| From: |
| Marc Deslauriers <marc.deslauriers@canonical.com> |
| To: |
| ubuntu-security-announce@lists.ubuntu.com |
| Subject: |
| [USN-1762-1] APT vulnerability |
| Date: |
| Thu, 14 Mar 2013 09:50:56 -0400 |
| Message-ID: |
| <5141D5C0.9050900@canonical.com> |
| Archive-link: |
| Article, Thread
|
==========================================================================
Ubuntu Security Notice USN-1762-1
March 14, 2013
apt vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.10
- Ubuntu 12.04 LTS
- Ubuntu 11.10
Summary:
An attacker could trick APT into installing altered packages.
Software Description:
- apt: Advanced front-end for dpkg
Details:
Ansgar Burchardt discovered that APT incorrectly handled repositories that
use InRelease files. The default Ubuntu repositories do not use InRelease
files, so this issue only affected third-party repositories. If a remote
attacker were able to perform a man-in-the-middle attack, this flaw could
potentially be used to install altered packages.
This update corrects the issue by disabling InRelease file support
completely.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.10:
apt 0.9.7.5ubuntu5.4
Ubuntu 12.04 LTS:
apt 0.8.16~exp12ubuntu10.10
Ubuntu 11.10:
apt 0.8.16~exp5ubuntu13.7
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-1762-1
CVE-2013-1051
Package Information:
https://launchpad.net/ubuntu/+source/apt/0.9.7.5ubuntu5.4
https://launchpad.net/ubuntu/+source/apt/0.8.16~exp12ubun...
https://launchpad.net/ubuntu/+source/apt/0.8.16~exp5ubunt...
--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at:
https://lists.ubuntu.com/mailman/listinfo/ubuntu-security...
(
Log in to post comments)