Debian Apt vulnerabilities

5 known vulnerabilities affecting debian/apt.

Total CVEs
5
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1MEDIUM2LOW2

Vulnerabilities

Page 1 of 1
CVE-2020-3810MEDIUMCVSS 5.5fixed in 2.1.2vbefore 2.1.22020-05-15
CVE-2020-3810 [MEDIUM] CWE-20 CVE-2020-3810: Missing input validation in the ar/tar implementations of APT before version 2.1.2 could result in d Missing input validation in the ar/tar implementations of APT before version 2.1.2 could result in denial of service when processing specially crafted deb files.
cvelistv5nvd
CVE-2014-7206LOWCVSS 3.6v0.9.7.9v1.0.92014-10-15
CVE-2014-7206 [LOW] CWE-59 CVE-2014-7206: The changelog command in Apt before 1.0.9.2 allows local users to write to arbitrary files via a sym The changelog command in Apt before 1.0.9.2 allows local users to write to arbitrary files via a symlink attack on the changelog file.
nvd
CVE-2013-1051MEDIUMCVSS 4.3v0.9.72013-03-21
CVE-2013-1051 [MEDIUM] CWE-20 CVE-2013-1051: apt 0.8.16, 0.9.7, and possibly other versions does not properly handle InRelease files, which allow apt 0.8.16, 0.9.7, and possibly other versions does not properly handle InRelease files, which allows man-in-the-middle attackers to modify packages before installation via unknown vectors, possibly related to integrity checking and the use of third-party repositories.
nvd
CVE-2012-0961LOWCVSS 2.1v0.9.72012-12-26
CVE-2012-0961 [LOW] CWE-200 CVE-2012-0961: Apt 0.8.16~exp5ubuntu13.x before 0.8.16~exp5ubuntu13.6, 0.8.16~exp12ubuntu10.x before 0.8.16~exp12ub Apt 0.8.16~exp5ubuntu13.x before 0.8.16~exp5ubuntu13.6, 0.8.16~exp12ubuntu10.x before 0.8.16~exp12ubuntu10.7, and 0.9.7.5ubuntu5.x before 0.9.7.5ubuntu5.2, as used in Ubuntu, uses world-readable permissions for /var/log/apt/term.log, which allows local users to obtain sensitive shell information by reading the log file.
nvd
CVE-2009-1358CRITICALCVSS 10.0v0.0.1v0.0.2+145 more2009-04-21
CVE-2009-1358 [CRITICAL] CVE-2009-1358: apt-get in apt before 0.7.21 does not check for the correct error code from gpgv, which causes apt t apt-get in apt before 0.7.21 does not check for the correct error code from gpgv, which causes apt to treat a repository as valid even when it has been signed with a key that has been revoked or expired, which might allow remote attackers to trick apt into installing malicious repositories.
nvd
Debian Apt vulnerabilities | cvebase