aboutsummaryrefslogtreecommitdiffstats
path: root/english/lts/security/2022/dla-3056.wml
diff options
context:
space:
mode:
authorChris Lamb <lamby@debian.org>2022-06-22 11:00:49 +0100
committerChris Lamb <lamby@debian.org>2022-06-22 11:00:49 +0100
commit88db640cd0bbd4add2bd09bdd7c1bf022da2885b (patch)
tree91b777c13d8b01a1b9ce7377bab7d065c3b87a75 /english/lts/security/2022/dla-3056.wml
parent76135d3b56621ff89007bd99bab3fbc48c76dc79 (diff)
Add DLA-3056-1.
Diffstat (limited to 'english/lts/security/2022/dla-3056.wml')
-rw-r--r--english/lts/security/2022/dla-3056.wml29
1 files changed, 29 insertions, 0 deletions
diff --git a/english/lts/security/2022/dla-3056.wml b/english/lts/security/2022/dla-3056.wml
new file mode 100644
index 00000000000..cbc3d528057
--- /dev/null
+++ b/english/lts/security/2022/dla-3056.wml
@@ -0,0 +1,29 @@
+<define-tag description>LTS security update</define-tag>
+<define-tag moreinfo>
+
+<p>It was discovered that there was an issue in XFCE where allowed attackers
+could execute arbitrary code because xdg-open could execute a .desktop file on
+an attacker-controlled FTP server.</p>
+
+<ul>
+
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-32278">CVE-2022-32278</a>
+
+ <p>XFCE 4.16 allows attackers to execute arbitrary code because xdg-open
+ can execute a .desktop file on an attacker-controlled FTP server.</p></li>
+
+</ul>
+
+<p>For Debian 9 <q>Stretch</q>, this problem has been fixed in version
+0.10.7-1+deb9u1.</p>
+
+<p>We recommend that you upgrade your exo packages.</p>
+
+<p>Further information about Debian LTS security advisories, how to apply
+these updates to your system and frequently asked questions can be
+found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
+</define-tag>
+
+# do not modify the following line
+#include "$(ENGLISHDIR)/lts/security/2022/dla-3056.data"
+# $Id: $

© 2014-2024 Faster IT GmbH | imprint | privacy policy