Further information on APT and its products can be found at: http://www.lanner.com/. This issue has been assigned the CVE identifier CVE-2019-1109 and has been assigned the following Common Vulnerabilities and Exposures rating: CVSS score: -10.0/10 --- End of information. IMPORTANT: If you are running a version of Debian or Ubuntu with APT installed, you should upgrade to the latest version of Debian or Ubuntu as soon as possible. Debian and Ubuntu have been upgraded to version 17.10, which now includes Lanner Inc IAC-AST2500A.

APT: What is it and why should you care?

APT, or Advanced Package Tool, is a tool that can help you manage the installation of software packages on your computer. It is commonly used to install and remove software packages in Linux-based operating systems. If you're running Debian or Ubuntu, your system includes an APT package management engine and will automatically use APT when installing or removing software.

Changelog:

- The affected products have been renamed to Lanner Inc IAC-AST2500A.
- The APT packages have been removed from all supported versions of Debian, Ubuntu and derivatives.

APT - a brief description

The Advanced Packaging Tool (APT) is a powerful open source package management system used on Debian, Ubuntu and many other Linux distributions. APT is a command-line interface designed to work with the dpkg tool. It gives users the ability to manage software packages in their distribution, as well as perform operations such as adding or removing dependencies and integrity checking packages.

APT - Analysis of a US military software vulnerability

This is an analysis of a U.S. military software vulnerability, CVE-2019-1109 that has been assigned the Common Vulnerabilities and Exposures (CVE) identifier: CVE-2019-1109. This vulnerability was found by researchers at Lanner Inc, which is a company located in California, USA with its headquarters in Israel. It has been assigned the Common Vulnerabilities and Exposures (CVE) identifier: CVE-2019-1109.

Timeline

Published on: 10/24/2022 14:15:00 UTC
Last modified on: 10/24/2022 16:56:00 UTC

References