Количество 7
Количество 7
BDU:2025-11256
Уязвимость менеджера пакетов Dpkg, связанная с небезопасными временными файлами, позволяющая нарушителю вызвать отказ в обслуживании
ROS-20250904-10
Уязвимость dpkg
CVE-2025-6297
It was discovered that dpkg-deb does not properly sanitize directory permissions when extracting a control member into a temporary directory, which is documented as being a safe operation even on untrusted data. This may result in leaving temporary files behind on cleanup. Given automated and repeated execution of dpkg-deb commands on adversarial .deb packages or with well compressible files, placed inside a directory with permissions not allowing removal by a non-root user, this can end up in a DoS scenario due to causing disk quota exhaustion or disk full conditions.
CVE-2025-6297
It was discovered that dpkg-deb does not properly sanitize directory permissions when extracting a control member into a temporary directory, which is documented as being a safe operation even on untrusted data. This may result in leaving temporary files behind on cleanup. Given automated and repeated execution of dpkg-deb commands on adversarial .deb packages or with well compressible files, placed inside a directory with permissions not allowing removal by a non-root user, this can end up in a DoS scenario due to causing disk quota exhaustion or disk full conditions.
CVE-2025-6297
It was discovered that dpkg-deb does not properly sanitize directory p ...
SUSE-SU-2025:02734-1
Security update for dpkg
GHSA-w56q-6jw5-h5xf
It was discovered that dpkg-deb does not properly sanitize directory permissions when extracting a control member into a temporary directory, which is documented as being a safe operation even on untrusted data. This may result in leaving temporary files behind on cleanup. Given automated and repeated execution of dpkg-deb commands on adversarial .deb packages or with well compressible files, placed inside a directory with permissions not allowing removal by a non-root user, this can end up in a DoS scenario due to causing disk quota exhaustion or disk full conditions.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
BDU:2025-11256 Уязвимость менеджера пакетов Dpkg, связанная с небезопасными временными файлами, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 8.2 | 0% Низкий | 7 месяцев назад | |
ROS-20250904-10 Уязвимость dpkg | CVSS3: 8.2 | 0% Низкий | 5 месяцев назад | |
CVE-2025-6297 It was discovered that dpkg-deb does not properly sanitize directory permissions when extracting a control member into a temporary directory, which is documented as being a safe operation even on untrusted data. This may result in leaving temporary files behind on cleanup. Given automated and repeated execution of dpkg-deb commands on adversarial .deb packages or with well compressible files, placed inside a directory with permissions not allowing removal by a non-root user, this can end up in a DoS scenario due to causing disk quota exhaustion or disk full conditions. | CVSS3: 8.2 | 0% Низкий | 7 месяцев назад | |
CVE-2025-6297 It was discovered that dpkg-deb does not properly sanitize directory permissions when extracting a control member into a temporary directory, which is documented as being a safe operation even on untrusted data. This may result in leaving temporary files behind on cleanup. Given automated and repeated execution of dpkg-deb commands on adversarial .deb packages or with well compressible files, placed inside a directory with permissions not allowing removal by a non-root user, this can end up in a DoS scenario due to causing disk quota exhaustion or disk full conditions. | CVSS3: 8.2 | 0% Низкий | 7 месяцев назад | |
CVE-2025-6297 It was discovered that dpkg-deb does not properly sanitize directory p ... | CVSS3: 8.2 | 0% Низкий | 7 месяцев назад | |
SUSE-SU-2025:02734-1 Security update for dpkg | 0% Низкий | 5 месяцев назад | ||
GHSA-w56q-6jw5-h5xf It was discovered that dpkg-deb does not properly sanitize directory permissions when extracting a control member into a temporary directory, which is documented as being a safe operation even on untrusted data. This may result in leaving temporary files behind on cleanup. Given automated and repeated execution of dpkg-deb commands on adversarial .deb packages or with well compressible files, placed inside a directory with permissions not allowing removal by a non-root user, this can end up in a DoS scenario due to causing disk quota exhaustion or disk full conditions. | CVSS3: 8.2 | 0% Низкий | 7 месяцев назад |
Уязвимостей на страницу