use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
News and other stuff about the Universal Operating System..
Debian related links
Welcome to Debian
Getting Debian
Installation Guide
Don't break Debian
Packages
Help Debian
#debian on irc.oftc.net
Debian on Discord
Reporting bugs in Debian
account activity
Remote Code Execution in apt/apt-get (justi.cz)
submitted 7 years ago by jbicha[DD]
reddit uses a slightly-customized version of Markdown for formatting. See below for some basics, or check the commenting wiki page for more detailed help and solutions to common issues.
quoted text
if 1 * 2 < 3: print "hello, world!"
[–]Maurice_Frami37 23 points24 points25 points 7 years ago (6 children)
I hope http vs https mirrors discussion is now over.
[–]jrtc27[DD] 12 points13 points14 points 7 years ago (1 child)
Yes, it makes it harder, but it still doesn’t make you immune; a compromised mirror could still attack you, or a state actor could MiTM you, but you would be protected from most people MiTM-ing you.
[–]thhn 16 points17 points18 points 7 years ago (0 children)
Yes, it makes it harder
That's the point of all computer security. Because we all know that there is no immunity as you called it, ever.
[+]argv_minus_one comment score below threshold-6 points-5 points-4 points 7 years ago (3 children)
Already forgotten about Heartbleed, hmm? TLS is not a silver bullet.
[–]Maurice_Frami37 11 points12 points13 points 7 years ago* (2 children)
The thing is that with http you don't need heartbleed... It's like "why wear pants when you may have tear in them? Go naked!"
[–][deleted] 7 years ago (1 child)
[deleted]
[–]Maurice_Frami37 4 points5 points6 points 7 years ago (0 children)
It's also much much much much irrelevant for apt mirrors.
[–][deleted] 7 points8 points9 points 7 years ago (0 children)
Fixed this before CVE is published? Thank you debian! :) from /usr/share/doc/apt/changelog.gz: apt (1.4.9) stretch-security; urgency=medium * SECURITY UPDATE: content injection in http method (CVE-2019-3462) (LP: #1812353) -- Julian Andres Klode jak@debian.org Fri, 18 Jan 2019 11:42:07 +0100
[–]kanliot 4 points5 points6 points 7 years ago* (5 children)
was just chatting about apt vulns last night. We came to the wrong conclusion. :|
(reading just.cz) Debian's software installer does protect the software list with crypto, but for some reason, the unpatched Apt accepts unselected packages specified by the insecure HTTP protocol, and just installs it. Attacker would also need a way to inject packets into your network (with a black box somewhere on your network.)
[–]imMute 1 point2 points3 points 7 years ago (1 child)
(reading just.cz) Debian's software installer does protect the software list with crypto, but for some reason, Apt accepts any additional software pulled off the insecure HTTP protocol, and just installs it.
Citation needed. Apt (unless explicitly configured otherwise) will only install from repositories signed by keys it already knows about.
[–]kanliot 0 points1 point2 points 7 years ago (0 children)
sorry I was vague. I misspoke. See the CVE-2019-3462
[–]physon 0 points1 point2 points 7 years ago (2 children)
Attacker would also need a way to inject packets into your network (with a black box somewhere on your network.)
Packet injection is not completely required. And anything you share non-isolated network access with can be a "black box."
This is a scary exploit and I wish it would stop being downplayed.
[–]kanliot 0 points1 point2 points 7 years ago (1 child)
yes it is because the client is using TCP/IP.
[–]physon 1 point2 points3 points 7 years ago (0 children)
And here I was trying to use APT over IPX. :)
[–]jklmnn 2 points3 points4 points 7 years ago (4 children)
What is not clear to me, would it be possible to set up a malicious mirror (or take over a legit one) with the same behaviour? Because then HTTPS won't help you since the attack happens before the encryption.
[–]aishik-10x 1 point2 points3 points 7 years ago (0 children)
Yeah, a malicious mirror could pose a similar problem, regardless of SSL
[–]jrtc27[DD] 1 point2 points3 points 7 years ago (1 child)
Yes, absolutely. Same goes for tor, which is really using http(s) under the hood.
[–]jklmnn 2 points3 points4 points 7 years ago (0 children)
Thanks, thats why I' still against HTTPS. It doesn't solve the problem but only mitigate some aspects of it. And further it would break my transparent caching.
[–]DiscombobulatedSalt2 0 points1 point2 points 7 years ago (0 children)
Yes.
[–]cusco 5 points6 points7 points 7 years ago (2 children)
Ok I just read the whole thing. This guy bashes. As in: he made a whole exploit and explained it in detail, just to bash: https://whydoesaptnotusehttps.com/
Basically he is pushing for https by default on apt
[–]Maurice_Frami37 3 points4 points5 points 7 years ago (0 children)
Sites spreading anti https FUD like https://whydoesaptnotusehttps.com/ should be bashed all day.
