9.8
CVSSv3

CVE-2022-1664

Published: 26/05/2022 Updated: 03/12/2022
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Dpkg::Source::Archive in dpkg, the Debian package management system, before version 1.21.8, 1.20.10, 1.19.8, 1.18.26 is prone to a directory traversal vulnerability. When extracting untrusted source packages in v2 and v3 source package formats that include a debian.tar, the in-place extraction can lead to directory traversal situations on specially crafted orig.tar and debian.tar tarballs.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

debian dpkg

debian debian linux 9.0

debian debian linux 10.0

debian debian linux 11.0

netapp ontap select deploy administration utility -

Vendor Advisories

Max Justicz reported a directory traversal vulnerability in Dpkg::Source::Archive in dpkg, the Debian package management system This affects extracting untrusted source packages in the v2 and v3 source package formats that include a debiantar For the oldstable distribution (buster), this problem has been fixed in version 1198 For the stable d ...

Github Repositories

GitHub Action: Jacked Jacked provides organizations with a more comprehensive look at their application to take calculated actions and create a better security approach Its primary purpose is to scan vulnerabilities to implement subsequent risk mitigation measures GitHub Action CICD Integration Inputs Description Input Name Description scan-name * Input image name ima