From 8dbea06fcd82915bad1507b8a173c13ee523a34f Mon Sep 17 00:00:00 2001 From: GLSAMaker Date: Mon, 12 Aug 2024 07:19:16 +0000 Subject: [ GLSA 202408-30 ] dpkg: Directory Traversal Bug: https://bugs.gentoo.org/847976 Signed-off-by: GLSAMaker Signed-off-by: Hans de Graaff --- glsa-202408-30.xml | 42 ++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 42 insertions(+) create mode 100644 glsa-202408-30.xml diff --git a/glsa-202408-30.xml b/glsa-202408-30.xml new file mode 100644 index 00000000..5acd36cb --- /dev/null +++ b/glsa-202408-30.xml @@ -0,0 +1,42 @@ + + + + dpkg: Directory Traversal + A vulnerability has been discovered in dpkg, which allows for directory traversal. + dpkg + 2024-08-12 + 2024-08-12 + 847976 + local + + + 1.20.9-r1 + 1.20.9-r1 + + + +

Debian package management system.

+
+ +

Please review the CVE indentifier referenced below for details.

+
+ +

Dpkg::Source::Archive in dpkg, the Debian package management system, is prone to a directory traversal vulnerability. When extracting untrusted source packages in v2 and v3 source package formats that include a debian.tar, the in-place extraction can lead to directory traversal situations on specially crafted orig.tar and debian.tar tarballs.

+
+ +

There is no known workaround at this time.

+
+ +

All dpkg users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-arch/dpkg-1.20.9-r1" + +
+ + CVE-2022-1664 + + graaff + graaff +
\ No newline at end of file -- cgit v1.2.3-65-gdbad