DSA-4371-1 apt -- aptID: oval:org.secpod.oval:def:603611 | Date: (C)2019-01-25 (M)2023-12-20 |
Class: PATCH | Family: unix |
Max Justicz discovered a vulnerability in APT, the high level package manager. The code handling HTTP redirects in the HTTP transport method doesn"t properly sanitize fields transmitted over the wire. This vulnerability could be used by an attacker located as a man-in-the-middle between APT and a mirror to inject malicous content in the HTTP connection. This content could then be recognized as a valid package by APT and used later for code execution with root privileges on the target machine. Since the vulnerability is present in the package manager itself, it is recommended to disable redirects in order to prevent exploitation during this upgrade only, using: apt -o Acquire::http::AllowRedirect=false update apt -o Acquire::http::AllowRedirect=false upgrade This is known to break some proxies when used against security.debian.org
Product: |
libapt-pkg-dev |
libapt-inst2.0 |
libapt-pkg5.0 |
libapt-pkg-doc |
apt |