The apt package in Debian jessie before 1.0.9.8.4, in Debian unstable before 1.4~beta2, in Ubuntu 14.04 LTS before 1.0.1ubuntu2.17, in Ubuntu 16.04 LTS before 1.2.15ubuntu0.2, and in Ubuntu 16.10 before 1.3.2ubuntu0.1 allows man-in-the-middle attackers to bypass a repository-signing protection mechanism by leveraging improper error handling when validating InRelease file signatures.
{
"binaries": [
{
"binary_name": "apt",
"binary_version": "1.0.1ubuntu2.17"
},
{
"binary_name": "apt-transport-https",
"binary_version": "1.0.1ubuntu2.17"
},
{
"binary_name": "apt-utils",
"binary_version": "1.0.1ubuntu2.17"
},
{
"binary_name": "libapt-inst1.5",
"binary_version": "1.0.1ubuntu2.17"
},
{
"binary_name": "libapt-pkg-dev",
"binary_version": "1.0.1ubuntu2.17"
},
{
"binary_name": "libapt-pkg4.12",
"binary_version": "1.0.1ubuntu2.17"
}
],
"availability": "No subscription required"
}
{
"binaries": [
{
"binary_name": "apt",
"binary_version": "1.2.15ubuntu0.2"
},
{
"binary_name": "apt-transport-https",
"binary_version": "1.2.15ubuntu0.2"
},
{
"binary_name": "apt-utils",
"binary_version": "1.2.15ubuntu0.2"
},
{
"binary_name": "libapt-inst2.0",
"binary_version": "1.2.15ubuntu0.2"
},
{
"binary_name": "libapt-pkg-dev",
"binary_version": "1.2.15ubuntu0.2"
},
{
"binary_name": "libapt-pkg5.0",
"binary_version": "1.2.15ubuntu0.2"
}
],
"availability": "No subscription required"
}