apt-cacher-ng, apt-cacher
2018-01-15 14:50
CVE-2017-7443 apt-cacher-ng
CVE-2017-7443 apt-cacher
2017-10-23 14:18
2017-07-20 21:30
2017-07-04 01:03
2017-06-16 19:22
2017-05-10 23:47
2017-04-14 10:21
2017-04-07 00:03


apt-cacher before 1.7.15 and apt-cacher-ng before 3.4 allow HTTP response splitting via encoded newline characters, related to lack of blocking for the %0[ad] regular expression.

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
trusty apt-cacher None
apt-cacher-ng None
upstream apt-cacher 1.7.15
apt-cacher-ng 3-1
xenial apt-cacher None
apt-cacher-ng None


Release Package Reason
precise apt-cacher-ng ignored
apt-cacher ignored
precise/esm apt-cacher-ng DNE
apt-cacher DNE
vivid/stable-phone-overlay apt-cacher-ng DNE
apt-cacher DNE
vivid/ubuntu-core apt-cacher-ng DNE
apt-cacher DNE
yakkety apt-cacher-ng ignored
apt-cacher ignored
zesty apt-cacher-ng ignored
apt-cacher ignored
artful apt-cacher-ng not-affected
apt-cacher not-affected
devel apt-cacher-ng not-affected
apt-cacher not-affected