[USN-3863-1] APT vulnerability


This is an OpenPGP/MIME signed message (RFC 4880 and 3156)

protocol=”application/pgp-signature”;
boundary=”bsq0mjiwc0lbEdpFqkmvVvX9H3ZZThie7″

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–bsq0mjiwc0lbEdpFqkmvVvX9H3ZZThie7

protected-headers=”v1″
From: Marc Deslauriers
Reply-To: Ubuntu Security
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID:
Subject: [USN-3863-1] APT vulnerability

–2N6ugr2DOzXZZk1K5D9Pu8wy0WkU5BRGW

Content-Language: en-CA
Content-Transfer-Encoding: quoted-printable

=
=

Ubuntu Security Notice USN-3863-1
January 22, 2019

apt vulnerability
=
=

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.10
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

An attacker could trick APT into installing altered packages.

Software Description:
– apt: Advanced front-end for dpkg

Details:

Max Justicz discovered that APT incorrectly handled certain parameters
during redirects. If a remote attacker were able to perform a
man-in-the-middle attack, this flaw could potentially be used to install
altered packages.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.10:
apt 1.7.0ubuntu0.1

Ubuntu 18.04 LTS:
apt 1.6.6ubuntu0.1

Ubuntu 16.04 LTS:
apt 1.2.29ubuntu0.1

Ubuntu 14.04 LTS:
apt 1.0.1ubuntu2.19

In general, a standard system update will make all the necessary changes.=

References:
https://usn.ubuntu.com/usn/usn-3863-1
CVE-2019-3462

Package Information:
https://launchpad.net/ubuntu/+source/apt/1.7.0ubuntu0.1
https://launchpad.net/ubuntu/+source/apt/1.6.6ubuntu0.1
https://launchpad.net/ubuntu/+source/apt/1.2.29ubuntu0.1
https://launchpad.net/ubuntu/+source/apt/1.0.1ubuntu2.19

–2N6ugr2DOzXZZk1K5D9Pu8wy0WkU5BRGW–

–bsq0mjiwc0lbEdpFqkmvVvX9H3ZZThie7

Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename=”signature.asc”

—–BEGIN PGP SIGNATURE—–

iQIzBAEBCgAdFiEEUMSg3c8x5FLOsZtRZWnYVadEvpMFAlxHFXYACgkQZWnYVadE
vpM7bBAAkJvJtPnfUAElSPwqpCtTdmm+Lm/UvBJqD13LwXUn1ybdffe1jXAptsL4
S9EY9hjRFZDUU/uejLXuvpdHGbgu6Zm8utY8L+6j1vAIdqB7Oa7SWHtwiqumK7AT
K9dxeT0s9wfwTpsUssTsAOcXbzavKnN/AcB2jsKpgfd0f7adojnRMDqS9wIvTyGP
ONWGW0+Tkq7VqTXQOkbsuul9rtt0GUYEQqAF5Ouvaas44zVZv2svOLPLRgh3OY1v
C1njeOmY/OXUtJW37zCdrceKKyQc6PbCrBLXfsx4+og06qLpb8+dmh9aph7aTmb0
N748Arl2hozhz/Rv9jOrzLGxKLfGLTZ9c8XGVE/BVq5BX1HdL4/HQYxH/SzWBb6O
l4hv3BJdZUmptO1EbzWjgCD/02lXy6vDr8X5FwNNbiAadHyZa0H7ysh0U/IIx0Oh
T2VCEToGHQ2vj73q0qspMu+Z+Q5GjHGo55nrjqmWliBR4JiYA67YvrBDmLBlV89Z
taeHv8Jl14lYyJ4p+f2mS+rjlqL2Zp8HOVK5Xbm1NRTiKqlebIvr35buHsZhM2N5
vrrVf9rFUsMkH7bo/eJMPpomZu3EWNnR4sdq0mIaEcuteBRL5CzL76Hhkz5Eu0v6
Lo9yO3AQPk1MPYcAIw0qwr5jOlyLYM1l+wyn8G1aJe5QupiP/RA=
=rPxS
—–END PGP SIGNATURE—–

–bsq0mjiwc0lbEdpFqkmvVvX9H3ZZThie7–

MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK