Debian

Dpkg

13 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.09%
  • Published 01.07.2025 16:16:54
  • Last modified 19.08.2025 17:50:38

It was discovered that dpkg-deb does not properly sanitize directory permissions when extracting a control member into a temporary directory, which is documented as being a safe operation even on untrusted data. This may result in leaving temporary f...

  • EPSS 0.38%
  • Published 26.05.2022 14:15:08
  • Last modified 21.11.2024 06:41:12

Dpkg::Source::Archive in dpkg, the Debian package management system, before version 1.21.8, 1.20.10, 1.19.8, 1.18.26 is prone to a directory traversal vulnerability. When extracting untrusted source packages in v2 and v3 source package formats that i...

  • EPSS 1.07%
  • Published 26.04.2017 05:59:00
  • Last modified 20.04.2025 01:37:25

dpkg-source in dpkg 1.3.0 through 1.18.23 is able to use a non-GNU patch program and does not offer a protection mechanism for blank-indented diff hunks, which allows remote attackers to conduct directory traversal attacks via a crafted Debian source...

  • EPSS 4.07%
  • Published 03.12.2015 20:59:01
  • Last modified 12.04.2025 10:46:40

Off-by-one error in the extracthalf function in dpkg-deb/extract.c in the dpkg-deb component in Debian dpkg 1.16.x before 1.16.17 and 1.17.x before 1.17.26 allows remote attackers to execute arbitrary code via the archive magic version number in an "...

  • EPSS 0.65%
  • Published 13.04.2015 14:59:01
  • Last modified 12.04.2025 10:46:40

The dpkg-source command in Debian dpkg before 1.16.16 and 1.17.x before 1.17.25 allows remote attackers to bypass signature verification via a crafted Debian source control file (.dsc).

Exploit
  • EPSS 2.46%
  • Published 20.01.2015 15:59:01
  • Last modified 12.04.2025 10:46:40

Multiple format string vulnerabilities in the parse_error_msg function in parsehelp.c in dpkg before 1.17.22 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in the (1) packa...

  • EPSS 0.62%
  • Published 30.05.2014 18:55:05
  • Last modified 12.04.2025 10:46:40

dpkg 1.15.9, 1.16.x before 1.16.14, and 1.17.x before 1.17.9 expect the patch program to be compliant with a need for the "C-style encoded filenames" feature, but is supported in environments with noncompliant patch programs, which triggers an intera...

  • EPSS 0.92%
  • Published 14.05.2014 00:55:10
  • Last modified 12.04.2025 10:46:40

dpkg 1.15.9 on Debian squeeze introduces support for the "C-style encoded filenames" feature without recognizing that the squeeze patch program lacks this feature, which triggers an interaction error that allows remote attackers to conduct directory ...

  • EPSS 0.29%
  • Published 30.04.2014 14:22:06
  • Last modified 12.04.2025 10:46:40

Directory traversal vulnerability in the unpacking functionality in dpkg before 1.15.9, 1.16.x before 1.16.13, and 1.17.x before 1.17.8 allows remote attackers to write arbitrary files via a crafted source package, related to "C-style filename quotin...

  • EPSS 1.29%
  • Published 11.01.2011 03:00:05
  • Last modified 11.04.2025 00:51:21

dpkg-source in dpkg before 1.14.31 and 1.15.x allows user-assisted remote attackers to modify arbitrary files via a symlink attack on unspecified files in the .pc directory.