Debian dpkg 1.18.15

CPE Details

Debian dpkg 1.18.15
1.18.15
2017-05-09
14h11 +00:00
2023-02-27
18h31 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:debian:dpkg:1.18.15:*:*:*:*:*:*:*

Informations

Vendor

debian

Product

dpkg

Version

1.18.15

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2025-6297 2025-07-01 16h16 +00:00 It was discovered that dpkg-deb does not properly sanitize directory permissions when extracting a control member into a temporary directory, which is documented as being a safe operation even on untrusted data. This may result in leaving temporary files behind on cleanup. Given automated and repeated execution of dpkg-deb commands on adversarial .deb packages or with well compressible files, placed inside a directory with permissions not allowing removal by a non-root user, this can end up in a DoS scenario due to causing disk quota exhaustion or disk full conditions.
8.2
High
CVE-2022-1664 2022-05-26 08h20 +00:00 Dpkg::Source::Archive in dpkg, the Debian package management system, before version 1.21.8, 1.20.10, 1.19.8, 1.18.26 is prone to a directory traversal vulnerability. When extracting untrusted source packages in v2 and v3 source package formats that include a debian.tar, the in-place extraction can lead to directory traversal situations on specially crafted orig.tar and debian.tar tarballs.
9.8
Critical
CVE-2017-8283 2017-04-26 03h28 +00:00 dpkg-source in dpkg 1.3.0 through 1.18.23 is able to use a non-GNU patch program and does not offer a protection mechanism for blank-indented diff hunks, which allows remote attackers to conduct directory traversal attacks via a crafted Debian source package, as demonstrated by use of dpkg-source on NetBSD.
9.8
Critical