DEBIAN-CVE-2014-8625

Source
https://security-tracker.debian.org/tracker/CVE-2014-8625
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2014-8625.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2014-8625
Upstream
Published
2015-01-20T15:59:01.437Z
Modified
2025-11-19T01:08:53.069375Z
Summary
[none]
Details

Multiple format string vulnerabilities in the parseerrormsg function in parsehelp.c in dpkg before 1.17.22 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in the (1) package or (2) architecture name.

References

Affected packages

Debian:11 / dpkg

Package

Name
dpkg
Purl
pkg:deb/debian/dpkg?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.17.22

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2014-8625.json"

Debian:12 / dpkg

Package

Name
dpkg
Purl
pkg:deb/debian/dpkg?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.17.22

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2014-8625.json"

Debian:13 / dpkg

Package

Name
dpkg
Purl
pkg:deb/debian/dpkg?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.17.22

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2014-8625.json"

Debian:14 / dpkg

Package

Name
dpkg
Purl
pkg:deb/debian/dpkg?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.17.22

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2014-8625.json"