group.of.nepali.translators team mailing list archive
-
group.of.nepali.translators team
-
Mailing list archive
-
Message #28161
[Bug 1812353] Re: content injection in http method (CVE-2019-3462)
This bug was fixed in the package apt - 1.8.0~alpha3.1
---------------
apt (1.8.0~alpha3.1) unstable; urgency=emergency
* SECURITY UPDATE: content injection in http method (CVE-2019-3462)
(LP: #1812353)
-- Julian Andres Klode <jak@xxxxxxxxxx> Tue, 22 Jan 2019 19:52:38
+0100
** Changed in: apt (Ubuntu Disco)
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1812353
Title:
content injection in http method (CVE-2019-3462)
Status in apt package in Ubuntu:
Fix Released
Status in apt source package in Precise:
Fix Released
Status in apt source package in Trusty:
Fix Released
Status in apt source package in Xenial:
Fix Released
Status in apt source package in Bionic:
Fix Released
Status in apt source package in Cosmic:
Fix Released
Status in apt source package in Disco:
Fix Released
Bug description:
apt, starting with version 0.8.15, decodes target URLs of redirects,
but does not check them for newlines, allowing MiTM attackers (or
repository mirrors) to inject arbitrary headers into the result
returned to the main process.
If the URL embeds hashes of the supposed file, it can thus be used to
disable any validation of the downloaded file, as the fake hashes will
be prepended in front of the right hashes.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1812353/+subscriptions