ignores expiry of archive keys

Related Vulnerabilities: CVE-2009-1358   CVE-2009-1300  

Debian Bug report logs - #433091
ignores expiry of archive keys

version graph

Package: apt; Maintainer for apt is APT Development Team <deity@lists.debian.org>; Source for apt is src:apt (PTS, buildd, popcon).

Reported by: martin f krafft <madduck@debian.org>

Date: Sat, 14 Jul 2007 11:30:01 UTC

Severity: important

Tags: security

Fixed in versions apt/0.7.21, apt/0.7.20.2+lenny1, apt/0.6.46.4-0.1+etch4, apt/0.7.20.2+squeeze1

Done: Nico Golde <nion@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#433091; Package apt. (full text, mbox, link).


Message #3 received at submit@bugs.debian.org (full text, mbox, reply):

From: martin f krafft <madduck@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: ignores expiry of archive keys
Date: Sat, 14 Jul 2007 13:29:41 +0200
[Message part 1 (text/plain, inline)]
Package: apt
Version: 0.7.3
Severity: important

If I update from an archive whose key recently expired and I have
not yet updated the local copy via apt-key -- the local keyring says
it's expired -- APT does not complain but just proceeds. I think it
should *at least* warn.

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.21-2-amd64 (SMP w/1 CPU core)
Locale: LANG=en_GB, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages apt depends on:
ii  debian-archive-keyring  2007.02.19-0.1   GnuPG archive keys of the Debian a
ii  libc6                   2.6-2            GNU C Library: Shared libraries
ii  libgcc1                 1:4.2-20070707-1 GCC support library
ii  libstdc++6              4.2-20070707-1   The GNU Standard C++ Library v3

apt recommends no packages.

-- no debconf information

-- 
 .''`.   martin f. krafft <madduck@debian.org>
: :'  :  proud Debian developer, author, administrator, and user
`. `'`   http://people.debian.org/~madduck - http://debiansystem.info
  `-  Debian - when you have better things to do than fixing systems
[signature.asc (application/pgp-signature, inline)]

Information forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#433091; Package apt. (full text, mbox, link).


Acknowledgement sent to martin f krafft <madduck@debian.org>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>. (full text, mbox, link).


Message #8 received at 433091@bugs.debian.org (full text, mbox, reply):

From: martin f krafft <madduck@debian.org>
To: 433091@bugs.debian.org
Subject: Re: Bug#433091: ignores expiry of archive keys
Date: Sun, 13 Jul 2008 23:55:58 +0200
[Message part 1 (text/plain, inline)]
severity 433091 critical
# justification: security; incomplete trust model
tags 433091 security
found 433091 0.6.46.4-0.1
thanks

also sprach martin f krafft <madduck@debian.org> [2007.07.14.1329 +0200]:
> If I update from an archive whose key recently expired and I have
> not yet updated the local copy via apt-key -- the local keyring says
> it's expired -- APT does not complain but just proceeds. I think it
> should *at least* warn.

For its first birthday, I am giving this bug report a severity
upgrade and a tag.

-- 
 .''`.   martin f. krafft <madduck@debian.org>
: :'  :  proud Debian developer, author, administrator, and user
`. `'`   http://people.debian.org/~madduck - http://debiansystem.info
  `-  Debian - when you have better things to do than fixing systems
[digital_signature_gpg.asc (application/pgp-signature, inline)]

Severity set to `critical' from `important' Request was from martin f krafft <madduck@debian.org> to control@bugs.debian.org. (Sun, 13 Jul 2008 21:57:06 GMT) (full text, mbox, link).


Tags added: security Request was from martin f krafft <madduck@debian.org> to control@bugs.debian.org. (Sun, 13 Jul 2008 21:57:06 GMT) (full text, mbox, link).


Bug marked as found in version 0.6.46.4-0.1. Request was from martin f krafft <madduck@debian.org> to control@bugs.debian.org. (Sun, 13 Jul 2008 21:57:07 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#433091; Package apt. (full text, mbox, link).


Acknowledgement sent to Thijs Kinkhorst <thijs@debian.org>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>. (full text, mbox, link).


Message #19 received at 433091@bugs.debian.org (full text, mbox, reply):

From: Thijs Kinkhorst <thijs@debian.org>
To: 433091@bugs.debian.org
Cc: martin f krafft <madduck@debian.org>
Subject: Re: Bug#433091: ignores expiry of archive keys
Date: Tue, 5 Aug 2008 14:41:35 +0200
[Message part 1 (text/plain, inline)]
Hi Martin,

Going through the security issues to fix before lenny, I came by this bug.

> > If I update from an archive whose key recently expired and I have
> > not yet updated the local copy via apt-key -- the local keyring says
> > it's expired -- APT does not complain but just proceeds. I think it
> > should *at least* warn.

> For its first birthday, I am giving this bug report a severity
> upgrade and a tag.

I think key expiry is a rather peripheral part of the PGP model. It's designed 
to combat proliferation of keys for which the private key was lost.

While it is desirable to implement key expiry, and I hope that the APT team 
will do so, I do have doubts whether this sould be critical for the release 
of Debian Lenny. Can you provide a scenario that illustrates the criticality 
of this issue?


cheers,
Thijs
[Message part 2 (application/pgp-signature, inline)]

Information forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#433091; Package apt. (full text, mbox, link).


Acknowledgement sent to martin f krafft <madduck@debian.org>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>. (full text, mbox, link).


Message #24 received at 433091@bugs.debian.org (full text, mbox, reply):

From: martin f krafft <madduck@debian.org>
To: Thijs Kinkhorst <thijs@debian.org>
Cc: 433091@bugs.debian.org
Subject: Re: Bug#433091: ignores expiry of archive keys
Date: Tue, 5 Aug 2008 11:23:58 -0300
[Message part 1 (text/plain, inline)]
also sprach Thijs Kinkhorst <thijs@debian.org> [2008.08.05.0941 -0300]:
> While it is desirable to implement key expiry, and I hope that the
> APT team will do so, I do have doubts whether this sould be
> critical for the release of Debian Lenny. Can you provide
> a scenario that illustrates the criticality of this issue?

No, it just casts a rather bad light on the implementation of
signature checking in APT.

-- 
 .''`.   martin f. krafft <madduck@debian.org>
: :'  :  proud Debian developer, author, administrator, and user
`. `'`   http://people.debian.org/~madduck - http://debiansystem.info
  `-  Debian - when you have better things to do than fixing systems
 
on the other hand, you have different fingers.
[digital_signature_gpg.asc (application/pgp-signature, inline)]

Information forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#433091; Package apt. (full text, mbox, link).


Acknowledgement sent to Thijs Kinkhorst <thijs@debian.org>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>. (full text, mbox, link).


Message #29 received at 433091@bugs.debian.org (full text, mbox, reply):

From: Thijs Kinkhorst <thijs@debian.org>
To: martin f krafft <madduck@debian.org>
Cc: 433091@bugs.debian.org
Subject: Re: Bug#433091: ignores expiry of archive keys
Date: Tue, 5 Aug 2008 20:08:02 +0200
[Message part 1 (text/plain, inline)]
On Tuesday 5 August 2008 16:23, martin f krafft wrote:
> also sprach Thijs Kinkhorst <thijs@debian.org> [2008.08.05.0941 -0300]:
> > While it is desirable to implement key expiry, and I hope that the
> > APT team will do so, I do have doubts whether this sould be
> > critical for the release of Debian Lenny. Can you provide
> > a scenario that illustrates the criticality of this issue?
>
> No, it just casts a rather bad light on the implementation of
> signature checking in APT.

That could be true, but is subjective. In a similar way my impression of a 
program with typos in its strings is that it may be sloppily made. Still I 
don't think such a situation is a critical bug.

I propose to put this bug at severity "important" which for me strikes the 
right balance between being 'very desirable to fix' and not being 'an actual, 
critical security hole'. OK?

Obviously fixing it is the real solution.


cheers,
Thijs
[Message part 2 (application/pgp-signature, inline)]

Information forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#433091; Package apt. (full text, mbox, link).


Acknowledgement sent to martin f krafft <madduck@debian.org>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>. (full text, mbox, link).


Message #34 received at 433091@bugs.debian.org (full text, mbox, reply):

From: martin f krafft <madduck@debian.org>
To: Thijs Kinkhorst <thijs@debian.org>
Cc: 433091@bugs.debian.org
Subject: Re: Bug#433091: ignores expiry of archive keys
Date: Tue, 5 Aug 2008 15:24:13 -0300
[Message part 1 (text/plain, inline)]
also sprach Thijs Kinkhorst <thijs@debian.org> [2008.08.05.1508 -0300]:
> I propose to put this bug at severity "important" which for me
> strikes the right balance between being 'very desirable to fix'
> and not being 'an actual, critical security hole'. OK?

Sure, we wouldn't want to endanger our release schedule for feature
enhancements or Debian's reputation. ;|

-- 
 .''`.   martin f. krafft <madduck@debian.org>
: :'  :  proud Debian developer, author, administrator, and user
`. `'`   http://people.debian.org/~madduck - http://debiansystem.info
  `-  Debian - when you have better things to do than fixing systems
 
nasa spent 2 billion dollars on the research of a ballpoint pen that
could write on everything, even upside down, under water, or at
extreme temperatures; the russians used a pencil.
         (but see: http://www.snopes.com/business/genius/spacepen.asp)
[digital_signature_gpg.asc (application/pgp-signature, inline)]

Information forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#433091; Package apt. (full text, mbox, link).


