{"id":"CVE-2010-1679","details":"Directory traversal vulnerability in dpkg-source in dpkg before 1.14.31 and 1.15.x allows user-assisted remote attackers to modify arbitrary files via directory traversal sequences in a patch for a source-format 3.0 package.","modified":"2026-04-10T03:41:14.309266Z","published":"2011-01-11T03:00:01Z","references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/42826"},{"type":"ADVISORY","url":"http://secunia.com/advisories/42831"},{"type":"ADVISORY","url":"http://secunia.com/advisories/43054"},{"type":"ADVISORY","url":"http://www.debian.org/security/2011/dsa-2142"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-1038-1"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2011/0040"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2011/0044"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2011/0196"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053306.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053311.html"},{"type":"WEB","url":"http://osvdb.org/70368"},{"type":"WEB","url":"http://www.securityfocus.com/bid/45703"},{"type":"WEB","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/64615"}],"schema_version":"1.7.5"}