Jakub Wilk discovered that APT did not correctly validate signatures when downloading source packages. If a remote attacker were able to perform a machine-in-the-middle attack, this flaw could potentially be used to install altered source packages.
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "apt",
"binary_version": "1.0.1ubuntu2.1"
},
{
"binary_name": "apt-transport-https",
"binary_version": "1.0.1ubuntu2.1"
},
{
"binary_name": "apt-utils",
"binary_version": "1.0.1ubuntu2.1"
},
{
"binary_name": "libapt-inst1.5",
"binary_version": "1.0.1ubuntu2.1"
},
{
"binary_name": "libapt-pkg-dev",
"binary_version": "1.0.1ubuntu2.1"
},
{
"binary_name": "libapt-pkg4.12",
"binary_version": "1.0.1ubuntu2.1"
}
]
}