CPANSA-Dpkg-2022-1664: Dpkg vulnerability
Publisher | giterlizzi | Document category | csaf_security_advisory |
---|---|---|---|
Initial release date | 2022-05-26T00:00:00 | Engine | CSAF Perl Toolkit 0.25 |
Current release date | 2022-05-26T00:00:00 | Build Date | |
Current version | 1 | Status | final |
CVSS v3.1 Base Score | 9.8 | Severity | Critical |
Original language | Language | en | |
Also referred to |
Vulnerability Description
Dpkg::Source::Archive in dpkg, the Debian package management system, before version 1.21.8, 1.20.10, 1.19.8, 1.18.26 is prone to a directory traversal vulnerability. When extracting untrusted source packages in v2 and v3 source package formats that include a debian.tar, the in-place extraction can lead to directory traversal situations on specially crafted orig.tar and debian.tar tarballs.
Vulnerabilities
CVE-2022-1664
Vulnerability DescriptionDpkg::Source::Archive in dpkg, the Debian package management system, before version 1.21.8, 1.20.10, 1.19.8, 1.18.26 is prone to a directory traversal vulnerability. When extracting untrusted source packages in v2 and v3 source package formats that include a debian.tar, the in-place extraction can lead to directory traversal situations on specially crafted orig.tar and debian.tar tarballs.
Weakness | CWE-22 : Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') |
---|
Product status
Known affected
Product | Score | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dpkg less than 1.21.8 |
|
Fixed
- Dpkg greater than or equal 1.21.8
giterlizzi
Namespace: https://github.com/giterlizzi/
gdt@cpan.org
References
- CPANSA-Dpkg-2022-1664 JSON self
https://raw.githubusercontent.com/giterlizzi/perl-CPANSA-CSAF/develop/csaf/white/2022/cpansa-dpkg-2022-1664.json - https://lists.debian.org/debian-security-announce/2022/msg00115.html external
https://lists.debian.org/debian-security-announce/2022/msg00115.html - https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=faa4c92debe45412bfcf8a44f26e827800bb24be external
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=faa4c92debe45412bfcf8a44f26e827800bb24be - https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=7a6c03cb34d4a09f35df2f10779cbf1b70a5200b external
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=7a6c03cb34d4a09f35df2f10779cbf1b70a5200b - https://lists.debian.org/debian-lts-announce/2022/05/msg00033.html external
https://lists.debian.org/debian-lts-announce/2022/05/msg00033.html - https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=58814cacee39c4ce9e2cd0e3a3b9b57ad437eff5 external
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=58814cacee39c4ce9e2cd0e3a3b9b57ad437eff5 - https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=1f23dddc17f69c9598477098c7fb9936e15fa495 external
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=1f23dddc17f69c9598477098c7fb9936e15fa495 - CVE-2022-1664 (NVD) external
https://nvd.nist.gov/vuln/detail/CVE-2022-1664
Revision history
Version | Date of the revision | Summary of the revision |
---|---|---|
1 | Thu May 26 00:00:00 2022 | First release |
Sharing rules
TLP:WHITE
For the TLP version see: https://www.first.org/tlp/