APT before 0.8.15.2 does not properly validate inline GPG signatures, which allows man-in-the-middle attackers to install modified packages via vectors involving lack of an initial clearsigned message.
References
Configurations
History
21 Nov 2024, 01:27
Type | Values Removed | Values Added |
---|---|---|
References | () http://launchpadlibrarian.net/75126628/apt_0.8.13.2ubuntu2_0.8.13.2ubuntu4.1.diff.gz - Patch, Third Party Advisory | |
References | () http://packages.debian.org/changelogs/pool/main/a/apt/current/changelog - Release Notes, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/48671 - Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/USN-1169-1 - Third Party Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/68560 - Third Party Advisory, VDB Entry | |
References | () https://launchpad.net/bugs/784473 - Third Party Advisory | |
References | () https://launchpad.net/ubuntu/+archive/primary/+sourcepub/1817196/+listing-archive-extra - Patch |
Information
Published : 2011-07-27 02:55
Updated : 2024-11-21 01:27
NVD link : CVE-2011-1829
Mitre link : CVE-2011-1829
CVE.ORG link : CVE-2011-1829
JSON object : View
Products Affected
canonical
- ubuntu_linux
debian
- advanced_package_tool
CWE
CWE-20
Improper Input Validation