UBUNTU-CVE-2016-1252

Source
https://ubuntu.com/security/CVE-2016-1252
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-1252.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2016-1252
Related
Published
2016-12-13T00:00:00Z
Modified
2025-01-13T10:21:12Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
  • 5.9 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

The apt package in Debian jessie before 1.0.9.8.4, in Debian unstable before 1.4~beta2, in Ubuntu 14.04 LTS before 1.0.1ubuntu2.17, in Ubuntu 16.04 LTS before 1.2.15ubuntu0.2, and in Ubuntu 16.10 before 1.3.2ubuntu0.1 allows man-in-the-middle attackers to bypass a repository-signing protection mechanism by leveraging improper error handling when validating InRelease file signatures.

References

Affected packages

Ubuntu:14.04:LTS / apt

Package

Name
apt
Purl
pkg:deb/ubuntu/apt@1.0.1ubuntu2.17?arch=source&distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.1ubuntu2.17

Affected versions

0.*

0.9.9.1~ubuntu3
0.9.9.1~ubuntu4
0.9.9.1~ubuntu5
0.9.13~exp1ubuntu1
0.9.13~exp1ubuntu2
0.9.13~exp1ubuntu3
0.9.13.1~ubuntu1
0.9.14.1ubuntu1
0.9.14.1ubuntu2
0.9.15.1ubuntu1
0.9.15.4ubuntu1
0.9.15.4ubuntu2
0.9.15.4ubuntu3
0.9.15.4ubuntu4
0.9.15.4ubuntu5

1.*

1.0.1ubuntu2
1.0.1ubuntu2.1
1.0.1ubuntu2.3
1.0.1ubuntu2.4.1
1.0.1ubuntu2.5
1.0.1ubuntu2.6
1.0.1ubuntu2.7
1.0.1ubuntu2.8
1.0.1ubuntu2.9
1.0.1ubuntu2.10
1.0.1ubuntu2.11
1.0.1ubuntu2.12
1.0.1ubuntu2.13
1.0.1ubuntu2.14
1.0.1ubuntu2.15

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "binary_version": "1.0.1ubuntu2.17",
            "binary_name": "apt"
        },
        {
            "binary_version": "1.0.1ubuntu2.17",
            "binary_name": "apt-dbgsym"
        },
        {
            "binary_version": "1.0.1ubuntu2.17",
            "binary_name": "apt-doc"
        },
        {
            "binary_version": "1.0.1ubuntu2.17",
            "binary_name": "apt-transport-https"
        },
        {
            "binary_version": "1.0.1ubuntu2.17",
            "binary_name": "apt-transport-https-dbgsym"
        },
        {
            "binary_version": "1.0.1ubuntu2.17",
            "binary_name": "apt-utils"
        },
        {
            "binary_version": "1.0.1ubuntu2.17",
            "binary_name": "apt-utils-dbgsym"
        },
        {
            "binary_version": "1.0.1ubuntu2.17",
            "binary_name": "libapt-inst1.5"
        },
        {
            "binary_version": "1.0.1ubuntu2.17",
            "binary_name": "libapt-inst1.5-dbgsym"
        },
        {
            "binary_version": "1.0.1ubuntu2.17",
            "binary_name": "libapt-pkg-dev"
        },
        {
            "binary_version": "1.0.1ubuntu2.17",
            "binary_name": "libapt-pkg-doc"
        },
        {
            "binary_version": "1.0.1ubuntu2.17",
            "binary_name": "libapt-pkg4.12"
        },
        {
            "binary_version": "1.0.1ubuntu2.17",
            "binary_name": "libapt-pkg4.12-dbgsym"
        }
    ]
}

Ubuntu:16.04:LTS / apt

Package

Name
apt
Purl
pkg:deb/ubuntu/apt@1.2.15ubuntu0.2?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2.15ubuntu0.2

Affected versions

1.*

1.0.10.2ubuntu1
1.1.4
1.1.5
1.1.10
1.2.3
1.2.4
1.2.6
1.2.7
1.2.8
1.2.9
1.2.10
1.2.10ubuntu1
1.2.12~ubuntu16.04.1
1.2.15

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "binary_version": "1.2.15ubuntu0.2",
            "binary_name": "apt"
        },
        {
            "binary_version": "1.2.15ubuntu0.2",
            "binary_name": "apt-dbgsym"
        },
        {
            "binary_version": "1.2.15ubuntu0.2",
            "binary_name": "apt-doc"
        },
        {
            "binary_version": "1.2.15ubuntu0.2",
            "binary_name": "apt-transport-https"
        },
        {
            "binary_version": "1.2.15ubuntu0.2",
            "binary_name": "apt-transport-https-dbgsym"
        },
        {
            "binary_version": "1.2.15ubuntu0.2",
            "binary_name": "apt-utils"
        },
        {
            "binary_version": "1.2.15ubuntu0.2",
            "binary_name": "apt-utils-dbgsym"
        },
        {
            "binary_version": "1.2.15ubuntu0.2",
            "binary_name": "libapt-inst2.0"
        },
        {
            "binary_version": "1.2.15ubuntu0.2",
            "binary_name": "libapt-inst2.0-dbgsym"
        },
        {
            "binary_version": "1.2.15ubuntu0.2",
            "binary_name": "libapt-pkg-dev"
        },
        {
            "binary_version": "1.2.15ubuntu0.2",
            "binary_name": "libapt-pkg-doc"
        },
        {
            "binary_version": "1.2.15ubuntu0.2",
            "binary_name": "libapt-pkg5.0"
        },
        {
            "binary_version": "1.2.15ubuntu0.2",
            "binary_name": "libapt-pkg5.0-dbgsym"
        }
    ]
}