Unrated severityNVD Advisory· Published Jun 19, 2012· Updated Apr 29, 2026
CVE-2012-0954
CVE-2012-0954
Description
APT 0.7.x before 0.7.25 and 0.8.x before 0.8.16, when using the apt-key net-update to import keyrings, relies on GnuPG argument order and does not check GPG subkeys, which might allow remote attackers to install altered packages via a man-in-the-middle (MITM) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-3587.
Affected products
61cpe:2.3:a:debian:advanced_package_tool:0.7.0:*:*:*:*:*:*:*+ 60 more
- cpe:2.3:a:debian:advanced_package_tool:0.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.7.10:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.7.11:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.7.12:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.7.13:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.7.14:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.7.15:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.7.15:exp1:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.7.15:exp2:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.7.15:exp3:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.7.16:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.7.17:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.7.17:exp1:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.7.17:exp2:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.7.17:exp3:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.7.17:exp4:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.7.18:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.7.19:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.7.20:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.7.2-0.1:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.7.20.1:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.7.20.2:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.7.21:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.7.22:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.7.22.1:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.7.22.2:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.7.23:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.7.23.1:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.7.24:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.8.0:pre1:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.8.0:pre2:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.8.10:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.8.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.8.10.2:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.8.10.3:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.8.11:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.8.11.1:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.8.11.2:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.8.11.3:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.8.11.4:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.8.11.5:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.8.12:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.8.13:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.8.13.1:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.8.13.2:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.8.14:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.8.14.1:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.8.15:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.8.15.1:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.8.15.10:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.8.15.6:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.8.15.7:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.8.15.8:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.8.15.9:*:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.8.15:exp1:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.8.15:exp2:*:*:*:*:*:*
- cpe:2.3:a:debian:advanced_package_tool:0.8.15:exp3:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- seclists.org/fulldisclosure/2012/Jun/267nvd
- seclists.org/fulldisclosure/2012/Jun/271nvd
- seclists.org/fulldisclosure/2012/Jun/289nvd
- www.securityfocus.com/bid/54046nvd
- www.ubuntu.com/usn/USN-1475-1nvd
- www.ubuntu.com/usn/USN-1477-1nvd
- bugs.launchpad.net/ubuntu/+source/apt/+bug/1013128nvd
- bugs.launchpad.net/ubuntu/+source/apt/+bug/1013639nvd
- bugs.launchpad.net/ubuntu/+source/apt/+bug/1013681nvd
News mentions
0No linked articles in our index yet.