UBUNTU-CVE-2014-8625

Source
https://ubuntu.com/security/CVE-2014-8625
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2014/UBUNTU-CVE-2014-8625.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2014-8625
Upstream
Published
2015-01-20T15:59:00Z
Modified
2026-04-22T09:54:16.952763Z
Severity
  • Ubuntu - low
Summary
[none]
Details

Multiple format string vulnerabilities in the parseerrormsg function in parsehelp.c in dpkg before 1.17.22 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in the (1) package or (2) architecture name.

References

Affected packages

Ubuntu:Pro:14.04:LTS / dpkg

Package

Name
dpkg
Purl
pkg:deb/ubuntu/dpkg@1.17.5ubuntu5.8+esm1?arch=source&distro=esm-infra-legacy/trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.16.12ubuntu1
1.17.1ubuntu1
1.17.5ubuntu1
1.17.5ubuntu2
1.17.5ubuntu3
1.17.5ubuntu4
1.17.5ubuntu5
1.17.5ubuntu5.1
1.17.5ubuntu5.2
1.17.5ubuntu5.3
1.17.5ubuntu5.4
1.17.5ubuntu5.5
1.17.5ubuntu5.6
1.17.5ubuntu5.7
1.17.5ubuntu5.8
1.17.5ubuntu5.8+esm1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1.17.5ubuntu5.8+esm1",
            "binary_name": "dpkg"
        },
        {
            "binary_version": "1.17.5ubuntu5.8+esm1",
            "binary_name": "dselect"
        },
        {
            "binary_version": "1.17.5ubuntu5.8+esm1",
            "binary_name": "libdpkg-perl"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2014/UBUNTU-CVE-2014-8625.json"