Debian Security Advisory - DSA-3025-1 apt - security update

by
Anonymous Coward
in linux on (#2SK4)
Debian has announced a security advisory about its apt-get software, and recommends that you upgrade your apt packages ... with apt, of course.
"It was discovered that APT, the high level package manager, does not properly invalidate unauthenticated data (CVE-2014-0488), performs incorrect verification of 304 replies (CVE-2014-0487), does not perform the checksum check when the Acquire::GzipIndexes option is used (CVE-2014-0489) and does not properly perform validation for binary packages downloaded by the apt-get download command (CVE-2014-0490)."
This update comes to you courtesy of the IOERROR Twitter account.

Re: Some glaring security holes? (Score: 1)

by evilviper@pipedot.org on 2014-09-24 07:03 (#2SVX)

That stops them from getting in, but doesn't stop them from flooding your system (and your logs) with hundreds of tries per second, right?
It does, actually. If you disable password authentication entirely (not just for root or specific users), the server will not provide any way for someone to send it a password. So that's the end of brute-forcing attempts.

(Sorry I'm late to the party)
Post Comment
Subject
Comment
Captcha
20, 7 or 78: which of these is the smallest?