Acknowledgement sent to Thijs Kinkhorst <thijs@debian.org>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>. (full text, mbox, link).


Message #39 received at 433091@bugs.debian.org (full text, mbox, reply):

From: Thijs Kinkhorst <thijs@debian.org>
To: martin f krafft <madduck@debian.org>
Cc: 433091@bugs.debian.org
Subject: Re: Bug#433091: ignores expiry of archive keys
Date: Tue, 5 Aug 2008 20:53:49 +0200
[Message part 1 (text/plain, inline)]
On Tuesday 5 August 2008 20:24, martin f krafft wrote:
> Sure, we wouldn't want to endanger our release schedule for feature
> enhancements or Debian's reputation. ;|

Or put differently, I'd rather spend our time on things that more 
significantly improve the security a of Debian system, and to be frank I 
think it's quite speculative that there's actual reputation risk here.

If you believe that this would actually be detrimental to Debian's reputation, 
surely the APT developers would gladly accept your patch?


Thijs
[Message part 2 (application/pgp-signature, inline)]

Bug reassigned from package `apt' to `gpgv'. Request was from Goswin von Brederlow <goswin-v-b@web.de> to control@bugs.debian.org. (Thu, 04 Sep 2008 16:24:04 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, Debian GnuPG-Maintainers <pkg-gnupg-maint@lists.alioth.debian.org>:
Bug#433091; Package gpgv. (full text, mbox, link).


Acknowledgement sent to Goswin von Brederlow <goswin-v-b@web.de>:
Extra info received and forwarded to list. Copy sent to Debian GnuPG-Maintainers <pkg-gnupg-maint@lists.alioth.debian.org>. (full text, mbox, link).


Message #46 received at 433091@bugs.debian.org (full text, mbox, reply):

From: Goswin von Brederlow <goswin-v-b@web.de>
To: 433091@bugs.debian.org
Cc: 433091-submitter@bugs.debian.org
Subject: Clone+Reassign to gpgv of #433091 apt-get: ignores expiry of archive keys
Date: Thu, 04 Sep 2008 18:47:10 +0200
Hi,

I just cloned and reassigned your bug about apt-get ignoring expired
keys. apt-get forks gpgv to do the actual verification and that gives
no indication of any expirey. So apt-get has no chance to detect and
warn about such an event.

mrvn@book:% sudo gpgv --keyring etc/apt/trusted.gpg var/lib/apt/lists/localhost_debian_dists_sid_Release.gpg var/lib/apt/lists/localhost_debian_dists_sid_Release
gpgv: Signature made Tue Sep  2 18:08:46 2008 CEST using RSA key ID
F583D700
gpgv: Good signature from "Tester (test key) <test@noreply.org>"


mrvn@book:/% sudo gpg --keyring etc/apt/trusted.gpg --verify var/lib/apt/lists/localhost_debian_dists_sid_Release.gpg var/lib/apt/lists/localhost_debian_dists_sid_Release
gpg: WARNING: unsafe ownership on configuration file
`/home/mrvn/.gnupg/gpg.conf'
gpg: Signature made Tue Sep  2 18:08:46 2008 CEST using RSA key ID
F583D700
gpg: Good signature from "Tester (test key) <test@noreply.org>"
gpg: Note: This key has expired!
Primary key fingerprint: 317C B6A2 20E3 D9DF BE98  0264 1E34 EFC0 F583
D700
mrvn@book:/% echo $?
0

Note that gpg does not fail the signature just because it has expired,
even if the signature is made after the expirey date of the key. The
signature was made when the key was still valid s it gets accepted.


MfG
        Goswin




Message sent on to martin f krafft <madduck@debian.org>:
Bug#433091. (full text, mbox, link).


Bug 433091 cloned as bug 497825. Request was from Goswin von Brederlow <goswin-v-b@web.de> to control@bugs.debian.org. (Thu, 04 Sep 2008 16:55:36 GMT) (full text, mbox, link).


Bug reassigned from package `gpgv' to `apt'. Request was from Goswin von Brederlow <goswin-v-b@web.de> to control@bugs.debian.org. (Thu, 04 Sep 2008 16:55:40 GMT) (full text, mbox, link).


Severity set to `important' from `critical' Request was from Thijs Kinkhorst <thijs@debian.org> to control@bugs.debian.org. (Fri, 05 Sep 2008 06:45:03 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#433091; Package apt. (full text, mbox, link).


Acknowledgement sent to Thijs Kinkhorst <thijs@debian.org>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>. (full text, mbox, link).


Message #60 received at 433091@bugs.debian.org (full text, mbox, reply):

From: Thijs Kinkhorst <thijs@debian.org>
To: 433091@bugs.debian.org
Subject: Re: apt-get: ignores expiry of archive keys
Date: Fri, 5 Sep 2008 08:47:10 +0200
[Message part 1 (text/plain, inline)]
On Thursday 4 September 2008 18:47, Goswin von Brederlow wrote:
> apt-get forks gpgv to do the actual verification and that gives
> no indication of any expirey. So apt-get has no chance to detect and
> warn about such an event.

Werner, what do you think of implementing key expiry checking in gpgv?


cheers,
Thijs
[Message part 2 (application/pgp-signature, inline)]

Information forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#433091; Package apt. (Mon, 06 Apr 2009 00:15:05 GMT) (full text, mbox, link).


Acknowledgement sent to Peter Palfrader <weasel@debian.org>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>. (Mon, 06 Apr 2009 00:15:05 GMT) (full text, mbox, link).


Message #65 received at 433091@bugs.debian.org (full text, mbox, reply):

From: Peter Palfrader <weasel@debian.org>
To: Thijs Kinkhorst <thijs@debian.org>
Cc: martin f krafft <madduck@debian.org>, 433091@bugs.debian.org, team@security.debian.org
Subject: Re: Bug#433091: ignores expiry of archive keys
Date: Mon, 6 Apr 2009 02:12:26 +0200
On Tue, 05 Aug 2008, Thijs Kinkhorst wrote:

> On Tuesday 5 August 2008 20:24, martin f krafft wrote:
> > Sure, we wouldn't want to endanger our release schedule for feature
> > enhancements or Debian's reputation. ;|
> 
> Or put differently, I'd rather spend our time on things that more 
> significantly improve the security a of Debian system, and to be frank I 
> think it's quite speculative that there's actual reputation risk here.

So why the fuck do we ship apt keys with expiration dates anyway, if apt
happily ignores them?

When I create a key and add that to apt's trusted-keys with an
expiration date of foo I fully expect it to not be trusted afterwards.

But heck, I can even create new signatures made after the expiration
date and apt will happily accept any and all Release files signed by
that expired key.

I was shocked when I realized this today, after reading this bug
report I'm dumbfounded that you even consider this acceptable!

still shaking my head,
weasel
-- 
                           |  .''`.  ** Debian GNU/Linux **
      Peter Palfrader      | : :' :      The  universal
 http://www.palfrader.org/ | `. `'      Operating System
                           |   `-    http://www.debian.org/




Information forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#433091; Package apt. (Mon, 06 Apr 2009 00:30:02 GMT) (full text, mbox, link).


Acknowledgement sent to Peter Palfrader <weasel@debian.org>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>. (Mon, 06 Apr 2009 00:30:03 GMT) (full text, mbox, link).


Message #70 received at 433091@bugs.debian.org (full text, mbox, reply):

From: Peter Palfrader <weasel@debian.org>
To: Goswin von Brederlow <goswin-v-b@web.de>
Cc: 433091@bugs.debian.org, 497825@bugs.debian.org
Subject: Re: Clone+Reassign to gpgv of #433091 apt-get: ignores expiry of archive keys
Date: Mon, 6 Apr 2009 02:26:35 +0200
Goswin von Brederlow schrieb am Donnerstag, dem 04. September 2008:

> mrvn@book:% sudo gpgv --keyring etc/apt/trusted.gpg var/lib/apt/lists/localhost_debian_dists_sid_Release.gpg var/lib/apt/lists/localhost_debian_dists_sid_Release
> gpgv: Signature made Tue Sep  2 18:08:46 2008 CEST using RSA key ID
> F583D700
> gpgv: Good signature from "Tester (test key) <test@noreply.org>"

Stop abusing my domain name.  example.{com,org,net} is what you were
looking for.

> mrvn@book:/% sudo gpg --keyring etc/apt/trusted.gpg --verify var/lib/apt/lists/localhost_debian_dists_sid_Release.gpg var/lib/apt/lists/localhost_debian_dists_sid_Release
> gpg: WARNING: unsafe ownership on configuration file
> `/home/mrvn/.gnupg/gpg.conf'
> gpg: Signature made Tue Sep  2 18:08:46 2008 CEST using RSA key ID
> F583D700
> gpg: Good signature from "Tester (test key) <test@noreply.org>"
> gpg: Note: This key has expired!
> Primary key fingerprint: 317C B6A2 20E3 D9DF BE98  0264 1E34 EFC0 F583
> D700
> mrvn@book:/% echo $?
> 0
> 
> Note that gpg does not fail the signature just because it has expired,
> even if the signature is made after the expirey date of the key. The
> signature was made when the key was still valid s it gets accepted.

