First published: Thu Dec 03 2015(Updated: )
Off-by-one error in the extracthalf function in dpkg-deb/extract.c in the dpkg-deb component in Debian dpkg 1.16.x before 1.16.17 and 1.17.x before 1.17.26 allows remote attackers to execute arbitrary code via the archive magic version number in an "old-style" Debian binary package, which triggers a stack-based buffer overflow.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =15.04 | |
Canonical Ubuntu Linux | =15.10 | |
Debian dpkg | =1.16.0 | |
Debian dpkg | =1.16.0.1 | |
Debian dpkg | =1.16.0.2 | |
Debian dpkg | =1.16.0.3 | |
Debian dpkg | =1.16.1 | |
Debian dpkg | =1.16.1.1 | |
Debian dpkg | =1.16.1.2 | |
Debian dpkg | =1.16.2 | |
Debian dpkg | =1.16.3 | |
Debian dpkg | =1.16.4 | |
Debian dpkg | =1.16.4.1 | |
Debian dpkg | =1.16.4.2 | |
Debian dpkg | =1.16.4.3 | |
Debian dpkg | =1.16.5 | |
Debian dpkg | =1.16.6 | |
Debian dpkg | =1.16.7 | |
Debian dpkg | =1.16.8 | |
Debian dpkg | =1.16.9 | |
Debian dpkg | =1.16.10 | |
Debian dpkg | =1.16.11 | |
Debian dpkg | =1.16.12 | |
Debian dpkg | =1.16.15 | |
Debian dpkg | =1.17.0 | |
Debian dpkg | =1.17.1 | |
Debian dpkg | =1.17.2 | |
Debian dpkg | =1.17.3 | |
Debian dpkg | =1.17.4 | |
Debian dpkg | =1.17.5 | |
Debian dpkg | =1.17.6 | |
Debian dpkg | =1.17.7 | |
Debian dpkg | =1.17.8 | |
Debian dpkg | =1.17.9 | |
Debian dpkg | =1.17.10 | |
Debian dpkg | =1.17.11 | |
Debian dpkg | =1.17.12 | |
Debian dpkg | =1.17.13 | |
Debian dpkg | =1.17.14 | |
Debian dpkg | =1.17.15 | |
Debian dpkg | =1.17.16 | |
Debian dpkg | =1.17.17 | |
Debian dpkg | =1.17.18 | |
Debian dpkg | =1.17.19 | |
Debian dpkg | =1.17.20 | |
Debian dpkg | =1.17.21 | |
Debian dpkg | =1.17.22 | |
Debian dpkg | =1.17.23 | |
Debian dpkg | =1.17.24 | |
Debian dpkg | =1.17.25 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.