On Tue, Jan 22, 2019 at 01:44:12PM +0000, Ben Hutchings wrote:
>On Tue, 2019-01-22 at 13:17 +0100, Yves-Alexis Perez wrote:
>> -------------------------------------------------------------------------
>> Debian Security Advisory DSA-4371-1                   secur...@debian.org
>> https://www.debian.org/security/                        Yves-Alexis Perez
>> January 22, 2019                      https://www.debian.org/security/faq
>> -------------------------------------------------------------------------
>> 
>> Package        : apt
>> CVE ID         : CVE-2019-3462
>> 
>> Max Justicz discovered a vulnerability in APT, the high level package 
>> manager.
>> The code handling HTTP redirects in the HTTP transport method doesn't 
>> properly
>> sanitize fields transmitted over the wire. This vulnerability could be used 
>> by
>> an attacker located as a man-in-the-middle between APT and a mirror to inject
>> malicous content in the HTTP connection. This content could then be 
>> recognized
>> as a valid package by APT and used later for code execution with root
>> privileges on the target machine.
>[...]
>
>This presumably needs to be fixed for jessie LTS as well, and I see
>Chris Lamb has claimed it.
>
>However, APT is used during initial installation and we don't have any
>provision for updating installer images during LTS.  So we're either
>going to have to revisit that or come up with some kind of workaround
>for installation time.

I can help with new jessie installation images, but it'll need a bit
of prep work. debian-cd doesn't pull from security or lts by default.

-- 
Steve McIntyre, Cambridge, UK.                                st...@einval.com
"Managing a volunteer open source project is a lot like herding
 kittens, except the kittens randomly appear and disappear because they
 have day jobs." -- Matt Mackall

Reply via email to