Package: xen-tools
Version: 4.8-1
Severity: serious
File: /usr/share/xen-tools/debian.d/20-setup-apt
User: debian-de...@lists.debian.org
Usertags: bullseye-security

With the release of Debian bullseye and later, security updates are
provided in the bullseye-security suite instead of bullseye/updates.

The above hook script references ${dist}/updates but when bullseye is
released that should be replaced by ${dist}-security so it looks
like the script would generate an incorrect sources.list using /updates
instead of -security which would cause the new Xen guest to not get
security updates from bullseye in a timely manner.

I suggest that this hook check the version of the Debian release in
question using distro-info and then if the release is 11 or higher,
then use ${dist}-security otherwise use ${dist}/updates as before.

It is much better to use distro-info than to hard-code the release
version numbers. It might even be a good idea to include the security
suite information in distro-info itself and look it up there.

   $ grep -B12 -A3 /updates /usr/share/xen-tools/debian.d/20-setup-apt
   #
   #  If the host system has security support then enable that here, too,
   #  except if we're installing Debian Unstable.
   #
   if ( test "${dist}" "!=" "sid" && test "${dist}" "!=" "unstable" && \
        test -e /etc/apt/sources.list && \
        grep ^deb.*security -r /etc/apt/sources.list /etc/apt/sources.list.d 
>/dev/null 2>/dev/null ) ; then

       cat <<E_O_APT >> ${prefix}/etc/apt/sources.list
   # 
   #  Security updates
   # 
   deb     http://security.debian.org/ ${dist}/updates  main contrib non-free
   deb-src http://security.debian.org/ ${dist}/updates  main contrib non-free
   E_O_APT

   else
       cat <<E_O_APT >> ${prefix}/etc/apt/sources.list
   # 
   #  Security updates - Uncomment to enable.
   # 
   # deb     http://security.debian.org/ ${dist}/updates  main contrib non-free
   # deb-src http://security.debian.org/ ${dist}/updates  main contrib non-free
   E_O_APT

   fi

-- System Information:
Debian Release: bullseye/sid
  APT prefers testing-debug
  APT policy: (900, 'testing-debug'), (900, 'testing'), (800, 
'unstable-debug'), (800, 'unstable'), (790, 'buildd-unstable'), (700, 
'experimental-debug'), (700, 'experimental'), (690, 'buildd-experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 5.9.0-1-amd64 (SMP w/4 CPU threads)
Locale: LANG=en_AU.utf8, LC_CTYPE=en_AU.utf8 (charmap=UTF-8), LANGUAGE=en_AU:en
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages xen-tools depends on:
ii  debootstrap                   1.0.123
ii  libconfig-inifiles-perl       3.000003-1
ii  libdata-validate-domain-perl  0.10-1
pn  libdata-validate-ip-perl      <none>
pn  libdata-validate-uri-perl     <none>
ii  libfile-slurp-perl            9999.32-1
ii  libfile-which-perl            1.23-1
ii  libsort-versions-perl         1.62-1
ii  libtext-template-perl         1.59-1
ii  openssh-client                1:8.3p1-1
ii  perl                          5.30.3-4

Versions of packages xen-tools recommends:
ii  debian-archive-keyring                   2019.1
ii  e2fsprogs                                1.45.6-1
pn  libexpect-perl                           <none>
ii  lvm2                                     2.03.09-3
pn  rinse                                    <none>
pn  ubuntu-keyring | ubuntu-archive-keyring  <none>
pn  xen-hypervisor                           <none>
pn  xen-utils                                <none>

Versions of packages xen-tools suggests:
ii  btrfs-progs    5.7-1
pn  cfengine2      <none>
pn  grub-xen-host  <none>
ii  reiserfsprogs  1:3.6.27-4
pn  xfsprogs       <none>

-- 
bye,
pabs

https://wiki.debian.org/PaulWise

Attachment: signature.asc
Description: This is a digitally signed message part

Reply via email to