Is this apt vulnerability (CVE-2019-3462) a security concern for Ubuntu users?Install GNOME extensions through website: security vulnerability?Does ubuntu allow users to run ESET Smart Security?Is this a security risk/concern?Priority field in CVE pages on http://people.ubuntu.com/~ubuntu-security/cve/CVE-XXXXis the current Adobe Flash 'ransomware vulnerability' affecting Ubuntu users?Add a repository for security testingURL for Ubuntu 16.04 security updatesIs there a RESTful API for the Ubuntu CVE Tracker?Ubuntu AMi for AWS with patch for Dirty cow VulnerabilityHow is the severity/priority of a vulnerability in the Ubuntu CVE tracker determined?

Why did David Cameron offer a referendum on the European Union?

Why is this Simple Puzzle impossible to solve?

How long until a random word with letters "A", "B", "C" ends in the pattern "ABC"?

NIntegrate doesn't evaluate

How to deal with a colleague who is being aggressive?

Have 1.5% of all nuclear reactors ever built melted down?

Is it true that cut time means "play twice as fast as written"?

Popcorn is the only acceptable snack to consume while watching a movie

Plot and find intersection points of multiple curves

Why aren't space telescopes put in GEO?

Can a person survive on blood in place of water?

Is DateWithin30Days(Date 1, Date 2) an Apex Method?

Why would Ryanair allow me to book this journey through a third party, but not through their own website?

Did the UK Government ask for the Irish backstop?

Is the derivative with respect to a fermion field Grassmann-odd?

How should I introduce map drawing to my players?

Is Jon Snow the last of his House?

Why did the person in charge of a principality not just declare themself king?

How did these characters "suit up" so quickly?

Using credit/debit card details vs swiping a card in a payment (credit card) terminal

What does this symbol on the box of power supply mean?

Are these reasonable traits for someone with autism?

C++ forcing function parameter evalution order

Why do most published works in medical imaging try to reduce false positives?



Is this apt vulnerability (CVE-2019-3462) a security concern for Ubuntu users?


Install GNOME extensions through website: security vulnerability?Does ubuntu allow users to run ESET Smart Security?Is this a security risk/concern?Priority field in CVE pages on http://people.ubuntu.com/~ubuntu-security/cve/CVE-XXXXis the current Adobe Flash 'ransomware vulnerability' affecting Ubuntu users?Add a repository for security testingURL for Ubuntu 16.04 security updatesIs there a RESTful API for the Ubuntu CVE Tracker?Ubuntu AMi for AWS with patch for Dirty cow VulnerabilityHow is the severity/priority of a vulnerability in the Ubuntu CVE tracker determined?






.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty margin-bottom:0;








8















I am new to Ubuntu server. I found this post about a vulnerability in Debian's APT. Do you think this issue has been resolved?




  1. A vulnerability in Debian’s apt allows for easy lateral movement in data centers




    On January 22nd, Max Justicz published a write up detailing a vulnerability in the apt client. Using Man in the Middle techniques, an attacker can intercept the apt communication while it downloads a software package, replace the requested package content with their own binary, and execute it with root privileges.





  2. Remote Code Execution in apt/apt-get - Max Justicz




    I found a vulnerability in apt that allows a network man-in-the-middle (or a malicious package mirror) to execute arbitrary code as root on a machine installing any package. The bug has been fixed in the latest versions of apt. If you’re worried about being exploited during the update process, you can protect yourself by disabling HTTP redirects while you update.












share|improve this question



















  • 1





    It's good to summarise or include a relevant bit from the linked page into the question (or answer) in case the page disappears and to make what you're saying self-evident

    – thomasrutter
    May 13 at 6:04

















8















I am new to Ubuntu server. I found this post about a vulnerability in Debian's APT. Do you think this issue has been resolved?




  1. A vulnerability in Debian’s apt allows for easy lateral movement in data centers




    On January 22nd, Max Justicz published a write up detailing a vulnerability in the apt client. Using Man in the Middle techniques, an attacker can intercept the apt communication while it downloads a software package, replace the requested package content with their own binary, and execute it with root privileges.





