Security Advisories (1)
CVE-2022-1664 (2022-05-26)

Dpkg::Source::Archive in dpkg, the Debian package management system, before version 1.21.8, 1.20.10, 1.19.8, 1.18.26 is prone to a directory traversal vulnerability. When extracting untrusted source packages in v2 and v3 source package formats that include a debian.tar, the in-place extraction can lead to directory traversal situations on specially crafted orig.tar and debian.tar tarballs.

NAME

Dpkg::Vendor::Ubuntu - Ubuntu vendor object

DESCRIPTION

This vendor object customizes the behaviour of dpkg scripts for Ubuntu specific behavior and policies.

PUBLIC FUNCTIONS

$bugs = Dpkg::Vendor::Ubuntu::find_launchpad_closes($changes)

Takes one string as argument and finds "LP: #123456, #654321" statements, which are references to bugs on Launchpad. Returns all closed bug numbers in an array reference.

CHANGES

Version 0.xx

This is a semi-private module. Only documented functions are public.