I don't think that's correct.

| weasel@intrepid:~/tmp/g$ gpgv --keyring ./pubring.gpg  Release.gpg Release
| gpgv: Signature made Mon Apr  6 01:42:33 2009 CEST using DSA key ID BD2B0EE0
| gpgv: Good signature from "db.debian.org archive key 2008"
| weasel@intrepid:~/tmp/g$ echo $?
| 0

| weasel@intrepid:~/tmp/g$ gpg --status-fd=2 --verify Release.gpg Release
| gpg: WARNING: unsafe permissions on homedir `.'
| gpg: Signature made Mon Apr  6 01:42:33 2009 CEST using DSA key ID
| BD2B0EE0
| [GNUPG:] KEYEXPIRED 1238972541
| [GNUPG:] SIGEXPIRED deprecated-use-keyexpired-instead
| [GNUPG:] SIG_ID ku+8oeaPmKjRxDvpydIDp9yPiss 2009-04-05 1238974953
| [GNUPG:] EXPKEYSIG BEA7CF10BD2B0EE0 db.debian.org archive key 2008
| gpg: Good signature from "db.debian.org archive key 2008"
| [GNUPG:] VALIDSIG 41A8A518BF62877513FE798FBEA7CF10BD2B0EE0 2009-04-05
| 1238974953 0 4 0 17 2 00 41A8A518BF62877513FE798FBEA7CF10BD2B0EE0
| gpg: Note: This key has expired!
| Primary key fingerprint: 41A8 A518 BF62 8775 13FE  798F BEA7 CF10 BD2B 0EE0

No GOODSIG.

So gpgv considers a signature valid that gpg doesn't.  That in itself
should be a grave bug.

-- 
                           |  .''`.  ** Debian GNU/Linux **
      Peter Palfrader      | : :' :      The  universal
 http://www.palfrader.org/ | `. `'      Operating System
                           |   `-    http://www.debian.org/




Information forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#433091; Package apt. (Tue, 07 Apr 2009 10:27:07 GMT) (full text, mbox, link).


Acknowledgement sent to Michael Vogt <mvo@debian.org>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>. (Tue, 07 Apr 2009 10:27:07 GMT) (full text, mbox, link).


Message #75 received at 433091@bugs.debian.org (full text, mbox, reply):

From: Michael Vogt <mvo@debian.org>
To: Peter Palfrader <weasel@debian.org>, 433091@bugs.debian.org
Subject: Re: Bug#433091: ignores expiry of archive keys
Date: Tue, 7 Apr 2009 12:24:54 +0200
On Mon, Apr 06, 2009 at 02:12:26AM +0200, Peter Palfrader wrote:
> On Tue, 05 Aug 2008, Thijs Kinkhorst wrote:
> 
> > On Tuesday 5 August 2008 20:24, martin f krafft wrote:
> > > Sure, we wouldn't want to endanger our release schedule for feature
> > > enhancements or Debian's reputation. ;|
> > 
> > Or put differently, I'd rather spend our time on things that more 
> > significantly improve the security a of Debian system, and to be frank I 
> > think it's quite speculative that there's actual reputation risk here.
> 
> So why the fuck do we ship apt keys with expiration dates anyway, if apt
> happily ignores them?
> 
> When I create a key and add that to apt's trusted-keys with an
> expiration date of foo I fully expect it to not be trusted afterwards.
> 
> But heck, I can even create new signatures made after the expiration
> date and apt will happily accept any and all Release files signed by
> that expired key.
> 
> I was shocked when I realized this today, after reading this bug
> report I'm dumbfounded that you even consider this acceptable!

Sorry for this. I'm looking through the code now and it seems like
this caused by a misinterpretation of the gpg documentation for the
GOODSIG vs VALIDSIG status mesages (and is in the code since day 1 of
apt-secure :(

I'm working on a patch now and would appreicate help with the
testing/verification ones its ready.

Thanks,
 Michael




Information forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#433091; Package apt. (Tue, 07 Apr 2009 15:42:03 GMT) (full text, mbox, link).


Acknowledgement sent to Michael Vogt <mvo@debian.org>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>. (Tue, 07 Apr 2009 15:42:03 GMT) (full text, mbox, link).


Message #80 received at 433091@bugs.debian.org (full text, mbox, reply):

From: Michael Vogt <mvo@debian.org>
To: 433091@bugs.debian.org
Subject: [patch] possible fix
Date: Tue, 7 Apr 2009 17:39:46 +0200
[Message part 1 (text/plain, inline)]
Hi,

I did some investigation and it seems like gpgv is sending the right
message, but the gpgv method in apt is not reading them
properly. There is also the problem that VALIDSIG is send even for
expired/revoked signatures and apt is checking for that (instead of
using GOODSIG). However the docs in doc/DETAILS in gpg make this
difference not clear. 

Attached is a possible fix. It does the following:

 * recognize KEYEXPIRED and KEYREVOKED messages from gpgv and put them
   into a new "WorthlessSignatures " vector
 * only listen for GOODSIG message from gpgv and ignore VALIDSIG (as
   GOODSIG is only send when the signature is not done with a expired or
   revoked key)
 * if there is no good signature, show a message that displays the
   worthless signatures to the user (including the KEYEXPIRED or
   KEYREVSIG bits to ensure there is a way to know what is going on)
 * if there is one (or more) good signature and worthless signatures,
   just ignore the worthless ones

That should hopefully cover the problem without breaking strings and
compatibility. Feedback/review/testing is very welcome. I tested it in
a etch chroot with various expired settings and it works as it should,
but I need to make a test-suit for it too.

Cheers,
 Michael
[gpgv.diff (text/x-diff, attachment)]

Information forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#433091; Package apt. (Tue, 07 Apr 2009 16:21:02 GMT) (full text, mbox, link).


Acknowledgement sent to martin f krafft <madduck@debian.org>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>. (Tue, 07 Apr 2009 16:21:02 GMT) (full text, mbox, link).


Message #85 received at 433091@bugs.debian.org (full text, mbox, reply):

From: martin f krafft <madduck@debian.org>
To: Michael Vogt <mvo@debian.org>, 433091@bugs.debian.org
Subject: Re: Bug#433091: [patch] possible fix
Date: Tue, 7 Apr 2009 18:16:49 +0200
also sprach Michael Vogt <mvo@debian.org> [2009.04.07.1739 +0200]:
> That should hopefully cover the problem without breaking strings and
> compatibility. Feedback/review/testing is very welcome. I tested it in
> a etch chroot with various expired settings and it works as it should,
> but I need to make a test-suit for it too.

Packages for amd64/i386 will be at
http://debian.madduck.net/repo/pool/main/a/apt/ shortly.

-- 
 .''`.   martin f. krafft <madduck@d.o>      Related projects:
: :'  :  proud Debian developer               http://debiansystem.info
`. `'`   http://people.debian.org/~madduck    http://vcs-pkg.org
  `-  Debian - when you have better things to do than fixing systems




Information forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#433091; Package apt. (Tue, 07 Apr 2009 16:36:02 GMT) (full text, mbox, link).


Acknowledgement sent to martin f krafft <madduck@debian.org>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>. (Tue, 07 Apr 2009 16:36:02 GMT) (full text, mbox, link).


Message #90 received at 433091@bugs.debian.org (full text, mbox, reply):

From: martin f krafft <madduck@debian.org>
To: Michael Vogt <mvo@debian.org>, 433091@bugs.debian.org
Subject: Re: Bug#433091: [patch] possible fix
Date: Tue, 7 Apr 2009 18:30:12 +0200
also sprach martin f krafft <madduck@debian.org> [2009.04.07.1816 +0200]:
> Packages for amd64/i386 will be at
> http://debian.madduck.net/repo/pool/main/a/apt/ shortly.

I screwed up the version number, but the packages should work
anyway, and that's fine for testing purposes...

-- 
 .''`.   martin f. krafft <madduck@d.o>      Related projects:
: :'  :  proud Debian developer               http://debiansystem.info
`. `'`   http://people.debian.org/~madduck    http://vcs-pkg.org
  `-  Debian - when you have better things to do than fixing systems




Information forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#433091; Package apt. (Wed, 08 Apr 2009 20:12:11 GMT) (full text, mbox, link).


Acknowledgement sent to Michael Vogt <mvo@debian.org>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>. (Wed, 08 Apr 2009 20:12:11 GMT) (full text, mbox, link).


Message #95 received at 433091@bugs.debian.org (full text, mbox, reply):

From: Michael Vogt <mvo@debian.org>
To: martin f krafft <madduck@debian.org>, 433091@bugs.debian.org
Subject: Re: Bug#433091: [patch] possible fix
Date: Wed, 8 Apr 2009 22:09:30 +0200
On Tue, Apr 07, 2009 at 06:16:49PM +0200, martin f krafft wrote:
> also sprach Michael Vogt <mvo@debian.org> [2009.04.07.1739 +0200]:
> > That should hopefully cover the problem without breaking strings and
> > compatibility. Feedback/review/testing is very welcome. I tested it in
> > a etch chroot with various expired settings and it works as it should,
> > but I need to make a test-suit for it too.
> 
> Packages for amd64/i386 will be at
> http://debian.madduck.net/repo/pool/main/a/apt/ shortly.

Thanks a lot for this. I did a simple "test-suite" to test problem and
fix via:
$ bzr get lp:~mvo/+junk/apt-gpgv-tests
$ cd apt-gpgv-tests
$ sudo ./test.sh

It does test "good","expired","revoked","revoked+good","expired+good".

