Attempt to update ONLY security issues

For questions regarding system and application security
Message
Author
Straybit
Posts: 52
Joined: Fri Dec 22, 2023 2:06 pm

Attempt to update ONLY security issues

#1 Post by Straybit »

It seems that when I do a general update, things have changed in the apps that I use. For example, a few years ago, GCC would not allow me to

Code: Select all

#define ARRAY-ELEMNTS 6
Then later it allowed that but

Code: Select all

#include <stdio.h>
int main()
{	FILE *fi;

	fi = fopen( "some file", "r" );
	if( fi == NULL)
		fprintf( "The file opened\n" );
	else
		fprintf( "The file DID NOT open\n" );
	return 0;
)
On compiling, it would tell me that the if statement did not guard (or some such)! It seemed that every time I got back to coding, I had to adjust the code I had already written and debugged, I had to change it to accommodate the "new" GCC!

(The above happened while using Peppermint OS.)

A few weeks ago I attempted to update with only Security repository allowed. My reasoning for that was that, perhaps, I could update only security issues

After that, LibreCcalc no longer tried to auto fill cells, Later, I happened to check the repositories in Synaptic and noticed that ALL of the repositories were selected.

Is there a way to get the security updates with updating all of the apps?

Bruce

Code: Select all

System:
  Kernel: 6.1.0-28-amd64 [6.1.119-1] arch: x86_64 bits: 64 compiler: gcc v: 12.2.0
    parameters: BOOT_IMAGE=/boot/vmlinuz-6.1.0-28-amd64 root=UUID=<filter> ro quiet splash
  Desktop: Xfce v: 4.18.1 tk: Gtk v: 3.24.36 info: xfce4-panel wm: xfwm v: 4.18.0 vt: 7
    dm: LightDM v: 1.26.0 Distro: MX-23.3_x64 Libretto May 19  2024 base: Debian GNU/Linux 12
    (bookworm)
Machine:
  Type: Laptop System: System76 product: Darter Pro v: darp6 serial: <superuser required> Chassis:
    type: 9 serial: <superuser required>
  Mobo: System76 model: Darter Pro v: darp6 serial: <superuser required> UEFI: coreboot
    v: 2020-05-20_de5eab8 date: 05/13/2020
Battery:
  ID-1: BAT0 charge: 25.2 Wh (72.8%) condition: 34.6/53.2 Wh (65.1%) volts: 16.3 min: 15.4
    model: Notebook BAT type: Li-ion serial: <filter> status: not charging
  Device-1: hidpp_battery_0 model: Logitech Wireless Mouse M325 serial: <filter>
    charge: 55% (should be ignored) rechargeable: yes status: discharging
CPU:
  Info: model: Intel Core i5-10210U bits: 64 type: MT MCP arch: Comet/Whiskey Lake note: check
    gen: core 10 level: v3 note: check built: 2018 process: Intel 14nm family: 6 model-id: 0x8E (142)
    stepping: 0xC (12) microcode: 0xF8
  Topology: cpus: 1x cores: 4 tpc: 2 threads: 8 smt: enabled cache: L1: 256 KiB
    desc: d-4x32 KiB; i-4x32 KiB L2: 1024 KiB desc: 4x256 KiB L3: 6 MiB desc: 1x6 MiB
  Speed (MHz): avg: 571 high: 600 min/max: 400/4200 scaling: driver: intel_pstate
    governor: powersave cores: 1: 600 2: 568 3: 600 4: 400 5: 600 6: 600 7: 600 8: 600
    bogomips: 33599
  Flags: avx avx2 ht lm nx pae sse sse2 sse3 sse4_1 sse4_2 ssse3 vmx
  Vulnerabilities:
  Type: gather_data_sampling mitigation: Microcode
  Type: itlb_multihit status: KVM: VMX disabled
  Type: l1tf status: Not affected
  Type: mds status: Not affected
  Type: meltdown status: Not affected
  Type: mmio_stale_data mitigation: Clear CPU buffers; SMT vulnerable
  Type: reg_file_data_sampling status: Not affected
  Type: retbleed mitigation: Enhanced IBRS
  Type: spec_rstack_overflow status: Not affected
  Type: spec_store_bypass mitigation: Speculative Store Bypass disabled via prctl
  Type: spectre_v1 mitigation: usercopy/swapgs barriers and __user pointer sanitization
  Type: spectre_v2 mitigation: Enhanced / Automatic IBRS; IBPB: conditional; RSB filling;
    PBRSB-eIBRS: SW sequence; BHI: SW loop, KVM: SW loop
  Type: srbds mitigation: Microcode
  Type: tsx_async_abort status: Not affected
Graphics:
  Device-1: Intel CometLake-U GT2 [UHD Graphics] driver: i915 v: kernel arch: Gen-9.5
    process: Intel 14nm built: 2016-20 ports: active: eDP-1 empty: DP-1,HDMI-A-1,HDMI-A-2
    bus-ID: 00:02.0 chip-ID: 8086:9b41 class-ID: 0300
  Device-2: Chicony USB2.0 Camera type: USB driver: uvcvideo bus-ID: 1-7:3 chip-ID: 04f2:b685
    class-ID: 0e02
  Display: x11 server: X.Org v: 1.21.1.7 compositor: xfwm v: 4.18.0 driver: X:
    loaded: modesetting unloaded: fbdev,vesa dri: iris gpu: i915 display-ID: :0.0 screens: 1
