<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<atom:link href="https://dev1galaxy.org/extern.php?action=feed&amp;tid=2614&amp;type=rss" rel="self" type="application/rss+xml" />
		<title><![CDATA[Dev1 Galaxy Forum / DSA-4371-1 apt -- security update]]></title>
		<link>https://dev1galaxy.org/viewtopic.php?id=2614</link>
		<description><![CDATA[The most recent posts in DSA-4371-1 apt -- security update.]]></description>
		<lastBuildDate>Wed, 06 Mar 2019 00:32:06 +0000</lastBuildDate>
		<generator>FluxBB</generator>
		<item>
			<title><![CDATA[Re: DSA-4371-1 apt -- security update]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=14651#p14651</link>
			<description><![CDATA[<p>More devs on deck to build them would be great too.&#160; <img src="https://dev1galaxy.org/img/smilies/wink.png" width="15" height="15" alt="wink" /></p>]]></description>
			<author><![CDATA[dummy@example.com (golinux)]]></author>
			<pubDate>Wed, 06 Mar 2019 00:32:06 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=14651#p14651</guid>
		</item>
		<item>
			<title><![CDATA[Re: DSA-4371-1 apt -- security update]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=14650#p14650</link>
			<description><![CDATA[<p>I had exactly the same question/concern as RoundDuckMan. Fresh isos that use the fixed apt version would be really great.</p>]]></description>
			<author><![CDATA[dummy@example.com (kuleszdl)]]></author>
			<pubDate>Wed, 06 Mar 2019 00:27:24 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=14650#p14650</guid>
		</item>
		<item>
			<title><![CDATA[Re: DSA-4371-1 apt -- security update]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=14464#p14464</link>
			<description><![CDATA[<p>I know this topic is now about a month old, but after looking back for Debian-related news, I found out about this, and while it might not be too bad for my laptop to have this problem when it got updated, not knowing of this bug, on the 25th of January, this hole is very dangerous now for the Devuan install .isos. Is there any way that in a Devuan release we&#039;ll actually have point releases like Debian, like maybe a Devuan 2.1.0 .iso? </p><p>Oh, and BTW, it wasn&#039;t like I randomly came here after hearing of that. I just felt like testing Devuan in a VM again, and then I wondered about that APT vulnerability when installing Devuan.</p>]]></description>
			<author><![CDATA[dummy@example.com (RoundDuckMan)]]></author>
			<pubDate>Tue, 19 Feb 2019 08:20:31 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=14464#p14464</guid>
		</item>
		<item>
			<title><![CDATA[Re: DSA-4371-1 apt -- security update]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=13839#p13839</link>
			<description><![CDATA[<div class="quotebox"><cite>golinux wrote:</cite><blockquote><div><p>If indeed that &quot;clarification&quot; is a correct conclusion.&#160; &#160;LOLOL!!&#160; In any case we both updated and seem to have survived so onward . . .</p></div></blockquote></div><p>Addressing to <a href="https://lists.dyne.org/lurker/message/20190122.152406.07b05a4c.en.html" rel="nofollow">lists.dyne</a> was a kind of clarity for me. <br />Because I was looking for a Devuan reliable source. I think so too, upgrading APT somehow relaxed my mind <img src="https://dev1galaxy.org/img/smilies/smile.png" width="15" height="15" alt="smile" /></p><p>BR,<br />Nili</p>]]></description>
			<author><![CDATA[dummy@example.com (Nili)]]></author>
			<pubDate>Fri, 25 Jan 2019 10:22:01 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=13839#p13839</guid>
		</item>
		<item>
			<title><![CDATA[Re: DSA-4371-1 apt -- security update]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=13836#p13836</link>
			<description><![CDATA[<p>Hello,</p><p>Please is it secure to use this <span class="bbc">/etc/apt/sources.list</span> ?</p><div class="codebox"><pre><code>deb http://pkgmaster.devuan.org/merged/ ascii main contrib non-free 
deb http://pkgmaster.devuan.org/merged/ ascii-updates main contrib non-free 
deb http://pkgmaster.devuan.org/merged/ ascii-security main contrib non-free 
deb http://pkgmaster.devuan.org/merged/ ascii-backports main contrib non-free 

deb http://packages.devuan.org/merged/ ascii main 
deb-src http://packages.devuan.org/merged/ ascii main </code></pre></div>]]></description>
