<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<atom:link href="https://dev1galaxy.org/extern.php?action=feed&amp;tid=4318&amp;type=rss" rel="self" type="application/rss+xml" />
		<title><![CDATA[Dev1 Galaxy Forum / [SOLVED] Security update delays (again)]]></title>
		<link>https://dev1galaxy.org/viewtopic.php?id=4318</link>
		<description><![CDATA[The most recent posts in [SOLVED] Security update delays (again).]]></description>
		<lastBuildDate>Sun, 16 May 2021 16:21:51 +0000</lastBuildDate>
		<generator>FluxBB</generator>
		<item>
			<title><![CDATA[Re: [SOLVED] Security update delays (again)]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=29824#p29824</link>
			<description><![CDATA[<p>Thanks for the alert. It&#039;s been brought up to date.</p>]]></description>
			<author><![CDATA[dummy@example.com (fsmithred)]]></author>
			<pubDate>Sun, 16 May 2021 16:21:51 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=29824#p29824</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] Security update delays (again)]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=29823#p29823</link>
			<description><![CDATA[<p>I received this notification more than 48 hours ago:</p><div class="quotebox"><blockquote><div><p>- -------------------------------------------------------------------------<br />Debian Security Advisory DSA-4915-1&#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160;security@debian.org<br /><a href="https://www.debian.org/security/" rel="nofollow">https://www.debian.org/security/</a>&#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160;Moritz Muehlenhoff<br />May 13, 2021&#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; <a href="https://www.debian.org/security/faq" rel="nofollow">https://www.debian.org/security/faq</a><br />- -------------------------------------------------------------------------</p><p>Package&#160; &#160; &#160; &#160; : postgresql-11<br />CVE ID&#160; &#160; &#160; &#160; &#160;: CVE-2021-32027 CVE-2021-32028 CVE-2021-32029</p><p>Multiple security issues have been discovered in the PostgreSQL database<br />system, which could result in the execution of arbitrary code or<br />disclosure of memory content.</p><p>For the stable distribution (buster), these problems have been fixed in<br />version 11.12-0+deb10u1.</p><p>We recommend that you upgrade your postgresql-11 packages.</p><p>For the detailed security status of postgresql-11 please refer to<br />its security tracker page at:<br /><a href="https://security-tracker.debian.org/tracker/postgresql-11" rel="nofollow">https://security-tracker.debian.org/tra … tgresql-11</a></p><p>Further information about Debian Security Advisories, how to apply<br />these updates to your system and frequently asked questions can be<br />found at: <a href="https://www.debian.org/security/" rel="nofollow">https://www.debian.org/security/</a></p><p>Mailing list: debian-security-announce@lists.debian.org</p></div></blockquote></div><p>This does not look right:</p><div class="codebox"><pre><code>$ apt policy postgresql-11
postgresql-11:
  Installed: (none)
  Candidate: 11.11-0+deb10u1
  Version table:
     11.11-0+deb10u1 500
        500 http://deb.devuan.org/merged beowulf/main amd64 Packages
     11.7-0+deb10u1 500
        500 http://deb.devuan.org/merged beowulf-security/main amd64 Packages</code></pre></div>]]></description>
			<author><![CDATA[dummy@example.com (pcalvert)]]></author>
			<pubDate>Sun, 16 May 2021 00:11:30 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=29823#p29823</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] Security update delays (again)]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=29711#p29711</link>
			<description><![CDATA[<p>It finally came through some time earlier today.</p><div class="codebox"><pre><code>$ apt policy exim4
exim4:
  Installed: 4.92-8+deb10u5
  Candidate: 4.92-8+deb10u6
  Version table:
     4.92-8+deb10u6 500
        500 http://deb.devuan.org/merged beowulf-security/main amd64 Packages
 *** 4.92-8+deb10u5 500
        500 http://deb.devuan.org/merged beowulf/main amd64 Packages
        100 /var/lib/dpkg/status</code></pre></div>]]></description>
			<author><![CDATA[dummy@example.com (pcalvert)]]></author>
			<pubDate>Mon, 10 May 2021 17:09:22 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=29711#p29711</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] Security update delays (again)]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=29703#p29703</link>
