First published: Tue Dec 05 2017(Updated: )
The apt package in Debian jessie before 1.0.9.8.4, in Debian unstable before 1.4~beta2, in Ubuntu 14.04 LTS before 1.0.1ubuntu2.17, in Ubuntu 16.04 LTS before 1.2.15ubuntu0.2, and in Ubuntu 16.10 before 1.3.2ubuntu0.1 allows man-in-the-middle attackers to bypass a repository-signing protection mechanism by leveraging improper error handling when validating InRelease file signatures.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/apt | 1.8.2.3 1.8.2.2 2.2.4 2.6.1 2.7.6 | |
Debian Advanced Package Tool | <1.0.9.8.4 | |
Debian Debian Linux | =8.0 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =16.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1252 is a vulnerability that allows man-in-the-middle attackers to bypass repository-signing protection mechanism in the apt package.
The apt package in Debian jessie before 1.0.9.8.4, Debian unstable before 1.4~beta2, Ubuntu 14.04 LTS before 1.0.1ubuntu2.17, Ubuntu 16.04 LTS before 1.2.15ubuntu0.2, and Ubuntu 16.10 before 1.3.2ubuntu0.1 are affected.
The severity of CVE-2016-1252 is medium with a CVSS score of 5.9.
To fix CVE-2016-1252, it is recommended to update the apt package to version 1.8.2.3, 1.8.2.2, 2.2.4, 2.6.1, or 2.7.6, depending on the affected software package.
You can find more information about CVE-2016-1252 at the following references: - [Ubuntu Bug Report](https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1647467) - [Debian Security Tracker](https://security-tracker.debian.org/tracker/CVE-2016-1252) - [Packet Storm Security](http://packetstormsecurity.com/files/140145/apt-Repository-Signing-Bypass.html)