  2. Remote Code Execution in apt/apt-get - Max Justicz




    I found a vulnerability in apt that allows a network man-in-the-middle (or a malicious package mirror) to execute arbitrary code as root on a machine installing any package. The bug has been fixed in the latest versions of apt. If you’re worried about being exploited during the update process, you can protect yourself by disabling HTTP redirects while you update.












share|improve this question



















  • 1





    It's good to summarise or include a relevant bit from the linked page into the question (or answer) in case the page disappears and to make what you're saying self-evident

    – thomasrutter
    May 13 at 6:04













8












8








8


2






I am new to Ubuntu server. I found this post about a vulnerability in Debian's APT. Do you think this issue has been resolved?




  1. A vulnerability in Debian’s apt allows for easy lateral movement in data centers




    On January 22nd, Max Justicz published a write up detailing a vulnerability in the apt client. Using Man in the Middle techniques, an attacker can intercept the apt communication while it downloads a software package, replace the requested package content with their own binary, and execute it with root privileges.





  2. Remote Code Execution in apt/apt-get - Max Justicz




    I found a vulnerability in apt that allows a network man-in-the-middle (or a malicious package mirror) to execute arbitrary code as root on a machine installing any package. The bug has been fixed in the latest versions of apt. If you’re worried about being exploited during the update process, you can protect yourself by disabling HTTP redirects while you update.












share|improve this question
















I am new to Ubuntu server. I found this post about a vulnerability in Debian's APT. Do you think this issue has been resolved?




  1. A vulnerability in Debian’s apt allows for easy lateral movement in data centers




    On January 22nd, Max Justicz published a write up detailing a vulnerability in the apt client. Using Man in the Middle techniques, an attacker can intercept the apt communication while it downloads a software package, replace the requested package content with their own binary, and execute it with root privileges.





  2. Remote Code Execution in apt/apt-get - Max Justicz




    I found a vulnerability in apt that allows a network man-in-the-middle (or a malicious package mirror) to execute arbitrary code as root on a machine installing any package. The bug has been fixed in the latest versions of apt. If you’re worried about being exploited during the update process, you can protect yourself by disabling HTTP redirects while you update.









apt security






share|improve this question















share|improve this question













share|improve this question




share|improve this question








edited May 13 at 6:23









fkraiem

9,29132031




9,29132031










asked May 12 at 23:58









AbdulAbdul

556




556







  • 1





    It's good to summarise or include a relevant bit from the linked page into the question (or answer) in case the page disappears and to make what you're saying self-evident

    – thomasrutter
    May 13 at 6:04












  • 1





    It's good to summarise or include a relevant bit from the linked page into the question (or answer) in case the page disappears and to make what you're saying self-evident

    – thomasrutter
    May 13 at 6:04







1




1





It's good to summarise or include a relevant bit from the linked page into the question (or answer) in case the page disappears and to make what you're saying self-evident

– thomasrutter
May 13 at 6:04





It's good to summarise or include a relevant bit from the linked page into the question (or answer) in case the page disappears and to make what you're saying self-evident

– thomasrutter
May 13 at 6:04










3 Answers
3






active

oldest

votes


















9














I opened a link you provided to grab the CVE number, then looked using a search engine for details



https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3462.html




> Ubuntu 12.04 ESM (Precise Pangolin): released
> (0.8.16~exp12ubuntu10.28)
> Ubuntu 14.04 LTS (Trusty Tahr): released
> (1.0.1ubuntu2.19) Ubuntu 16.04 LTS (Xenial Xerus): released
> (1.2.29ubuntu0.1) Ubuntu 18.04 LTS (Bionic Beaver): released
> (1.6.6ubuntu0.1) Ubuntu 18.10 (Cosmic Cuttlefish): released
> (1.7.0ubuntu0.1) Ubuntu 19.04 (Disco Dingo): released (1.8.0~alpha3.1)



As long as you have the packages listed as containing the fix you'll be fine. For more details, check Ubuntu security notes.






share|improve this answer

























  • Thanks the info. Hope this help me to use Ubuntu again.

