SB2022052610 - Path traversal in dpkg
Published: May 26, 2022
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Path traversal (CVE-ID: CVE-2022-1664)
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error in Dpkg::Source::Archive in dpkg when extracting untrusted source packages in the v2 and v3
source package formats that include a debian.tar. A remote attacker can create a specially crafted package with symbolic links that point to files outside the source tree root directory and overwrite arbitrary files on the system.
Remediation
Install update from vendor's website.
References
- https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=7a6c03cb34d4a09f35df2f10779cbf1b70a5200b
- https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=58814cacee39c4ce9e2cd0e3a3b9b57ad437eff5
- https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=1f23dddc17f69c9598477098c7fb9936e15fa495
- https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=faa4c92debe45412bfcf8a44f26e827800bb24be