<feed xmlns='http://www.w3.org/2005/Atom'>
<title>apt, branch 1.8.0_beta1</title>
<subtitle>Debians commandline package manager</subtitle>
<id>https://git.kalnischkies.de/apt/atom?h=1.8.0_beta1</id>
<link rel='self' href='https://git.kalnischkies.de/apt/atom?h=1.8.0_beta1'/>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/'/>
<updated>2019-01-23T15:50:11Z</updated>
<entry>
<title>Release 1.8.0~beta1</title>
<updated>2019-01-23T15:50:11Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2019-01-23T15:50:11Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=4200469bb5a14c4659285917ed30c46a0b15c286'/>
<id>urn:sha1:4200469bb5a14c4659285917ed30c46a0b15c286</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Merge tag '1.8.0_alpha3.1'</title>
<updated>2019-01-22T18:54:55Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2019-01-22T18:54:55Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=d39b6b646cc912314e1e3560ad407980131df92b'/>
<id>urn:sha1:d39b6b646cc912314e1e3560ad407980131df92b</id>
<content type='text'>
apt Debian release 1.8.0~alpha3.1
</content>
</entry>
<entry>
<title>Release 1.8.0~alpha3.1</title>
<updated>2019-01-22T18:52:42Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2019-01-22T18:51:09Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=f397feb72d964924daa85c8cfad18db3a0570ab7'/>
<id>urn:sha1:f397feb72d964924daa85c8cfad18db3a0570ab7</id>
<content type='text'>
</content>
</entry>
<entry>
<title>SECURITY UPDATE: content injection in http method (CVE-2019-3462)</title>
<updated>2019-01-22T18:50:36Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2019-01-18T08:13:52Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=c31d65e76810f72c356e381818174bf100605de7'/>
<id>urn:sha1:c31d65e76810f72c356e381818174bf100605de7</id>
<content type='text'>
This fixes a security issue that can be exploited to inject arbritrary debs
or other files into a signed repository as followed:

(1) Server sends a redirect to somewhere%0a&lt;headers for the apt method&gt; (where %0a is
    \n encoded)
(2) apt method decodes the redirect (because the method encodes the URLs before
    sending them out), writting something like
    somewhere\n
    &lt;headers&gt;
    into its output
(3) apt then uses the headers injected for validation purposes.

Regression-Of: c34ea12ad509cb34c954ed574a301c3cbede55ec
LP: #1812353
(cherry picked from commit 5eb01ec13f3ede4bae5e60eb16bd8cffb7c03e1b)
</content>
</entry>
<entry>
<title>Merge branch 'pu/release-preparations'</title>
<updated>2019-01-22T17:39:56Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2019-01-22T17:39:56Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=cf6c1eb20951bcf6be32cab495da03bc4f68bf8a'/>
<id>urn:sha1:cf6c1eb20951bcf6be32cab495da03bc4f68bf8a</id>
<content type='text'>
</content>
</entry>
<entry>
<title>debian/control: Drop libcurl4-gnutls-dev build dependency</title>
<updated>2019-01-22T17:37:49Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2019-01-22T17:37:00Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=95612ea3b7a54b810b8a2f5ee2e3a29660b3c78b'/>
<id>urn:sha1:95612ea3b7a54b810b8a2f5ee2e3a29660b3c78b</id>
<content type='text'>
Not needed since quite some time.
</content>
</entry>
<entry>
<title>Merge branch 'pu/gpgvsignedby' into 'master'</title>
<updated>2019-01-22T15:02:36Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>jak@debian.org</email>
</author>
<published>2019-01-22T15:02:36Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=690bc2923814b3620ace1ffcb710603f81fa217f'/>
<id>urn:sha1:690bc2923814b3620ace1ffcb710603f81fa217f</id>
<content type='text'>
Report keys used to sign file from gpgv method to acquire system

See merge request apt-team/apt!44</content>
</entry>
<entry>
<title>SECURITY UPDATE: content injection in http method (CVE-2019-3462)</title>
<updated>2019-01-22T11:50:59Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2019-01-18T08:13:52Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=5eb01ec13f3ede4bae5e60eb16bd8cffb7c03e1b'/>
<id>urn:sha1:5eb01ec13f3ede4bae5e60eb16bd8cffb7c03e1b</id>
<content type='text'>
This fixes a security issue that can be exploited to inject arbritrary debs
or other files into a signed repository as followed:

(1) Server sends a redirect to somewhere%0a&lt;headers for the apt method&gt; (where %0a is
    \n encoded)
(2) apt method decodes the redirect (because the method encodes the URLs before
    sending them out), writting something like
    somewhere\n
    &lt;headers&gt;
    into its output
(3) apt then uses the headers injected for validation purposes.

Regression-Of: c34ea12ad509cb34c954ed574a301c3cbede55ec
LP: #1812353
</content>
</entry>
<entry>
<title>doc/apt-verbatim.ent: Debian buster is stable</title>
<updated>2019-01-22T11:43:15Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2019-01-22T11:36:37Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=2fea01a9f0db4107bfcca79fabe8e11403050d9e'/>
<id>urn:sha1:2fea01a9f0db4107bfcca79fabe8e11403050d9e</id>
<content type='text'>
Move everything up one "old", and change testing to be
bullseye.
</content>
</entry>
<entry>
<title>CI: Use debian:buster as test base image</title>
<updated>2019-01-22T11:43:15Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2019-01-22T11:33:51Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=3cc995a1318b971aed9f8d9f968d4a0a16ece53b'/>
<id>urn:sha1:3cc995a1318b971aed9f8d9f968d4a0a16ece53b</id>
<content type='text'>
This prepares us for the upcoming buster release, as buster
is the main release series for this series (the other being
Ubuntu disco).
</content>
</entry>
</feed>