    – Abdul
    May 13 at 1:56


















9














Yes, it's definitely fixed.



The best way to track security issues is using a CVE number. That's what CVE numbers are for. In this case, you seem to be worried about CVE-2019-3462



CVEs may have more than one related bug report. You can find all the bugs for this particular CVE at https://bugs.launchpad.net/bugs/cve/2019-3462. The bug tracker will tell you which bugs are fixed in which releases of Ubuntu, and when the fixes were uploaded.



After fixing this particular CVE, the Ubuntu Security Team talked about this issue and the fix in their podcast of 29 January 2019. It's brief, and worth a listen.






share|improve this answer























  • Glad to know that. Thanks

    – Abdul
    May 13 at 1:58


















3














When speaking of security vulnerabilities, the so-called CVE number is used across the entire industry to refer to a specific vulnerability. Everyone who responds to the vulnerability, regardless of Linux distribution, will use the same CVE number to refer to it.



In the articles you referenced, the CVE number was shown: CVE-2019-3462



Once you have the CVE number for any security issue, you can look it up in the Ubuntu CVE Tracker to find its current status in Ubuntu, including:



  • A description of the vulnerability

  • Links to Ubuntu Security Notices for the vulnerability, if available

  • The status of the vulnerability in each supported Ubuntu distribution

  • Package version numbers of fixed packages, when they become available

  • External links to information about the vulnerability

When the status for your distribution shows as "released" then a package with the fix is ready to download, and should be available after the next time you run sudo apt update.



To check the version of a package that you have installed, you can use dpkg -s. For example:



error@vmtest-ubuntu1804:~$ dpkg -s apt | grep ^Version
Version: 1.6.10





share|improve this answer

























  • Hope this help me secure my blog :). Cause my blog suddenly had a corrupted plugin when I upgraded it which was fine before.

    – Abdul
    May 14 at 0:58











  • @Abdul No idea? You asked about the vulnerability in apt, not about your blog.

    – Michael Hampton
    May 14 at 0:59











  • Pardon me, I am new in ubuntu and have not much knowledge about it. I was thinking that If the vulnerability allowed people to install their binary, so it can damage the thing inside the server include my blog. Maybe I am paranoid.

    – Abdul
    May 14 at 1:08











  • @Abdul There is no way to prove that your machine wasn't already compromised. If you have reason to suspect a compromise, reinstall the OS.

    – Michael Hampton
    May 14 at 1:13











Your Answer








StackExchange.ready(function()
var channelOptions =
tags: "".split(" "),
id: "89"
;
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function()
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled)
StackExchange.using("snippets", function()
createEditor();
);

else
createEditor();

);

function createEditor()
StackExchange.prepareEditor(
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader:
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
,
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
);



);













draft saved

draft discarded


















StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1142734%2fis-this-apt-vulnerability-cve-2019-3462-a-security-concern-for-ubuntu-users%23new-answer', 'question_page');

);

Post as a guest















Required, but never shown

























3 Answers
3






active

oldest

votes








3 Answers
3






active

oldest

votes









active

oldest

votes






active

oldest

votes









9














I opened a link you provided to grab the CVE number, then looked using a search engine for details



https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3462.html




> Ubuntu 12.04 ESM (Precise Pangolin): released
> (0.8.16~exp12ubuntu10.28)
> Ubuntu 14.04 LTS (Trusty Tahr): released
> (1.0.1ubuntu2.19) Ubuntu 16.04 LTS (Xenial Xerus): released
> (1.2.29ubuntu0.1) Ubuntu 18.04 LTS (Bionic Beaver): released
> (1.6.6ubuntu0.1) Ubuntu 18.10 (Cosmic Cuttlefish): released
> (1.7.0ubuntu0.1) Ubuntu 19.04 (Disco Dingo): released (1.8.0~alpha3.1)



As long as you have the packages listed as containing the fix you'll be fine. For more details, check Ubuntu security notes.






share|improve this answer

























  • Thanks the info. Hope this help me to use Ubuntu again.