			<author><![CDATA[dummy@example.com (boycottsystemd)]]></author>
			<pubDate>Fri, 25 Jan 2019 07:06:13 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=13836#p13836</guid>
		</item>
		<item>
			<title><![CDATA[Re: DSA-4371-1 apt -- security update]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=13815#p13815</link>
			<description><![CDATA[<div class="quotebox"><cite>Nili wrote:</cite><blockquote><div><p>golinux, thank you for your clarification / suggestions.</p></div></blockquote></div><p>If indeed that &quot;clarification&quot; is a correct conclusion.&#160; &#160;LOLOL!!&#160; In any case we both updated and seem to have survived so onward . . .</p>]]></description>
			<author><![CDATA[dummy@example.com (golinux)]]></author>
			<pubDate>Thu, 24 Jan 2019 15:48:33 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=13815#p13815</guid>
		</item>
		<item>
			<title><![CDATA[Re: DSA-4371-1 apt -- security update]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=13809#p13809</link>
			<description><![CDATA[<div class="quotebox"><cite>golinux wrote:</cite><blockquote><div><p>Yes, it was confusing and I chewed on it for quite some time myself.&#160; I think he recommended pkgmaster because it is the source for all the other pkg mirrors would eliminate exposure to the many mirrors in the round robin.</p></div></blockquote></div><p>OK, i switched my sources.list from deb.devuan.org to pkgmaster.devuan.org i did an apt-get update, I&#039;ve taken all the possible updates. So, i&#039;ll keep eyes open in the APT matter on following.</p><p>golinux, thank you for your clarification / suggestions.</p><p>BR,<br />Nili</p>]]></description>
			<author><![CDATA[dummy@example.com (Nili)]]></author>
			<pubDate>Thu, 24 Jan 2019 07:34:54 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=13809#p13809</guid>
		</item>
		<item>
			<title><![CDATA[Re: DSA-4371-1 apt -- security update]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=13807#p13807</link>
			<description><![CDATA[<div class="quotebox"><cite>Nili wrote:</cite><blockquote><div><p>it is said from <a href="https://lists.dyne.org/lurker/message/20190122.152406.07b05a4c.en.html" rel="nofollow">KatolaZ</a></p><div class="quotebox"><blockquote><div><p>The safest way would actually be to manually download the deb packages of apt from the debian-security pool (more information available below), or to use pkgmaster.devuan.org in your sources.list to do the upgrade (pkgmaster.devuan.org is not a rough mirror...).</p></div></blockquote></div><p>^This part is that I&#039;m confused.</p><p>I&#039;ve done APT successfully upgraded to version 1.0.9.8.5 2 via &quot;deb <a href="http://deb.devuan.org/merged" rel="nofollow">http://deb.devuan.org/merged</a> jessie-security&quot;<br />Is it necessary for me to switch hosts to &quot;<strong>pkgmaster.devuan.org</strong>&quot; or make other manual interventions?</p><p>Forgive me for my lack of understanding on this part.</p><p>BR,<br />Nili</p></div></blockquote></div><p>Yes, it was confusing and I chewed on it for quite some time myself.&#160; I think he recommended pkgmaster because it is the source for all the other pkg mirrors would eliminate exposure to the many mirrors in the round robin.</p>]]></description>
			<author><![CDATA[dummy@example.com (golinux)]]></author>
			<pubDate>Thu, 24 Jan 2019 07:04:10 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=13807#p13807</guid>
		</item>
		<item>
			<title><![CDATA[Re: DSA-4371-1 apt -- security update]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=13806#p13806</link>
			<description><![CDATA[<p>Hello golinux, thanks for pointing the link out. I read it carefully, but I&#039;m a bit unclear. <br />Please let me start by explaining my information a bit.</p><p>I&#039;m on Devuan 1 (jessie) 32bit</p><p>Current apt status:</p><div class="codebox"><pre><code>#! nili ~ $ apt-cache policy apt
apt:
  Installed: 1.0.9.8.5
  Candidate: 1.0.9.8.5
  Version table:
 *** 1.0.9.8.5 0
        500 http://deb.devuan.org/merged/ jessie-security/main i386 Packages
        100 /var/lib/dpkg/status
     1.0.9.8.4 0
