Mangelnde Eingabeprüfung in APT (Aktualisierung)
ID: | USN-3863-2 |
Distribution: | Ubuntu |
Plattformen: | Ubuntu 12.04 ESM |
Datum: | Di, 22. Januar 2019, 16:38 |
Referenzen: | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3462 |
Applikationen: | APT |
Update von: | Mangelnde Eingabeprüfung in APT |
Originalnachricht |
|
--===============5237682094434378611== Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="=-s1dY8Wb410cnzVbQCmr1" --=-s1dY8Wb410cnzVbQCmr1 Content-Type: text/plain; charset="UTF-8 Content-Transfer-Encoding: quoted-printable ========================================================================== Ubuntu Security Notice USN-3863-2 January 22, 2019 apt vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 12.04 ESM Summary: An attacker could trick APT into installing altered packages. Software Description: - apt: Advanced front-end for dpkg Details: USN-3863-1 fixed a vulnerability in APT. This update provides the corresponding update for Ubuntu 12.04 ESM. Original advisory details: Max Justicz discovered that APT incorrectly handled certain parameters during redirects. If a remote attacker were able to perform a man-in-the-middle attack, this flaw could potentially be used to install altered packages. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 12.04 ESM: apt 0.8.16~exp12ubuntu10.28 In general, a standard system update will make all the necessary changes. References: https://usn.ubuntu.com/usn/usn-3863-2 https://usn.ubuntu.com/usn/usn-3863-1 CVE-2019-3462 --=-s1dY8Wb410cnzVbQCmr1 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: This is a digitally signed message part Content-Transfer-Encoding: 7bit -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAABCAAGBQJcRxqvAAoJEEW851uECx9plUkP/iMcgZdhW5fKYX37kP5SIlT4 8I861BoHJDu7ZRlpSzaOMhvhel4TVDkg+9mZK1Jkq8hpFpclwY42m1OU19D9y8J6 P0E14NAXJgi+TIYuClJSVKhI9SHE5Z9Ukr3BGCa2OVMWfo4o08kd45ilUMDXO6MM N7hp3z1XtCn6+bQ2yz1CzMatqcPgkaMhJON5w+WGLMOgdGleppY9VbIzGqDeW3bs K1M6zojLxzFJQDVKpouc2c3Ce0vT5lMRjgSEL2WvcLfY65dWQjPW4zko8T7k2o/3 2fQ4W40eR4avfJLOeWmT3P0qiBP5EqjrHraafUfbQuAj2oPD1uSROUa9Ykxcp4bs oAy90kRHo30eeQM7Rjp73I/4yLXJiiIccxqWoUYZFnEUo9/ncTdNMa9rCLzq89fm e/NAfm+euSbZ5cTiw0J9k4egA1uuwHSUSZvNccytfkbObuG1AM1W3JZM/b9JFgPh GGnJ0JFfnQD6FNH8u3eyWdWj0wy73ZcXUczRvm1rGksxoQSSssLHPXbS6J8ZXFIE lG7XyHY9DpCcLYMeWkg7grttoisCKhlfY6nwtX7puWMbmrOYJz5ifSTWE/vQ+Scy 305GzvKDKlKvqyGoqtsrYV/FjstxHxv8uv8PfBXD4R5YXgcGXmAZmdmQOEUGkcCg ol73scbtZf2/XoMk+n39 =iJRR -----END PGP SIGNATURE----- --=-s1dY8Wb410cnzVbQCmr1-- --===============5237682094434378611== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5 LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj dXJpdHktYW5ub3VuY2UK --===============5237682094434378611==-- |