CVE-2017-9269

Source
https://nvd.nist.gov/vuln/detail/CVE-2017-9269
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-9269.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2017-9269
Related
Published
2018-03-01T20:29:00Z
Modified
2024-11-21T03:35:43Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

In libzypp before August 2018 GPG keys attached to YUM repositories were not correctly pinned, allowing malicious repository mirrors to silently downgrade to unsigned repositories with potential malicious content.

References

Affected packages

Debian:11 / libzypp

Package

Name
libzypp
Purl
pkg:deb/debian/libzypp?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
17.3.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / libzypp

Package

Name
libzypp
Purl
pkg:deb/debian/libzypp?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
17.3.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / libzypp

Package

Name
libzypp
Purl
pkg:deb/debian/libzypp?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
17.3.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}