UBUNTU-CVE-2017-7443

Source
https://ubuntu.com/security/CVE-2017-7443
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-7443.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2017-7443
Upstream
Published
2017-04-05T20:59:00Z
Modified
2025-10-24T04:46:14Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
  • Ubuntu - low
Summary
[none]
Details

apt-cacher before 1.7.15 and apt-cacher-ng before 3.4 allow HTTP response splitting via encoded newline characters, related to lack of blocking for the %0[ad] regular expression.

References

Affected packages

Ubuntu:16.04:LTS / apt-cacher

Package

Name
apt-cacher
Purl
pkg:deb/ubuntu/apt-cacher@1.7.11?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.7.11

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "apt-cacher",
            "binary_version": "1.7.11"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-7443.json"

Ubuntu:16.04:LTS / apt-cacher-ng

Package

Name
apt-cacher-ng
Purl
pkg:deb/ubuntu/apt-cacher-ng@0.9.1-1ubuntu1?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.8.5-1
0.8.6-1
0.8.7-1
0.8.8-1
0.8.9-1
0.8.9-1ubuntu1
0.9.1-1ubuntu1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "apt-cacher-ng",
            "binary_version": "0.9.1-1ubuntu1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-7443.json"