{"id":24712,"date":"2019-01-23T15:12:03","date_gmt":"2019-01-23T15:12:03","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/29745\/Nasty-Security-Bug-Found-And-Fixed-In-Linux-apt.html"},"modified":"2019-01-23T15:12:03","modified_gmt":"2019-01-23T15:12:03","slug":"nasty-security-bug-found-and-fixed-in-linux-apt","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/nasty-security-bug-found-and-fixed-in-linux-apt\/","title":{"rendered":"Nasty Security Bug Found And Fixed In Linux apt"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/r\/2018\/12\/11\/52b22f1f-bf38-45e5-80c6-a382ed9aed96\/thumbnail\/770x578\/5275511ca6489b26fc203cf7efe773e9\/istock-hacker-hands-doing-the-cyber-crimes-and-hacking.jpg\" class=\"ff-og-image-inserted\"\/><\/div>\n<div class=\"relatedContent alignRight\">\n<h3 class=\"heading\"><span class=\"int\">More security news<\/span><\/h3>\n<\/div>\n<p>If you want to install a program on the <a href=\"https:\/\/www.debian.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Debian<\/a>\/<a href=\"https:\/\/www.ubuntu.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ubuntu<\/a>\/<a href=\"https:\/\/linuxmint.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Mint<\/a> Linux distribution family, you almost always end up using the core software installer program <a href=\"https:\/\/www.computerhope.com\/unix\/apt-get.htm\" target=\"_blank\" rel=\"noopener noreferrer\">Advanced Package Tool (apt)<\/a>. It works well, but security researcher Max Justicz recently found a nasty way to make a <a href=\"https:\/\/justi.cz\/security\/2019\/01\/22\/apt-rce.html\" target=\"_blank\" rel=\"noopener noreferrer\">man-in-the-middle attack on apt<\/a>.<\/p>\n<p>Adding salt to this wound, Justicz found the hole would enable a remote attacker to execute arbitrary code as root on any system installing any package. To understand how it attacks, you need to understand how apt works.<\/p>\n<p>Apt is a front-end to the the <a href=\"https:\/\/wiki.debian.org\/DebianPackageManagement\" target=\"_blank\" rel=\"noopener noreferrer\">dpkg packaging system<\/a>. A packaging system, in turn, is a database of &#8220;packages&#8221; the files need to be installed for a program, such as Firefox, to run. With apt, you can find and install new programs, upgrade programs, remove programs, and update your local dbkg database.<\/p>\n<p>So far, so good. But, when apt installs a new program or updates an existing one, it doesn&#8217;t check to see if anything&#8217;s wrong with a package&#8217;s requested Uniform Resource Identifier (URI). Instead, it just compares the <a href=\"https:\/\/medium.freecodecamp.org\/how-does-pretty-good-privacy-work-3f5f75ecea97\" target=\"_blank\" rel=\"noopener noreferrer\">PGP security hashes<\/a> returned by the URI Done response with the values from the signed package manifest. But, since the man-in-the-middle attacker controls the reported hashes, they can forge them to make a malware package look legitimate.<\/p>\n<p>As the <a href=\"https:\/\/bugs.launchpad.net\/ubuntu\/+source\/apt\/+bug\/1812353\" target=\"_blank\" rel=\"noopener noreferrer\">Ubuntu apt security message<\/a> stated, &#8220;apt, starting with version 0.8.15, decodes target URLs of redirects, but does not check them for newlines, allowing MiTM attackers (or repository mirrors) to inject arbitrary headers into the result returned to the main process. If the URL embeds hashes of the supposed file, it can thus be used to disable any validation of the downloaded file, as the fake hashes will be prepended in front of the right hashes.&#8221;<\/p>\n<p>Justicz showed he could get a malicious .deb into a target system by using the Release.gpg file. This file is always pulled during apt update and is usually installed into a predictable location.<\/p>\n<p>Justicz demonstrated this can be as obvious as:<\/p>\n<blockquote readability=\"5\">\n<p>&lt;oops.deb contents&gt;<br \/>&#8212;&#8211;BEGIN PGP SIGNATURE&#8212;&#8211;<br \/>&#8230;<br \/>&#8212;&#8211;END PGP SIGNATURE&#8212;&#8211;<\/p>\n<\/blockquote>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>And whatever &#8220;oops&#8221; points to will get installed.<\/p>\n<p>He also pointed out that, &#8220;By default, Debian and Ubuntu both use plain http repositories out of the box.&#8221; While there&#8217;s <a href=\"https:\/\/www.reddit.com\/r\/linux\/comments\/aidxwa\/why_does_apt_not_use_https\/\" target=\"_blank\" rel=\"noopener noreferrer\">heated debate over whether the more secure https actually improved apt security<\/a>, Justicz knows his position: &#8220;I wouldn&#8217;t have been able to exploit the Dockerfile at the top of this post if the default package servers had been using https.&#8221;<\/p>\n<p>So, how bad is this really? Bad.<\/p>\n<p>Yves-Alexis Perez, a member of the Debian security team, wrote: &#8220;This vulnerability could be used by an attacker located as <a href=\"https:\/\/lists.debian.org\/debian-security-announce\/2019\/msg00010.html\" target=\"_blank\" rel=\"noopener noreferrer\">a man-in-the-middle between APT and a mirror to inject malicious content<\/a> in the HTTP connection. This content could then be recognized as a valid package by APT and used later for code execution with root privileges on the target machine.&#8221;<\/p>\n<hr\/>\n<h3>Must read<\/h3>\n<hr\/>\n<p>As potentially damaging as this bug could be, the patches are already available for both <a href=\"https:\/\/lists.debian.org\/debian-security-announce\/2019\/msg00010.html\" target=\"_blank\" rel=\"noopener noreferrer\">Debian<\/a> and <a href=\"https:\/\/bugs.launchpad.net\/ubuntu\/+source\/apt\/+bug\/1812353\" target=\"_blank\" rel=\"noopener noreferrer\">Ubuntu<\/a>. Patches will soon be available for Mint and other Debian\/Ubuntu-based Linux distros. When you do patch apt, the Debian security team recommends you take the following actions first: Disable redirects in order to prevent exploitation, with the following commands as root:<\/p>\n<blockquote readability=\"5\">\n<p>apt -o Acquire::http::AllowRedirect=false update<br \/>apt -o Acquire::http::AllowRedirect=false upgrade<\/p>\n<\/blockquote>\n<p>The bad news is: &#8220;This is known to break some proxies when used against security.debian.org. If that happens, people can switch their security APT source to use: deb http:\/\/cdn-fastly.deb.debian.org\/debian-security stable\/updates main.