Vulnerability Description
Dpkg::Source::Archive in dpkg, the Debian package management system, before version 1.21.8, 1.20.10, 1.19.8, 1.18.26 is prone to a directory traversal vulnerability. When extracting untrusted source packages in v2 and v3 source package formats that include a debian.tar, the in-place extraction can lead to directory traversal situations on specially crafted orig.tar and debian.tar tarballs.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Debian | Dpkg | >= 1.14.17, < 1.18.26 |
| Debian | Debian Linux | 9.0 |
| Netapp | Ontap Select Deploy Administration Utility | - |
Related Weaknesses (CWE)
References
- https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=1f23dddc17f69c9598477098c7fb9Mailing ListPatchVendor Advisory
- https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=58814cacee39c4ce9e2cd0e3a3b9bMailing ListPatchVendor Advisory
- https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=7a6c03cb34d4a09f35df2f10779cbMailing ListPatchVendor Advisory
- https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=faa4c92debe45412bfcf8a44f26e8Mailing ListPatchVendor Advisory
- https://lists.debian.org/debian-lts-announce/2022/05/msg00033.htmlMailing ListVendor Advisory
- https://lists.debian.org/debian-security-announce/2022/msg00115.htmlMailing ListVendor Advisory
- https://security.netapp.com/advisory/ntap-20221007-0002/Third Party Advisory
- https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=1f23dddc17f69c9598477098c7fb9Mailing ListPatchVendor Advisory
- https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=58814cacee39c4ce9e2cd0e3a3b9bMailing ListPatchVendor Advisory
- https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=7a6c03cb34d4a09f35df2f10779cbMailing ListPatchVendor Advisory
- https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=faa4c92debe45412bfcf8a44f26e8Mailing ListPatchVendor Advisory
- https://lists.debian.org/debian-lts-announce/2022/05/msg00033.htmlMailing ListVendor Advisory
- https://lists.debian.org/debian-security-announce/2022/msg00115.htmlMailing ListVendor Advisory
- https://security.netapp.com/advisory/ntap-20221007-0002/Third Party Advisory
FAQ
What is CVE-2022-1664?
CVE-2022-1664 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Dpkg::Source::Archive in dpkg, the Debian package management system, before version 1.21.8, 1.20.10, 1.19.8, 1.18.26 is prone to a directory traversal vulnerability. When extracting untrusted source p...
How severe is CVE-2022-1664?
CVE-2022-1664 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-1664?
Check the references section above for vendor advisories and patch information. Affected products include: Debian Dpkg, Debian Debian Linux, Netapp Ontap Select Deploy Administration Utility.