This update fixes a regression introduced in 0.8.10.3+squeeze5 where
apt would send invalid HTTP requests when sending If-Range queries.
For reference, the original advisory text follows.
The Google Security Team discovered a buffer overflow vulnerability in
the HTTP transport code in apt-get. An attacker able to
man-in-the-middle a HTTP request to an apt repository can trigger the
buffer overflow, leading to a crash of the http apt method binary, or
potentially to arbitrary code execution.
The following regression fixes were included in this update:
For Debian 6 Squeeze, these issues have been fixed in apt version 0.8.10.3+squeeze6
CPE | Name | Operator | Version |
---|---|---|---|
apt | eq | 0.8.10.3 | |
apt | eq | 0.8.10.3+squeeze3 | |
apt | eq | 0.8.10.3+squeeze1 | |
apt | eq | 0.8.10.3+squeeze2 |