Stories
Slash Boxes
Comments

SoylentNews is people

posted by LaminatorX on Friday September 19 2014, @08:48AM   Printer-friendly
from the apt-to-fail dept.

"We recommend that you upgrade your apt packages." with apt of course... (via https://twitter.com/ioerror)

https://www.debian.org/security/2014/dsa-3025

"It was discovered that APT, the high level package manager, does not properly invalidate unauthenticated data (CVE-2014-0488), performs incorrect verification of 304 replies (CVE-2014-0487), does not perform the checksum check when the Acquire::GzipIndexes option is used (CVE-2014-0489) and does not properly perform validation for binary packages downloaded by the apt-get download command (CVE-2014-0490)."

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 4, Informative) by _NSAKEY on Friday September 19 2014, @08:58AM

    by _NSAKEY (16) on Friday September 19 2014, @08:58AM (#95399)

    wget the .debs for both apt [debian.org] and apt-utils [debian.org]. Install with dpkg -i. Done.

    Starting Score:    1  point
    Moderation   +2  
       Informative=2, Total=2
    Extra 'Informative' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   4  
  • (Score: 3, Interesting) by mtrycz on Friday September 19 2014, @09:13AM

    by mtrycz (60) on Friday September 19 2014, @09:13AM (#95403)

    I might not be getting it: is there a clear reason not to update it with apt?

    --
    In capitalist America, ads view YOU!
    • (Score: 3, Informative) by _NSAKEY on Friday September 19 2014, @09:22AM

      by _NSAKEY (16) on Friday September 19 2014, @09:22AM (#95406)

      Aside from avoiding the irony of updating apt by using apt? Not unless you're really paranoid.

      • (Score: 3, Insightful) by mth on Friday September 19 2014, @09:41AM

        by mth (2848) on Friday September 19 2014, @09:41AM (#95409) Homepage

        Bypassing apt altogether skips all security checks, so that would be a lot less safe than apt skipping some of the checks in particular situations.

        • (Score: 3, Informative) by q.kontinuum on Friday September 19 2014, @12:43PM

          by q.kontinuum (532) on Friday September 19 2014, @12:43PM (#95455) Journal

          I'd expepct you can download a signed .deb and check the signature manually, which might make it safer.

          --
          Registered IRC nick on chat.soylentnews.org: qkontinuum
          • (Score: 2) by _NSAKEY on Friday September 19 2014, @04:59PM

            by _NSAKEY (16) on Friday September 19 2014, @04:59PM (#95559)

            The steps for doing that can be found here [debian.org]

      • (Score: -1, Offtopic) by Anonymous Coward on Friday September 19 2014, @11:29AM

        by Anonymous Coward on Friday September 19 2014, @11:29AM (#95433)

        Not unless you're really paranoid.

        What solutions exists for beyond really paranoids? Like, for those imaginarilly paranoids? Or quaternionly paranoids?