First published: Tue Jan 22 2019(Updated: )
Max Justicz discovered that APT incorrectly handled certain parameters during redirects. If a remote attacker were able to perform a machine-in-the-middle attack, this flaw could potentially be used to install altered packages.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/apt | <1.7.0ubuntu0.1 | 1.7.0ubuntu0.1 |
=18.10 | ||
All of | ||
ubuntu/apt | <1.6.6ubuntu0.1 | 1.6.6ubuntu0.1 |
=18.04 | ||
All of | ||
ubuntu/apt | <1.2.29ubuntu0.1 | 1.2.29ubuntu0.1 |
=16.04 | ||
All of | ||
ubuntu/apt | <1.0.1ubuntu2.19 | 1.0.1ubuntu2.19 |
=14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is USN-3863-1.
APT incorrectly handles certain parameters during redirects.
A remote attacker could potentially use this vulnerability to install altered packages.
Versions 1.7.0ubuntu0.1, 1.6.6ubuntu0.1, 1.2.29ubuntu0.1, and 1.0.1ubuntu2.19 of APT are affected by this vulnerability.
You can fix this vulnerability by updating APT to version 1.7.0ubuntu0.1 or applying the corresponding security patches.