USN-5446-2: dpkg vulnerability
30 May 2022
A malicious source package could write files outside the unpack directory.
Releases
Packages
- dpkg - Debian package management system
Details
USN-5446-1 fixed a vulnerability in dpkg. This update provides
the corresponding update for Ubuntu 16.04 ESM.
Original advisory details:
Max Justicz discovered that dpkg incorrectly handled unpacking certain
source packages. If a user or an automated system were tricked into
unpacking a specially crafted source package, a remote attacker could
modify files outside the target unpack directory, leading to a denial of
service or potentially gaining access to the system.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04
-
dpkg
-
1.18.4ubuntu1.7+esm1
Available with Ubuntu Pro
-
libdpkg-perl
-
1.18.4ubuntu1.7+esm1
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-5446-1: libdpkg-dev, dpkg-dev, libdpkg-perl, dselect, dpkg