It should fail for expired and revoked (they are no good) but should
pass for revoked+good and expired+good. Basicly it will ignore expired
or revoked signatures if there is anohter valid signature on the
Release file.

Again, feedback/review is very welcome.

Cheers,
 Michael




Information forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#433091; Package apt. (Wed, 08 Apr 2009 23:03:03 GMT) (full text, mbox, link).


Acknowledgement sent to Michael Vogt <mvo@debian.org>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>. (Wed, 08 Apr 2009 23:03:03 GMT) (full text, mbox, link).


Message #100 received at 433091@bugs.debian.org (full text, mbox, reply):

From: Michael Vogt <mvo@debian.org>
To: martin f krafft <madduck@debian.org>, 433091@bugs.debian.org
Subject: Re: Bug#433091: [patch] possible fix
Date: Thu, 9 Apr 2009 00:58:00 +0200
On Wed, Apr 08, 2009 at 10:09:30PM +0200, Michael Vogt wrote:
> On Tue, Apr 07, 2009 at 06:16:49PM +0200, martin f krafft wrote:
> > also sprach Michael Vogt <mvo@debian.org> [2009.04.07.1739 +0200]:
> > > That should hopefully cover the problem without breaking strings and
> > > compatibility. Feedback/review/testing is very welcome. I tested it in
> > > a etch chroot with various expired settings and it works as it should,
> > > but I need to make a test-suit for it too.
> > 
> > Packages for amd64/i386 will be at
> > http://debian.madduck.net/repo/pool/main/a/apt/ shortly.

I merged the diff into the apt debian-sid tree and will upload soon. I
would love to have some positivie test feedback before I do the
upload.

Thanks,
 Michael




Information forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#433091; Package apt. (Thu, 09 Apr 2009 06:45:02 GMT) (full text, mbox, link).


Acknowledgement sent to martin f krafft <madduck@debian.org>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>. (Thu, 09 Apr 2009 06:45:02 GMT) (full text, mbox, link).


Message #105 received at 433091@bugs.debian.org (full text, mbox, reply):

From: martin f krafft <madduck@debian.org>
To: Michael Vogt <mvo@debian.org>
Cc: 433091@bugs.debian.org
Subject: Re: Bug#433091: [patch] possible fix
Date: Thu, 9 Apr 2009 08:42:14 +0200
[Message part 1 (text/plain, inline)]
also sprach Michael Vogt <mvo@debian.org> [2009.04.09.0058 +0200]:
> I merged the diff into the apt debian-sid tree and will upload soon. I
> would love to have some positivie test feedback before I do the
> upload.

I just tried in a chroot and it doesn't look good:

pulse:~# apt-cache policy apt
apt:
  Installed: 0.7.21~exp2~~mvo-gpgv-sigexpiry.1
  Candidate: 0.7.21~exp2~~mvo-gpgv-sigexpiry.1
  Version table:
 *** 0.7.21~exp2~~mvo-gpgv-sigexpiry.1 0
        500 http://debian.madduck.net sid/main Packages
        100 /var/lib/dpkg/status
     0.7.20.2 0
        500 http://ftp.ch.debian.org sid/main Packages
pulse:~# apt-get update
Get:1 http://debian.madduck.net sid Release.gpg [197B]
Hit http://debian.madduck.net sid Release
Err http://debian.madduck.net sid Release

Get:2 http://debian.madduck.net sid Release [9914B]
Ign http://debian.madduck.net sid Release
Ign http://debian.madduck.net sid/main Packages/DiffIndex
Ign http://debian.madduck.net sid/main Sources/DiffIndex
Ign http://debian.madduck.net sid/main Packages
Ign http://debian.madduck.net sid/main Sources
Hit http://ftp.ch.debian.org sid Release.gpg
Hit http://debian.madduck.net sid/main Packages
Hit http://debian.madduck.net sid/main Sources
Hit http://ftp.ch.debian.org sid Release
Hit http://ftp.ch.debian.org sid/main Packages/DiffIndex
Hit http://ftp.ch.debian.org sid/main Sources/DiffIndex
Fetched 10.1kB in 0s (11.7kB/s)
Reading package lists... Done
W: GPG error: http://debian.madduck.net sid Release: The following signatures were invalid: KEYEXPIRED 1182334739
W: You may want to run apt-get update to correct these problems



But the key is not expired:

pulse:~# wget -q http://debian.madduck.net/repo/gpg/a4ba872bd5b9e51e.key.asc http://debian.madduck.net/repo/dists/sid/Release{,.gpg}
pulse:~# gpg --import < a4ba872bd5b9e51e.key.asc
gpg: /root/.gnupg/trustdb.gpg: trustdb created
gpg: key D5B9E51E: public key "madduck's archive signing key (http://debian.madduck.net/repo) <archive@debian.madduck.net>" imported
gpg: Total number processed: 1
gpg:               imported: 1
gpg: no ultimately trusted keys found
pulse:~# gpg --verify Release.gpg Release
gpg: Signature made Tue Apr  7 16:36:50 2009 UTC using DSA key ID D5B9E51E
gpg: Good signature from "madduck's archive signing key (http://debian.madduck.net/repo) <archive@debian.madduck.net>"
gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.
Primary key fingerprint: 5726 0E2A 6376 CB44 1AE9  0B77 A4BA 872B D5B9 E51E
pulse:~# gpg --list-keys a4ba872bd5b9e51e
pub   1024D/D5B9E51E 2006-06-07 [expires: 2010-06-30]
uid                  madduck's archive signing key (http://debian.madduck.net/repo) <archive@debian.madduck.net>



But at least I am now asked when I try to install packages from the
archive:

WARNING: The following packages cannot be authenticated!
  apt
Install these packages without verification [y/N]?


-- 
 .''`.   martin f. krafft <madduck@d.o>      Related projects:
: :'  :  proud Debian developer               http://debiansystem.info
`. `'`   http://people.debian.org/~madduck    http://vcs-pkg.org
  `-  Debian - when you have better things to do than fixing systems
 
"driving with a destination
 is like having sex to have children"
                                             -- backwater wayne miller
[digital_signature_gpg.asc (application/pgp-signature, inline)]

Information forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#433091; Package apt. (Thu, 09 Apr 2009 07:45:03 GMT) (full text, mbox, link).


Acknowledgement sent to Michael Vogt <mvo@debian.org>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>. (Thu, 09 Apr 2009 07:45:03 GMT) (full text, mbox, link).


Message #110 received at 433091@bugs.debian.org (full text, mbox, reply):

From: Michael Vogt <mvo@debian.org>
To: martin f krafft <madduck@debian.org>, 433091@bugs.debian.org
Subject: Re: Bug#433091: [patch] possible fix
Date: Thu, 9 Apr 2009 09:43:45 +0200
On Thu, Apr 09, 2009 at 08:42:14AM +0200, martin f krafft wrote:
> also sprach Michael Vogt <mvo@debian.org> [2009.04.09.0058 +0200]:
> > I merged the diff into the apt debian-sid tree and will upload soon. I
> > would love to have some positivie test feedback before I do the
> > upload.
> 
> I just tried in a chroot and it doesn't look good:

Thanks a lot for testing the patch!
 
> pulse:~# apt-cache policy apt
[..]
> pulse:~# apt-get update
> Get:1 http://debian.madduck.net sid Release.gpg [197B]
> Hit http://debian.madduck.net sid Release
> Err http://debian.madduck.net sid Release
[..]
> W: GPG error: http://debian.madduck.net sid Release: The following signatures were invalid: KEYEXPIRED 1182334739
> W: You may want to run apt-get update to correct these problems

Could you please run (preferably only with the debian.madduck.net url):
# apt-get update -o debug::acquire::gpgv=true 
and attach the output? I just tested it on my system and it seems to
be working (your clock was not off for some reason, e.g. to test
expiring keys?).
 
> But the key is not expired:
> 
> pulse:~# wget -q http://debian.madduck.net/repo/gpg/a4ba872bd5b9e51e.key.asc http://debian.madduck.net/repo/dists/sid/Release{,.gpg}
> pulse:~# gpg --import < a4ba872bd5b9e51e.key.asc
> gpg: /root/.gnupg/trustdb.gpg: trustdb created
> gpg: key D5B9E51E: public key "madduck's archive signing key (http://debian.madduck.net/repo) <archive@debian.madduck.net>" imported
> gpg: Total number processed: 1
> gpg:               imported: 1
> gpg: no ultimately trusted keys found
> pulse:~# gpg --verify Release.gpg Release
[..]

Could you please also run:
# gpgv --status-fd 1 Release.gpg Release

 
Thanks!
 Michael




Information forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#433091; Package apt. (Fri, 10 Apr 2009 03:51:02 GMT) (full text, mbox, link).


Acknowledgement sent to Daniel Kahn Gillmor <dkg@fifthhorseman.net>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>. (Fri, 10 Apr 2009 03:51:02 GMT) (full text, mbox, link).


Message #115 received at 433091@bugs.debian.org (full text, mbox, reply):

From: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
To: 433091@bugs.debian.org
Subject: signatures created after key expiration should be considered invalid
Date: Thu, 09 Apr 2009 23:50:08 -0400
[Message part 1 (text/plain, inline)]
weasel wrote:

> No GOODSIG.
> 
> So gpgv considers a signature valid that gpg doesn't.  That in itself
> should be a grave bug.

