CVE-2025-6297
Publication date 1 July 2025
Last updated 24 September 2025
Ubuntu priority
Description
It was discovered that dpkg-deb does not properly sanitize directory permissions when extracting a control member into a temporary directory, which is documented as being a safe operation even on untrusted data. This may result in leaving temporary files behind on cleanup. Given automated and repeated execution of dpkg-deb commands on adversarial .deb packages or with well compressible files, placed inside a directory with permissions not allowing removal by a non-root user, this can end up in a DoS scenario due to causing disk quota exhaustion or disk full conditions.
Read the notes from the security team
Only leaves temp files around when manually extracting a deb file
Status
Package | Ubuntu Release | Status |
---|---|---|
dpkg | 25.10 questing |
Fixed 1.22.21ubuntu1
|
25.04 plucky |
Fixed 1.22.18ubuntu2.2
|
|
24.04 LTS noble |
Fixed 1.22.6ubuntu6.5
|
|
22.04 LTS jammy |
Fixed 1.21.1ubuntu2.6
|
|
20.04 LTS focal |
Needs evaluation
|
|
18.04 LTS bionic |
Needs evaluation
|
|
16.04 LTS xenial |
Needs evaluation
|
|
14.04 LTS trusty |
Needs evaluation
|
Notes
mdeslaur
This issue only results in temporary files being left behind when manually extracting deb packages with the dpkg-deb tool. Contrary to the CVSS score, this is a rather unimportant issue. Marking as low priority.
Severity score breakdown
Parameter | Value |
---|---|
Base score |
|
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | Low |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-7768-1
- dpkg vulnerability
- 24 September 2025