CVE-2025-6297

It was discovered that dpkg-deb does not properly sanitize directory permissions when extracting a control member into a temporary directory, which is documented as being a safe operation even on untrusted data. This may result in leaving temporary files behind on cleanup. Given automated and repeated execution of dpkg-deb commands on adversarial .deb packages or with well compressible files, placed inside a directory with permissions not allowing removal by a non-root user, this can end up in a DoS scenario due to causing disk quota exhaustion or disk full conditions.
Configurations

No configuration.

History

03 Jul 2025, 15:14

Type Values Removed Values Added
Summary
  • (es) Se descubrió que dpkg-deb no depura correctamente los permisos de directorio al extraer un miembro de control a un directorio temporal, lo cual se documenta como una operación segura incluso con datos no confiables. Esto puede resultar en la pérdida de archivos temporales durante la depuración. Si se ejecutan comandos dpkg-deb de forma automatizada y repetida en paquetes .deb adversarios o con archivos bien comprimibles, ubicados dentro de un directorio con permisos que impiden la eliminación por parte de un usuario no root, esto puede provocar un ataque de denegación de servicio (DoS) al causar el agotamiento de la cuota de disco o la saturación del disco.

01 Jul 2025, 18:15

Type Values Removed Values Added
CWE CWE-400
CWE-732
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.2
Summary (en) It was discovered that dpkg does not properly sanitize directory permissions when extracting a control member into a temporary directory, which is documented as being a safe operation even on untrusted data, which may lead to leave temporary files behind on cleanup. Given automated and repeated execution of dpkg-deb commands on adversarial .deb packages or with well compressible files, placed inside a directory with permissions not allowing removal by a non-root user, this can end up with a DoS scenario due to causing disk quota exhaustion or disk full conditions. (en) It was discovered that dpkg-deb does not properly sanitize directory permissions when extracting a control member into a temporary directory, which is documented as being a safe operation even on untrusted data. This may result in leaving temporary files behind on cleanup. Given automated and repeated execution of dpkg-deb commands on adversarial .deb packages or with well compressible files, placed inside a directory with permissions not allowing removal by a non-root user, this can end up in a DoS scenario due to causing disk quota exhaustion or disk full conditions.

01 Jul 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-01 17:15

Updated : 2025-07-03 15:14


NVD link : CVE-2025-6297

Mitre link : CVE-2025-6297

CVE.ORG link : CVE-2025-6297


JSON object : View

Products Affected

No product.

CWE
CWE-400

Uncontrolled Resource Consumption

CWE-732

Incorrect Permission Assignment for Critical Resource