Headline
Ubuntu Security Notice USN-5446-1
Ubuntu Security Notice 5446-1 - Max Justicz discovered that dpkg incorrectly handled unpacking certain source packages. If a user or an automated system were tricked into unpacking a specially crafted source package, a remote attacker could modify files outside the target unpack directory, leading to a denial of service or potentially gaining access to the system.
==========================================================================
Ubuntu Security Notice USN-5446-1
May 26, 2022
dpkg vulnerability
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
- Ubuntu 21.10
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
Summary:
A malicious source package could write files outside the unpack directory.
Software Description:
- dpkg: Debian package management system
Details:
Max Justicz discovered that dpkg incorrectly handled unpacking certain
source packages. If a user or an automated system were tricked into
unpacking a specially crafted source package, a remote attacker could
modify files outside the target unpack directory, leading to a denial of
service or potentially gaining access to the system.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS:
dpkg 1.21.1ubuntu2.1
libdpkg-perl 1.21.1ubuntu2.1
Ubuntu 21.10:
dpkg 1.20.9ubuntu2.2
libdpkg-perl 1.20.9ubuntu2.2
Ubuntu 20.04 LTS:
dpkg 1.19.7ubuntu3.2
libdpkg-perl 1.19.7ubuntu3.2
Ubuntu 18.04 LTS:
dpkg 1.19.0.5ubuntu2.4
libdpkg-perl 1.19.0.5ubuntu2.4
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-5446-1
CVE-2022-1664
Package Information:
https://launchpad.net/ubuntu/+source/dpkg/1.21.1ubuntu2.1
https://launchpad.net/ubuntu/+source/dpkg/1.20.9ubuntu2.2
https://launchpad.net/ubuntu/+source/dpkg/1.19.7ubuntu3.2
https://launchpad.net/ubuntu/+source/dpkg/1.19.0.5ubuntu2.4
Related news
Gentoo Linux Security Advisory 202408-30 - A vulnerability has been discovered in dpkg, which allows for directory traversal. Versions greater than or equal to 1.20.9-r1 are affected.
Dell VxRail versions earlier than 7.0.450, contain(s) an OS command injection vulnerability in VxRail Manager. A local authenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker.
Hello everyone! Great news for my open source Scanvus project! You can now perform vulnerability checks on Linux hosts and docker images not only using the Vulners.com API, but also with the Vulns.io VM API. It’s especially nice that all the code to support the new API was written and contributed by colleagues from Vulns.io. […]
Ubuntu Security Notice 5446-2 - USN-5446-1 fixed a vulnerability in dpkg. This update provides the corresponding update for Ubuntu 16.04 ESM. Max Justicz discovered that dpkg incorrectly handled unpacking certain source packages. If a user or an automated system were tricked into unpacking a specially crafted source package, a remote attacker could modify files outside the target unpack directory, leading to a denial of service or potentially gaining access to the system.
Dpkg::Source::Archive in dpkg, the Debian package management system, before version 1.21.8, 1.20.10, 1.19.8, 1.18.26 is prone to a directory traversal vulnerability. When extracting untrusted source packages in v2 and v3 source package formats that include a debian.tar, the in-place extraction can lead to directory traversal situations on specially crafted orig.tar and debian.tar tarballs.