Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Apt
(Debian)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 5 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2020-05-15 | CVE-2020-3810 | Missing input validation in the ar/tar implementations of APT before version 2.1.2 could result in denial of service when processing specially crafted deb files. | Ubuntu_linux, Apt, Debian_linux, Fedora | 5.5 | ||
2014-10-15 | CVE-2014-7206 | The changelog command in Apt before 1.0.9.2 allows local users to write to arbitrary files via a symlink attack on the changelog file. | Advanced_package_tool, Apt | N/A | ||
2013-03-21 | CVE-2013-1051 | apt 0.8.16, 0.9.7, and possibly other versions does not properly handle InRelease files, which allows man-in-the-middle attackers to modify packages before installation via unknown vectors, possibly related to integrity checking and the use of third-party repositories. | Ubuntu_linux, Advanced_package_tool, Apt | N/A | ||
2012-12-26 | CVE-2012-0961 | Apt 0.8.16~exp5ubuntu13.x before 0.8.16~exp5ubuntu13.6, 0.8.16~exp12ubuntu10.x before 0.8.16~exp12ubuntu10.7, and 0.9.7.5ubuntu5.x before 0.9.7.5ubuntu5.2, as used in Ubuntu, uses world-readable permissions for /var/log/apt/term.log, which allows local users to obtain sensitive shell information by reading the log file. | Advanced_package_tool, Apt | N/A | ||
2009-04-21 | CVE-2009-1358 | apt-get in apt before 0.7.21 does not check for the correct error code from gpgv, which causes apt to treat a repository as valid even when it has been signed with a key that has been revoked or expired, which might allow remote attackers to trick apt into installing malicious repositories. | Advanced_package_tool, Apt | N/A |