<feed xmlns='http://www.w3.org/2005/Atom'>
<title>apt/methods, branch 1.0.9.5</title>
<subtitle>Debians commandline package manager</subtitle>
<id>https://git.kalnischkies.de/apt/atom?h=1.0.9.5</id>
<link rel='self' href='https://git.kalnischkies.de/apt/atom?h=1.0.9.5'/>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/'/>
<updated>2014-12-22T13:23:39Z</updated>
<entry>
<title>dispose http(s) 416 error page as non-content</title>
<updated>2014-12-22T13:23:39Z</updated>
<author>
<name>David Kalnischkies</name>
<email>david@kalnischkies.de</email>
</author>
<published>2014-11-29T16:59:52Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=92e8c1ff287ab829de825e00cdf94744e699ff97'/>
<id>urn:sha1:92e8c1ff287ab829de825e00cdf94744e699ff97</id>
<content type='text'>
Real webservers (like apache) actually send an error page with a 416
response, but our client didn't expect it leaving the page on the socket
to be parsed as response for the next request (http) or as file content
(https), which isn't what we want at all… Symptom is a "Bad header line"
as html usually doesn't parse that well to an http-header.

This manifests itself e.g. if we have a complete file (or larger) in
partial/ which isn't discarded by If-Range as the server doesn't support
it (or it is just newer, think: mirror rotation).
It is a sort-of regression of 78c72d0ce22e00b194251445aae306df357d5c1a,
which removed the filesize - 1 trick, but this had its own problems…

To properly test this our webserver gains the ability to reply with
transfer-encoding: chunked as most real webservers will use it to send
the dynamically generated error pages.

(The tests and their binary helpers had to be slightly modified to
apply, but the patch to fix the issue itself is unchanged.)

Closes: 768797
</content>
</entry>
<entry>
<title>methods/rsh.cc: replace strcat with std::string</title>
<updated>2014-10-08T09:35:48Z</updated>
<author>
<name>Michael Vogt</name>
<email>mvo@ubuntu.com</email>
</author>
<published>2014-10-08T09:35:48Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=180b693262d71381d650d10c3f95a5a70553f40f'/>
<id>urn:sha1:180b693262d71381d650d10c3f95a5a70553f40f</id>
<content type='text'>
Instead of using strcat use a C++ std::string to avoid overflowing
this buffer. Thanks to David Garfield

Closes: #76442
</content>
</entry>
<entry>
<title>generalize Acquire::GzipIndex</title>
<updated>2014-09-21T08:18:03Z</updated>
<author>
<name>Michael Vogt</name>
<email>mvo@debian.org</email>
</author>
<published>2014-09-21T08:18:03Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=b0f4b486e6850c5f98520ccf19da71d0ed748ae4'/>
<id>urn:sha1:b0f4b486e6850c5f98520ccf19da71d0ed748ae4</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Fix regression when copy: is used for a relative path</title>
<updated>2014-09-19T14:41:55Z</updated>
<author>
<name>Michael Vogt</name>
<email>mvo@ubuntu.com</email>
</author>
<published>2014-09-19T14:41:55Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=9da539c5aff025aab99537be1c75e8c6a853fd83'/>
<id>urn:sha1:9da539c5aff025aab99537be1c75e8c6a853fd83</id>
<content type='text'>
When we do a ReverifyAfterIMS() we use the copy: method to
verify the hashes again. If the user uses -o Dir=./something/relative
this fails because we use the URI class in copy.cc that strips
away the leading relative part. By not using URI this is fixed.

Closes: #762160
</content>
</entry>
<entry>
<title>SECURITY UPDATE for CVE-2014-{0488,0487,0489}</title>
<updated>2014-09-16T18:39:13Z</updated>
<author>
<name>Michael Vogt</name>
<email>mvo@ubuntu.com</email>
</author>
<published>2014-09-16T18:23:43Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=ca7fd76c2f30c100dcf1c12e717ce397cccd690b'/>
<id>urn:sha1:ca7fd76c2f30c100dcf1c12e717ce397cccd690b</id>
<content type='text'>
incorrect invalidating of unauthenticated data (CVE-2014-0488)
incorect verification of 304 reply (CVE-2014-0487)
incorrect verification of Acquire::Gzip indexes (CVE-2014-0489)
</content>
</entry>
<entry>
<title>Improve Debug::Acquire::http debug output</title>
<updated>2014-09-05T14:24:32Z</updated>
<author>
<name>Michael Vogt</name>
<email>mvo@ubuntu.com</email>
</author>
<published>2014-09-05T14:24:32Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=9622b2111095c3fc705ec0615d27fe403e18c3b8'/>
<id>urn:sha1:9622b2111095c3fc705ec0615d27fe403e18c3b8</id>
<content type='text'>
Prefix all answers with the URL that the answer is for. This
helps when debugging and pipeline is enabled.
</content>
</entry>
<entry>
<title>Make Proxy-Auto-Detect check for each host</title>
<updated>2014-09-02T14:02:37Z</updated>
<author>
<name>Michael Vogt</name>
<email>mvo@ubuntu.com</email>
</author>
<published>2014-09-02T13:50:19Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=c6ee61eab54edf6cc3fbe118d304d72a860e1451'/>
<id>urn:sha1:c6ee61eab54edf6cc3fbe118d304d72a860e1451</id>
<content type='text'>
When doing Acquire::http{,s}::Proxy-Auto-Detect, run the auto-detect
command for each host instead of only once. This should make using
"proxy" from libproxy-tools feasible which can then be used for PAC
style or other proxy configurations.

Closes: #759264
</content>
</entry>
<entry>
<title>methods/http.cc: use Req.str() in debug output</title>
<updated>2014-06-24T13:45:09Z</updated>
<author>
<name>Michael Vogt</name>
<email>mvo@debian.org</email>
</author>
<published>2014-06-24T13:45:09Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=7b734b09f6bd9356e4622aee64bd2e5e43554570'/>
<id>urn:sha1:7b734b09f6bd9356e4622aee64bd2e5e43554570</id>
<content type='text'>
</content>
</entry>
<entry>
<title>enforce LFS for partial files in https range requests</title>
<updated>2014-04-26T07:51:05Z</updated>
<author>
<name>David Kalnischkies</name>
<email>david@kalnischkies.de</email>
</author>
<published>2014-04-24T08:49:41Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=062074cb519aa05110d24936d95747c59cc0ffc1'/>
<id>urn:sha1:062074cb519aa05110d24936d95747c59cc0ffc1</id>
<content type='text'>
</content>
</entry>
<entry>
<title>build http request in a stringstream</title>
<updated>2014-04-26T07:51:05Z</updated>
<author>
<name>David Kalnischkies</name>
<email>david@kalnischkies.de</email>
</author>
<published>2014-04-24T08:20:45Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=b123b0ba77936a82d7964bebf01693acf94cae1f'/>
<id>urn:sha1:b123b0ba77936a82d7964bebf01693acf94cae1f</id>
<content type='text'>
beside reducing code a bit, it avoids oddball problems while building
the string and doesn't trigger static analyse warnings.
</content>
</entry>
</feed>
