apt-get in apt before 0.7.21 does not check for the correct error code from gpgv, which causes apt to treat a repository as valid even when it has been signed with a key that has been revoked or expired, which might allow remote attackers to trick apt into installing malicious repositories.
Link | Tags |
---|---|
http://secunia.com/advisories/34874 | third party advisory |
http://www.debian.org/security/2009/dsa-1779 | vendor advisory |
http://secunia.com/advisories/34829 | third party advisory |
http://www.securityfocus.com/bid/34630 | vdb entry |
http://secunia.com/advisories/34832 | third party advisory |
https://bugs.launchpad.net/ubuntu/+source/apt/+bug/356012 | |
https://usn.ubuntu.com/762-1/ | vendor advisory |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=433091 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/50086 | vdb entry |