Ubuntu Security Notice 2566-1 - Jann Horn discovered that dpkg incorrectly validated signatures when extracting local source packages. If a user or an automated system were tricked into unpacking a specially crafted source package, a remote attacker could bypass signature verification checks.
6cf9f3e41298a6212ac8a4bcd8c602d537ac9410e0524b541502765d10e1b336
============================================================================
Ubuntu Security Notice USN-2566-1
April 09, 2015
dpkg vulnerability
============================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS
Summary:
dpkg could be tricked into bypassing source package signature checks.
Software Description:
- dpkg: Debian package management system
Details:
Jann Horn discovered that dpkg incorrectly validated signatures when
extracting local source packages. If a user or an automated system were
tricked into unpacking a specially crafted source package, a remote
attacker could bypass signature verification checks.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.10:
libdpkg-perl 1.17.13ubuntu1.1
Ubuntu 14.04 LTS:
libdpkg-perl 1.17.5ubuntu5.4
Ubuntu 12.04 LTS:
libdpkg-perl 1.16.1.2ubuntu7.6
Ubuntu 10.04 LTS:
dpkg-dev 1.15.5.6ubuntu4.10
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2566-1
CVE-2015-0840
Package Information:
https://launchpad.net/ubuntu/+source/dpkg/1.17.13ubuntu1.1
https://launchpad.net/ubuntu/+source/dpkg/1.17.5ubuntu5.4
https://launchpad.net/ubuntu/+source/dpkg/1.16.1.2ubuntu7.6
https://launchpad.net/ubuntu/+source/dpkg/1.15.5.6ubuntu4.10