Security
Headlines
HeadlinesLatestCVEs

Headline

Gentoo Linux Security Advisory 202408-30

Gentoo Linux Security Advisory 202408-30 - A vulnerability has been discovered in dpkg, which allows for directory traversal. Versions greater than or equal to 1.20.9-r1 are affected.

Packet Storm
#vulnerability#web#mac#linux#debian

Gentoo Linux Security Advisory GLSA 202408-30


                                       https://security.gentoo.org/  

Severity: Normal
Title: dpkg: Directory Traversal
Date: August 12, 2024
Bugs: #847976
ID: 202408-30


Synopsis

A vulnerability has been discovered in dpkg, which allows for directory
traversal.

Background

Debian package management system.

Affected packages

Package Vulnerable Unaffected


app-arch/dpkg < 1.20.9-r1 >= 1.20.9-r1

Description

Please review the CVE indentifier referenced below for details.

Impact

Dpkg::Source::Archive in dpkg, the Debian package management system, is
prone to a directory traversal vulnerability. When extracting untrusted
source packages in v2 and v3 source package formats that include a
debian.tar, the in-place extraction can lead to directory traversal
situations on specially crafted orig.tar and debian.tar tarballs.

Workaround

There is no known workaround at this time.

Resolution

All dpkg users should upgrade to the latest version:

emerge --sync

emerge --ask --oneshot --verbose “>=app-arch/dpkg-1.20.9-r1”

References

[ 1 ] CVE-2022-1664
https://nvd.nist.gov/vuln/detail/CVE-2022-1664

Availability

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/202408-30

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users’ machines is of utmost
importance to us. Any security concerns should be addressed to
[email protected] or alternatively, you may file a bug at
https://bugs.gentoo.org.

License

Copyright 2024 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5

Related news

CVE-2023-23694: DSA-2023-071: Dell VxRail Security Update for Multiple Third-Party Component Vulnerabilities – 7.0.450

Dell VxRail versions earlier than 7.0.450, contain(s) an OS command injection vulnerability in VxRail Manager. A local authenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker.

Scanvus now supports Vulners and Vulns.io VM Linux vulnerability detection APIs

Hello everyone! Great news for my open source Scanvus project! You can now perform vulnerability checks on Linux hosts and docker images not only using the Vulners.com API, but also with the Vulns.io VM API. It’s especially nice that all the code to support the new API was written and contributed by colleagues from Vulns.io. […]

Ubuntu Security Notice USN-5446-2

Ubuntu Security Notice 5446-2 - USN-5446-1 fixed a vulnerability in dpkg. This update provides the corresponding update for Ubuntu 16.04 ESM. Max Justicz discovered that dpkg incorrectly handled unpacking certain source packages. If a user or an automated system were tricked into unpacking a specially crafted source package, a remote attacker could modify files outside the target unpack directory, leading to a denial of service or potentially gaining access to the system.

Ubuntu Security Notice USN-5446-1

Ubuntu Security Notice 5446-1 - Max Justicz discovered that dpkg incorrectly handled unpacking certain source packages. If a user or an automated system were tricked into unpacking a specially crafted source package, a remote attacker could modify files outside the target unpack directory, leading to a denial of service or potentially gaining access to the system.

CVE-2022-1664: [SECURITY] [DSA 5147-1] dpkg security update

Dpkg::Source::Archive in dpkg, the Debian package management system, before version 1.21.8, 1.20.10, 1.19.8, 1.18.26 is prone to a directory traversal vulnerability. When extracting untrusted source packages in v2 and v3 source package formats that include a debian.tar, the in-place extraction can lead to directory traversal situations on specially crafted orig.tar and debian.tar tarballs.

Packet Storm: Latest News

NIELD (Network Interface Events Logging Daemon) 0.6.2