Linux Security
    Linux Security
    Linux Security

    Debian: DSA-3031-1: apt security update

    Date 23 Sep 2014
    109
    Posted By LinuxSecurity Advisories
    The Google Security Team discovered a buffer overflow vulnerability in the HTTP transport code in apt-get. An attacker able to man-in-the-middle a HTTP request to an apt repository can trigger the buffer overflow, leading to a crash of the 'http' apt method binary, or
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-3031-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                      Salvatore Bonaccorso
    September 23, 2014                     https://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : apt
    CVE ID         : CVE-2014-6273
    
    The Google Security Team discovered a buffer overflow vulnerability in
    the HTTP transport code in apt-get. An attacker able to
    man-in-the-middle a HTTP request to an apt repository can trigger the
    buffer overflow, leading to a crash of the 'http' apt method binary, or
    potentially to arbitrary code execution.
    
    Two regression fixes were included in this update:
    
     * Fix regression from the previous update in DSA-3025-1 when the custom
       apt configuration option for Dir::state::lists is set to a relative
       path (#762160).
    
     * Fix regression in the reverificaiton handling of cdrom: sources that
       may lead to incorrect hashsum warnings. Affected users need to run
       "apt-cdrom add" again after the update was applied.
    
    For the stable distribution (wheezy), this problem has been fixed in
    version 0.9.7.9+deb7u5.
    
    We recommend that you upgrade your apt packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    

    Advisories

    LinuxSecurity Poll

    I agree with Linus Torvalds - Apple's new M1-powered laptops should run on Linux.

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /main-polls/45-i-agree-with-linus-torvalds-apple-s-new-m1-powered-laptops-should-run-on-linux?task=poll.vote&format=json
    45
    radio
    [{"id":"158","title":"True","votes":"13","type":"x","order":"1","pct":3.13,"resources":[]},{"id":"159","title":"False","votes":"402","type":"x","order":"2","pct":96.87,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    You have already voted for this poll.


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.