USN-2566-1: dpkg vulnerability

Ubuntu Security Notice USN-2566-1

9th April, 2015

dpkg vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS
  • Ubuntu 10.04 LTS

Summary

dpkg could be tricked into bypassing source package signature checks.

Software description

  • dpkg
    – Debian package management system

Details

Jann Horn discovered that dpkg incorrectly validated signatures when
extracting local source packages. If a user or an automated system were
tricked into unpacking a specially crafted source package, a remote
attacker could bypass signature verification checks.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.10:
libdpkg-perl

1.17.13ubuntu1.1
Ubuntu 14.04 LTS:
libdpkg-perl

1.17.5ubuntu5.4
Ubuntu 12.04 LTS:
libdpkg-perl

1.16.1.2ubuntu7.6
Ubuntu 10.04 LTS:
dpkg-dev

1.15.5.6ubuntu4.10

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2015-0840

Leave a Reply