Описание
reprepro 1.3.0 through 2.2.3 does not properly verify signatures when updating repositories, which allows remote attackers to construct and distribute an ostensibly valid Release.gpg file by signing it with an unknown key, related to the update command.
reprepro 1.3.0 through 2.2.3 does not properly verify signatures when updating repositories, which allows remote attackers to construct and distribute an ostensibly valid Release.gpg file by signing it with an unknown key, related to the update command.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2007-4739
- http://alioth.debian.org/frs/shownotes.php?release_id=1031
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=440535
- http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=5%3Bfilename=interdiff%3Batt=1%3Bbug=440535
- http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=5;filename=interdiff;att=1;bug=440535
- http://osvdb.org/40172
- http://secunia.com/advisories/26678
- http://secunia.com/advisories/27334
- http://www.debian.org/security/2007/dsa-1394
- http://www.securityfocus.com/bid/25537
EPSS
CVE ID
Связанные уязвимости
reprepro 1.3.0 through 2.2.3 does not properly verify signatures when updating repositories, which allows remote attackers to construct and distribute an ostensibly valid Release.gpg file by signing it with an unknown key, related to the update command.
reprepro 1.3.0 through 2.2.3 does not properly verify signatures when updating repositories, which allows remote attackers to construct and distribute an ostensibly valid Release.gpg file by signing it with an unknown key, related to the update command.
reprepro 1.3.0 through 2.2.3 does not properly verify signatures when ...
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить целостность защищаемой информации
EPSS