First published: Tue Jun 19 2012(Updated: )
APT 0.7.x before 0.7.25 and 0.8.x before 0.8.16, when using the apt-key net-update to import keyrings, relies on GnuPG argument order and does not check GPG subkeys, which might allow remote attackers to install altered packages via a man-in-the-middle (MITM) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-3587.
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Debian APT Package Management | =0.7.0 | |
Debian APT Package Management | =0.7.1 | |
Debian APT Package Management | =0.7.2 | |
Debian APT Package Management | =0.7.2-0.1 | |
Debian APT Package Management | =0.7.10 | |
Debian APT Package Management | =0.7.11 | |
Debian APT Package Management | =0.7.12 | |
Debian APT Package Management | =0.7.13 | |
Debian APT Package Management | =0.7.14 | |
Debian APT Package Management | =0.7.15 | |
Debian APT Package Management | =0.7.15-exp1 | |
Debian APT Package Management | =0.7.15-exp2 | |
Debian APT Package Management | =0.7.15-exp3 | |
Debian APT Package Management | =0.7.16 | |
Debian APT Package Management | =0.7.17 | |
Debian APT Package Management | =0.7.17-exp1 | |
Debian APT Package Management | =0.7.17-exp2 | |
Debian APT Package Management | =0.7.17-exp3 | |
Debian APT Package Management | =0.7.17-exp4 | |
Debian APT Package Management | =0.7.18 | |
Debian APT Package Management | =0.7.19 | |
Debian APT Package Management | =0.7.20 | |
Debian APT Package Management | =0.7.20.1 | |
Debian APT Package Management | =0.7.20.2 | |
Debian APT Package Management | =0.7.21 | |
Debian APT Package Management | =0.7.22 | |
Debian APT Package Management | =0.7.22.1 | |
Debian APT Package Management | =0.7.22.2 | |
Debian APT Package Management | =0.7.23 | |
Debian APT Package Management | =0.7.23.1 | |
Debian APT Package Management | =0.7.24 | |
Debian APT Package Management | =0.8.0 | |
Debian APT Package Management | =0.8.0-pre1 | |
Debian APT Package Management | =0.8.0-pre2 | |
Debian APT Package Management | =0.8.1 | |
Debian APT Package Management | =0.8.10 | |
Debian APT Package Management | =0.8.10.1 | |
Debian APT Package Management | =0.8.10.2 | |
Debian APT Package Management | =0.8.10.3 | |
Debian APT Package Management | =0.8.11 | |
Debian APT Package Management | =0.8.11.1 | |
Debian APT Package Management | =0.8.11.2 | |
Debian APT Package Management | =0.8.11.3 | |
Debian APT Package Management | =0.8.11.4 | |
Debian APT Package Management | =0.8.11.5 | |
Debian APT Package Management | =0.8.12 | |
Debian APT Package Management | =0.8.13 | |
Debian APT Package Management | =0.8.13.1 | |
Debian APT Package Management | =0.8.13.2 | |
Debian APT Package Management | =0.8.14 | |
Debian APT Package Management | =0.8.14.1 | |
Debian APT Package Management | =0.8.15 | |
Debian APT Package Management | =0.8.15-exp1 | |
Debian APT Package Management | =0.8.15-exp2 | |
Debian APT Package Management | =0.8.15-exp3 | |
Debian APT Package Management | =0.8.15.1 | |
Debian APT Package Management | =0.8.15.6 | |
Debian APT Package Management | =0.8.15.7 | |
Debian APT Package Management | =0.8.15.8 | |
Debian APT Package Management | =0.8.15.9 | |
Debian APT Package Management | =0.8.15.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-0954 is considered a high severity vulnerability as it allows remote attackers to potentially install altered packages through a man-in-the-middle (MITM) attack.
To fix CVE-2012-0954, upgrade the affected APT version to 0.7.25 or 0.8.16 or later, which addresses the vulnerability.
CVE-2012-0954 affects APT versions 0.7.x before 0.7.25 and 0.8.x before 0.8.16.
CVE-2012-0954 is associated with man-in-the-middle (MITM) attacks that could allow an attacker to intercept and alter package installations.
Yes, CVE-2012-0954 compromises package integrity by potentially allowing the installation of tampered packages.