  Screen-1: 0 s-res: 1920x1080 s-dpi: 96 s-size: 508x285mm (20.00x11.22") s-diag: 582mm (22.93")
  Monitor-1: eDP-1 model: LG Display 0x05e5 built: 2018 res: 1920x1080 hz: 60 dpi: 142 gamma: 1.2
    size: 344x194mm (13.54x7.64") diag: 395mm (15.5") ratio: 16:9 modes: 1920x1080
  API: OpenGL v: 4.6 Mesa 22.3.6 renderer: Mesa Intel UHD Graphics (CML GT2) direct-render: Yes
Audio:
  Device-1: Intel Comet Lake PCH-LP cAVS driver: snd_hda_intel v: kernel
    alternate: snd_sof_pci_intel_cnl bus-ID: 00:1f.3 chip-ID: 8086:02c8 class-ID: 0403
  API: ALSA v: k6.1.0-28-amd64 status: kernel-api tools: alsamixer,amixer
  Server-1: PipeWire v: 1.0.0 status: active with: 1: pipewire-pulse status: active
    2: wireplumber status: active 3: pipewire-alsa type: plugin 4: pw-jack type: plugin
    tools: pactl,pw-cat,pw-cli,wpctl
Network:
  Device-1: Intel Comet Lake PCH-LP CNVi WiFi driver: iwlwifi v: kernel modules: wl bus-ID: 00:14.3
    chip-ID: 8086:02f0 class-ID: 0280
  IF: wlan0 state: up mac: <filter>
  Device-2: Realtek RTL8111/8168/8411 PCI Express Gigabit Ethernet vendor: CLEVO/KAPOK
    driver: r8169 v: kernel pcie: gen: 1 speed: 2.5 GT/s lanes: 1 port: 4000 bus-ID: 26:00.1
    chip-ID: 10ec:8168 class-ID: 0200
  IF: eth0 state: down mac: <filter>
Bluetooth:
  Device-1: Intel AX201 Bluetooth type: USB driver: btusb v: 0.8 bus-ID: 1-10:4 chip-ID: 8087:0026
    class-ID: e001
  Report: hciconfig ID: hci0 rfk-id: 1 state: up address: <filter> bt-v: 3.0 lmp-v: 5.2
    sub-v: 200f hci-v: 5.2 rev: 200f
  Info: acl-mtu: 1021:4 sco-mtu: 96:6 link-policy: rswitch sniff link-mode: peripheral accept
    service-classes: rendering, capturing, object transfer, audio, telephony
Drives:
  Local Storage: total: 223.57 GiB used: 41.46 GiB (18.5%)
  SMART Message: Unable to run smartctl. Root privileges required.
  ID-1: /dev/sda maj-min: 8:0 vendor: Western Digital model: WDS240G2G0B-00EPW0 size: 223.57 GiB
    block-size: physical: 512 B logical: 512 B speed: 6.0 Gb/s type: SSD serial: <filter> rev: 0400
    scheme: GPT
Partition:
  ID-1: / raw-size: 25 GiB size: 24.44 GiB (97.76%) used: 9.42 GiB (38.5%) fs: ext4 dev: /dev/sda2
    maj-min: 8:2
  ID-2: /boot/efi raw-size: 16 MiB size: 15.9 MiB (99.67%) used: 278 KiB (1.7%) fs: vfat
    dev: /dev/sda1 maj-min: 8:1
  ID-3: /home raw-size: 10 GiB size: 9.76 GiB (97.59%) used: 923.3 MiB (9.2%) fs: ext4
    dev: /dev/sda4 maj-min: 8:4
Swap:
  Kernel: swappiness: 15 (default 60) cache-pressure: 100 (default)
  ID-1: swap-1 type: partition size: 10.04 GiB used: 7.2 MiB (0.1%) priority: -2 dev: /dev/sda3
    maj-min: 8:3
Sensors:
  System Temperatures: cpu: 45.0 C pch: 42.0 C mobo: N/A
  Fan Speeds (RPM): N/A
Repos:
  Packages: pm: dpkg pkgs: 2255 libs: 1146 tools: apt,apt-get,aptitude,nala,synaptic pm: rpm
    pkgs: 0 pm: flatpak pkgs: 0
  No active apt repos in: /etc/apt/sources.list
  Active apt repos in: /etc/apt/sources.list.d/debian-stable-updates.list
    1: deb http://deb.debian.org/debian/ bookworm-updates main contrib non-free non-free-firmware
  Active apt repos in: /etc/apt/sources.list.d/debian.list
    1: deb http://deb.debian.org/debian/ bookworm main contrib non-free non-free-firmware
    2: deb http://security.debian.org/debian-security/ bookworm-security main contrib non-free non-free-firmware
    3: deb-src http://deb.debian.org/debian/ bookworm non-free-firmware non-free contrib main
    4: deb http://deb.debian.org/debian/ bookworm-backports non-free-firmware non-free contrib main
  Active apt repos in: /etc/apt/sources.list.d/mx.list
    1: deb https://mxrepo.com/mx/repo/ bookworm main non-free
    2: deb https://mxrepo.com/mx/testrepo/ bookworm test
Info:
  Processes: 295 Uptime: 10d 21h 14m wakeups: 273 Memory: 7.63 GiB used: 4.48 GiB (58.7%)
  Init: SysVinit v: 3.06 runlevel: 5 default: graphical tool: systemctl Compilers: gcc: 12.2.0
  alt: 12 Client: shell wrapper v: 5.2.15-release inxi: 3.3.26
Boot Mode: UEFI

User avatar
CharlesV
Global Moderator
Posts: 7531
Joined: Sun Jul 07, 2019 5:11 pm

Re: Attempt to update ONLY security issues

#2 Post by CharlesV »

I believe that this is what debian's unattended-upgrades is all about .
https://wiki.debian.org/UnattendedUpgrades

I have not tried this MX, but I suspect it is a workable solution for it too.
*QSI = Quick System Info from menu (Copy for Forum)
*MXPI = MX Package Installer
*Please check the solved checkbox on the post that solved it.
*Linux -This is the way!

Post Reply

Return to “Security”