&#8221;<\/p>\n<p>So, as long as you move promptly to update your systems, this new security hole shouldn&#8217;t be a problem. That said, you don&#8217;t want to wait too long. It will get exploited in the wild. It&#8217;s only a matter of time.<\/p>\n<h3><strong>Related Stories:<\/strong><\/h3>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/29745\/Nasty-Security-Bug-Found-And-Fixed-In-Linux-apt.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":24713,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[5622],"class_list":["post-24712","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinelinuxflawpatch"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Nasty Security Bug Found And Fixed In Linux apt 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/nasty-security-bug-found-and-fixed-in-linux-apt\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Nasty Security Bug Found And Fixed In Linux apt 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/nasty-security-bug-found-and-fixed-in-linux-apt\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-23T15:12:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/nasty-security-bug-found-and-fixed-in-linux-apt.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nasty-security-bug-found-and-fixed-in-linux-apt\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nasty-security-bug-found-and-fixed-in-linux-apt\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Nasty Security Bug Found And Fixed In Linux apt\",\"datePublished\":\"2019-01-23T15:12:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nasty-security-bug-found-and-fixed-in-linux-apt\\\/\"},\"wordCount\":660,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nasty-security-bug-found-and-fixed-in-linux-apt\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/nasty-security-bug-found-and-fixed-in-linux-apt.jpg\",\"keywords\":[\"headline,linux,flaw,patch\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nasty-security-bug-found-and-fixed-in-linux-apt\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nasty-security-bug-found-and-fixed-in-linux-apt\\\/\",\"name\":\"Nasty Security Bug Found And Fixed In Linux apt 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nasty-security-bug-found-and-fixed-in-linux-apt\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nasty-security-bug-found-and-fixed-in-linux-apt\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/nasty-security-bug-found-and-fixed-in-linux-apt.jpg\",\"datePublished\":\"2019-01-23T15:12:03+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nasty-security-bug-found-and-fixed-in-linux-apt\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nasty-security-bug-found-and-fixed-in-linux-apt\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nasty-security-bug-found-and-fixed-in-linux-apt\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/nasty-security-bug-found-and-fixed-in-linux-apt.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/nasty-security-bug-found-and-fixed-in-linux-apt.jpg\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nasty-security-bug-found-and-fixed-in-linux-apt\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,linux,flaw,patch\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinelinuxflawpatch\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Nasty Security Bug Found And Fixed In Linux apt\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Nasty Security Bug Found And Fixed In Linux apt 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/nasty-security-bug-found-and-fixed-in-linux-apt\/","og_locale":"en_US","og_type":"article","og_title":"Nasty Security Bug Found And Fixed In Linux apt 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/nasty-security-bug-found-and-fixed-in-linux-apt\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-01-23T15:12:03+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/nasty-security-bug-found-and-fixed-in-linux-apt.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/nasty-security-bug-found-and-fixed-in-linux-apt\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/nasty-security-bug-found-and-fixed-in-linux-apt\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Nasty Security Bug Found And Fixed In Linux apt","datePublished":"2019-01-23T15:12:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/nasty-security-bug-found-and-fixed-in-linux-apt\/"},"wordCount":660,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/nasty-security-bug-found-and-fixed-in-linux-apt\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/nasty-security-bug-found-and-fixed-in-linux-apt.jpg","keywords":["headline,linux,flaw,patch"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/nasty-security-bug-found-and-fixed-in-linux-apt\/","url":"https:\/\/www.threatshub.org\/blog\/nasty-security-bug-found-and-fixed-in-linux-apt\/","name":"Nasty Security Bug Found And Fixed In Linux apt 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/nasty-security-bug-found-and-fixed-in-linux-apt\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/nasty-security-bug-found-and-fixed-in-linux-apt\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/nasty-security-bug-found-and-fixed-in-linux-apt.jpg","datePublished":"2019-01-23T15:12:03+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/nasty-security-bug-found-and-fixed-in-linux-apt\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/nasty-security-bug-found-and-fixed-in-linux-apt\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/nasty-security-bug-found-and-fixed-in-linux-apt\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/nasty-security-bug-found-and-fixed-in-linux-apt.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/nasty-security-bug-found-and-fixed-in-linux-apt.jpg","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/nasty-security-bug-found-and-fixed-in-linux-apt\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,linux,flaw,patch","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinelinuxflawpatch\/"},{"@type":"ListItem","position":3,"name":"Nasty Security Bug Found And Fixed In Linux apt"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/24712","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=24712"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/24712\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/24713"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=24712"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=24712"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=24712"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}