MGASA-2015-0482

Source
https://advisories.mageia.org/MGASA-2015-0482.html
Import Source
https://advisories.mageia.org/MGASA-2015-0482.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2015-0482
Related
Published
2015-12-23T20:12:49Z
Modified
2015-12-23T20:08:31Z
Summary
Updated dpkg packages fix CVE-2015-0860
Details

Updated dpkg packages fix security vulnerability:

Hanno Boeck discovered a stack-based buffer overflow in the dpkg-deb component of dpkg. This flaw could potentially lead to arbitrary code execution if a user or an automated system were tricked into processing a specially crafted Debian binary package (.deb) in the old style Debian binary package format (CVE-2015-0860).

References
Credits

Affected packages

Mageia:5 / dpkg

Package

Name
dpkg
Purl
pkg:rpm/mageia/dpkg?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.17.26-1.mga5

Ecosystem specific

{
    "section": "core"
}