USN-1283-1: APT vulnerability
Ubuntu Security Notice USN-1283-1
28th November, 2011
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 11.04
- Ubuntu 10.10
- Ubuntu 10.04 LTS
- Ubuntu 8.04 LTS
APT could be made to expose sensitive information over the network.
- apt - Advanced front-end for dpkg
It was discovered that APT incorrectly handled the Verify-Host
configuration option. If a remote attacker were able to perform a
man-in-the-middle attack, this flaw could potentially be used to steal
repository credentials. This issue only affected Ubuntu 10.04 LTS and
USN-1215-1 fixed a vulnerability in APT by disabling the apt-key net-update
option. This update re-enables the option with corrected verification.
Original advisory details:
It was discovered that the apt-key utility incorrectly verified GPG
keys when downloaded via the net-update option. If a remote attacker were
able to perform a man-in-the-middle attack, this flaw could potentially be
used to install altered packages.
The problem can be corrected by updating your system to the following package version:
- Ubuntu 11.04:
- apt 0.8.13.2ubuntu4.3
- Ubuntu 10.10:
- apt 0.8.3ubuntu7.3
- Ubuntu 10.04 LTS:
- apt 0.7.25.3ubuntu9.9
- Ubuntu 8.04 LTS:
- apt 0.7.9ubuntu17.4
To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.
In general, a standard system update will make all the necessary changes.