Debian dpkg 1.15.10

CPE Details

Debian dpkg 1.15.10
1.15.10
2014-05-14
21h22 +00:00
2023-02-27
18h31 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:debian:dpkg:1.15.10:*:*:*:*:*:*:*

Informations

Vendor

debian

Product

dpkg

Version

1.15.10

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2025-6297 2025-07-01 16h16 +00:00 It was discovered that dpkg-deb does not properly sanitize directory permissions when extracting a control member into a temporary directory, which is documented as being a safe operation even on untrusted data. This may result in leaving temporary files behind on cleanup. Given automated and repeated execution of dpkg-deb commands on adversarial .deb packages or with well compressible files, placed inside a directory with permissions not allowing removal by a non-root user, this can end up in a DoS scenario due to causing disk quota exhaustion or disk full conditions.
8.2
High
CVE-2022-1664 2022-05-26 08h20 +00:00 Dpkg::Source::Archive in dpkg, the Debian package management system, before version 1.21.8, 1.20.10, 1.19.8, 1.18.26 is prone to a directory traversal vulnerability. When extracting untrusted source packages in v2 and v3 source package formats that include a debian.tar, the in-place extraction can lead to directory traversal situations on specially crafted orig.tar and debian.tar tarballs.
9.8
Critical
CVE-2015-0840 2015-04-13 12h00 +00:00 The dpkg-source command in Debian dpkg before 1.16.16 and 1.17.x before 1.17.25 allows remote attackers to bypass signature verification via a crafted Debian source control file (.dsc).
4.3
CVE-2014-8625 2015-01-20 14h00 +00:00 Multiple format string vulnerabilities in the parse_error_msg function in parsehelp.c in dpkg before 1.17.22 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in the (1) package or (2) architecture name.
6.8