Summary: | <app-arch/dpkg-1.15.6.1: applies patches containing insecure paths - (CVE-2010-0396) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Jeroen Roovers (RETIRED) <jer> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED WONTFIX | ||
Severity: | normal | CC: | deb-tools+disabled |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | B1? [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
Jeroen Roovers (RETIRED)
2010-03-15 19:20:15 UTC
1.15.6 is in the tree already. deb-tools: is it ok to go stable? deb-tools == yvasilev and I so I don't see what's holding you back... CVE-2010-0396 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0396): Directory traversal vulnerability in the dpkg-source component in dpkg before 1.14.29 allows remote attackers to modify arbitrary files via a crafted Debian source archive. 1.15.6.1 is good to go according to [1] whereas 1.15.6 is not. Arch teams, please test and mark stable: =app-arch/dpkg-1.15.6.1 [1] http://security-tracker.debian.org/tracker/CVE-2010-0396 ppc done Stable for HPPA. Tests passed successfully on x86 also. x86 stable, thanks Andreas alpha/arm/ia64/m68k/s390/sh/sparc stable amd64 stable ppc64 doesn't have a version that is marked as stable. Thanks, folks. GLSA request filed. Old. No GLSA. |