First published: Wed Jul 27 2011(Updated: )
APT before 0.8.15.2 does not properly validate inline GPG signatures, which allows man-in-the-middle attackers to install modified packages via vectors involving lack of an initial clearsigned message.
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Kali Linux package management (APT) | <0.8.15.2 | |
Ubuntu | =11.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2011-1829 is classified as high due to its potential for man-in-the-middle attacks.
To fix CVE-2011-1829, update APT to version 0.8.15.2 or later.
CVE-2011-1829 affects versions of APT prior to 0.8.15.2 and Ubuntu Linux 11.04.
CVE-2011-1829 allows attackers to install modified packages by exploiting improper validation of GPG signatures.
Man-in-the-middle attackers are the potential threat actors associated with CVE-2011-1829.