CVE-2018-0501

NameCVE-2018-0501
DescriptionThe mirror:// method implementation in Advanced Package Tool (APT) 1.6.x before 1.6.4 and 1.7.x before 1.7.0~alpha3 mishandles gpg signature verification for the InRelease file of a fallback mirror, aka mirrorfail.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
apt (PTS)jessie1.0.9.8.4fixed
jessie (security)1.0.9.8.5fixed
stretch (security), stretch1.4.9fixed
buster, sid1.8.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
aptsource(unstable)1.6.4medium
aptsourcejessie(not affected)
aptsourcestretch(not affected)

Notes

[stretch] - apt <not-affected> (Vulnerable code introduced in 1.6~alpha6)
[jessie] - apt <not-affected> (Vulnerable code introduced in 1.6~alpha6)
https://mirror.fail/

Search for package or bug name: Reporting problems