CVE-2018-0501

NameCVE-2018-0501
DescriptionThe mirror:// method implementation in Advanced Package Tool (APT) 1.6.x before 1.6.4 and 1.7.x before 1.7.0~alpha3 mishandles gpg signature verification for the InRelease file of a fallback mirror, aka mirrorfail.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
apt (PTS)jessie, jessie (lts)1.0.9.8.7fixed
stretch (security), stretch (lts), stretch1.4.11fixed
buster1.8.2.3fixed
buster (security)1.8.2.2fixed
bullseye2.2.4fixed
bookworm2.6.1fixed
sid, trixie2.9.2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
aptsourcewheezy(not affected)
aptsourcejessie(not affected)
aptsourcestretch(not affected)
aptsource(unstable)1.6.4

Notes

[stretch] - apt <not-affected> (Vulnerable code introduced in 1.6~alpha6)
[jessie] - apt <not-affected> (Vulnerable code introduced in 1.6~alpha6)
https://mirror.fail/
[wheezy] - apt <not-affected> (vulnerable code not present, introduced in 1.6~alpha6)

Search for package or bug name: Reporting problems