Описание
APT 0.7.x before 0.7.25 and 0.8.x before 0.8.16, when using the apt-key net-update to import keyrings, relies on GnuPG argument order and does not check GPG subkeys, which might allow remote attackers to install Trojan horse packages via a man-in-the-middle (MITM) attack.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 0.9.6ubuntu3 |
| hardy | released | 0.7.9ubuntu17.6 |
| lucid | released | 0.7.25.3ubuntu9.13 |
| natty | released | 0.8.13.2ubuntu4.6 |
| oneiric | released | 0.8.16~exp5ubuntu13.5 |
| precise | released | 0.8.16~exp12ubuntu10.2 |
| upstream | needs-triage |
Показывать по
2.6 Low
CVSS2
Связанные уязвимости
APT 0.7.x before 0.7.25 and 0.8.x before 0.8.16, when using the apt-key net-update to import keyrings, relies on GnuPG argument order and does not check GPG subkeys, which might allow remote attackers to install Trojan horse packages via a man-in-the-middle (MITM) attack.
APT 0.7.x before 0.7.25 and 0.8.x before 0.8.16, when using the apt-ke ...
APT 0.7.x before 0.7.25 and 0.8.x before 0.8.16, when using the apt-key net-update to import keyrings, relies on GnuPG argument order and does not check GPG subkeys, which might allow remote attackers to install Trojan horse packages via a man-in-the-middle (MITM) attack.
2.6 Low
CVSS2