reprepro 1.3.0 through 2.2.3 does not properly verify signatures when updating repositories, which allows remote attackers to construct and distribute an ostensibly valid Release.gpg file by signing it with an unknown key, related to the update command.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1394-1 | New reprepro packages fix authentication bypass |
EUVD |
EUVD-2007-4720 | reprepro 1.3.0 through 2.2.3 does not properly verify signatures when updating repositories, which allows remote attackers to construct and distribute an ostensibly valid Release.gpg file by signing it with an unknown key, related to the update command. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T15:08:33.426Z
Reserved: 2007-09-06T00:00:00
Link: CVE-2007-4739
No data.
Status : Deferred
Published: 2007-09-06T19:17:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2007-4739
No data.
OpenCVE Enrichment
No data.
Debian DSA
EUVD