We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2019-3462 remote code execution in apt when following redirects: https://justi.cz/security/2019/01/22/apt-rce.html
This would allow an adversary to execute arbitrary code on the server by exploiting a vulnerability in apt.
For apt served over http, this requires an attacker to either compromise the apt server or be in a privileged networked position.
For apt served over https, the require must compromise the apt server or be in a privileged network position AND have a valid HTTPS certificate.
deb.torproject.org and apt.freedom.press use https, however, archive.ubuntu.com does not.
Existing installs have already been upgraded to the latest version.
Before running any apt commands, apt should be updated with -o Acquire::http:AllowRedirect=false
-o Acquire::http:AllowRedirect=false
The text was updated successfully, but these errors were encountered:
[0.12.0] Remove #4058 from changelog, was in 0.11.1
db960a1
[0.12.0] Remove #4058 from changelog, was in 0.11.1; fix typo
9120b37
Merge pull request #4156 from freedomofpress/docs-changelog-fix
d6e66cf
emkll
Successfully merging a pull request may close this issue.
Description
CVE-2019-3462 remote code execution in apt when following redirects:
https://justi.cz/security/2019/01/22/apt-rce.html
This would allow an adversary to execute arbitrary code on the server by exploiting a vulnerability in apt.
For apt served over http, this requires an attacker to either compromise the apt server or be in a privileged networked position.
For apt served over https, the require must compromise the apt server or be in a privileged network position AND have a valid HTTPS certificate.
deb.torproject.org and apt.freedom.press use https, however, archive.ubuntu.com does not.
Existing installs
Existing installs have already been upgraded to the latest version.
New installs
Before running any apt commands, apt should be updated with
-o Acquire::http:AllowRedirect=false
The text was updated successfully, but these errors were encountered: