Debian

Lintian

6 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1%
  • Veröffentlicht 07.11.2019 22:15:10
  • Zuletzt bearbeitet 21.11.2024 01:49:33

Lintian before 2.5.12 allows remote attackers to gather information about the "host" system using crafted symlinks.

  • EPSS 0.31%
  • Veröffentlicht 08.05.2017 06:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Deserialization vulnerability in lintian through 2.5.50.3 allows attackers to trigger code execution by requesting a review of a source package with a crafted YAML file.

  • EPSS 0.84%
  • Veröffentlicht 02.02.2010 16:30:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Multiple directory traversal vulnerabilities in Lintian 1.23.x through 1.23.28, 1.24.x through 1.24.2.1, and 2.x before 2.3.2 allow remote attackers to overwrite arbitrary files or obtain sensitive information via vectors involving (1) control field ...

  • EPSS 2.04%
  • Veröffentlicht 02.02.2010 16:30:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Multiple format string vulnerabilities in Lintian 1.23.x through 1.23.28, 1.24.x through 1.24.2.1, and 2.x before 2.3.2 allow remote attackers to have an unspecified impact via vectors involving (1) check scripts and (2) the Lintian::Schedule module.

  • EPSS 1.16%
  • Veröffentlicht 02.02.2010 16:30:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Lintian 1.23.x through 1.23.28, 1.24.x through 1.24.2.1, and 2.x before 2.3.2 allows remote attackers to execute arbitrary commands via shell metacharacters in filename arguments.

  • EPSS 0.06%
  • Veröffentlicht 10.01.2004 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

lintian 1.23 and earlier removes the working directory even if it was not created by lintian, which may allow local users to delete arbitrary files or directories via a symlink attack.