    – Abdul
    May 13 at 1:56















9














I opened a link you provided to grab the CVE number, then looked using a search engine for details



https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3462.html




> Ubuntu 12.04 ESM (Precise Pangolin): released
> (0.8.16~exp12ubuntu10.28)
> Ubuntu 14.04 LTS (Trusty Tahr): released
> (1.0.1ubuntu2.19) Ubuntu 16.04 LTS (Xenial Xerus): released
> (1.2.29ubuntu0.1) Ubuntu 18.04 LTS (Bionic Beaver): released
> (1.6.6ubuntu0.1) Ubuntu 18.10 (Cosmic Cuttlefish): released
> (1.7.0ubuntu0.1) Ubuntu 19.04 (Disco Dingo): released (1.8.0~alpha3.1)



As long as you have the packages listed as containing the fix you'll be fine. For more details, check Ubuntu security notes.






share|improve this answer

























  • Thanks the info. Hope this help me to use Ubuntu again.

    – Abdul
    May 13 at 1:56













9












9








9







I opened a link you provided to grab the CVE number, then looked using a search engine for details



https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3462.html




> Ubuntu 12.04 ESM (Precise Pangolin): released
> (0.8.16~exp12ubuntu10.28)
> Ubuntu 14.04 LTS (Trusty Tahr): released
> (1.0.1ubuntu2.19) Ubuntu 16.04 LTS (Xenial Xerus): released
> (1.2.29ubuntu0.1) Ubuntu 18.04 LTS (Bionic Beaver): released
> (1.6.6ubuntu0.1) Ubuntu 18.10 (Cosmic Cuttlefish): released
> (1.7.0ubuntu0.1) Ubuntu 19.04 (Disco Dingo): released (1.8.0~alpha3.1)



As long as you have the packages listed as containing the fix you'll be fine. For more details, check Ubuntu security notes.






share|improve this answer















I opened a link you provided to grab the CVE number, then looked using a search engine for details



https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3462.html




> Ubuntu 12.04 ESM (Precise Pangolin): released
> (0.8.16~exp12ubuntu10.28)
> Ubuntu 14.04 LTS (Trusty Tahr): released
> (1.0.1ubuntu2.19) Ubuntu 16.04 LTS (Xenial Xerus): released
> (1.2.29ubuntu0.1) Ubuntu 18.04 LTS (Bionic Beaver): released
> (1.6.6ubuntu0.1) Ubuntu 18.10 (Cosmic Cuttlefish): released
> (1.7.0ubuntu0.1) Ubuntu 19.04 (Disco Dingo): released (1.8.0~alpha3.1)



As long as you have the packages listed as containing the fix you'll be fine. For more details, check Ubuntu security notes.







share|improve this answer














share|improve this answer



share|improve this answer








edited May 13 at 0:27

























answered May 13 at 0:22









guivercguiverc

5,69421724




5,69421724












  • Thanks the info. Hope this help me to use Ubuntu again.

    – Abdul
    May 13 at 1:56

















  • Thanks the info. Hope this help me to use Ubuntu again.

    – Abdul
    May 13 at 1:56
















Thanks the info. Hope this help me to use Ubuntu again.

– Abdul
May 13 at 1:56





Thanks the info. Hope this help me to use Ubuntu again.

– Abdul
May 13 at 1:56













9














Yes, it's definitely fixed.



The best way to track security issues is using a CVE number. That's what CVE numbers are for. In this case, you seem to be worried about CVE-2019-3462



CVEs may have more than one related bug report. You can find all the bugs for this particular CVE at https://bugs.launchpad.net/bugs/cve/2019-3462. The bug tracker will tell you which bugs are fixed in which releases of Ubuntu, and when the fixes were uploaded.



After fixing this particular CVE, the Ubuntu Security Team talked about this issue and the fix in their podcast of 29 January 2019. It's brief, and worth a listen.






share|improve this answer























  • Glad to know that. Thanks

    – Abdul
    May 13 at 1:58















9














Yes, it's definitely fixed.



