MGASA-2014-0442

Source
https://advisories.mageia.org/MGASA-2014-0442.html
Import Source
https://advisories.mageia.org/MGASA-2014-0442.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2014-0442
Related
Published
2014-11-12T09:56:47Z
Modified
2014-11-12T09:45:15Z
Summary
Updated apt packages fix security vulnerability
Details

The Google Security Team discovered a buffer overflow vulnerability in the HTTP transport code in apt-get. An attacker able to man-in-the-middle a HTTP request to an apt repository can trigger the buffer overflow, leading to a crash of the "http" apt method binary, or potentially to arbitrary code execution (CVE-2014-6273).

Also fixed is parsing of Mageia package index "synthesis" files with lines longer than 64k characters. This is necessary for upgrading to the "cauldron" development distro that will become Mageia 5. Note however that upgrading from Mageia 3 to Mageia 5 will not be supported.

References
Credits

Affected packages

Mageia:4 / apt

Package

Name
apt
Purl
pkg:rpm/mageia/apt?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.5.15lorg3.94-11.2.mga4

Ecosystem specific

{
    "section": "core"
}

Mageia:3 / apt

Package

Name
apt
Purl
pkg:rpm/mageia/apt?distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.5.15lorg3.94-9.2.mga3

Ecosystem specific

{
    "section": "core"
}