* Escape package and architecture names on control file parsing warning, as those get injected into a variable that is used as a format string, and they come from the package fields, which are under user control. Regression introduced in dpkg 1.16.0. Fixes CVE-2014-8625. Closes: #768485 Reported by Joshua Rogers <megamansec@gmail.com>.
Arch teams, please test and mark stable: =app-arch/dpkg-1.17.22 Targeted stable KEYWORDS : alpha amd64 arm hppa ia64 ppc ppc64 sparc x86
amd64 stable
x86 stable
Stable for HPPA.
sparc stable
alpha stable
arm stable
ppc stable
ppc64 stable
ia64 stable. Maintainer(s), please cleanup.
Maintainer(s), Thank you for you for cleanup. GLSA Vote: No
CVE-2014-8625 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8625): Multiple format string vulnerabilities in the parse_error_msg function in parsehelp.c in dpkg before 1.17.22 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in the (1) package or (2) architecture name.
GLSA Vote: No