It was reported that apt, Advanced Packaging Tool, did not honor the Verify-Host configuration option properly, when the x509 certificate host name did not match. A remote attacker could provide a specially-crafted APT repository URL and trick the local unsuspecting user into using it, potentially leading successful MITM attack. References: [1] https://bugs.launchpad.net/ubuntu/+source/apt/+bug/868353 [2] http://www.openwall.com/lists/oss-security/2011/10/19/4 (CVE request) Upstream patch: [3] http://bazaar.launchpad.net/~donkult/apt/sid/revision/2053.1.28
This issue did NOT affect the versions of the apt package, as shipped with Fedora release of 14 and 15, since those versions do NOT support apt-https method yet.
The CVE identifier of CVE-2011-3634 has been assigned to this issue: [4] http://www.openwall.com/lists/oss-security/2011/10/20/12