On Fri, Jan 25, 2019 at 12:23:27PM -0500, Pete Geenhuizen wrote: > I am mainly a Centos user and am quite a novice when it comes to Debian and > I have a computer which is currently running Stretch 9.6 and I recently > install apt 1.4.9. > > With the release of Stretch 9.7 and because of the recent vulnerability > discovered in apt I'm not sure how to proceed. >
In your case there is actually nothing to be done. This is just a point release and is only interesting for installs. You are running Stretch already and any update automatically pulls in new updates (as you have already done with apt). > According to the instructions in the Debian Security Advisory they advise > disabling redirects which might > "break some proxies when used against security.debian.org", not sure exactly > what this means to me, You could update, couldn't you? So you are fine. > > and further on it says "For the stable distribution (stretch), this problem > has been fixed in version 1.4.9" > > I just don't know what direction I should take, so I'd appreciate some > insight and pointers on how I should proceed. > Stay put :) -H -- Henning Follmann | hfollm...@itcfollmann.com