Bug 2375776 (CVE-2025-6297) - CVE-2025-6297 dpkg: dpkg excessive disk usage
Summary: CVE-2025-6297 dpkg: dpkg excessive disk usage
Keywords:
Status: NEW
Alias: CVE-2025-6297
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2375784 2375779 2375781 2375782 2375783
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-07-01 17:01 UTC by OSIDB Bzimport
Modified: 2025-07-02 13:05 UTC (History)
8 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-07-01 17:01:12 UTC
It was discovered that dpkg does not properly sanitize directory permissions when extracting a control member into a temporary directory, which is
documented as being a safe operation even on untrusted data, which may lead to leave temporary files behind on cleanup. Given automated and repeated execution of dpkg-deb commands on
adversarial .deb packages or with well compressible files, placed
inside a directory with permissions not allowing removal by a non-root
user, this can end up with a DoS scenario due to causing disk quota
exhaustion or disk full conditions.


Note You need to log in before you can comment on or make changes to this bug.