CVE-2025-6297

Publication date 1 July 2025

Last updated 3 July 2025


Ubuntu priority

Cvss 3 Severity Score

8.2 · High

Score breakdown

It was discovered that dpkg-deb does not properly sanitize directory permissions when extracting a control member into a temporary directory, which is documented as being a safe operation even on untrusted data. This may result in leaving temporary files behind on cleanup. Given automated and repeated execution of dpkg-deb commands on adversarial .deb packages or with well compressible files, placed inside a directory with permissions not allowing removal by a non-root user, this can end up in a DoS scenario due to causing disk quota exhaustion or disk full conditions.

Read the notes from the security team

Why is this CVE low priority?

Only leaves temp files around when manually extracting a deb file

Learn more about Ubuntu priority

Status

Package Ubuntu Release Status
dpkg 25.04 plucky
Needs evaluation
24.10 oracular Ignored end of life, was needs-triage
24.04 LTS noble
Needs evaluation
22.04 LTS jammy
Needs evaluation
20.04 LTS focal
Needs evaluation
18.04 LTS bionic
Needs evaluation
16.04 LTS xenial
Needs evaluation
14.04 LTS trusty
Needs evaluation

Notes


mdeslaur

This issue only results in temporary files being left behind when manually extracting deb packages with the dpkg-deb tool. Contrary to the CVSS score, this is a rather unimportant issue. Marking as low priority.

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
dpkg

Severity score breakdown

Parameter Value
Base score 8.2 · High
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact Low
Availability impact None
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N