Improper Input Validation Affecting apt package, versions <0.8.15.2
Snyk CVSS
Attack Complexity
Low
User Interaction
Required
Threat Intelligence
EPSS
0.26% (66th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN10-APT-407488
- published 27 Jul 2011
- disclosed 27 Jul 2011
Introduced: 27 Jul 2011
CVE-2011-1829 Open this link in a new tabHow to fix?
Upgrade Debian:10
apt
to version 0.8.15.2 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream apt
package and not the apt
package as distributed by Debian
.
See How to fix?
for Debian:10
relevant fixed versions and status.
APT before 0.8.15.2 does not properly validate inline GPG signatures, which allows man-in-the-middle attackers to install modified packages via vectors involving lack of an initial clearsigned message.
References
- https://security-tracker.debian.org/tracker/CVE-2011-1829
- http://launchpadlibrarian.net/75126628/apt_0.8.13.2ubuntu2_0.8.13.2ubuntu4.1.diff.gz
- http://packages.debian.org/changelogs/pool/main/a/apt/current/changelog
- https://launchpad.net/bugs/784473
- https://launchpad.net/ubuntu/+archive/primary/+sourcepub/1817196/+listing-archive-extra
- http://xforce.iss.net/xforce/xfdb/68560
- http://www.securityfocus.com/bid/48671
- http://www.ubuntu.com/usn/USN-1169-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68560