Jakub Wilk discovered that APT did not correctly validate signatures when downloading source packages. If a remote attacker were able to perform a machine-in-the-middle attack, this flaw could potentially be used to install altered source packages.
{ "availability": "No subscription required", "binaries": [ { "binary_version": "1.0.1ubuntu2.1", "binary_name": "apt" }, { "binary_version": "1.0.1ubuntu2.1", "binary_name": "apt-doc" }, { "binary_version": "1.0.1ubuntu2.1", "binary_name": "apt-transport-https" }, { "binary_version": "1.0.1ubuntu2.1", "binary_name": "apt-utils" }, { "binary_version": "1.0.1ubuntu2.1", "binary_name": "libapt-inst1.5" }, { "binary_version": "1.0.1ubuntu2.1", "binary_name": "libapt-pkg-dev" }, { "binary_version": "1.0.1ubuntu2.1", "binary_name": "libapt-pkg-doc" }, { "binary_version": "1.0.1ubuntu2.1", "binary_name": "libapt-pkg4.12" } ] }