APT before 1.0.4 does not properly validate source packages, which allows man-in-the-middle attackers to download and install Trojan horse packages by removing the Release signature.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_name": "apt", "binary_version": "1.0.1ubuntu2.1" }, { "binary_name": "apt-doc", "binary_version": "1.0.1ubuntu2.1" }, { "binary_name": "apt-transport-https", "binary_version": "1.0.1ubuntu2.1" }, { "binary_name": "apt-utils", "binary_version": "1.0.1ubuntu2.1" }, { "binary_name": "libapt-inst1.5", "binary_version": "1.0.1ubuntu2.1" }, { "binary_name": "libapt-pkg-dev", "binary_version": "1.0.1ubuntu2.1" }, { "binary_name": "libapt-pkg-doc", "binary_version": "1.0.1ubuntu2.1" }, { "binary_name": "libapt-pkg4.12", "binary_version": "1.0.1ubuntu2.1" } ] }