[PVE-User] APT CVE-2019-3462 (please read before upgrading!)

Thomas Lamprecht t.lamprecht at proxmox.com
Fri Jan 25 15:05:04 CET 2019


On 1/23/19 10:27 AM, Fabian Grünbichler wrote:
> The APT package manager used by Proxmox VE and Proxmox Mail Gateway was
> recently discovered to be affected by CVE-2019-3462, allowing a
> Man-In-The-Middle or malicious mirror server to execute arbitrary code
> with root privileges when affected systems attempt to install upgrades.
> 
> To securely upgrade your systems, run the following commands as root:
> 
> # apt -o Acquire::http::AllowRedirect=false update
> # apt -o Acquire::http::AllowRedirect=false full-upgrade
> 
> and verify that apt is now at least version 1.4.9 on Debian Stretch:
> 
> $ apt -v
> apt 1.4.9 (amd64)
> 
> Please see the Debian Security Advisory for details:
> https://www.debian.org/security/2019/dsa-4371
> 

To allow you to install Proxmox VE with a package management system version not
affected by this issue, we additionally released a new Proxmox VE 5.3 ISO
containing the fix for CVE-2019-3462 and all other security fixes since the
first 5.3 ISO. Get it from:

https://www.proxmox.com/en/downloads/category/iso-images-pve
http://download.proxmox.com/iso/proxmox-ve_5.3-2.iso

All container templates based on apt (Debian and Ubuntu) got also updated
yesterday.

cheers,
Thomas





More information about the pve-user mailing list