Bug | Description |
---|
TEMP-0592115-F98F5C | signature verification issue |
CVE-2022-1664 | Dpkg::Source::Archive in dpkg, the Debian package management system, b ... |
CVE-2017-8283 | dpkg-source in dpkg 1.3.0 through 1.18.23 is able to use a non-GNU pat ... |
CVE-2015-0860 | Off-by-one error in the extracthalf function in dpkg-deb/extract.c in ... |
CVE-2015-0840 | The dpkg-source command in Debian dpkg before 1.16.16 and 1.17.x befor ... |
CVE-2014-8625 | Multiple format string vulnerabilities in the parse_error_msg function ... |
CVE-2014-3865 | Multiple directory traversal vulnerabilities in dpkg-source in dpkg-de ... |
CVE-2014-3864 | Directory traversal vulnerability in dpkg-source in dpkg-dev 1.3.0 all ... |
CVE-2014-3227 | dpkg 1.15.9, 1.16.x before 1.16.14, and 1.17.x before 1.17.9 expect th ... |
CVE-2014-3127 | dpkg 1.15.9 on Debian squeeze introduces support for the "C-style enco ... |
CVE-2014-0471 | Directory traversal vulnerability in the unpacking functionality in dp ... |
CVE-2011-0402 | dpkg-source in dpkg before 1.14.31 and 1.15.x allows user-assisted rem ... |
CVE-2010-1679 | Directory traversal vulnerability in dpkg-source in dpkg before 1.14.3 ... |
CVE-2010-0396 | Directory traversal vulnerability in the dpkg-source component in dpkg ... |
CVE-2006-0300 | Buffer overflow in tar 1.14 through 1.15.90 allows user-assisted attac ... |
CVE-2005-2096 | zlib 1.2 and later versions allows remote attackers to cause a denial ... |
CVE-2004-2768 | dpkg 1.9.21 does not properly reset the metadata of a file during repl ... |