FWIW, /usr/share/doc/gnupg/DETAILS.gz says:


    GOODSIG     <long keyid>  <username>
        The signature with the keyid is good.  For each signature only
        one of the three codes GOODSIG, BADSIG or ERRSIG will be
        emitted and they may be used as a marker for a new signature.
        The username is the primary one encoded in UTF-8 and %XX
        escaped.

 [...]

    VALIDSIG   <fingerprint in hex> <sig_creation_date> <sig-timestamp>
               <expire-timestamp> <sig-version> <reserved> <pubkey-algo>
               <hash-algo> <sig-class> <primary-key-fpr>

        The signature with the keyid is good. This is the same as
        GOODSIG but has the fingerprint as the argument. Both status
        lines are emitted for a good signature.  All arguments here
        are on one long line.  sig-timestamp is the signature creation
        time in seconds after the epoch. expire-timestamp is the
        signature expiration time in seconds after the epoch (zero
        means "does not expire"). sig-version, pubkey-algo, hash-algo,
        and sig-class (a 2-byte hex value) are all straight from the
        signature packet.  PRIMARY-KEY-FPR is the fingerprint of the
        primary key or identical to the first argument.  This is
        useful to get back to the primary key without running gpg
        again for this purpose.



So the documentation itself is unclear about the intended behavior.  Can
a signature be VALIDSIG but not GOODSIG?  What about the situation where
neither GOODSIG, BADSIG, nor ERRSIG show up, as is the case here?

i agree with weasel that this is currently a really bad situation.  It
is bad enough that gpg accepts a signature made by an expired key if the
signature was during the key's lifetime.  But it also does not
explicitly reject signatures that were made after a key is known to expire.

That is, Key A is valid beginning at time B, and expires at time E.
gnupg does not appear to distinguish between these cases:

 0) a signature made at time X where B < X < E

 1) a signature made at time X where B < E < X

At the very least, any signature made by a key *after* the key itself is
believed to be expired (case 1 above) should be considered
untrustworthy, but gpg (and gpg2, according to my tests) don't seem to
compare the date of the signature against the key expiration at all
(though they do compare it against the key creation timestamp).  They
*do* compare the key expiration time against "now", which is a good thing.

I'm attaching a tarball with an OpenPGP public key, a simple test file,
and two signatures made over the test file.  One of the signatures is
made within the lifespan of the key, and the other is made after the key
expires.

I'm not sure what is the right thing to do about this.  :(

	--dkg

[testsig.tgz (application/x-gtar, inline)]
[signature.asc (application/pgp-signature, attachment)]

Information forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#433091; Package apt. (Sun, 12 Apr 2009 06:36:02 GMT) (full text, mbox, link).


Acknowledgement sent to martin f krafft <madduck@debian.org>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>. (Sun, 12 Apr 2009 06:36:02 GMT) (full text, mbox, link).


Message #120 received at 433091@bugs.debian.org (full text, mbox, reply):

From: martin f krafft <madduck@debian.org>
To: Michael Vogt <mvo@debian.org>
Cc: 433091@bugs.debian.org
Subject: Re: Bug#433091: [patch] possible fix
Date: Sun, 12 Apr 2009 08:34:42 +0200
[Message part 1 (text/plain, inline)]
also sprach Michael Vogt <mvo@debian.org> [2009.04.09.0943 +0200]:
> Could you please run (preferably only with the debian.madduck.net
> url): # apt-get update -o debug::acquire::gpgv=true and attach the
> output? I just tested it on my system and it seems to be working
> (your clock was not off for some reason, e.g. to test expiring
> keys?).

I have not touched the clock at all.

pulse:/home/madduck# apt-get update -o debug::acquire::gpgv=true
Get:1 http://debian.madduck.net sid Release.gpg [197B]
Hit http://debian.madduck.net sid Release
99% [Working]inside VerifyGetSigners
gpgv path: /usr/bin/gpgv
Keyring path: /etc/apt/trusted.gpg
Preparing to exec: /usr/bin/gpgv /usr/bin/gpgv --status-fd 3 --ignore-time-conflict --keyring /etc/apt/trusted.gpg /var/lib/apt/lists/partial/debian.madduck.net_repo_dists_sid_Release.gpg /var/lib/apt/lists/debian.madduck.net_repo_dists_sid_Release
99% [Release gpgv 9914]Read: [GNUPG:] KEYEXPIRED 1182334739
Got KEYEXPIRED! 
Read: [GNUPG:] SIGEXPIRED deprecated-use-keyexpired-instead
Read: [GNUPG:] SIG_ID D2M7RKDiTEH9ZrZjtANG3Hfmnus 2009-04-07 1239122210
Read: [GNUPG:] EXPKEYSIG A4BA872BD5B9E51E madduck's archive signing key (http://debian.madduck.net/repo) <archive@debian.madduck.net>
Read: [GNUPG:] VALIDSIG 57260E2A6376CB441AE90B77A4BA872BD5B9E51E 2009-04-07 1239122210 0 4 0 17 2 00 57260E2A6376CB441AE90B77A4BA872BD5B9E51E
gpgv exited
Err http://debian.madduck.net sid Release
  
Get:2 http://debian.madduck.net sid Release [9914B]
99% [2 Release gpgv 9914]yGetSigners
gpgv path: /usr/bin/gpgv
Keyring path: /etc/apt/trusted.gpg
Preparing to exec: /usr/bin/gpgv /usr/bin/gpgv --status-fd 3 --ignore-time-conflict --keyring /etc/apt/trusted.gpg /var/lib/apt/lists/partial/debian.madduck.net_repo_dists_sid_Release.gpg /var/lib/apt/lists/debian.madduck.net_repo_dists_sid_Release
Read: [GNUPG:] KEYEXPIRED 1182334739
Got KEYEXPIRED! 
Read: [GNUPG:] SIGEXPIRED deprecated-use-keyexpired-instead
Read: [GNUPG:] SIG_ID D2M7RKDiTEH9ZrZjtANG3Hfmnus 2009-04-07 1239122210
Read: [GNUPG:] EXPKEYSIG A4BA872BD5B9E51E madduck's archive signing key (http://debian.madduck.net/repo) <archive@debian.madduck.net>
Read: [GNUPG:] VALIDSIG 57260E2A6376CB441AE90B77A4BA872BD5B9E51E 2009-04-07 1239122210 0 4 0 17 2 00 57260E2A6376CB441AE90B77A4BA872BD5B9E51E
gpgv exited
Ign http://debian.madduck.net sid Release
Ign http://debian.madduck.net sid/main Packages/DiffIndex
Ign http://debian.madduck.net sid/main Sources/DiffIndex
Ign http://debian.madduck.net sid/main Packages
Ign http://debian.madduck.net sid/main Sources
Hit http://debian.madduck.net sid/main Packages
Hit http://debian.madduck.net sid/main Sources
Fetched 10.1kB in 0s (72.3kB/s)
Reading package lists... Done
W: GPG error: http://debian.madduck.net sid Release: The following signatures were invalid: KEYEXPIRED 1182334739
W: You may want to run apt-get update to correct these problems

> > pulse:~# wget -q http://debian.madduck.net/repo/gpg/a4ba872bd5b9e51e.key.asc http://debian.madduck.net/repo/dists/sid/Release{,.gpg}
> > pulse:~# gpg --import < a4ba872bd5b9e51e.key.asc
> > gpg: /root/.gnupg/trustdb.gpg: trustdb created
> > gpg: key D5B9E51E: public key "madduck's archive signing key (http://debian.madduck.net/repo) <archive@debian.madduck.net>" imported
> > gpg: Total number processed: 1
> > gpg:               imported: 1
> > gpg: no ultimately trusted keys found
> > pulse:~# gpg --verify Release.gpg Release
> [..]
> 
> Could you please also run:
> # gpgv --status-fd 1 Release.gpg Release

After playing around with this and having to use --keyring,
I eventually found out that I hadn't updated the key in
/etc/apt/trusted.gpg in the chroot. :)

So it seems to work. Thanks!

-- 
 .''`.   martin f. krafft <madduck@d.o>      Related projects:
: :'  :  proud Debian developer               http://debiansystem.info
`. `'`   http://people.debian.org/~madduck    http://vcs-pkg.org
  `-  Debian - when you have better things to do than fixing systems
 
fitter, healthier, more productive
like a pig, in a cage, on antibiotics
                                                          -- radiohead
[digital_signature_gpg.asc (application/pgp-signature, inline)]

Reply sent to Michael Vogt <mvo@debian.org>:
You have taken responsibility. (Wed, 15 Apr 2009 22:18:17 GMT) (full text, mbox, link).


Notification sent to martin f krafft <madduck@debian.org>:
Bug acknowledged by developer. (Wed, 15 Apr 2009 22:18:17 GMT) (full text, mbox, link).


