CVE-2025-6297
- EPSS 0.09%
- Published 01.07.2025 16:16:54
- Last modified 19.08.2025 17:50:38
It was discovered that dpkg-deb does not properly sanitize directory permissions when extracting a control member into a temporary directory, which is documented as being a safe operation even on untrusted data. This may result in leaving temporary f...
CVE-2022-1664
- EPSS 0.38%
- Published 26.05.2022 14:15:08
- Last modified 21.11.2024 06:41:12
Dpkg::Source::Archive in dpkg, the Debian package management system, before version 1.21.8, 1.20.10, 1.19.8, 1.18.26 is prone to a directory traversal vulnerability. When extracting untrusted source packages in v2 and v3 source package formats that i...
CVE-2017-8283
- EPSS 1.07%
- Published 26.04.2017 05:59:00
- Last modified 20.04.2025 01:37:25
dpkg-source in dpkg 1.3.0 through 1.18.23 is able to use a non-GNU patch program and does not offer a protection mechanism for blank-indented diff hunks, which allows remote attackers to conduct directory traversal attacks via a crafted Debian source...
CVE-2015-0860
- EPSS 4.07%
- Published 03.12.2015 20:59:01
- Last modified 12.04.2025 10:46:40
Off-by-one error in the extracthalf function in dpkg-deb/extract.c in the dpkg-deb component in Debian dpkg 1.16.x before 1.16.17 and 1.17.x before 1.17.26 allows remote attackers to execute arbitrary code via the archive magic version number in an "...
CVE-2015-0840
- EPSS 0.65%
- Published 13.04.2015 14:59:01
- Last modified 12.04.2025 10:46:40
The dpkg-source command in Debian dpkg before 1.16.16 and 1.17.x before 1.17.25 allows remote attackers to bypass signature verification via a crafted Debian source control file (.dsc).
CVE-2014-8625
- EPSS 2.46%
- Published 20.01.2015 15:59:01
- Last modified 12.04.2025 10:46:40
Multiple format string vulnerabilities in the parse_error_msg function in parsehelp.c in dpkg before 1.17.22 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in the (1) packa...
CVE-2014-3227
- EPSS 0.62%
- Published 30.05.2014 18:55:05
- Last modified 12.04.2025 10:46:40
dpkg 1.15.9, 1.16.x before 1.16.14, and 1.17.x before 1.17.9 expect the patch program to be compliant with a need for the "C-style encoded filenames" feature, but is supported in environments with noncompliant patch programs, which triggers an intera...
CVE-2014-3127
- EPSS 0.92%
- Published 14.05.2014 00:55:10
- Last modified 12.04.2025 10:46:40
dpkg 1.15.9 on Debian squeeze introduces support for the "C-style encoded filenames" feature without recognizing that the squeeze patch program lacks this feature, which triggers an interaction error that allows remote attackers to conduct directory ...
- EPSS 0.29%
- Published 30.04.2014 14:22:06
- Last modified 12.04.2025 10:46:40
Directory traversal vulnerability in the unpacking functionality in dpkg before 1.15.9, 1.16.x before 1.16.13, and 1.17.x before 1.17.8 allows remote attackers to write arbitrary files via a crafted source package, related to "C-style filename quotin...
CVE-2011-0402
- EPSS 1.29%
- Published 11.01.2011 03:00:05
- Last modified 11.04.2025 00:51:21
dpkg-source in dpkg before 1.14.31 and 1.15.x allows user-assisted remote attackers to modify arbitrary files via a symlink attack on unspecified files in the .pc directory.