        500 http://deb.devuan.org/merged/ jessie/main i386 Packages</code></pre></div><p>according to <a href="https://security-tracker.debian.org/tracker/CVE-2019-3462" rel="nofollow">CVE-2019-3462</a> is noted for &quot;jessie-security&quot; have been patched/fixed </p><p>Source Package&#160; &#160; Release&#160; &#160; &#160; &#160; &#160; &#160; &#160; Version&#160; &#160; &#160; Status<br />apt (PTS)&#160; &#160; &#160; &#160; &#160;jessie (security)&#160; &#160; 1.0.9.8.5&#160; &#160; fixed</p><p>My sources.list:</p><div class="codebox"><pre><code>deb http://deb.devuan.org/merged jessie main contrib non-free

deb http://deb.devuan.org/merged jessie-updates main contrib non-free

deb http://deb.devuan.org/merged jessie-security main contrib non-free

deb http://deb.devuan.org/merged jessie-backports main contrib non-free</code></pre></div><p>it is said from <a href="https://lists.dyne.org/lurker/message/20190122.152406.07b05a4c.en.html" rel="nofollow">KatolaZ</a></p><div class="quotebox"><blockquote><div><p>The safest way would actually be to manually download the deb packages of apt from the debian-security pool (more information available below), or to use pkgmaster.devuan.org in your sources.list to do the upgrade (pkgmaster.devuan.org is not a rough mirror...).</p></div></blockquote></div><p>^This part is that I&#039;m confused.</p><p>I&#039;ve done APT successfully upgraded to version 1.0.9.8.5 2 via &quot;deb <a href="http://deb.devuan.org/merged" rel="nofollow">http://deb.devuan.org/merged</a> jessie-security&quot;<br />Is it necessary for me to switch hosts to &quot;<strong>pkgmaster.devuan.org</strong>&quot; or make other manual interventions?</p><p>Forgive me for my lack of understanding on this part.</p><p>BR,<br />Nili</p>]]></description>
			<author><![CDATA[dummy@example.com (Nili)]]></author>
			<pubDate>Thu, 24 Jan 2019 06:38:32 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=13806#p13806</guid>
		</item>
		<item>
			<title><![CDATA[Re: DSA-4371-1 apt -- security update]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=13794#p13794</link>
			<description><![CDATA[<p>You can find KatolaZ&#039; recommendations <span class="bbu"><a href="https://lists.dyne.org/lurker/message/20190122.152406.07b05a4c.en.html" rel="nofollow">HERE</a></span></p>]]></description>
			<author><![CDATA[dummy@example.com (golinux)]]></author>
			<pubDate>Wed, 23 Jan 2019 15:03:55 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=13794#p13794</guid>
		</item>
		<item>
			<title><![CDATA[DSA-4371-1 apt -- security update]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=13793#p13793</link>
			<description><![CDATA[<p>Hello! I just received an update for package &quot;apt&quot; on Devuan 1 (Jessie)</p><div class="codebox"><pre><code>Start-Date: 2019-01-23  15:02:58
Commandline: apt-get upgrade
Upgrade: apt:i386 (1.0.9.8.4, 1.0.9.8.5), libudev1:i386 (215-17+deb8u8, 215-17+deb8u9), udev:i386 (215-17+deb8u8, 215-17+deb8u9), libapt-pkg4.12:i386 (1.0.9.8.4, 1.0.9.8.5), apt-utils:i386 (1.0.9.8.4, 1.0.9.8.5), libapt-inst1.5:i386 (1.0.9.8.4, 1.0.9.8.5), libjpeg62-turbo:i386 (1.3.1-12, 1.3.1-12+deb8u1)
End-Date: 2019-01-23  15:03:20</code></pre></div><p>I usually look at <a href="https://www.debian.org/security/2019/dsa-4371" rel="nofollow">DSA</a> for specific packages to read more about the update.<br />For this APT update, Noticed that an intervention is required:</p><div class="quotebox"><blockquote><div><p>Since the vulnerability is present in the package manager itself, it is recommended to disable redirects in order to prevent exploitation during this upgrade only, using:</p></div></blockquote></div><div class="codebox"><pre><code>apt -o Acquire::http::AllowRedirect=false update
apt -o Acquire::http::AllowRedirect=false upgrade</code></pre></div><p>I mean, Does it apply to us Devuan users as well?</p><p>I ask this question because doing those commands is associated by a notice, (located inside the above DSA link).</p><p>So far, I have not done any action except updating APT.<br />Any advice/info would clarify a bit more about this security advisory.</p><p>Thank you for your attention.<br />BR,<br />Nili</p>]]></description>
			<author><![CDATA[dummy@example.com (Nili)]]></author>
			<pubDate>Wed, 23 Jan 2019 14:45:17 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=13793#p13793</guid>
		</item>
	</channel>
</rss>