Message #125 received at 433091-close@bugs.debian.org (full text, mbox, reply):

From: Michael Vogt <mvo@debian.org>
To: 433091-close@bugs.debian.org
Subject: Bug#433091: fixed in apt 0.7.21
Date: Wed, 15 Apr 2009 21:17:10 +0000
Source: apt
Source-Version: 0.7.21

We believe that the bug you reported is fixed in the latest version of
apt, which is due to be installed in the Debian FTP archive:

apt-doc_0.7.21_all.deb
  to pool/main/a/apt/apt-doc_0.7.21_all.deb
apt-transport-https_0.7.21_i386.deb
  to pool/main/a/apt/apt-transport-https_0.7.21_i386.deb
apt-utils_0.7.21_i386.deb
  to pool/main/a/apt/apt-utils_0.7.21_i386.deb
apt_0.7.21.dsc
  to pool/main/a/apt/apt_0.7.21.dsc
apt_0.7.21.tar.gz
  to pool/main/a/apt/apt_0.7.21.tar.gz
apt_0.7.21_i386.deb
  to pool/main/a/apt/apt_0.7.21_i386.deb
libapt-pkg-dev_0.7.21_i386.deb
  to pool/main/a/apt/libapt-pkg-dev_0.7.21_i386.deb
libapt-pkg-doc_0.7.21_all.deb
  to pool/main/a/apt/libapt-pkg-doc_0.7.21_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 433091@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Michael Vogt <mvo@debian.org> (supplier of updated apt package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Tue, 14 Apr 2009 14:12:51 +0200
Source: apt
Binary: apt apt-doc libapt-pkg-dev libapt-pkg-doc apt-utils apt-transport-https
Architecture: source all i386
Version: 0.7.21
Distribution: unstable
Urgency: low
Maintainer: APT Development Team <deity@lists.debian.org>
Changed-By: Michael Vogt <mvo@debian.org>
Description: 
 apt        - Advanced front-end for dpkg
 apt-doc    - Documentation for APT
 apt-transport-https - APT https transport
 apt-utils  - APT utility programs
 libapt-pkg-dev - Development files for APT's libapt-pkg and libapt-inst
 libapt-pkg-doc - Documentation for APT development
Closes: 433091 513211 513311 513843 518070 520403 520403 520430 522222
Changes: 
 apt (0.7.21) unstable; urgency=low
 .
   [ Christian Perrier ]
   * Translations:
     - bg.po. Closes: #513211
     - zh_TW.po. Closes: #513311
     - nb.po. Closes: #513843
     - fr.po. Closes: #520430
     - sv.po. Closes: #518070
     - sk.po. Closes: #520403
     - it.po. Closes: #522222
     - sk.po. Closes: #520403
 .
   [ Jamie Strandboge ]
   * apt.cron.daily: catch invalid dates due to DST time changes
     in the stamp files
 .
   [ Michael Vogt ]
   * methods/gpgv.cc:
     - properly check for expired and revoked keys (closes: #433091)
   * apt-pkg/contrib/strutl.cc:
     - fix TimeToStr i18n (LP: #289807)
   * [ABI break] merge support for http redirects, thanks to
     Jeff Licquia and Anthony Towns
   * [ABI break] use int for the package IDs (thanks to Steve Cotton)
   * apt-pkg/pkgcache.cc:
     - do not run "dpkg --configure pkg" if pkg is in trigger-awaited
       state (LP: #322955)
   * methods/https.cc:
     - add Acquire::https::AllowRedirect support
   * Clarify the --help for 'purge' (LP: #243948)
   * cmdline/apt-get.cc
     - fix "apt-get source pkg" if there is a binary package and
       a source package of the same name but from different
       packages (LP: #330103)
 .
   [ Colin Watson ]
   * cmdline/acqprogress.cc:
     - Call pkgAcquireStatus::Pulse even if quiet, so that we still get
       dlstatus messages on the status-fd (LP: #290234).
Checksums-Sha1: 
 30c17caedc9d91d0827f52cb2542a689006d944c 1212 apt_0.7.21.dsc
 955864538e5f812406b9054825649667cb8f5ce8 2054363 apt_0.7.21.tar.gz
 d24e98a402a48fc48e05d64be4a7364d35a58e88 100546 apt-doc_0.7.21_all.deb
 9b0109e3749cf53b9406746a91f6c1191e3df33a 124512 libapt-pkg-doc_0.7.21_all.deb
 4fde24a6df97b5fdad6b92cce8218860814b16eb 1608880 apt_0.7.21_i386.deb
 fad84a990a7dcadd50f981e18e453d45306225bf 109496 libapt-pkg-dev_0.7.21_i386.deb
 9c41acec6ca1a571049781476b82ea18d40f8a38 187820 apt-utils_0.7.21_i386.deb
 8d78d69200dd41bb0191f9944781af8ad113e3ec 58932 apt-transport-https_0.7.21_i386.deb
Checksums-Sha256: 
 f8aff84dc9118b1e3d725b0b337b94fbb587c57bae81dcda5299f0870ff3a1d5 1212 apt_0.7.21.dsc
 99b2fc7ce3bb6b64f289f44e8cc7ee1345e3ef74a37d3402924008b4a692eadb 2054363 apt_0.7.21.tar.gz
 425316f048f70f023dd2e3eeca1b6d56bcc10617d55b66c4665d5fee795fc6f6 100546 apt-doc_0.7.21_all.deb
 c76a01a8482577fe38ec023f605ec2c7d6b32c50a29743be6162ef5f26928885 124512 libapt-pkg-doc_0.7.21_all.deb
 f1499b99496c5bc5290af209601dbe894675fbfed124c8ec4cd84a0fdc8936e5 1608880 apt_0.7.21_i386.deb
 7b9c828f6ab77af46252f3f1fa95c2a7a80b40b925581b3159b9f3ee0dfc1f4a 109496 libapt-pkg-dev_0.7.21_i386.deb
 ffab9c01ee2b8e420ff3466ab884a3442d10aeccaff010c2509296d1434a7ecd 187820 apt-utils_0.7.21_i386.deb
 771bc0754803b6587fcb51e55ea89e15fd52ccbb68147e0bddc358baf0b65e56 58932 apt-transport-https_0.7.21_i386.deb
Files: 
 af08202f8a7c47e8ed9cd519fa2dae09 1212 admin important apt_0.7.21.dsc
 d814cbf5fd83105fa3d600fa4de3bab4 2054363 admin important apt_0.7.21.tar.gz
 72e58e18425e7cad79a7a35d0b760ae4 100546 doc optional apt-doc_0.7.21_all.deb
 b966cbde4c85439a12d5fc784cbbb4c3 124512 doc optional libapt-pkg-doc_0.7.21_all.deb
 31a6ce78a372a93d2f691a6dbe090ff1 1608880 admin important apt_0.7.21_i386.deb
 15e5ee61a8ec0da5e1b6da0787d52346 109496 libdevel optional libapt-pkg-dev_0.7.21_i386.deb
 2c9ae6be375be28287474efa66cd8a0b 187820 admin important apt-utils_0.7.21_i386.deb
 0954a0535bb70851e465cbbfb4360630 58932 admin optional apt-transport-https_0.7.21_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAknllqUACgkQliSD4VZixzR+FwCgnvOyv/JAKExVnJ1ZW0Z5+eza
QfkAn0UYaYt4o7voHq03XsONhGRvFlxc
=dh0r
-----END PGP SIGNATURE-----





Information forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#433091; Package apt. (Wed, 22 Apr 2009 06:48:02 GMT) (full text, mbox, link).


Acknowledgement sent to Thijs Kinkhorst <thijs@debian.org>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>. (Wed, 22 Apr 2009 06:48:02 GMT) (full text, mbox, link).


Message #130 received at 433091@bugs.debian.org (full text, mbox, reply):

From: Thijs Kinkhorst <thijs@debian.org>
To: 433091@bugs.debian.org
Subject: CVE id assigned
Date: Wed, 22 Apr 2009 08:44:48 +0200
[Message part 1 (text/plain, inline)]
This is CVE-2009-1358.
Please reference it in the appropriate changelog entry.

Thanks,
Thijs
[signature.asc (application/pgp-signature, inline)]

Reply sent to Michael Vogt <mvo@debian.org>:
You have taken responsibility. (Sat, 02 May 2009 13:57:07 GMT) (full text, mbox, link).


Notification sent to martin f krafft <madduck@debian.org>:
Bug acknowledged by developer. (Sat, 02 May 2009 13:57:07 GMT) (full text, mbox, link).


