CVE-2015-0840

The dpkg-source command in Debian dpkg before 1.16.16 and 1.17.x before 1.17.25 allows remote attackers to bypass signature verification via a crafted Debian source control file (.dsc).
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.3 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
debianCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 71%
VendorProductVersion
debiandpkg
𝑥
≤ 1.16.15
debiandpkg
1.17.0
debiandpkg
1.17.1
debiandpkg
1.17.2
debiandpkg
1.17.3
debiandpkg
1.17.4
debiandpkg
1.17.5
debiandpkg
1.17.6
debiandpkg
1.17.7
debiandpkg
1.17.8
debiandpkg
1.17.9
debiandpkg
1.17.10
debiandpkg
1.17.11
debiandpkg
1.17.12
debiandpkg
1.17.13
debiandpkg
1.17.14
debiandpkg
1.17.15
debiandpkg
1.17.16
debiandpkg
1.17.17
debiandpkg
1.17.18
debiandpkg
1.17.19
debiandpkg
1.17.20
debiandpkg
1.17.21
debiandpkg
1.17.22
debiandpkg
1.17.23
debiandpkg
1.17.24
canonicalubuntu_linux
10.04
canonicalubuntu_linux
12.04
canonicalubuntu_linux
14.04
canonicalubuntu_linux
14.10
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
dpkg
bullseye
1.20.13
fixed
bullseye (security)
1.20.10
fixed
bookworm
1.21.22
fixed
sid
1.22.11
fixed
trixie
1.22.11
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
dpkg
utopic
Fixed 1.17.13ubuntu1.1
released
trusty
Fixed 1.17.5ubuntu5.4
released
precise
Fixed 1.16.1.2ubuntu7.6
released
lucid
Fixed 1.15.5.6ubuntu4.10
released