- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 202408-30
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                           https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
    Title: dpkg: Directory Traversal
     Date: August 12, 2024
     Bugs: #847976
       ID: 202408-30

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

A vulnerability has been discovered in dpkg, which allows for directory
traversal.

Background
==========

Debian package management system.

Affected packages
=================

Package        Vulnerable    Unaffected
-------------  ------------  ------------
app-arch/dpkg  < 1.20.9-r1   >= 1.20.9-r1

Description
===========

Please review the CVE indentifier referenced below for details.

Impact
======

Dpkg::Source::Archive in dpkg, the Debian package management system, is
prone to a directory traversal vulnerability. When extracting untrusted
source packages in v2 and v3 source package formats that include a
debian.tar, the in-place extraction can lead to directory traversal
situations on specially crafted orig.tar and debian.tar tarballs.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All dpkg users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=app-arch/dpkg-1.20.9-r1"

References
==========

[ 1 ] CVE-2022-1664
      https://nvd.nist.gov/vuln/detail/CVE-2022-1664

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/202408-30

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=======

Copyright 2024 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5

Gentoo: GLSA-202408-30: dpkg: Directory TraversalSecurity Advisory Updates

A vulnerability has been discovered in dpkg, which allows for directory traversal.

Summary

Please review the CVE indentifier referenced below for details.

Resolution

All dpkg users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-arch/dpkg-1.20.9-r1"

References

[ 1 ] CVE-2022-1664 https://nvd.nist.gov/vuln/detail/CVE-2022-1664

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/202408-30

Concerns

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

Severity
Severity: Normal
Title: dpkg: Directory Traversal
Date: August 12, 2024
Bugs: #847976
ID: 202408-30

Synopsis

A vulnerability has been discovered in dpkg, which allows for directory traversal.

Background

Debian package management system.

Affected Packages

Package Vulnerable Unaffected ------------- ------------ ------------ app-arch/dpkg < 1.20.9-r1 >= 1.20.9-r1

Impact

Dpkg::Source::Archive in dpkg, the Debian package management system, is prone to a directory traversal vulnerability. When extracting untrusted source packages in v2 and v3 source package formats that include a debian.tar, the in-place extraction can lead to directory traversal situations on specially crafted orig.tar and debian.tar tarballs.

Workaround

There is no known workaround at this time.

Related News