The best way to track security issues is using a CVE number. That's what CVE numbers are for. In this case, you seem to be worried about CVE-2019-3462



CVEs may have more than one related bug report. You can find all the bugs for this particular CVE at https://bugs.launchpad.net/bugs/cve/2019-3462. The bug tracker will tell you which bugs are fixed in which releases of Ubuntu, and when the fixes were uploaded.



After fixing this particular CVE, the Ubuntu Security Team talked about this issue and the fix in their podcast of 29 January 2019. It's brief, and worth a listen.






share|improve this answer























  • Glad to know that. Thanks

    – Abdul
    May 13 at 1:58













9












9








9







Yes, it's definitely fixed.



The best way to track security issues is using a CVE number. That's what CVE numbers are for. In this case, you seem to be worried about CVE-2019-3462



CVEs may have more than one related bug report. You can find all the bugs for this particular CVE at https://bugs.launchpad.net/bugs/cve/2019-3462. The bug tracker will tell you which bugs are fixed in which releases of Ubuntu, and when the fixes were uploaded.



After fixing this particular CVE, the Ubuntu Security Team talked about this issue and the fix in their podcast of 29 January 2019. It's brief, and worth a listen.






share|improve this answer













Yes, it's definitely fixed.



The best way to track security issues is using a CVE number. That's what CVE numbers are for. In this case, you seem to be worried about CVE-2019-3462



CVEs may have more than one related bug report. You can find all the bugs for this particular CVE at https://bugs.launchpad.net/bugs/cve/2019-3462. The bug tracker will tell you which bugs are fixed in which releases of Ubuntu, and when the fixes were uploaded.



After fixing this particular CVE, the Ubuntu Security Team talked about this issue and the fix in their podcast of 29 January 2019. It's brief, and worth a listen.







share|improve this answer












share|improve this answer



share|improve this answer










answered May 13 at 1:37









user535733user535733

9,49433147




9,49433147












  • Glad to know that. Thanks

    – Abdul
    May 13 at 1:58

















  • Glad to know that. Thanks

    – Abdul
    May 13 at 1:58
















Glad to know that. Thanks

– Abdul
May 13 at 1:58





Glad to know that. Thanks

– Abdul
May 13 at 1:58











3














When speaking of security vulnerabilities, the so-called CVE number is used across the entire industry to refer to a specific vulnerability. Everyone who responds to the vulnerability, regardless of Linux distribution, will use the same CVE number to refer to it.



In the articles you referenced, the CVE number was shown: CVE-2019-3462



Once you have the CVE number for any security issue, you can look it up in the Ubuntu CVE Tracker to find its current status in Ubuntu, including:



  • A description of the vulnerability

  • Links to Ubuntu Security Notices for the vulnerability, if available

  • The status of the vulnerability in each supported Ubuntu distribution

  • Package version numbers of fixed packages, when they become available

  • External links to information about the vulnerability

When the status for your distribution shows as "released" then a package with the fix is ready to download, and should be available after the next time you run sudo apt update.



To check the version of a package that you have installed, you can use dpkg -s. For example:



error@vmtest-ubuntu1804:~$ dpkg -s apt | grep ^Version
Version: 1.6.10





share|improve this answer

























  • Hope this help me secure my blog :). Cause my blog suddenly had a corrupted plugin when I upgraded it which was fine before.

    – Abdul
    May 14 at 0:58











  • @Abdul No idea? You asked about the vulnerability in apt, not about your blog.

    – Michael Hampton
    May 14 at 0:59











  • Pardon me, I am new in ubuntu and have not much knowledge about it. I was thinking that If the vulnerability allowed people to install their binary, so it can damage the thing inside the server include my blog. Maybe I am paranoid.

    – Abdul
    May 14 at 1:08











  • @Abdul There is no way to prove that your machine wasn't already compromised. If you have reason to suspect a compromise, reinstall the OS.

    – Michael Hampton
    May 14 at 1:13















3














When speaking of security vulnerabilities, the so-called CVE number is used across the entire industry to refer to a specific vulnerability. Everyone who responds to the vulnerability, regardless of Linux distribution, will use the same CVE number to refer to it.



