lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Sat, 28 Sep 2019 14:09:51 +0000
From: Salvatore Bonaccorso <carnil@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 4537-1] file-roller security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4537-1                   security@...ian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
September 28, 2019                    https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : file-roller
CVE ID         : CVE-2019-16680

It was discovered that file-roller, an archive manager for GNOME, does
not properly handle the extraction of archives with a single ./../ in a
file path. An attacker able to provide a specially crafted archive for
processing can take advantage of this flaw to overwrite files if a user
is dragging a specific file or map to a location to extract to.

For the oldstable distribution (stretch), this problem has been fixed
in version 3.22.3-1+deb9u1.

We recommend that you upgrade your file-roller packages.

For the detailed security status of file-roller please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/file-roller

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
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=u9N6
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