reprepro 1.3.0 through 2.2.3 does not properly verify signatures when updating repositories, which allows remote attackers to construct and distribute an ostensibly valid Release.gpg file by signing it with an unknown key, related to the update command.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Reprepro | Debian | 1.3.0 (including) | 1.3.0 (including) |
Reprepro | Debian | 1.3.1 (including) | 1.3.1 (including) |
Reprepro | Debian | 2.0.0 (including) | 2.0.0 (including) |
Reprepro | Debian | 2.1.0 (including) | 2.1.0 (including) |
Reprepro | Debian | 2.2.0 (including) | 2.2.0 (including) |
Reprepro | Debian | 2.2.1 (including) | 2.2.1 (including) |
Reprepro | Debian | 2.2.2 (including) | 2.2.2 (including) |
Reprepro | Debian | 2.2.3 (including) | 2.2.3 (including) |
Reprepro | Ubuntu | dapper | * |
Reprepro | Ubuntu | devel | * |
Reprepro | Ubuntu | edgy | * |
Reprepro | Ubuntu | feisty | * |
Reprepro | Ubuntu | gutsy | * |
Reprepro | Ubuntu | hardy | * |
Reprepro | Ubuntu | intrepid | * |
Reprepro | Ubuntu | jaunty | * |
Reprepro | Ubuntu | karmic | * |