Message #135 received at 433091-close@bugs.debian.org (full text, mbox, reply):

From: Michael Vogt <mvo@debian.org>
To: 433091-close@bugs.debian.org
Subject: Bug#433091: fixed in apt 0.7.20.2+lenny1
Date: Sat, 02 May 2009 13:53:45 +0000
Source: apt
Source-Version: 0.7.20.2+lenny1

We believe that the bug you reported is fixed in the latest version of
apt, which is due to be installed in the Debian FTP archive:

apt-doc_0.7.20.2+lenny1_all.deb
  to pool/main/a/apt/apt-doc_0.7.20.2+lenny1_all.deb
apt-transport-https_0.7.20.2+lenny1_i386.deb
  to pool/main/a/apt/apt-transport-https_0.7.20.2+lenny1_i386.deb
apt-utils_0.7.20.2+lenny1_i386.deb
  to pool/main/a/apt/apt-utils_0.7.20.2+lenny1_i386.deb
apt_0.7.20.2+lenny1.dsc
  to pool/main/a/apt/apt_0.7.20.2+lenny1.dsc
apt_0.7.20.2+lenny1.tar.gz
  to pool/main/a/apt/apt_0.7.20.2+lenny1.tar.gz
apt_0.7.20.2+lenny1_i386.deb
  to pool/main/a/apt/apt_0.7.20.2+lenny1_i386.deb
libapt-pkg-dev_0.7.20.2+lenny1_i386.deb
  to pool/main/a/apt/libapt-pkg-dev_0.7.20.2+lenny1_i386.deb
libapt-pkg-doc_0.7.20.2+lenny1_all.deb
  to pool/main/a/apt/libapt-pkg-doc_0.7.20.2+lenny1_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 433091@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Michael Vogt <mvo@debian.org> (supplier of updated apt package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Sun, 19 Apr 2009 21:23:46 +0200
Source: apt
Binary: apt apt-doc libapt-pkg-dev libapt-pkg-doc apt-utils apt-transport-https
Architecture: source all i386
Version: 0.7.20.2+lenny1
Distribution: stable-security
Urgency: high
Maintainer: APT Development Team <deity@lists.debian.org>
Changed-By: Michael Vogt <mvo@debian.org>
Description: 
 apt        - Advanced front-end for dpkg
 apt-doc    - Documentation for APT
 apt-transport-https - APT https transport
 apt-utils  - APT utility programs
 libapt-pkg-dev - Development files for APT's libapt-pkg and libapt-inst
 libapt-pkg-doc - Documentation for APT development
Closes: 433091 523213
Changes: 
 apt (0.7.20.2+lenny1) stable-security; urgency=high
 .
   * debian/apt.cron.daily:
     - fix possible DST timestamp releated auto-update problem
       (CVE-2009-1300, closes: #523213)
   * methods/gpgv.cc:
     - properly check for expired and revoked keys (closes: #433091)
Checksums-Sha1: 
 80d7d53646c2e3fd3604b7d6dc507fb68ed6357d 1540 apt_0.7.20.2+lenny1.dsc
 bdb5687a0ade523d395da3bf21bddfb5ebb31f9a 2043258 apt_0.7.20.2+lenny1.tar.gz
 07f88ed68e5d5576e8ab28e2bec144f74147be68 102110 apt-doc_0.7.20.2+lenny1_all.deb
 3a1590b2a583928cb1f2bac9f7e150e69e2db562 125292 libapt-pkg-doc_0.7.20.2+lenny1_all.deb
 10c8643be9c1725f266349f8ec9cb16afffedb0b 1639116 apt_0.7.20.2+lenny1_i386.deb
 ef2602d7b81295cc70f0f3fec01837d493f1f848 107586 libapt-pkg-dev_0.7.20.2+lenny1_i386.deb
 d0acf24212f4ae67bc5259cbb009c23f95274115 188158 apt-utils_0.7.20.2+lenny1_i386.deb
 aef12bbd95a37b1a1e2870ab0ba78be769d5b800 58824 apt-transport-https_0.7.20.2+lenny1_i386.deb
Checksums-Sha256: 
 1d2459ddfcf220064412b4053ea9248c0107c8800710852372abba6e97f2bbad 1540 apt_0.7.20.2+lenny1.dsc
 fd8091400ab45b24950211dd22f1a26457adbd4e37a9d13923aed57e8a9c5269 2043258 apt_0.7.20.2+lenny1.tar.gz
 2b8e00bcc16992d5df403c67e27e0d89b97ea49b5febde5a50f20846e10db8d8 102110 apt-doc_0.7.20.2+lenny1_all.deb
 e5be5ac36657d1e52d4c6b7124f5c0a8f874e27b37112f9599d5ad3a1e8fe6de 125292 libapt-pkg-doc_0.7.20.2+lenny1_all.deb
 0c376bf8208292c3b1100a61e40adab95501d2f7cc2e6cabbd70643cfb70f733 1639116 apt_0.7.20.2+lenny1_i386.deb
 2f7a1a8903aac858d4dc23bb483948c6ee0849a296a9cf6cf8030ee77572c45c 107586 libapt-pkg-dev_0.7.20.2+lenny1_i386.deb
 5a75db904448e43a0713b68622f90fbb2ab87c7468fee5a67eeb39ce43075bb0 188158 apt-utils_0.7.20.2+lenny1_i386.deb
 e04bd88a41f174bff59e5b8227fdaeb0903c1537459ffdaeb5ed31d17e4d366a 58824 apt-transport-https_0.7.20.2+lenny1_i386.deb
Files: 
 60e740d25e23101d5f7a9c90b90ee698 1540 admin important apt_0.7.20.2+lenny1.dsc
 c23dc4256af67c1644a9dbc5ae0115c8 2043258 admin important apt_0.7.20.2+lenny1.tar.gz
 099c1c85cb08d668e9e4668516ebc763 102110 doc optional apt-doc_0.7.20.2+lenny1_all.deb
 68c3671fa441778e16dbbe838cc893e5 125292 doc optional libapt-pkg-doc_0.7.20.2+lenny1_all.deb
 f2021728f2e92ffe32f7eb1bdc2d6231 1639116 admin important apt_0.7.20.2+lenny1_i386.deb
 e5ac47a6a1892c8ae12b0c25136b163d 107586 libdevel optional libapt-pkg-dev_0.7.20.2+lenny1_i386.deb
 a0f4a903e2fc11d9d6535d310e7f5a9e 188158 admin important apt-utils_0.7.20.2+lenny1_i386.deb
 68cbda40b139645b347d3168e09c722b 58824 admin optional apt-transport-https_0.7.20.2+lenny1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iQEcBAEBAgAGBQJJ7NNGAAoJECIIoQCMVaAcWmYIAIxLk0Hbhs9eOAt4asY5U4/g
8Brl5T2Fj+W7QB9sclmohdsejy6sVqPB34Wxscfdff1EacVMv2ZeLPWiQmx1GaEV
T5LiMlxbDMAhyVYnRRfKqLiguH0zXbZOc8wfehe2l1Lk8WzHpfJ2KBxPaAHBnyKC
atpd4rSutNPfyF+8uV9oD5/PqmdSecFrO56hw3rrVNTJiOO+YAjtZDn+cwPRm+Er
ldxzn1fTbT7g4IwwUVab93TeZxSbQqYjZbiI9Dgm5Y7pPnJJnHHVN+spUnYGdpvM
dVwU5LnULsc1GqHoovsXzcmZYVHx5b+7Ve1Y4MosG6rJogGrPQLRb3Lk6vqoDt8=
=i8fJ
-----END PGP SIGNATURE-----





Reply sent to Michael Vogt <mvo@debian.org>:
You have taken responsibility. (Sat, 02 May 2009 20:00:14 GMT) (full text, mbox, link).


Notification sent to martin f krafft <madduck@debian.org>:
Bug acknowledged by developer. (Sat, 02 May 2009 20:00:15 GMT) (full text, mbox, link).


Message #140 received at 433091-close@bugs.debian.org (full text, mbox, reply):

From: Michael Vogt <mvo@debian.org>
To: 433091-close@bugs.debian.org
Subject: Bug#433091: fixed in apt 0.6.46.4-0.1+etch4
Date: Sat, 02 May 2009 19:54:46 +0000
Source: apt
Source-Version: 0.6.46.4-0.1+etch4

We believe that the bug you reported is fixed in the latest version of
apt, which is due to be installed in the Debian FTP archive:

apt-doc_0.6.46.4-0.1+etch4_all.deb
  to pool/main/a/apt/apt-doc_0.6.46.4-0.1+etch4_all.deb
apt-utils_0.6.46.4-0.1+etch4_i386.deb
  to pool/main/a/apt/apt-utils_0.6.46.4-0.1+etch4_i386.deb
apt_0.6.46.4-0.1+etch4.dsc
  to pool/main/a/apt/apt_0.6.46.4-0.1+etch4.dsc
apt_0.6.46.4-0.1+etch4.tar.gz
  to pool/main/a/apt/apt_0.6.46.4-0.1+etch4.tar.gz
apt_0.6.46.4-0.1+etch4_i386.deb
  to pool/main/a/apt/apt_0.6.46.4-0.1+etch4_i386.deb
libapt-pkg-dev_0.6.46.4-0.1+etch4_i386.deb
  to pool/main/a/apt/libapt-pkg-dev_0.6.46.4-0.1+etch4_i386.deb
libapt-pkg-doc_0.6.46.4-0.1+etch4_all.deb
  to pool/main/a/apt/libapt-pkg-doc_0.6.46.4-0.1+etch4_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 433091@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Michael Vogt <mvo@debian.org> (supplier of updated apt package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Sun, 19 Apr 2009 21:06:46 +0200
Source: apt
Binary: apt-utils libapt-pkg-doc libapt-pkg-dev apt-doc apt
Architecture: source all i386
Version: 0.6.46.4-0.1+etch4
Distribution: oldstable-security
Urgency: high
Maintainer: APT Development Team <deity@lists.debian.org>
Changed-By: Michael Vogt <mvo@debian.org>
Description: 
 apt        - Advanced front-end for dpkg
 apt-doc    - Documentation for APT
 apt-utils  - APT utility programs
 libapt-pkg-dev - Development files for APT's libapt-pkg and libapt-inst
 libapt-pkg-doc - Documentation for APT development
Closes: 433091 523213
Changes: 
 apt (0.6.46.4-0.1+etch4) oldstable-security; urgency=high
 .
   * debian/apt.cron.daily:
     - fix possible DST timestap releated auto-update problem
       (CVE-2009-1300, closes: #523213)
   * methods/gpgv.cc:
     - properly check for expired and revoked keys (closes: #433091)
Files: 
 c631100edac082afe2dddb28030ed6ff 1108 admin important apt_0.6.46.4-0.1+etch4.dsc
 e6eaebb8a12f5243668ca56e65c8c71e 1798703 admin important apt_0.6.46.4-0.1+etch4.tar.gz
 999f34683b7cb7818258ac1ebfca701c 89752 doc optional apt-doc_0.6.46.4-0.1+etch4_all.deb
 b91e59e2e1093ecbe387ccc7e8111d73 112248 doc optional libapt-pkg-doc_0.6.46.4-0.1+etch4_all.deb
 73f115b27de4fdf11af97e2b5afca613 1438190 admin important apt_0.6.46.4-0.1+etch4_i386.deb
 6aa9a63c060eb0461b66f67e35ed20c7 84166 libdevel optional libapt-pkg-dev_0.6.46.4-0.1+etch4_i386.deb
 7245c5ea84b1c4eefa816af20868a794 198392 admin important apt-utils_0.6.46.4-0.1+etch4_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iQEcBAEBAgAGBQJJ7ZDZAAoJECIIoQCMVaAcYgQH+wXRkiChxfmz1vuiqDe1yx/K
a5T5c+zb/mrY1Q3M0zh/p0sB9xmE6XBC9c4UYEX3qLS/V0PJ4eND1DHyT8qBtm67
mB2G/+U0MDFB607l5vCIstSchgJP9XTLA7cdvTudQCgEihYhvXpySSzHNPcn+WHv
Bb5fTvcERQ7zVfjFv2tySyn/y5dwssqf0dwm625NuYc75oD1eVHZ+vpX1WVMHI4K
795kdmDE7X0/vbg0P6CIZn4xRo1P/JLuhzZt1f7facB0mCLnHphHKhB2e7vBHECu
OPqW9ryZsPDD34Zs/v0UPosYqFOwyrY8JMyJQog2/VljHqhAVB1/A4aZShLuwIw=
=9jPa
-----END PGP SIGNATURE-----





