USN-3863-1: APT vulnerability
22 January 2019
An attacker could trick APT into installing altered packages.
Releases
Packages
- apt - Advanced front-end for dpkg
Details
Max Justicz discovered that APT incorrectly handled certain parameters
during redirects. If a remote attacker were able to perform a
machine-in-the-middle attack, this flaw could potentially be used to install
altered packages.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.10
Ubuntu 18.04
Ubuntu 16.04
Ubuntu 14.04
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-3863-2: libapt-pkg-dev, libapt-pkg-doc, apt-doc, libapt-pkg4.12, apt, apt-utils, apt-transport-https, libapt-inst1.4