exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 34874

Secunia Security Advisory 34874
Posted Apr 27, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for apt. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | linux, debian
SHA-256 | a267a8747fba6338928a04459618eedafffd2c82118928520ae371a69a7971cc

Secunia Security Advisory 34874

Change Mirror Download
----------------------------------------------------------------------

Secunia is pleased to announce the release of the annual Secunia
report for 2008.

Highlights from the 2008 report:
* Vulnerability Research
* Software Inspection Results
* Secunia Research Highlights
* Secunia Advisory Statistics

Request the full 2008 Report here:
http://secunia.com/advisories/try_vi/request_2008_report/

Stay Secure,

Secunia


----------------------------------------------------------------------

TITLE:
Debian update for apt

SECUNIA ADVISORY ID:
SA34874

VERIFY ADVISORY:
http://secunia.com/advisories/34874/

DESCRIPTION:
Debian has issued an update for apt. This fixes a security issue,
which can be exploited by malicious people to bypass certain security
restrictions.

For more information:
SA34829

SOLUTION:
Apply updated packages.

-- Debian GNU/Linux 4.0 alias etch --

Source archives:

http://security.debian.org/pool/updates/main/a/apt/apt_0.6.46.4-0.1+etch1.tar.gz
Size/MD5 checksum: 1798703 e6eaebb8a12f5243668ca56e65c8c71e
http://security.debian.org/pool/updates/main/a/apt/apt_0.6.46.4-0.1+etch1.dsc
Size/MD5 checksum: 1108 c631100edac082afe2dddb28030ed6ff

Architecture independent packages:

http://security.debian.org/pool/updates/main/a/apt/apt-doc_0.6.46.4-0.1+etch1_all.deb
Size/MD5 checksum: 89752 999f34683b7cb7818258ac1ebfca701c
http://security.debian.org/pool/updates/main/a/apt/libapt-pkg-doc_0.6.46.4-0.1+etch1_all.deb
Size/MD5 checksum: 112248 b91e59e2e1093ecbe387ccc7e8111d73

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/a/apt/apt-utils_0.6.46.4-0.1+etch1_alpha.deb
Size/MD5 checksum: 216152 3fde92f88576df84cb57aaf846ba3816
http://security.debian.org/pool/updates/main/a/apt/libapt-pkg-dev_0.6.46.4-0.1+etch1_alpha.deb
Size/MD5 checksum: 84560 48019ace277299ac3495eb77ddb94320
http://security.debian.org/pool/updates/main/a/apt/apt_0.6.46.4-0.1+etch1_alpha.deb
Size/MD5 checksum: 1505198 088f74bfebfac8c33f19e5b05f536761

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/a/apt/apt-utils_0.6.46.4-0.1+etch1_amd64.deb
Size/MD5 checksum: 198456 7cad50de61d033a85b079211ab282ec7
http://security.debian.org/pool/updates/main/a/apt/libapt-pkg-dev_0.6.46.4-0.1+etch1_amd64.deb
Size/MD5 checksum: 84796 66930e40732a85913fff7815591ea784
http://security.debian.org/pool/updates/main/a/apt/apt_0.6.46.4-0.1+etch1_amd64.deb
Size/MD5 checksum: 1448634 b29859a90e52b5f47048f38e115e44dd

arm architecture (ARM)

http://security.debian.org/pool/updates/main/a/apt/apt-utils_0.6.46.4-0.1+etch1_arm.deb
Size/MD5 checksum: 214264 5ab7d5e622e9425b3f5163b007e7e71e
http://security.debian.org/pool/updates/main/a/apt/libapt-pkg-dev_0.6.46.4-0.1+etch1_arm.deb
Size/MD5 checksum: 83810 04ec509e12759ee2af94881e0d5ef724
http://security.debian.org/pool/updates/main/a/apt/apt_0.6.46.4-0.1+etch1_arm.deb
Size/MD5 checksum: 1497802 2a03e41c76e2720707dbbfb790c17f62

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/a/apt/libapt-pkg-dev_0.6.46.4-0.1+etch1_i386.deb
Size/MD5 checksum: 84166 6aa9a63c060eb0461b66f67e35ed20c7
http://security.debian.org/pool/updates/main/a/apt/apt-utils_0.6.46.4-0.1+etch1_i386.deb
Size/MD5 checksum: 198392 7245c5ea84b1c4eefa816af20868a794
http://security.debian.org/pool/updates/main/a/apt/apt_0.6.46.4-0.1+etch1_i386.deb
Size/MD5 checksum: 1438190 73f115b27de4fdf11af97e2b5afca613

