Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

apt-cacher-ng-3.1-bp154.1.31 RPM for x86_64

From OpenSuSE Leap 15.4 for x86_64

Name: apt-cacher-ng Distribution: SUSE Linux Enterprise 15 SP4
Version: 3.1 Vendor: openSUSE
Release: bp154.1.31 Build date: Mon May 9 11:10:43 2022
Group: Productivity/Networking/Web/Proxy Build host: lamb03
Size: 1289826 Source RPM: apt-cacher-ng-3.1-bp154.1.31.src.rpm
Summary: A caching proxy specialized for Linux distribution packages
Apt-Cacher NG is a caching proxy for downloading packages from Debian-style
software repositories (or possibly from other types).

The main principle is that a central machine hosts the proxy for a local
network, and clients configure their APT setup to download through it.
Apt-Cacher NG keeps a copy of all useful data that passes through it, and when
a similar request is made, the cached copy of the data is delivered without
being re-downloaded.

Apt-Cacher NG has been designed from scratch as a replacement for apt-cacher,
but with a focus on maximizing throughput with low system resource
requirements. It can also be used as replacement for apt-proxy and approx with
no need to modify clients' sources.list files.




BSD-4-Clause AND MIT


* Mon Jan 20 2020 Matthias Gerstner <>
  - fix CVE-2019-18899 (bsc#1157703): the systemd service configuration in
    apt-cacher-ng.service did run apt-cacher-ng as root while /run/apt-cacher-ng
    was created for the apt-cacher-ng user via systemd-tmpfiles. A compromised
    apt-cacher-ng could have performed symlink attacks in /run/apt-cacher-ng to
    cause writes to privileged file system locations by root. Furthermore the
    socket path /run/apt-cacher-ng/socket could have been replaced by an
    attacker owned socket, thereby allowing him to hijack privileged client
    connections to apt-cacher-ng. Additional unexplored security issues could
    have been possible.
    To fix this use the upstream service file with correct privilege drop
    configuration. During update the ownership of /var/log/apt-cacher-ng and
    /var/cache/apt-cacher-ng as well as a possibly already running apt-cacher-ng
    instance (files in /run/apt-cacher-ng) need to be fixed in %pre, %post.
* Fri Jan 17 2020 Matthias Gerstner <>
  - add CVE-2020-5202.patch: fixes bsc#1157706, CVE-2020-5202. A local user
    account that managed to listen on localhost:3142 before the actual
    apt-cacher-ng systemd service did could have intercepted client traffic sent
    by e.g. root via the cron job /etc/cron.daily/apt-cacher-ng, possibly
    including authentication credentials.
* Wed Dec 06 2017
  - Use more of cmake macros
  - Use pkgconfig style dependencies
* Tue Dec 05 2017
  - Version bump to 3.1
    * Hide credentials in acngtool in some corner cases
    * Dropped references to script which was superseeded by acngtool
    * Made default PassThroughPattern setting stricter
    * Mirror database update
    * Avoid expiration failure when some index files are missing
  - Fix logrotate file installation
* Fri May 26 2017
  - Trim description. Use regular %setup call for all unpacking.
* Tue May 16 2017
  - Initial commit



Generated by rpm2html 1.8.1

Fabrice Bellet, Tue Aug 9 21:10:18 2022