APT before 0.8.15.2 does not properly validate inline GPG signatures, which allows man-in-the-middle attackers to install modified packages via vectors involving lack of an initial clearsigned message.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://packages.debian.org/changelogs/pool/main/a/apt/current/changelog | release notes vendor advisory |
http://www.ubuntu.com/usn/USN-1169-1 | third party advisory vendor advisory |
https://launchpad.net/ubuntu/+archive/primary/+sourcepub/1817196/+listing-archive-extra | patch |
http://www.securityfocus.com/bid/48671 | third party advisory vdb entry |
https://launchpad.net/bugs/784473 | third party advisory |
http://launchpadlibrarian.net/75126628/apt_0.8.13.2ubuntu2_0.8.13.2ubuntu4.1.diff.gz | third party advisory patch |
https://exchange.xforce.ibmcloud.com/vulnerabilities/68560 | third party advisory vdb entry |