reprepro 1.3.0 through 2.2.3 does not properly verify signatures when updating repositories, which allows remote attackers to construct and distribute an ostensibly valid Release.gpg file by signing it with an unknown key, related to the update command.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.debian.org/security/2007/dsa-1394 | vendor advisory |
http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=5%3Bfilename=interdiff%3Batt=1%3Bbug=440535 | |
http://www.securityfocus.com/bid/25537 | vdb entry |
http://osvdb.org/40172 | vdb entry |
http://secunia.com/advisories/27334 | third party advisory |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=440535 | patch |
http://secunia.com/advisories/26678 | patch vendor advisory third party advisory |
http://alioth.debian.org/frs/shownotes.php?release_id=1031 | patch |