			<description><![CDATA[<p>In case it helps, this is the last security update that came through in a timely manner:</p><div class="quotebox"><blockquote><div><p>- -------------------------------------------------------------------------<br />Debian Security Advisory DSA-4911-1&#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160;security@debian.org<br /><a href="https://www.debian.org/security/" rel="nofollow">https://www.debian.org/security/</a>&#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; Michael Gilbert<br />May 03, 2021&#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; <a href="https://www.debian.org/security/faq" rel="nofollow">https://www.debian.org/security/faq</a><br />- -------------------------------------------------------------------------</p><p>Package&#160; &#160; &#160; &#160; : chromium<br />CVE ID&#160; &#160; &#160; &#160; &#160;: CVE-2021-21227 CVE-2021-21228 CVE-2021-21229 CVE-2021-21230<br />&#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160;CVE-2021-21231 CVE-2021-21232 CVE-2021-21233</p><p>Several vulnerabilities have been discovered in the chromium web browser.</p><p>CVE-2021-21227</p><p>&#160; &#160; Gengming Liu discovered a data validation issue in the v8 javascript<br />&#160; &#160; library.</p><p>CVE-2021-21228</p><p>&#160; &#160; Rob Wu discovered a policy enforcement error.</p><p>CVE-2021-21229</p><p>&#160; &#160; Mohit Raj discovered a user interface error in the file downloader.</p><p>CVE-2021-21230</p><p>&#160; &#160; Manfred Paul discovered use of an incorrect type.</p><p>CVE-2021-21231</p><p>&#160; &#160; Sergei Glazunov discovered a data validation issue in the v8 javascript<br />&#160; &#160; library.</p><p>CVE-2021-21232</p><p>&#160; &#160; Abdulrahman Alqabandi discovered a use-after-free issue in the developer<br />&#160; &#160; tools.</p><p>CVE-2021-21233</p><p>&#160; &#160; Omair discovered a buffer overflow issue in the ANGLE library.</p><p>For the stable distribution (buster), these problems have been fixed in<br />version 90.0.4430.93-1~deb10u1.</p><p>We recommend that you upgrade your chromium packages.</p><p>For the detailed security status of chromium please refer to<br />its security tracker page at:<br /><a href="https://security-tracker.debian.org/tracker/chromium" rel="nofollow">https://security-tracker.debian.org/tracker/chromium</a></p><p>Further information about Debian Security Advisories, how to apply<br />these updates to your system and frequently asked questions can be<br />found at: <a href="https://www.debian.org/security/" rel="nofollow">https://www.debian.org/security/</a></p><p>Mailing list: debian-security-announce@lists.debian.org</p></div></blockquote></div><p>From aptitude&#039;s log file:</p><div class="codebox"><pre><code>Aptitude 0.8.11: log report
Tue, May  4 2021 10:27:13 -0400

  IMPORTANT: this log only lists intended actions; actions which fail
  due to dpkg problems may not be completed.

Will install 3 packages, and remove 0 packages.
4096 B of disk space will be used
========================================
[UPGRADE] chromium:amd64 90.0.4430.85-1~deb10u1 -&gt; 90.0.4430.93-1~deb10u1
[UPGRADE] chromium-common:amd64 90.0.4430.85-1~deb10u1 -&gt; 90.0.4430.93-1~deb10u1
[UPGRADE] chromium-sandbox:amd64 90.0.4430.85-1~deb10u1 -&gt; 90.0.4430.93-1~deb10u1
========================================

Log complete.</code></pre></div>]]></description>
			<author><![CDATA[dummy@example.com (pcalvert)]]></author>
			<pubDate>Sun, 09 May 2021 19:06:52 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=29703#p29703</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] Security update delays (again)]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=29691#p29691</link>
			<description><![CDATA[<p>Using Refracta won&#039;t matter because it only has devuan repos. I was told a full merge is scheduled for Sunday, but I really have no idea what the schedule is or why. It seemed like we had this problem fixed with the last set of patches to amprolla. Guess not.</p>]]></description>
			<author><![CDATA[dummy@example.com (fsmithred)]]></author>
			<pubDate>Sat, 08 May 2021 14:29:26 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=29691#p29691</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] Security update delays (again)]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=29690#p29690</link>
			<description><![CDATA[<p>It has now been over 96 hours, and there is still no sign of the update.</p><div class="codebox"><pre><code>$ apt policy exim4
exim4:
  Installed: 4.92-8+deb10u5
  Candidate: 4.92-8+deb10u5
  Version table:
 *** 4.92-8+deb10u5 500
        500 http://deb.devuan.org/merged beowulf/main amd64 Packages
        100 /var/lib/dpkg/status
     4.92-8+deb10u4 500
        500 http://deb.devuan.org/merged beowulf-security/main amd64 Packages</code></pre></div><p>By the way, in case it matters, I am using Refracta based on Devuan Beowulf. I forgot to mention that in my original post.</p>]]></description>
			<author><![CDATA[dummy@example.com (pcalvert)]]></author>
			<pubDate>Sat, 08 May 2021 14:04:45 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=29690#p29690</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] Security update delays (again)]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=29642#p29642</link>
			<description><![CDATA[<div class="quotebox"><cite>Altoid wrote:</cite><blockquote><div><div class="quotebox"><cite>Tim Anderson @TheRegister wrote:</cite><blockquote><div><p>At the time of writing*, the packages for Debian 9 (Stretch), which is end of life but in long term support, had not yet been updated.</p></div></blockquote></div></div></blockquote></div><p>That would be valid for ASCII, not for Beowulf/Buster.</p><p>rolfie</p>]]></description>
			<author><![CDATA[dummy@example.com (rolfie)]]></author>
			<pubDate>Wed, 05 May 2021 18:58:53 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=29642#p29642</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] Security update delays (again)]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=29641#p29641</link>
