Security Advisories (1)
CVE-2022-1664 (2022-05-26)

Dpkg::Source::Archive in dpkg, the Debian package management system, before version 1.21.8, 1.20.10, 1.19.8, 1.18.26 is prone to a directory traversal vulnerability. When extracting untrusted source packages in v2 and v3 source package formats that include a debian.tar, the in-place extraction can lead to directory traversal situations on specially crafted orig.tar and debian.tar tarballs.

NAME

Dpkg::Control::Tests::Entry - represents a test suite entry

DESCRIPTION

This object represents a test suite entry.

METHODS

All the methods of Dpkg::Control are available. Those listed below are either new or overridden with a different behavior.

$entry = Dpkg::Control::Tests::Entry->new()

Creates a new object. It does not represent a real control test entry until one has been successfully parsed or built from scratch.

$entry->parse($fh, $desc)

Parse a control test entry from a filehandle. When called multiple times, the parsed fields are accumulated.

Returns true if parsing was a success.

CHANGES

Version 1.00 (dpkg 1.18.8)

Mark the module as public.