diff options
author | Andreas Rönnquist <andreas@ronnquist.net> | 2019-03-12 22:52:25 +0100 |
---|---|---|
committer | Andreas Rönnquist <andreas@ronnquist.net> | 2019-03-12 22:52:25 +0100 |
commit | 17ad00a8e0aa7e57608e532137ace459e664757f (patch) | |
tree | f31b4d8d561663676ecaa4d080262116dfb300de | |
parent | 809349a3636c4f8462a23327cda4461147f82a89 (diff) |
[DSA 4407-1] xmltooling security update
-rw-r--r-- | english/security/2019/dsa-4406.data | 13 | ||||
-rw-r--r-- | english/security/2019/dsa-4406.wml | 19 |
2 files changed, 32 insertions, 0 deletions
diff --git a/english/security/2019/dsa-4406.data b/english/security/2019/dsa-4406.data new file mode 100644 index 00000000000..150f26294ff --- /dev/null +++ b/english/security/2019/dsa-4406.data @@ -0,0 +1,13 @@ +<define-tag pagetitle>DSA-4406-1 waagent</define-tag> +<define-tag report_date>2019-3-12</define-tag> +<define-tag secrefs>CVE-2019-0804</define-tag> +<define-tag packages>waagent</define-tag> +<define-tag isvulnerable>yes</define-tag> +<define-tag fixed>yes</define-tag> +<define-tag fixed-section>no</define-tag> + +#use wml::debian::security + + + +</dl> diff --git a/english/security/2019/dsa-4406.wml b/english/security/2019/dsa-4406.wml new file mode 100644 index 00000000000..70b47d89487 --- /dev/null +++ b/english/security/2019/dsa-4406.wml @@ -0,0 +1,19 @@ +<define-tag description>security update</define-tag> +<define-tag moreinfo> +<p>Francis McBratney discovered that the Windows Azure Linux Agent created +swap files with world-readable permissions, resulting in information +disclosure.</p> + +<p>For the stable distribution (stretch), this problem has been fixed in +version 2.2.18-3~deb9u2.</p> + +<p>We recommend that you upgrade your waagent packages.</p> + +<p>For the detailed security status of waagent please refer to +its security tracker page at: +<a href="https://security-tracker.debian.org/tracker/waagent">https://security-tracker.debian.org/tracker/waagent</a></p> +</define-tag> + +# do not modify the following line +#include "$(ENGLISHDIR)/security/2019/dsa-4406.data" +# $Id: $ |