.asc
Description: This is a digitally signed message part