			<description><![CDATA[<p>Hello:</p><div class="quotebox"><cite>pcalvert wrote:</cite><blockquote><div><p>... received this notification more than 24 hours ago ...<br />... problems have been fixed in version 4.92-8+deb10u6.</p></div></blockquote></div><p>See this article from The Register.<br /><a href="https://www.theregister.com/2021/05/05/21_nails_in_exim_mail/" rel="nofollow">https://www.theregister.com/2021/05/05/ … exim_mail/</a></p><div class="quotebox"><cite>Tim Anderson @TheRegister wrote:</cite><blockquote><div><p>At the time of writing*, the packages for Debian 9 (Stretch), which is end of life but in long term support, had not yet been updated.</p></div></blockquote></div><p>* Wed 5 May 2021 // 17:20 UTC</p><p>It may shed some light on the reasons for the apparent delay.<br />It&#039;s probably on its way.</p><div class="codebox"><pre><code>groucho@devuan:~$ apt policy exim4
exim4:
  Installed: (none)
  Candidate: 4.92-8+deb10u5
  Version table:
     4.94.2-1~bpo10+1 100
        100 http://deb.devuan.org/merged beowulf-backports/main amd64 Packages
        100 http://deb.devuan.org/merged beowulf-backports/main i386 Packages
     4.92-8+deb10u5 500
        500 http://deb.devuan.org/merged beowulf/main amd64 Packages
        500 http://deb.devuan.org/merged beowulf/main i386 Packages
     4.92-8+deb10u4 500
        500 http://deb.devuan.org/merged beowulf-security/main amd64 Packages
        500 http://deb.devuan.org/merged beowulf-security/main i386 Packages
groucho@devuan:~$ </code></pre></div><p>Best,</p><p>A.</p>]]></description>
			<author><![CDATA[dummy@example.com (Altoid)]]></author>
			<pubDate>Wed, 05 May 2021 18:54:15 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=29641#p29641</guid>
		</item>
		<item>
			<title><![CDATA[[SOLVED] Security update delays (again)]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=29640#p29640</link>
			<description><![CDATA[<p>I received this notification more than 24 hours ago:</p><div class="quotebox"><blockquote><div><p>- -------------------------------------------------------------------------<br />Debian Security Advisory DSA-4912-1&#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160;security@debian.org<br /><a href="https://www.debian.org/security/" rel="nofollow">https://www.debian.org/security/</a>&#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160;Salvatore Bonaccorso<br />May 04, 2021&#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; <a href="https://www.debian.org/security/faq" rel="nofollow">https://www.debian.org/security/faq</a><br />- -------------------------------------------------------------------------</p><p>Package&#160; &#160; &#160; &#160; : exim4<br />CVE ID&#160; &#160; &#160; &#160; &#160;: CVE-2020-28007 CVE-2020-28008 CVE-2020-28009 CVE-2020-28010<br />&#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160;CVE-2020-28011 CVE-2020-28012 CVE-2020-28013 CVE-2020-28014<br />&#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160;CVE-2020-28015 CVE-2020-28017 CVE-2020-28019 CVE-2020-28021<br />&#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160;CVE-2020-28022 CVE-2020-28023 CVE-2020-28024 CVE-2020-28025<br />&#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160;CVE-2020-28026</p><p>The Qualys Research Labs reported several vulnerabilities in Exim, a<br />mail transport agent, which could result in local privilege escalation<br />and remote code execution.</p><p>Details can be found in the Qualys advisory at<br /><a href="https://www.qualys.com/2021/05/04/21nails/21nails.txt" rel="nofollow">https://www.qualys.com/2021/05/04/21nails/21nails.txt</a></p><p>For the stable distribution (buster), these problems have been fixed in<br />version 4.92-8+deb10u6.</p><p>We recommend that you upgrade your exim4 packages.</p><p>For the detailed security status of exim4 please refer to its security<br />tracker page at:<br /><a href="https://security-tracker.debian.org/tracker/exim4" rel="nofollow">https://security-tracker.debian.org/tracker/exim4</a></p><p>Further information about Debian Security Advisories, how to apply<br />these updates to your system and frequently asked questions can be<br />found at: <a href="https://www.debian.org/security/" rel="nofollow">https://www.debian.org/security/</a></p></div></blockquote></div><p>Reference:<br /><a href="https://www.debian.org/security/2021/dsa-4912" rel="nofollow">https://www.debian.org/security/2021/dsa-4912</a></p><p>I&#039;ve run <strong>apt update</strong> multiple times since then, and it hasn&#039;t shown up yet.</p><div class="codebox"><pre><code>$ apt policy exim4
exim4:
  Installed: 4.92-8+deb10u5
  Candidate: 4.92-8+deb10u5
  Version table:
 *** 4.92-8+deb10u5 500
        500 http://deb.devuan.org/merged beowulf/main amd64 Packages
        100 /var/lib/dpkg/status
     4.92-8+deb10u4 500
        500 http://deb.devuan.org/merged beowulf-security/main amd64 Packages</code></pre></div><p>Although I could be mistaken, this does not seem like normal behavior to me.</p>]]></description>
			<author><![CDATA[dummy@example.com (pcalvert)]]></author>
			<pubDate>Wed, 05 May 2021 18:22:07 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=29640#p29640</guid>
		</item>
	</channel>
</rss>
