Descriptionapt-setup in Debian GNU/Linux installs the apt.conf file with insecure permissions, which allows local users to obtain sensitive information such as passwords.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium
Debian Bugs305142

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
apt-setup (PTS)stretch1:0.127vulnerable
bookworm, sid1:0.167vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs


That's by design. We want to provide non-root users access to the source code,
thus it needs to be world-readable. Also, the password can't be too sensitive
as it'll be sent non-encrypted over the wire.

Search for package or bug name: Reporting problems