Debian

Apt

5 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.59%
  • Veröffentlicht 15.05.2020 14:15:11
  • Zuletzt bearbeitet 21.11.2024 05:31:47

Missing input validation in the ar/tar implementations of APT before version 2.1.2 could result in denial of service when processing specially crafted deb files.

  • EPSS 0.05%
  • Veröffentlicht 15.10.2014 14:55:09
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The changelog command in Apt before 1.0.9.2 allows local users to write to arbitrary files via a symlink attack on the changelog file.

  • EPSS 0.13%
  • Veröffentlicht 21.03.2013 17:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

apt 0.8.16, 0.9.7, and possibly other versions does not properly handle InRelease files, which allows man-in-the-middle attackers to modify packages before installation via unknown vectors, possibly related to integrity checking and the use of third-...

  • EPSS 0.05%
  • Veröffentlicht 26.12.2012 22:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Apt 0.8.16~exp5ubuntu13.x before 0.8.16~exp5ubuntu13.6, 0.8.16~exp12ubuntu10.x before 0.8.16~exp12ubuntu10.7, and 0.9.7.5ubuntu5.x before 0.9.7.5ubuntu5.2, as used in Ubuntu, uses world-readable permissions for /var/log/apt/term.log, which allows loc...

  • EPSS 1.37%
  • Veröffentlicht 21.04.2009 23:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

apt-get in apt before 0.7.21 does not check for the correct error code from gpgv, which causes apt to treat a repository as valid even when it has been signed with a key that has been revoked or expired, which might allow remote attackers to trick ap...