============================================================================ Ubuntu Security Notice USN-2566-1 April 09, 2015 dpkg vulnerability ============================================================================ A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 14.10 - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS - Ubuntu 10.04 LTS Summary: dpkg could be tricked into bypassing source package signature checks. Software Description: - dpkg: Debian package management system Details: Jann Horn discovered that dpkg incorrectly validated signatures when extracting local source packages. If a user or an automated system were tricked into unpacking a specially crafted source package, a remote attacker could bypass signature verification checks. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 14.10: libdpkg-perl 1.17.13ubuntu1.1 Ubuntu 14.04 LTS: libdpkg-perl 1.17.5ubuntu5.4 Ubuntu 12.04 LTS: libdpkg-perl 1.16.1.2ubuntu7.6 Ubuntu 10.04 LTS: dpkg-dev 1.15.5.6ubuntu4.10 In general, a standard system update will make all the necessary changes. References: http://www.ubuntu.com/usn/usn-2566-1 CVE-2015-0840 Package Information: https://launchpad.net/ubuntu/+source/dpkg/1.17.13ubuntu1.1 https://launchpad.net/ubuntu/+source/dpkg/1.17.5ubuntu5.4 https://launchpad.net/ubuntu/+source/dpkg/1.16.1.2ubuntu7.6 https://launchpad.net/ubuntu/+source/dpkg/1.15.5.6ubuntu4.10