documented as being a safe operation even on untrusted data. This may result in leaving temporary files behind on cleanup. Given automated and repeated execution of dpkg-deb commands on
adversarial .deb packages or with well compressible files, placed
inside a directory with permissions not allowing removal by a non-root
user, this can end up in a DoS scenario due to causing disk quota
exhaustion or disk full conditions.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-19670 | It was discovered that dpkg-deb does not properly sanitize directory permissions when extracting a control member into a temporary directory, which is documented as being a safe operation even on untrusted data. This may result in leaving temporary files behind on cleanup. Given automated and repeated execution of dpkg-deb commands on adversarial .deb packages or with well compressible files, placed inside a directory with permissions not allowing removal by a non-root user, this can end up in a DoS scenario due to causing disk quota exhaustion or disk full conditions. |
Ubuntu USN |
USN-7768-1 | dpkg vulnerability |
Wed, 06 Aug 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:debian:dpkg:*:*:*:*:*:*:*:* |
Tue, 01 Jul 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-400 CWE-732 |
|
| Metrics |
cvssV3_1
|
Tue, 01 Jul 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | It was discovered that dpkg does not properly sanitize directory permissions when extracting a control member into a temporary directory, which is documented as being a safe operation even on untrusted data, which may lead to leave temporary files behind on cleanup. Given automated and repeated execution of dpkg-deb commands on adversarial .deb packages or with well compressible files, placed inside a directory with permissions not allowing removal by a non-root user, this can end up with a DoS scenario due to causing disk quota exhaustion or disk full conditions. | It was discovered that dpkg-deb does not properly sanitize directory permissions when extracting a control member into a temporary directory, which is documented as being a safe operation even on untrusted data. This may result in leaving temporary files behind on cleanup. Given automated and repeated execution of dpkg-deb commands on adversarial .deb packages or with well compressible files, placed inside a directory with permissions not allowing removal by a non-root user, this can end up in a DoS scenario due to causing disk quota exhaustion or disk full conditions. |
Tue, 01 Jul 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | It was discovered that dpkg does not properly sanitize directory permissions when extracting a control member into a temporary directory, which is documented as being a safe operation even on untrusted data, which may lead to leave temporary files behind on cleanup. Given automated and repeated execution of dpkg-deb commands on adversarial .deb packages or with well compressible files, placed inside a directory with permissions not allowing removal by a non-root user, this can end up with a DoS scenario due to causing disk quota exhaustion or disk full conditions. | |
| Title | dpkg-deb: Fix cleanup for control member with restricted directories | |
| References |
|
Status: PUBLISHED
Assigner: debian
Published:
Updated: 2025-07-01T17:30:37.332Z
Reserved: 2025-06-19T07:40:18.350Z
Link: CVE-2025-6297
Updated: 2025-07-01T17:30:09.853Z
Status : Analyzed
Published: 2025-07-01T17:15:30.177
Modified: 2025-08-19T17:50:38.047
Link: CVE-2025-6297
No data.
OpenCVE Enrichment
Updated: 2025-07-12T23:06:13Z
EUVD
Ubuntu USN