[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249622

 
 

909

 
 

195549

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-3031-1 apt -- apt

ID: oval:org.secpod.oval:def:601888Date: (C)2014-12-30   (M)2021-06-02
Class: PATCHFamily: unix




The Google Security Team discovered a buffer overflow vulnerability in the HTTP transport code in apt-get. An attacker able to man-in-the-middle a HTTP request to an apt repository can trigger the buffer overflow, leading to a crash of the "http" apt method binary, or potentially to arbitrary code execution. Two regression fixes were included in this update: * Fix regression from the previous update in DSA-3025-1 when the custom apt configuration option for Dir::state::lists is set to a relative path . * Fix regression in the reverificaiton handling of cdrom: sources that may lead to incorrect hashsum warnings. Affected users need to run "apt-cdrom add" again after the update was applied.

Platform:
Debian 7.0
Product:
apt
Reference:
DSA-3031-1
CVE-2014-6273
CVE    1
CVE-2014-6273

© SecPod Technologies