Search for packages
| purl | pkg:deb/debian/dpkg@0?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-6znq-56pa-tyet | A malicious tar archive could trigger a Buffer overflow in GNU tar, potentially resulting in the execution of arbitrary code. |
CVE-2006-0300
|
| VCID-ec4e-5j15-ekd9 | It was discovered that dpkg-deb (a component of dpkg, the Debian package management system) does not properly validate the end of the data stream when uncompressing a zstd-compressed .deb archive, which may result in denial of service (infinite loop spinning the CPU). |
CVE-2026-2219
|
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-16T09:00:48.030954+00:00 | Debian Importer | Fixing | VCID-6znq-56pa-tyet | https://security-tracker.debian.org/tracker/data/json | 38.4.0 |
| 2026-04-11T18:02:36.120176+00:00 | Debian Importer | Fixing | VCID-6znq-56pa-tyet | https://security-tracker.debian.org/tracker/data/json | 38.3.0 |
| 2026-04-03T07:21:37.476594+00:00 | Debian Importer | Fixing | VCID-ec4e-5j15-ekd9 | https://security-tracker.debian.org/tracker/data/json | 38.1.0 |
| 2026-04-02T17:03:34.518044+00:00 | Debian Importer | Fixing | VCID-6znq-56pa-tyet | https://security-tracker.debian.org/tracker/data/json | 38.1.0 |