First published: Mon Apr 13 2015(Updated: )
The dpkg-source command in Debian dpkg before 1.16.16 and 1.17.x before 1.17.25 allows remote attackers to bypass signature verification via a crafted Debian source control file (.dsc).
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian dpkg | <=1.16.15 | |
Debian dpkg | =1.17.0 | |
Debian dpkg | =1.17.1 | |
Debian dpkg | =1.17.2 | |
Debian dpkg | =1.17.3 | |
Debian dpkg | =1.17.4 | |
Debian dpkg | =1.17.5 | |
Debian dpkg | =1.17.6 | |
Debian dpkg | =1.17.7 | |
Debian dpkg | =1.17.8 | |
Debian dpkg | =1.17.9 | |
Debian dpkg | =1.17.10 | |
Debian dpkg | =1.17.11 | |
Debian dpkg | =1.17.12 | |
Debian dpkg | =1.17.13 | |
Debian dpkg | =1.17.14 | |
Debian dpkg | =1.17.15 | |
Debian dpkg | =1.17.16 | |
Debian dpkg | =1.17.17 | |
Debian dpkg | =1.17.18 | |
Debian dpkg | =1.17.19 | |
Debian dpkg | =1.17.20 | |
Debian dpkg | =1.17.21 | |
Debian dpkg | =1.17.22 | |
Debian dpkg | =1.17.23 | |
Debian dpkg | =1.17.24 | |
Canonical Ubuntu Linux | =10.04 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =14.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.