Reply sent to Nico Golde <nion@debian.org>:
You have taken responsibility. (Wed, 06 May 2009 12:33:03 GMT) (full text, mbox, link).


Notification sent to martin f krafft <madduck@debian.org>:
Bug acknowledged by developer. (Wed, 06 May 2009 12:33:03 GMT) (full text, mbox, link).


Message #145 received at 433091-close@bugs.debian.org (full text, mbox, reply):

From: Nico Golde <nion@debian.org>
To: 433091-close@bugs.debian.org
Subject: Bug#433091: fixed in apt 0.7.20.2+squeeze1
Date: Wed, 06 May 2009 12:17:05 +0000
Source: apt
Source-Version: 0.7.20.2+squeeze1

We believe that the bug you reported is fixed in the latest version of
apt, which is due to be installed in the Debian FTP archive:

apt-doc_0.7.20.2+squeeze1_all.deb
  to pool/main/a/apt/apt-doc_0.7.20.2+squeeze1_all.deb
apt-transport-https_0.7.20.2+squeeze1_i386.deb
  to pool/main/a/apt/apt-transport-https_0.7.20.2+squeeze1_i386.deb
apt-utils_0.7.20.2+squeeze1_i386.deb
  to pool/main/a/apt/apt-utils_0.7.20.2+squeeze1_i386.deb
apt_0.7.20.2+squeeze1.dsc
  to pool/main/a/apt/apt_0.7.20.2+squeeze1.dsc
apt_0.7.20.2+squeeze1.tar.gz
  to pool/main/a/apt/apt_0.7.20.2+squeeze1.tar.gz
apt_0.7.20.2+squeeze1_i386.deb
  to pool/main/a/apt/apt_0.7.20.2+squeeze1_i386.deb
libapt-pkg-dev_0.7.20.2+squeeze1_i386.deb
  to pool/main/a/apt/libapt-pkg-dev_0.7.20.2+squeeze1_i386.deb
libapt-pkg-doc_0.7.20.2+squeeze1_all.deb
  to pool/main/a/apt/libapt-pkg-doc_0.7.20.2+squeeze1_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 433091@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Nico Golde <nion@debian.org> (supplier of updated apt package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Tue, 05 May 2009 15:37:03 +0200
Source: apt
Binary: apt apt-doc libapt-pkg-dev libapt-pkg-doc apt-utils apt-transport-https
Architecture: source all i386
Version: 0.7.20.2+squeeze1
Distribution: testing-security
Urgency: high
Maintainer: APT Development Team <deity@lists.debian.org>
Changed-By: Nico Golde <nion@debian.org>
Description: 
 apt        - Advanced front-end for dpkg
 apt-doc    - Documentation for APT
 apt-transport-https - APT https transport
 apt-utils  - APT utility programs
 libapt-pkg-dev - Development files for APT's libapt-pkg and libapt-inst
 libapt-pkg-doc - Documentation for APT development
Closes: 433091 523213
Changes: 
 apt (0.7.20.2+squeeze1) testing-security; urgency=high
 .
   * debian/apt.cron.daily:
     - fix possible DST timestamp releated auto-update problem
       (CVE-2009-1300, closes: #523213)
   * methods/gpgv.cc:
     - properly check for expired and revoked keys (closes: #433091)
Checksums-Sha1: 
 fe2ce2e9f49343fef4b371efbf3b2bf1e3f7b942 1256 apt_0.7.20.2+squeeze1.dsc
 b8523f3cc7bb81355f4b6702a6e6efd2c2aa20dd 2044030 apt_0.7.20.2+squeeze1.tar.gz
 e2f9c7fef94f911aba002490d57e3898f98ac4a5 99974 apt-doc_0.7.20.2+squeeze1_all.deb
 7d9d3e0bd339a9db541602c73842291fc1a5dedd 124124 libapt-pkg-doc_0.7.20.2+squeeze1_all.deb
 9b242d6f1fe1f225c8b24fd548ccfb9298eb4bc1 1628232 apt_0.7.20.2+squeeze1_i386.deb
 ee83f97fdb2dfffd0a07ed90fcfc1c3c89c2549b 109144 libapt-pkg-dev_0.7.20.2+squeeze1_i386.deb
 d2eea9704693e4f0a4b4ff9424cd23e1366bbfe6 188466 apt-utils_0.7.20.2+squeeze1_i386.deb
 2ae45b806c0b0cc8aa4e22040088be76a5e1a302 58674 apt-transport-https_0.7.20.2+squeeze1_i386.deb
Checksums-Sha256: 
 dd175ff29e5489eb8937170bfc851f538ef5483f894c62b507259389461ad209 1256 apt_0.7.20.2+squeeze1.dsc
 6d5fd840fba4fb7baacd2802abf0a89588aaa0b0d64b90b28015ea272278003b 2044030 apt_0.7.20.2+squeeze1.tar.gz
 bfafcb1b7dd33567cdd2314a22c113237a85fd1b27f5ef39434aeeb81cb3a982 99974 apt-doc_0.7.20.2+squeeze1_all.deb
 e7eaa5f035e54c5c3a96adb78dd2965c8f4485c2d4428f738109a9a7d836d149 124124 libapt-pkg-doc_0.7.20.2+squeeze1_all.deb
 7ea5ceaf0fbae59613351a11cb222191f93c00edd0c31999b6afd42076d0866a 1628232 apt_0.7.20.2+squeeze1_i386.deb
 00d4e5d4d342af6d31616aef595d0ce9bf1a9ed17b4e98767a96ea28c2ac6f21 109144 libapt-pkg-dev_0.7.20.2+squeeze1_i386.deb
 23b2db6e64b80b0f2ef406d28e9af07878e12ff1a12c151fcfcf28e4c9261f33 188466 apt-utils_0.7.20.2+squeeze1_i386.deb
 aeddbb1c88465fb199eb08db57247500093bbd1dde434dba6dea1d24a9d06f64 58674 apt-transport-https_0.7.20.2+squeeze1_i386.deb
Files: 
 337d5d3f86d65005905029eb272415bf 1256 admin important apt_0.7.20.2+squeeze1.dsc
 7a68e55346cf8ec2cf2019e0959e5907 2044030 admin important apt_0.7.20.2+squeeze1.tar.gz
 f7c4871dd7e7242fc04c15c0ca45dc7e 99974 doc optional apt-doc_0.7.20.2+squeeze1_all.deb
 d7d02f781c56217438ecd176bee1a515 124124 doc optional libapt-pkg-doc_0.7.20.2+squeeze1_all.deb
 f6e27ef8e207a4660161cd71d8474487 1628232 admin important apt_0.7.20.2+squeeze1_i386.deb
 aaeefc58ae6ca8d928bd7fdaddb86efa 109144 libdevel optional libapt-pkg-dev_0.7.20.2+squeeze1_i386.deb
 5e7aba28edf7976597336c89545cefbf 188466 admin important apt-utils_0.7.20.2+squeeze1_i386.deb
 fab50bd430585e9ac3128e041177448b 58674 admin optional apt-transport-https_0.7.20.2+squeeze1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkoAQb0ACgkQHYflSXNkfP9ZyQCgp3hPfN1XPMz/QrJ9khUArUY9
Z+IAnjSuBN3GVIBmOIzW85M/cVSirnlh
=WAqS
-----END PGP SIGNATURE-----





Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Fri, 05 Jun 2009 07:38:59 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 17:53:52 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.