| ID | 
        
          CVE-2025-6297
         | 
      
      
          | Sažetak | 
        It was discovered that dpkg-deb does not properly sanitize directory permissions when extracting a control member into a temporary directory, which is
documented as being a safe operation even on untrusted data. This may result in leaving temporary files behind on cleanup. Given automated and repeated execution of dpkg-deb commands on
adversarial .deb packages or with well compressible files, placed
inside a directory with permissions not allowing removal by a non-root
user, this can end up in a DoS scenario due to causing disk quota
exhaustion or disk full conditions. | 
      
      
          | Reference | 
        
          
         | 
      
      
        | CVSS | 
        
          
              | Base:           | 8.2 |  
              | Impact:         | 4.2 |  
              | Exploitability: | 3.9 |  
           
         | 
      
    
        | Pristup | 
        
        
            | Vektor | Složenost | Autentikacija |  
            
            | NETWORK | 
            LOW | 
            NONE | 
             
         
         | 
    
      
        | Impact | 
        
        
            | Povjerljivost | Cjelovitost | Dostupnost |  
            
            | HIGH | 
            LOW | 
            NONE | 
             
         
         | 
    
    
        | CVSS vektor | 
        CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N | 
      
      
          | Zadnje važnije ažuriranje | 
          
            19-08-2025 - 17:50 | 
          
      
      
          | Objavljeno | 
          
            01-07-2025 - 17:15 |