In the articles you referenced, the CVE number was shown: CVE-2019-3462



Once you have the CVE number for any security issue, you can look it up in the Ubuntu CVE Tracker to find its current status in Ubuntu, including:



  • A description of the vulnerability

  • Links to Ubuntu Security Notices for the vulnerability, if available

  • The status of the vulnerability in each supported Ubuntu distribution

  • Package version numbers of fixed packages, when they become available

  • External links to information about the vulnerability

When the status for your distribution shows as "released" then a package with the fix is ready to download, and should be available after the next time you run sudo apt update.



To check the version of a package that you have installed, you can use dpkg -s. For example:



error@vmtest-ubuntu1804:~$ dpkg -s apt | grep ^Version
Version: 1.6.10





share|improve this answer

























  • Hope this help me secure my blog :). Cause my blog suddenly had a corrupted plugin when I upgraded it which was fine before.

    – Abdul
    May 14 at 0:58











  • @Abdul No idea? You asked about the vulnerability in apt, not about your blog.

    – Michael Hampton
    May 14 at 0:59











  • Pardon me, I am new in ubuntu and have not much knowledge about it. I was thinking that If the vulnerability allowed people to install their binary, so it can damage the thing inside the server include my blog. Maybe I am paranoid.

    – Abdul
    May 14 at 1:08











  • @Abdul There is no way to prove that your machine wasn't already compromised. If you have reason to suspect a compromise, reinstall the OS.

    – Michael Hampton
    May 14 at 1:13













3












3








3







When speaking of security vulnerabilities, the so-called CVE number is used across the entire industry to refer to a specific vulnerability. Everyone who responds to the vulnerability, regardless of Linux distribution, will use the same CVE number to refer to it.



In the articles you referenced, the CVE number was shown: CVE-2019-3462



Once you have the CVE number for any security issue, you can look it up in the Ubuntu CVE Tracker to find its current status in Ubuntu, including:



  • A description of the vulnerability

  • Links to Ubuntu Security Notices for the vulnerability, if available

  • The status of the vulnerability in each supported Ubuntu distribution

  • Package version numbers of fixed packages, when they become available

  • External links to information about the vulnerability

When the status for your distribution shows as "released" then a package with the fix is ready to download, and should be available after the next time you run sudo apt update.



To check the version of a package that you have installed, you can use dpkg -s. For example:



error@vmtest-ubuntu1804:~$ dpkg -s apt | grep ^Version
Version: 1.6.10





share|improve this answer















When speaking of security vulnerabilities, the so-called CVE number is used across the entire industry to refer to a specific vulnerability. Everyone who responds to the vulnerability, regardless of Linux distribution, will use the same CVE number to refer to it.



In the articles you referenced, the CVE number was shown: CVE-2019-3462



Once you have the CVE number for any security issue, you can look it up in the Ubuntu CVE Tracker to find its current status in Ubuntu, including:



  • A description of the vulnerability

  • Links to Ubuntu Security Notices for the vulnerability, if available

  • The status of the vulnerability in each supported Ubuntu distribution

  • Package version numbers of fixed packages, when they become available

  • External links to information about the vulnerability

When the status for your distribution shows as "released" then a package with the fix is ready to download, and should be available after the next time you run sudo apt update.



To check the version of a package that you have installed, you can use dpkg -s. For example:



error@vmtest-ubuntu1804:~$ dpkg -s apt | grep ^Version
Version: 1.6.10






share|improve this answer














share|improve this answer



share|improve this answer








edited May 13 at 6:00

























answered May 13 at 5:52









Michael HamptonMichael Hampton

1,085921




1,085921












  • Hope this help me secure my blog :). Cause my blog suddenly had a corrupted plugin when I upgraded it which was fine before.

    – Abdul
    May 14 at 0:58











  • @Abdul No idea? You asked about the vulnerability in apt, not about your blog.

    – Michael Hampton
    May 14 at 0:59











  • Pardon me, I am new in ubuntu and have not much knowledge about it. I was thinking that If the vulnerability allowed people to install their binary, so it can damage the thing inside the server include my blog. Maybe I am paranoid.

