From ${URL} : Debian fixed the following flaw in dpkg: Hanno Boeck discovered a stack-based buffer overflow in the dpkg-deb component of dpkg, the Debian package management system. This flaw could potentially lead to arbitrary code execution if a user or an automated system were tricked into processing a specially crafted Debian binary package (.deb) in the old style Debian binary package format. Additional information: https://lists.debian.org/debian-security-announce/2015/msg00312.html http://seclists.org/oss-sec/2015/q4/389 @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Arch teams, please test and mark stable: =app-arch/dpkg-1.17.26 Targeted stable KEYWORDS : alpha amd64 arm hppa ia64 ppc ppc64 sparc x86
amd64 stable
Stable for HPPA.
Stable for PPC64.
ppc stable
arm stable
x86 stable
sparc stable
alpha stable
ia64 stable. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one.
Arches and Maintainer(s), Thank you for your work. New GLSA Request filed.
This issue was resolved and addressed in GLSA 201612-07 at https://security.gentoo.org/glsa/201612-07 by GLSA coordinator Aaron Bauman (b-man).