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/a/apt/apt-utils_0.6.46.4-0.1+etch1_ia64.deb
Size/MD5 checksum: 247928 a7c2581155ab49d35af4d365d51dbf8e
http://security.debian.org/pool/updates/main/a/apt/libapt-pkg-dev_0.6.46.4-0.1+etch1_ia64.deb
Size/MD5 checksum: 84186 c94ee0563a7531b142d8728699f17d96
http://security.debian.org/pool/updates/main/a/apt/apt_0.6.46.4-0.1+etch1_ia64.deb
Size/MD5 checksum: 1631044 4313242ccadf096fd8088c27050141e9

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/a/apt/apt_0.6.46.4-0.1+etch1_mips.deb
Size/MD5 checksum: 1413928 0d07461fb18e97564be6227cf04031e9
http://security.debian.org/pool/updates/main/a/apt/apt-utils_0.6.46.4-0.1+etch1_mips.deb
Size/MD5 checksum: 195524 35b9ad4c2121fde59d5a67f52f01ce1c
http://security.debian.org/pool/updates/main/a/apt/libapt-pkg-dev_0.6.46.4-0.1+etch1_mips.deb
Size/MD5 checksum: 84186 3fd16873a28ee85e1b42c6f6bb801852

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/a/apt/libapt-pkg-dev_0.6.46.4-0.1+etch1_mipsel.deb
Size/MD5 checksum: 84192 715de146cd96db7fc9421df5dd4fd5e5
http://security.debian.org/pool/updates/main/a/apt/apt-utils_0.6.46.4-0.1+etch1_mipsel.deb
Size/MD5 checksum: 195046 6bf1cd0ee7cc374a55c0cbfec7f1a2a7
http://security.debian.org/pool/updates/main/a/apt/apt_0.6.46.4-0.1+etch1_mipsel.deb
Size/MD5 checksum: 1410850 192ab91f19c4fd4f7a49bbe82bd9ccaa

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/a/apt/apt_0.6.46.4-0.1+etch1_powerpc.deb
Size/MD5 checksum: 1450594 f90c89e0e003ac88befb170a14709afc
http://security.debian.org/pool/updates/main/a/apt/apt-utils_0.6.46.4-0.1+etch1_powerpc.deb
Size/MD5 checksum: 206392 7d78be4ec2c5ac8a1c06b88e27053541
http://security.debian.org/pool/updates/main/a/apt/libapt-pkg-dev_0.6.46.4-0.1+etch1_powerpc.deb
Size/MD5 checksum: 84190 1e771c856f024be9ddd7b5c86b599b8e

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/a/apt/apt-utils_0.6.46.4-0.1+etch1_s390.deb
Size/MD5 checksum: 188942 fd67a46fd4260be589b2634d2df509f8
http://security.debian.org/pool/updates/main/a/apt/libapt-pkg-dev_0.6.46.4-0.1+etch1_s390.deb
Size/MD5 checksum: 84186 0d4d1110459a4d334332218f3cf9f9ac
http://security.debian.org/pool/updates/main/a/apt/apt_0.6.46.4-0.1+etch1_s390.deb
Size/MD5 checksum: 1430202 55abf0323abb3ce4df57b82706b1ec1c

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/a/apt/apt_0.6.46.4-0.1+etch1_sparc.deb
Size/MD5 checksum: 1423156 f7dcd42161f64afc103bfa53f853c34e
http://security.debian.org/pool/updates/main/a/apt/libapt-pkg-dev_0.6.46.4-0.1+etch1_sparc.deb
Size/MD5 checksum: 85288 e8402a5ced27cae1c8ba13df05e8972b
http://security.debian.org/pool/updates/main/a/apt/apt-utils_0.6.46.4-0.1+etch1_sparc.deb
Size/MD5 checksum: 189344 63b3411e1f3aea4920aee57fd92be904

-- Debian GNU/Linux 5.0 alias lenny --

Source archives:

http://security.debian.org/pool/updates/main/a/apt/apt_0.7.20.2+lenny1.tar.gz
Size/MD5 checksum: 2043258 c23dc4256af67c1644a9dbc5ae0115c8
http://security.debian.org/pool/updates/main/a/apt/apt_0.7.20.2+lenny1.dsc
Size/MD5 checksum: 1540 60e740d25e23101d5f7a9c90b90ee698

Architecture independent packages:

http://security.debian.org/pool/updates/main/a/apt/apt-doc_0.7.20.2+lenny1_all.deb
Size/MD5 checksum: 102110 099c1c85cb08d668e9e4668516ebc763
http://security.debian.org/pool/updates/main/a/apt/libapt-pkg-doc_0.7.20.2+lenny1_all.deb
Size/MD5 checksum: 125292 68c3671fa441778e16dbbe838cc893e5