    – Abdul
    May 14 at 1:08











  • @Abdul There is no way to prove that your machine wasn't already compromised. If you have reason to suspect a compromise, reinstall the OS.

    – Michael Hampton
    May 14 at 1:13

















  • Hope this help me secure my blog :). Cause my blog suddenly had a corrupted plugin when I upgraded it which was fine before.

    – Abdul
    May 14 at 0:58











  • @Abdul No idea? You asked about the vulnerability in apt, not about your blog.

    – Michael Hampton
    May 14 at 0:59











  • Pardon me, I am new in ubuntu and have not much knowledge about it. I was thinking that If the vulnerability allowed people to install their binary, so it can damage the thing inside the server include my blog. Maybe I am paranoid.

    – Abdul
    May 14 at 1:08











  • @Abdul There is no way to prove that your machine wasn't already compromised. If you have reason to suspect a compromise, reinstall the OS.

    – Michael Hampton
    May 14 at 1:13
















Hope this help me secure my blog :). Cause my blog suddenly had a corrupted plugin when I upgraded it which was fine before.

– Abdul
May 14 at 0:58





Hope this help me secure my blog :). Cause my blog suddenly had a corrupted plugin when I upgraded it which was fine before.

– Abdul
May 14 at 0:58













@Abdul No idea? You asked about the vulnerability in apt, not about your blog.

– Michael Hampton
May 14 at 0:59





@Abdul No idea? You asked about the vulnerability in apt, not about your blog.

– Michael Hampton
May 14 at 0:59













Pardon me, I am new in ubuntu and have not much knowledge about it. I was thinking that If the vulnerability allowed people to install their binary, so it can damage the thing inside the server include my blog. Maybe I am paranoid.

– Abdul
May 14 at 1:08





Pardon me, I am new in ubuntu and have not much knowledge about it. I was thinking that If the vulnerability allowed people to install their binary, so it can damage the thing inside the server include my blog. Maybe I am paranoid.

– Abdul
May 14 at 1:08













@Abdul There is no way to prove that your machine wasn't already compromised. If you have reason to suspect a compromise, reinstall the OS.

– Michael Hampton
May 14 at 1:13





@Abdul There is no way to prove that your machine wasn't already compromised. If you have reason to suspect a compromise, reinstall the OS.

– Michael Hampton
May 14 at 1:13

















draft saved

draft discarded
















































Thanks for contributing an answer to Ask Ubuntu!


  • Please be sure to answer the question. Provide details and share your research!

But avoid


  • Asking for help, clarification, or responding to other answers.

  • Making statements based on opinion; back them up with references or personal experience.

To learn more, see our tips on writing great answers.




draft saved


draft discarded














StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1142734%2fis-this-apt-vulnerability-cve-2019-3462-a-security-concern-for-ubuntu-users%23new-answer', 'question_page');

);

