Debian

Advanced Package Tool

21 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Published 10.12.2020 04:15:11
  • Last modified 21.11.2024 05:21:03

Various memory and file descriptor leaks were found in apt-python files python/arfile.cc, python/tag.cc, python/tarfile.cc, aka GHSL-2020-170. This issue affects: python-apt 1.1.0~beta1 versions prior to 1.1.0~beta1ubuntu0.16.04.10; 1.6.5ubuntu0 vers...

  • EPSS 0.23%
  • Published 10.12.2020 04:15:11
  • Last modified 21.11.2024 05:21:02

APT had several integer overflows and underflows while parsing .deb packages, aka GHSL-2020-168 GHSL-2020-169, in files apt-pkg/contrib/extracttar.cc, apt-pkg/deb/debfile.cc, and apt-pkg/contrib/arfile.cc. This issue affects: apt 1.2.32ubuntu0 versio...

Exploit
  • EPSS 1.51%
  • Published 26.11.2019 00:15:11
  • Last modified 21.11.2024 01:30:22

It was found that apt-key in apt, all versions, do not correctly validate gpg keys with the master keyring, leading to a potential man-in-the-middle attack.

  • EPSS 7.37%
  • Published 28.01.2019 21:29:00
  • Last modified 21.11.2024 04:42:05

Incorrect sanitation of the 302 redirect field in HTTP transport method of apt versions 1.4.8 and earlier can lead to content injection by a MITM attacker, potentially leading to remote code execution on the target machine.

  • EPSS 0.13%
  • Published 21.08.2018 00:29:00
  • Last modified 21.11.2024 03:38:21

The mirror:// method implementation in Advanced Package Tool (APT) 1.6.x before 1.6.4 and 1.7.x before 1.7.0~alpha3 mishandles gpg signature verification for the InRelease file of a fallback mirror, aka mirrorfail.

Exploit
  • EPSS 5.96%
  • Published 05.12.2017 16:29:00
  • Last modified 20.04.2025 01:37:25

The apt package in Debian jessie before 1.0.9.8.4, in Debian unstable before 1.4~beta2, in Ubuntu 14.04 LTS before 1.0.1ubuntu2.17, in Ubuntu 16.04 LTS before 1.2.15ubuntu0.2, and in Ubuntu 16.10 before 1.3.2ubuntu0.1 allows man-in-the-middle attacke...

  • EPSS 0.69%
  • Published 03.11.2014 22:55:07
  • Last modified 12.04.2025 10:46:40

The apt-get download command in APT before 1.0.9 does not properly validate signatures for packages, which allows remote attackers to execute arbitrary code via a crafted package.

  • EPSS 0.69%
  • Published 03.11.2014 22:55:07
  • Last modified 12.04.2025 10:46:40

APT before 1.0.9, when the Acquire::GzipIndexes option is enabled, does not validate checksums, which allows remote attackers to execute arbitrary code via a crafted package.

  • EPSS 0.2%
  • Published 03.11.2014 22:55:07
  • Last modified 12.04.2025 10:46:40

APT before 1.0.9 does not "invalidate repository data" when moving from an unauthenticated to authenticated state, which allows remote attackers to have unspecified impact via crafted repository data.

  • EPSS 0.12%
  • Published 03.11.2014 22:55:07
  • Last modified 12.04.2025 10:46:40

APT before 1.0.9 does not verify downloaded files if they have been modified as indicated using the If-Modified-Since header, which has unspecified impact and attack vectors.