Debian Dpkg 1.17.25

CPE Details

Debian Dpkg 1.17.25
1.17.25
2015-12-04
14h42 +00:00
2023-02-27
18h31 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:debian:dpkg:1.17.25:*:*:*:*:*:*:*

Informations

Vendor

debian

Product

dpkg

Version

1.17.25

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2022-1664 2022-05-26 08h20 +00:00 Dpkg::Source::Archive in dpkg, the Debian package management system, before version 1.21.8, 1.20.10, 1.19.8, 1.18.26 is prone to a directory traversal vulnerability. When extracting untrusted source packages in v2 and v3 source package formats that include a debian.tar, the in-place extraction can lead to directory traversal situations on specially crafted orig.tar and debian.tar tarballs.
9.8
Critical
CVE-2015-0860 2015-12-03 19h00 +00:00 Off-by-one error in the extracthalf function in dpkg-deb/extract.c in the dpkg-deb component in Debian dpkg 1.16.x before 1.16.17 and 1.17.x before 1.17.26 allows remote attackers to execute arbitrary code via the archive magic version number in an "old-style" Debian binary package, which triggers a stack-based buffer overflow.
7.5