Debian dpkg 1.15.8.11

CPE Details

Debian dpkg 1.15.8.11
1.15.8.11
2014-05-14
21h22 +00:00
2023-02-27
18h31 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:debian:dpkg:1.15.8.11:*:*:*:*:*:*:*

Informations

Vendor

debian

Product

dpkg

Version

1.15.8.11

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2025-6297 2025-07-01 16h16 +00:00 It was discovered that dpkg-deb does not properly sanitize directory permissions when extracting a control member into a temporary directory, which is documented as being a safe operation even on untrusted data. This may result in leaving temporary files behind on cleanup. Given automated and repeated execution of dpkg-deb commands on adversarial .deb packages or with well compressible files, placed inside a directory with permissions not allowing removal by a non-root user, this can end up in a DoS scenario due to causing disk quota exhaustion or disk full conditions.
8.2
High
CVE-2022-1664 2022-05-26 08h20 +00:00 Dpkg::Source::Archive in dpkg, the Debian package management system, before version 1.21.8, 1.20.10, 1.19.8, 1.18.26 is prone to a directory traversal vulnerability. When extracting untrusted source packages in v2 and v3 source package formats that include a debian.tar, the in-place extraction can lead to directory traversal situations on specially crafted orig.tar and debian.tar tarballs.
9.8
Critical
CVE-2015-0840 2015-04-13 12h00 +00:00 The dpkg-source command in Debian dpkg before 1.16.16 and 1.17.x before 1.17.25 allows remote attackers to bypass signature verification via a crafted Debian source control file (.dsc).
4.3
CVE-2014-8625 2015-01-20 14h00 +00:00 Multiple format string vulnerabilities in the parse_error_msg function in parsehelp.c in dpkg before 1.17.22 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in the (1) package or (2) architecture name.
6.8
CVE-2014-3127 2014-05-13 22h00 +00:00 dpkg 1.15.9 on Debian squeeze introduces support for the "C-style encoded filenames" feature without recognizing that the squeeze patch program lacks this feature, which triggers an interaction error that allows remote attackers to conduct directory traversal attacks and modify files outside of the intended directories via a crafted source package. NOTE: this can be considered a release engineering problem in the effort to fix CVE-2014-0471.
7.1