It was discovered that dpkg-deb does not properly sanitize directory permissions when extracting a control member into a temporary directory, which is documented as being a safe operation even on untrusted data. This may result in leaving temporary files behind on cleanup. Given automated and repeated execution of dpkg-deb commands on adversarial .deb packages or with well compressible files, placed inside a directory with permissions not allowing removal by a non-root user, this can end up in a DoS scenario due to causing disk quota exhaustion or disk full conditions.
{
"versions": [
{
"introduced": "0"
},
{
"fixed": "1.22.21"
}
]
}[
{
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2025-6297-1d5fef9f",
"target": {
"file": "src/deb/info.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"3924857962329433802195814023268348984",
"11499741058881957933100074069682834376",
"131071022544375825548247620293677028955",
"41214264164092395461160396364589676654",
"58326129543867966865887777217099056723",
"244540057041644525548894564888577026194",
"169901819412956784204652562832369938448",
"233197463928546155043575577853951865198",
"70107205517394846737529097499763027877"
]
},
"signature_version": "v1",
"source": "https://git.dpkg.org/cgit/dpkg/dpkg.git@ed6bbd445dd8800308c67236ba35d08004c98e82"
},
{
"signature_type": "Function",
"deprecated": false,
"id": "CVE-2025-6297-837f8e73",
"target": {
"file": "src/deb/info.c",
"function": "cu_info_prepare"
},
"digest": {
"length": 131.0,
"function_hash": "183637550470537410376282287605565844963"
},
"signature_version": "v1",
"source": "https://git.dpkg.org/cgit/dpkg/dpkg.git@ed6bbd445dd8800308c67236ba35d08004c98e82"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-6297.json"