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/a/apt/apt-transport-https_0.7.20.2+lenny1_alpha.deb
Size/MD5 checksum: 59682 c6f12690975904f490bae51e8896d2d2
http://security.debian.org/pool/updates/main/a/apt/libapt-pkg-dev_0.7.20.2+lenny1_alpha.deb
Size/MD5 checksum: 108326 e9ba5bbd066c440766eddd3f568f0762
http://security.debian.org/pool/updates/main/a/apt/apt-utils_0.7.20.2+lenny1_alpha.deb
Size/MD5 checksum: 215062 3e20fc15cdca71bba1011828f0bf7b7d
http://security.debian.org/pool/updates/main/a/apt/apt_0.7.20.2+lenny1_alpha.deb
Size/MD5 checksum: 1733134 6c1a53539011c887e6436c98dd2f9459

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/a/apt/apt-utils_0.7.20.2+lenny1_amd64.deb
Size/MD5 checksum: 192392 5c7789c5c31c810c45ad5ff9914449d0
http://security.debian.org/pool/updates/main/a/apt/apt_0.7.20.2+lenny1_amd64.deb
Size/MD5 checksum: 1657772 1e7f04ceddd59e28213c67d7fd7a0cac
http://security.debian.org/pool/updates/main/a/apt/apt-transport-https_0.7.20.2+lenny1_amd64.deb
Size/MD5 checksum: 59416 52d21612bd4ad79d834c4e86ddd70e00
http://security.debian.org/pool/updates/main/a/apt/libapt-pkg-dev_0.7.20.2+lenny1_amd64.deb
Size/MD5 checksum: 108906 b67790820711fb84894286e75a552464

arm architecture (ARM)

http://security.debian.org/pool/updates/main/a/apt/apt-utils_0.7.20.2+lenny1_arm.deb
Size/MD5 checksum: 207490 b6ae12f5fe907f0aae2cba5aefdae74e
http://security.debian.org/pool/updates/main/a/apt/apt-transport-https_0.7.20.2+lenny1_arm.deb
Size/MD5 checksum: 61332 18784a8161b32752a27e5ac6f7ba3fbc
http://security.debian.org/pool/updates/main/a/apt/libapt-pkg-dev_0.7.20.2+lenny1_arm.deb
Size/MD5 checksum: 109296 7bbcd9dd0c351d822b651cdc71d8b5d3
http://security.debian.org/pool/updates/main/a/apt/apt_0.7.20.2+lenny1_arm.deb
Size/MD5 checksum: 1715472 96a43332145ddc6a32c33cd470d2a98b

armel architecture (ARM EABI)

http://security.debian.org/pool/updates/main/a/apt/apt-utils_0.7.20.2+lenny1_armel.deb
Size/MD5 checksum: 183664 26c61ff554b0870d7b3b076c58e4cd48
http://security.debian.org/pool/updates/main/a/apt/apt_0.7.20.2+lenny1_armel.deb
Size/MD5 checksum: 1618204 0ece85e822c3a6b9a5fcdbd95154d6fc
http://security.debian.org/pool/updates/main/a/apt/libapt-pkg-dev_0.7.20.2+lenny1_armel.deb
Size/MD5 checksum: 109100 b5d6253870c61ffcfd86bcbd3abfdc69
http://security.debian.org/pool/updates/main/a/apt/apt-transport-https_0.7.20.2+lenny1_armel.deb
Size/MD5 checksum: 59644 7867c8452ef5dc79e7db094d35e823a7

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/a/apt/apt_0.7.20.2+lenny1_i386.deb
Size/MD5 checksum: 1639116 f2021728f2e92ffe32f7eb1bdc2d6231
http://security.debian.org/pool/updates/main/a/apt/libapt-pkg-dev_0.7.20.2+lenny1_i386.deb
Size/MD5 checksum: 107586 e5ac47a6a1892c8ae12b0c25136b163d
http://security.debian.org/pool/updates/main/a/apt/apt-utils_0.7.20.2+lenny1_i386.deb
Size/MD5 checksum: 188158 a0f4a903e2fc11d9d6535d310e7f5a9e
http://security.debian.org/pool/updates/main/a/apt/apt-transport-https_0.7.20.2+lenny1_i386.deb
Size/MD5 checksum: 58824 68cbda40b139645b347d3168e09c722b

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/a/apt/apt-transport-https_0.7.20.2+lenny1_ia64.deb
Size/MD5 checksum: 62086 351cdc33240bebee0e0a117ba6d3bbe6
http://security.debian.org/pool/updates/main/a/apt/libapt-pkg-dev_0.7.20.2+lenny1_ia64.deb
Size/MD5 checksum: 107180 44f5541e6a61acd8b118cb7c69760ec5
http://security.debian.org/pool/updates/main/a/apt/apt-utils_0.7.20.2+lenny1_ia64.deb
Size/MD5 checksum: 241400 5f124aa45329433fd321f26c855acd98
http://security.debian.org/pool/updates/main/a/apt/apt_0.7.20.2+lenny1_ia64.deb
Size/MD5 checksum: 1845584 d817332b5edd89be78c54c9952776879

