Vulnerabilities > Debian > Advanced Package Tool > 0.7.22.2
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-12-10 | CVE-2020-27351 | Missing Release of Resource after Effective Lifetime vulnerability in Debian Advanced Package Tool Various memory and file descriptor leaks were found in apt-python files python/arfile.cc, python/tag.cc, python/tarfile.cc, aka GHSL-2020-170. | 2.1 |
2020-12-10 | CVE-2020-27350 | Integer Overflow or Wraparound vulnerability in multiple products APT had several integer overflows and underflows while parsing .deb packages, aka GHSL-2020-168 GHSL-2020-169, in files apt-pkg/contrib/extracttar.cc, apt-pkg/deb/debfile.cc, and apt-pkg/contrib/arfile.cc. | 5.7 |
2019-01-28 | CVE-2019-3462 | Incorrect sanitation of the 302 redirect field in HTTP transport method of apt versions 1.4.8 and earlier can lead to content injection by a MITM attacker, potentially leading to remote code execution on the target machine. | 8.1 |
2017-12-05 | CVE-2016-1252 | Improper Certificate Validation vulnerability in multiple products The apt package in Debian jessie before 1.0.9.8.4, in Debian unstable before 1.4~beta2, in Ubuntu 14.04 LTS before 1.0.1ubuntu2.17, in Ubuntu 16.04 LTS before 1.2.15ubuntu0.2, and in Ubuntu 16.10 before 1.3.2ubuntu0.1 allows man-in-the-middle attackers to bypass a repository-signing protection mechanism by leveraging improper error handling when validating InRelease file signatures. | 4.3 |
2014-11-03 | CVE-2014-0490 | Improper Input Validation vulnerability in Debian Advanced Package Tool The apt-get download command in APT before 1.0.9 does not properly validate signatures for packages, which allows remote attackers to execute arbitrary code via a crafted package. | 7.5 |
2014-10-15 | CVE-2014-7206 | Link Following vulnerability in Debian Advanced Package Tool and APT The changelog command in Apt before 1.0.9.2 allows local users to write to arbitrary files via a symlink attack on the changelog file. | 3.6 |
2014-09-30 | CVE-2014-6273 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Debian Advanced Package Tool Buffer overflow in the HTTP transport code in apt-get in APT 1.0.1 and earlier allows man-in-the-middle attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted URL. | 6.8 |
2014-06-17 | CVE-2014-0478 | Improper Input Validation vulnerability in Debian Advanced Package Tool APT before 1.0.4 does not properly validate source packages, which allows man-in-the-middle attackers to download and install Trojan horse packages by removing the Release signature. | 4.0 |
2012-06-19 | CVE-2012-3587 | Improper Input Validation vulnerability in Debian Advanced Package Tool APT 0.7.x before 0.7.25 and 0.8.x before 0.8.16, when using the apt-key net-update to import keyrings, relies on GnuPG argument order and does not check GPG subkeys, which might allow remote attackers to install Trojan horse packages via a man-in-the-middle (MITM) attack. | 2.6 |
2012-06-19 | CVE-2012-0954 | Improper Input Validation vulnerability in Debian Advanced Package Tool APT 0.7.x before 0.7.25 and 0.8.x before 0.8.16, when using the apt-key net-update to import keyrings, relies on GnuPG argument order and does not check GPG subkeys, which might allow remote attackers to install altered packages via a man-in-the-middle (MITM) attack. | 2.6 |