Post as a guest















Required, but never shown





















































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown

































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown







Popular posts from this blog

Club Baloncesto Breogán Índice Historia | Pavillón | Nome | O Breogán na cultura popular | Xogadores | Adestradores | Presidentes | Palmarés | Historial | Líderes | Notas | Véxase tamén | Menú de navegacióncbbreogan.galCadroGuía oficial da ACB 2009-10, páxina 201Guía oficial ACB 1992, páxina 183. Editorial DB.É de 6.500 espectadores sentados axeitándose á última normativa"Estudiantes Junior, entre as mellores canteiras"o orixinalHemeroteca El Mundo Deportivo, 16 setembro de 1970, páxina 12Historia do BreogánAlfredo Pérez, o último canoneiroHistoria C.B. BreogánHemeroteca de El Mundo DeportivoJimmy Wright, norteamericano do Breogán deixará Lugo por ameazas de morteResultados de Breogán en 1986-87Resultados de Breogán en 1990-91Ficha de Velimir Perasović en acb.comResultados de Breogán en 1994-95Breogán arrasa al Barça. "El Mundo Deportivo", 27 de setembro de 1999, páxina 58CB Breogán - FC BarcelonaA FEB invita a participar nunha nova Liga EuropeaCharlie Bell na prensa estatalMáximos anotadores 2005Tempada 2005-06 : Tódolos Xogadores da Xornada""Non quero pensar nunha man negra, mais pregúntome que está a pasar""o orixinalRaúl López, orgulloso dos xogadores, presume da boa saúde económica do BreogánJulio González confirma que cesa como presidente del BreogánHomenaxe a Lisardo GómezA tempada do rexurdimento celesteEntrevista a Lisardo GómezEl COB dinamita el Pazo para forzar el quinto (69-73)Cafés Candelas, patrocinador del CB Breogán"Suso Lázare, novo presidente do Breogán"o orixinalCafés Candelas Breogán firma el mayor triunfo de la historiaEl Breogán realizará 17 homenajes por su cincuenta aniversario"O Breogán honra ao seu fundador e primeiro presidente"o orixinalMiguel Giao recibiu a homenaxe do PazoHomenaxe aos primeiros gladiadores celestesO home que nos amosa como ver o Breo co corazónTita Franco será homenaxeada polos #50anosdeBreoJulio Vila recibirá unha homenaxe in memoriam polos #50anosdeBreo"O Breogán homenaxeará aos seus aboados máis veteráns"Pechada ovación a «Capi» Sanmartín e Ricardo «Corazón de González»Homenaxe por décadas de informaciónPaco García volve ao Pazo con motivo do 50 aniversario"Resultados y clasificaciones""O Cafés Candelas Breogán, campión da Copa Princesa""O Cafés Candelas Breogán, equipo ACB"C.B. Breogán"Proxecto social"o orixinal"Centros asociados"o orixinalFicha en imdb.comMario Camus trata la recuperación del amor en 'La vieja música', su última película"Páxina web oficial""Club Baloncesto Breogán""C. B. Breogán S.A.D."eehttp://www.fegaba.com

Vilaño, A Laracha Índice Patrimonio | Lugares e parroquias | Véxase tamén | Menú de navegación43°14′52″N 8°36′03″O / 43.24775, -8.60070

Cegueira Índice Epidemioloxía | Deficiencia visual | Tipos de cegueira | Principais causas de cegueira | Tratamento | Técnicas de adaptación e axudas | Vida dos cegos | Primeiros auxilios | Crenzas respecto das persoas cegas | Crenzas das persoas cegas | O neno deficiente visual | Aspectos psicolóxicos da cegueira | Notas | Véxase tamén | Menú de navegación54.054.154.436928256blindnessDicionario da Real Academia GalegaPortal das Palabras"International Standards: Visual Standards — Aspects and Ranges of Vision Loss with Emphasis on Population Surveys.""Visual impairment and blindness""Presentan un plan para previr a cegueira"o orixinalACCDV Associació Catalana de Cecs i Disminuïts Visuals - PMFTrachoma"Effect of gene therapy on visual function in Leber's congenital amaurosis"1844137110.1056/NEJMoa0802268Cans guía - os mellores amigos dos cegosArquivadoEscola de cans guía para cegos en Mortágua, PortugalArquivado"Tecnología para ciegos y deficientes visuales. Recopilación de recursos gratuitos en la Red""Colorino""‘COL.diesis’, escuchar los sonidos del color""COL.diesis: Transforming Colour into Melody and Implementing the Result in a Colour Sensor Device"o orixinal"Sistema de desarrollo de sinestesia color-sonido para invidentes utilizando un protocolo de audio""Enseñanza táctil - geometría y color. Juegos didácticos para niños ciegos y videntes""Sistema Constanz"L'ocupació laboral dels cecs a l'Estat espanyol està pràcticament equiparada a la de les persones amb visió, entrevista amb Pedro ZuritaONCE (Organización Nacional de Cegos de España)Prevención da cegueiraDescrición de deficiencias visuais (Disc@pnet)Braillín, un boneco atractivo para calquera neno, con ou sen discapacidade, que permite familiarizarse co sistema de escritura e lectura brailleAxudas Técnicas36838ID00897494007150-90057129528256DOID:1432HP:0000618D001766C10.597.751.941.162C97109C0155020