Ubuntu Security Notice 3863-1 - Max Justicz discovered that APT incorrectly handled certain parameters during redirects. If a remote attacker were able to perform a man-in-the-middle attack, this flaw could potentially be used to install altered packages.
37de6a077e616f3d2fc675e0df086a441ee4d0d9862ab4d23e578f4cbc9261cf
==========================================================================
Ubuntu Security Notice USN-3863-1
January 22, 2019
apt vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.10
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
An attacker could trick APT into installing altered packages.
Software Description:
- apt: Advanced front-end for dpkg
Details:
Max Justicz discovered that APT incorrectly handled certain parameters
during redirects. If a remote attacker were able to perform a
man-in-the-middle attack, this flaw could potentially be used to install
altered packages.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.10:
apt 1.7.0ubuntu0.1
Ubuntu 18.04 LTS:
apt 1.6.6ubuntu0.1
Ubuntu 16.04 LTS:
apt 1.2.29ubuntu0.1
Ubuntu 14.04 LTS:
apt 1.0.1ubuntu2.19
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/usn/usn-3863-1
CVE-2019-3462
Package Information:
https://launchpad.net/ubuntu/+source/apt/1.7.0ubuntu0.1
https://launchpad.net/ubuntu/+source/apt/1.6.6ubuntu0.1
https://launchpad.net/ubuntu/+source/apt/1.2.29ubuntu0.1
https://launchpad.net/ubuntu/+source/apt/1.0.1ubuntu2.19