It was discovered that APT incorrectly handled certain http URLs. If a remote attacker were able to perform a machine-in-the-middle attack, this flaw could be exploited to cause APT to crash, resulting in a denial of service, or possibly execute arbitrary code. The default compiler options for affected releases should reduce the vulnerability to a denial of service. (CVE-2014-6273)
In addition, this update fixes regressions introduced by the USN-2348-1 security update: APT incorrectly handled file:/// sources on a different partition, incorrectly handled Dir::state::lists set to a relative path, and incorrectly handled cdrom: sources.
{ "binaries": [ { "binary_version": "1.0.1ubuntu2.4.1", "binary_name": "apt" }, { "binary_version": "1.0.1ubuntu2.4.1", "binary_name": "apt-doc" }, { "binary_version": "1.0.1ubuntu2.4.1", "binary_name": "apt-transport-https" }, { "binary_version": "1.0.1ubuntu2.4.1", "binary_name": "apt-utils" }, { "binary_version": "1.0.1ubuntu2.4.1", "binary_name": "libapt-inst1.5" }, { "binary_version": "1.0.1ubuntu2.4.1", "binary_name": "libapt-pkg-dev" }, { "binary_version": "1.0.1ubuntu2.4.1", "binary_name": "libapt-pkg-doc" }, { "binary_version": "1.0.1ubuntu2.4.1", "binary_name": "libapt-pkg4.12" } ], "availability": "No subscription required" }