it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Moritz Muehlenhoff <jmm AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 5625-1] engrampa security update
- Date: Fri, 16 Feb 2024 19:31:04 +0000
- List-archive: https://lists.debian.org/msgid-search/Zc+3+KGjl/HqsV5a AT seger.debian.org
- List-id: <debian-security-announce.lists.debian.org>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Content-Type:MIME-Version:Message-ID:Subject:To:From:Date :Reply-To:Cc:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=cuJTzYPGafvax3rsVsp4XjxGmmN9Ir6r3PaW06B1/Dg=; b=k0 ssbo5pg0CHNr9eQIu/by0V97gbPqnpPjxcBp/mAnLC0ZjQt7KuxkPBrFnWPSPSQYnflv7VSR6+8Ox tfp6XYMeCRO3BZGQGMF/hM5k4xVPOyrrxqKs+tFxeDz9IBjpTuop9c7DKrm61vzdNQlvRWu617Hi7 pf1ULcaxfBxoKSiWf53wDLjH5Z9g/3d1x3xWnJW8Ee/wjkXGbyMzq6gpFhkKpdq9iM/FiTs1lU16V TYKafdRKDoA2386NI9M4gZkt/YTCUd4TkmQGwwr5dU+r9AyuApqzOiXMOzcme6iOp4NySk65dBnUQ LppcZ2eXIKAYUVWzR2z0SpfqHmmmOInA==;
- Old-return-path: <jmm AT seger.debian.org>
- Priority: urgent
- Resent-date: Fri, 16 Feb 2024 19:31:33 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <D8O5eIcYNZ.A.BkC.Vg7zlB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5625-1 security AT debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
February 16, 2024 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : engrampa
CVE ID : CVE-2023-52138
It was discovered that Engrampa, an archive manager for the MATE
desktop environment was susceptible to path traversal when handling
CPIO archives.
For the oldstable distribution (bullseye), this problem has been fixed
in version 1.24.1-1+deb11u1.
For the stable distribution (bookworm), this problem has been fixed in
version 1.26.0-1+deb12u2.
We recommend that you upgrade your engrampa packages.
For the detailed security status of engrampa please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/engrampa
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----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=mXRg
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 5625-1] engrampa security update, Moritz Muehlenhoff, 16.02.2024
Archiv bereitgestellt durch MHonArc 2.6.19+.