Security Advisories (1)
CVE-2022-1664 (2022-05-26)

Dpkg::Source::Archive in dpkg, the Debian package management system, before version 1.21.8, 1.20.10, 1.19.8, 1.18.26 is prone to a directory traversal vulnerability. When extracting untrusted source packages in v2 and v3 source package formats that include a debian.tar, the in-place extraction can lead to directory traversal situations on specially crafted orig.tar and debian.tar tarballs.

NAME

Dpkg::Control::Tests - parse files like debian/tests/control

DESCRIPTION

It provides an object to access data of files that follow the same syntax as debian/tests/control.

METHODS

All the methods of Dpkg::Index are available. Those listed below are either new or overridden with a different behavior.

$c = Dpkg::Control::Tests->new(%opts)

Create a new Dpkg::Control::Tests object, which inherits from Dpkg::Index.

$item = $tests->new_item()

Creates a new item.

CHANGES

Version 1.00 (dpkg 1.18.8)

Mark the module as public.