Bug 35986

Summary: apt: Buffer overflow (3.2)
Product: UCS Reporter: Moritz Muehlenhoff <jmm>
Component: Security updatesAssignee: Janek Walkenhorst <walkenhorst>
Status: CLOSED FIXED QA Contact: Felix Botner <botner>
Severity: normal    
Priority: P3 CC: gohmann, walkenhorst
Version: UCS 3.2   
Target Milestone: UCS 3.2-3-errata   
Hardware: Other   
OS: Linux   
What kind of report is it?: --- What type of bug is this?: ---
Who will be affected by this bug?: --- How will those affected feel about the bug?: ---
User Pain: Enterprise Customer affected?:
School Customer affected?: ISV affected?:
Waiting Support: Flags outvoted (downgraded) after PO Review:
Ticket number: Bug group (optional):
Max CVSS v3 score:
Bug Depends on:    
Bug Blocks: 36277    

Description Moritz Muehlenhoff univentionstaff 2014-09-23 19:21:08 CEST
CVE-2014-6273

Buffer overflow in the HTTP backend of apt, resulting in the execution of arbitrary code by a MITM attacker.
Comment 1 Janek Walkenhorst univentionstaff 2014-09-24 18:20:44 CEST
Advisory: 2014-09-24-apt.yaml
Tests (amd64): OK
Comment 2 Felix Botner univentionstaff 2014-09-25 12:50:22 CEST
OK - install on amd64/i386
OK - apt still works after update
OK - YAML
Comment 3 Janek Walkenhorst univentionstaff 2014-09-25 14:32:35 CEST
http://errata.univention.de/ucs/3.2/212.html