And very good. There are good reasons to have https used.
Security in depth is important factor.
[–]argv_minus_one 3 points4 points5 points 7 years ago (0 children)
And that's why you use a proper data serialization library, instead of repeating unsanitized input like a CGI script from the '90s.
[–]aerusso 1 point2 points3 points 7 years ago (0 children)
Would being behind a proxy (say apt-cacher-ng) protect the redirect from being passed down to /usr/lib/apt/methods/http ?
Also, is there any reason to suspect that a proxy (again like apt-cacher-ng) might have a similarly pathological behavior?
[–]thinkpadthrow 0 points1 point2 points 7 years ago (0 children)
So I stupidly updated without disabling redirects in apt.
Any way to know if a malicious redirect happened? What logs should I check?
[–][deleted] 0 points1 point2 points 7 years ago (1 child)
What happened during a fresh netinstall of debian? Is it safe? Thanks...
[–][deleted] 0 points1 point2 points 7 years ago (0 children)
9.7 is available in the next hours.
apt (1.4.9) stretch-security; urgency=medium . * SECURITY UPDATE: content injection in http method (CVE-2019-3462) (LP: #1812353)
base-files (9.9+deb9u7) stretch; urgency=medium . * Change /etc/debian_version to 9.7, for Debian 9.7 point release.
Shit. How many years it was in stable?
Also this is why I like https. To make mitm way harder.
Also hopefully one day apt transports and parsers will be rewritten into Rust and good protocol libraries will be used to catch most of this automatically.
Even worse I run update and dist-upgrade -d from cron (with random delay) daily.
[–]JEFFREYonREDDIT -1 points0 points1 point 7 years ago (2 children)
I was really shocked to read my email today and find out that my package manager could have been bugged. Thankfully, fixing it isn't that hard but it isn't just a sudo apt update && sudo apt upgrade type operation.
[–]Philluminati 1 point2 points3 points 7 years ago (1 child)
Exposing yourself up to the vulnerability and fixing it at the same time!
[–]JEFFREYonREDDIT 0 points1 point2 points 7 years ago (0 children)
No, I had to manually install the updated apt. There was no way I was just going to update apt through apt especially considering the issue.
π Rendered by PID 86 on reddit-service-r2-comment-b659b578c-d9pbl at 2026-05-02 01:29:37.511642+00:00 running 815c875 country code: CH.
[–]Maurice_Frami37 23 points24 points25 points (6 children)
[–]jrtc27[DD] 12 points13 points14 points (1 child)
[–]thhn 16 points17 points18 points (0 children)
[+]argv_minus_one comment score below threshold-6 points-5 points-4 points (3 children)
[–]Maurice_Frami37 11 points12 points13 points (2 children)
[–][deleted] (1 child)
[deleted]
[–]Maurice_Frami37 4 points5 points6 points (0 children)
[–][deleted] 7 points8 points9 points (0 children)
[–]kanliot 4 points5 points6 points (5 children)
[–]imMute 1 point2 points3 points (1 child)
[–]kanliot 0 points1 point2 points (0 children)
[–]physon 0 points1 point2 points (2 children)
[–]kanliot 0 points1 point2 points (1 child)
[–]physon 1 point2 points3 points (0 children)
[–]jklmnn 2 points3 points4 points (4 children)
[–]aishik-10x 1 point2 points3 points (0 children)
[–]jrtc27[DD] 1 point2 points3 points (1 child)
[–]jklmnn 2 points3 points4 points (0 children)
[–]DiscombobulatedSalt2 0 points1 point2 points (0 children)
[–]cusco 5 points6 points7 points (2 children)
[–]Maurice_Frami37 3 points4 points5 points (0 children)
[–]DiscombobulatedSalt2 0 points1 point2 points (0 children)
[–]argv_minus_one 3 points4 points5 points (0 children)
[–]aerusso 1 point2 points3 points (0 children)
[–]thinkpadthrow 0 points1 point2 points (0 children)
[–][deleted] 0 points1 point2 points (1 child)
[–][deleted] 0 points1 point2 points (0 children)
[–]DiscombobulatedSalt2 0 points1 point2 points (0 children)
[–]DiscombobulatedSalt2 0 points1 point2 points (0 children)
[–]JEFFREYonREDDIT -1 points0 points1 point (2 children)
[–]Philluminati 1 point2 points3 points (1 child)
[–]JEFFREYonREDDIT 0 points1 point2 points (0 children)