In projects/debootstrap-image we are downloading an Ubuntu 18.04.1 image, and doing an apt-get update -y in it before installing some packages using an affected apt version.
To avoid this we could download updated apt packages and install them using dpkg -i.
We should also check if the use of debootstrap is affected by the issue.
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Child items 0
Show closed items
No child items are currently assigned. Use child items to break down this issue into smaller parts.
Linked items 0
Link issues together to show that they're related.
Learn more.
What happens inside the containers if we are installing, say, build dependencies? Are we good here? I guess I was wondering about the apt-get calls in container-image/config.
What happens inside the containers if we are installing, say, build dependencies? Are we good here? I guess I was wondering about the apt-get calls in container-image/config.
After checking, debootstrap is not installing packages from security.debian.org. So we are using a vulnerable apt version in container-image/config.
I think we can fix that by manually installing new apt packages inside the chroots after creating them with debootstrap in projects/debootstrap-image/config. I will work on a new version of the patch doing that.
Trac: Keywords: TorBrowserTeam201901R deleted, TorBrowserTeam201901 added Status: needs_review to needs_revision
The 32bit situation for Linux looks bleak. BUT: I thought we should start soon with #26323 (moved) anyway. I think this bug is a reason to start now-ish with that effort. I guess we could try to squeeze it into 8.5. boklm: what do you think?
The 32bit situation for Linux looks bleak. BUT: I thought we should start soon with #26323 (moved) anyway. I think this bug is a reason to start now-ish with that effort. I guess we could try to squeeze it into 8.5. boklm: what do you think?
Yes, I think it should be possible to do #26323 (moved) soon.
However maybe they will add it later as looking at the file modification time it seems it is not the first time that the i386 package comes later. Otherwise we can maybe rebuild the package ourself.
It is currently installing the packages on stretch too, however since yesterday they made a stretch point release, so it should not be needed anymore (but maybe we can add a check to verify that the correct version was installed).
So, we need 4 packages to fix the vulnerability on Debian systems. Why do we only need 2 for Ubuntu?
What is the plan for 32bit Wheezy? commit cd1874ffe37bc50bda7ea2fefadd9637d93b360b ? I am feeling a bit reluctant to taking trusty packages tbh...
So, we need 4 packages to fix the vulnerability on Debian systems. Why do we only need 2 for Ubuntu?
I looked at the Ubuntu image we download, and there was only 2 apt packages included inside this image. For the Debian ones, I looked at the apt packages installed by debootstrap, and there was those 4 packages.
What is the plan for 32bit Wheezy? commit cd1874ffe37bc50bda7ea2fefadd9637d93b360b ? I am feeling a bit reluctant to taking trusty packages tbh...
The commit using trusty packages was just a test to see if that could work, but it doesn't work.
I think the plan is to do #26323 (moved) to be able to stop using 32bit Wheezy.
Okay, sounds good. This got merged into master with commit 15e8c5389b76e5fd8634a35c5bff1a5a7192a818. #26323 (moved) will address the 32bit Wheezy issue.
Trac: Resolution: N/Ato fixed Status: needs_information to closed
Thanks, looks good to me and pushed to maint-8.0. I'll note the commits in the respective bugs. The bugfix for this ticket is available in commit 528f683266709865780e75b14755715f44f04d5a.