First published: Thu May 26 2022(Updated: )
Dpkg::Source::Archive in dpkg, the Debian package management system, before version 1.21.8, 1.20.10, 1.19.8, 1.18.26 is prone to a directory traversal vulnerability. When extracting untrusted source packages in v2 and v3 source package formats that include a debian.tar, the in-place extraction can lead to directory traversal situations on specially crafted orig.tar and debian.tar tarballs.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian dpkg | >=1.14.17<1.18.26 | |
Debian dpkg | >=1.19.0<1.19.8 | |
Debian dpkg | >=1.20.0<1.20.10 | |
Debian dpkg | >=1.21.0<1.21.8 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
NetApp ONTAP Select Deploy administration utility |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-1664 is a directory traversal vulnerability in dpkg, the Debian package management system.
CVE-2022-1664 has a severity rating of 9.8 (Critical).
Versions 1.14.17 to 1.21.8 of dpkg are affected by CVE-2022-1664.
To fix CVE-2022-1664, update dpkg to version 1.21.8, 1.20.10, 1.19.8, or 1.18.26.
Yes, you can find references for CVE-2022-1664 [here](https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=1f23dddc17f69c9598477098c7fb9936e15fa495), [here](https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=58814cacee39c4ce9e2cd0e3a3b9b57ad437eff5), and [here](https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=7a6c03cb34d4a09f35df2f10779cbf1b70a5200b).