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/a/apt/apt-transport-https_0.7.20.2+lenny1_mips.deb
Size/MD5 checksum: 59008 6a278db4d415830cec5c5eb6b636492b
http://security.debian.org/pool/updates/main/a/apt/apt-utils_0.7.20.2+lenny1_mips.deb
Size/MD5 checksum: 191408 bd2dcf570bee282e29ec379db8a32f14
http://security.debian.org/pool/updates/main/a/apt/libapt-pkg-dev_0.7.20.2+lenny1_mips.deb
Size/MD5 checksum: 107180 ce3b0385df6fd640bb3b1a2ae35a25d5
http://security.debian.org/pool/updates/main/a/apt/apt_0.7.20.2+lenny1_mips.deb
Size/MD5 checksum: 1616524 78ad8122717febb7952a1d6b14d27250

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/a/apt/libapt-pkg-dev_0.7.20.2+lenny1_mipsel.deb
Size/MD5 checksum: 107190 e231d8c9eea5e564a6d19e9eefc4c25e
http://security.debian.org/pool/updates/main/a/apt/apt-utils_0.7.20.2+lenny1_mipsel.deb
Size/MD5 checksum: 190900 4528466ab570e603256df256ea2de659
http://security.debian.org/pool/updates/main/a/apt/apt-transport-https_0.7.20.2+lenny1_mipsel.deb
Size/MD5 checksum: 58926 48dec2bd2641270e95b4bdea5cc0a8d5
http://security.debian.org/pool/updates/main/a/apt/apt_0.7.20.2+lenny1_mipsel.deb
Size/MD5 checksum: 1612746 92056ec6276c0b931859e6110125b861

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/a/apt/apt_0.7.20.2+lenny1_powerpc.deb
Size/MD5 checksum: 1706540 da3fd3aaab8a8e7c2e7028bbd05237a5
http://security.debian.org/pool/updates/main/a/apt/apt-transport-https_0.7.20.2+lenny1_powerpc.deb
Size/MD5 checksum: 61758 768c59f133efa8d32293ec8cbb756d57
http://security.debian.org/pool/updates/main/a/apt/libapt-pkg-dev_0.7.20.2+lenny1_powerpc.deb
Size/MD5 checksum: 107198 d8483f3ebee001a9524e5c60a2f8201b
http://security.debian.org/pool/updates/main/a/apt/apt-utils_0.7.20.2+lenny1_powerpc.deb
Size/MD5 checksum: 211530 b656601d1a6b1dac2a0c43a99ba43e33

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/a/apt/apt-transport-https_0.7.20.2+lenny1_s390.deb
Size/MD5 checksum: 59122 34cad4143dc249606699d6580ff5fb66
http://security.debian.org/pool/updates/main/a/apt/apt-utils_0.7.20.2+lenny1_s390.deb
Size/MD5 checksum: 190036 57f06428b14903ce2d7821fd40261593
http://security.debian.org/pool/updates/main/a/apt/libapt-pkg-dev_0.7.20.2+lenny1_s390.deb
Size/MD5 checksum: 107188 2b4e8b377bf7aad46621dd933c68792c
http://security.debian.org/pool/updates/main/a/apt/apt_0.7.20.2+lenny1_s390.deb
Size/MD5 checksum: 1649230 8405441f082af794841ba20cebaa7807

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/a/apt/apt_0.7.20.2+lenny1_sparc.deb
Size/MD5 checksum: 1649532 608c2627d477e3053b53dc622020c449
http://security.debian.org/pool/updates/main/a/apt/apt-utils_0.7.20.2+lenny1_sparc.deb
Size/MD5 checksum: 192880 5dccb38f4a4cc0dca8aaa485f4168aa3
http://security.debian.org/pool/updates/main/a/apt/libapt-pkg-dev_0.7.20.2+lenny1_sparc.deb
Size/MD5 checksum: 108746 ff9121fd1ff12c3b6bf406b43126ff44
http://security.debian.org/pool/updates/main/a/apt/apt-transport-https_0.7.20.2+lenny1_sparc.deb
Size/MD5 checksum: 60400 d6e12757ed28a524264f5e0b426e6779

-- Debian GNU/Linux unstable alias sid --

Fixed in version 0.7.21.

ORIGINAL ADVISORY:
DSA-1779-1:
http://lists.debian.org/debian-security-announce/2009/msg00090.html

OTHER REFERENCES:
SA34829:
http://secunia.com/advisories/34829/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close