Dpkg::Source::Archive in dpkg, the Debian package management system, before version 1.21.8, 1.20.10, 1.19.8, 1.18.26 is prone to a directory traversal vulnerability. When extracting untrusted source packages in v2 and v3 source package formats that include a debian.tar, the in-place extraction can lead to directory traversal situations on specially crafted orig.tar and debian.tar tarballs.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3022-1 | dpkg security update |
Debian DSA |
DSA-5147-1 | dpkg security update |
EUVD |
EUVD-2022-24950 | Dpkg::Source::Archive in dpkg, the Debian package management system, before version 1.21.8, 1.20.10, 1.19.8, 1.18.26 is prone to a directory traversal vulnerability. When extracting untrusted source packages in v2 and v3 source package formats that include a debian.tar, the in-place extraction can lead to directory traversal situations on specially crafted orig.tar and debian.tar tarballs. |
Ubuntu USN |
USN-5446-1 | dpkg vulnerability |
Ubuntu USN |
USN-5446-2 | dpkg vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: debian
Published:
Updated: 2024-09-17T02:16:10.760Z
Reserved: 2022-05-10T00:00:00
Link: CVE-2022-1664
No data.
Status : Modified
Published: 2022-05-26T14:15:08.010
Modified: 2024-11-21T06:41:12.497
Link: CVE-2022-1664
No data.
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN