First published: Mon Apr 13 2015(Updated: )
The dpkg-source command in Debian dpkg before 1.16.16 and 1.17.x before 1.17.25 allows remote attackers to bypass signature verification via a crafted Debian source control file (.dsc).
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
dpkg-dev | <=1.16.15 | |
dpkg-dev | =1.17.0 | |
dpkg-dev | =1.17.1 | |
dpkg-dev | =1.17.2 | |
dpkg-dev | =1.17.3 | |
dpkg-dev | =1.17.4 | |
dpkg-dev | =1.17.5 | |
dpkg-dev | =1.17.6 | |
dpkg-dev | =1.17.7 | |
dpkg-dev | =1.17.8 | |
dpkg-dev | =1.17.9 | |
dpkg-dev | =1.17.10 | |
dpkg-dev | =1.17.11 | |
dpkg-dev | =1.17.12 | |
dpkg-dev | =1.17.13 | |
dpkg-dev | =1.17.14 | |
dpkg-dev | =1.17.15 | |
dpkg-dev | =1.17.16 | |
dpkg-dev | =1.17.17 | |
dpkg-dev | =1.17.18 | |
dpkg-dev | =1.17.19 | |
dpkg-dev | =1.17.20 | |
dpkg-dev | =1.17.21 | |
dpkg-dev | =1.17.22 | |
dpkg-dev | =1.17.23 | |
dpkg-dev | =1.17.24 | |
Ubuntu | =10.04 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =14.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0840 is classified as a medium severity vulnerability due to its potential to allow remote attackers to bypass signature verification.
To fix CVE-2015-0840, you should upgrade Debian dpkg to version 1.16.16 or later, or 1.17.x to 1.17.25 or later.
CVE-2015-0840 affects Debian dpkg versions prior to 1.16.16 and specific 1.17.x versions before 1.17.25.
CVE-2015-0840 allows attackers to bypass signature verification through a crafted Debian source control file (.dsc).
Yes, CVE-2015-0840 primarily affects Debian and Ubuntu Linux distributions using the affected versions of dpkg.