From 88db640cd0bbd4add2bd09bdd7c1bf022da2885b Mon Sep 17 00:00:00 2001 From: Chris Lamb Date: Wed, 22 Jun 2022 11:00:49 +0100 Subject: Add DLA-3056-1. --- english/lts/security/2022/dla-3056.data | 9 +++++++++ english/lts/security/2022/dla-3056.wml | 29 +++++++++++++++++++++++++++++ 2 files changed, 38 insertions(+) create mode 100644 english/lts/security/2022/dla-3056.data create mode 100644 english/lts/security/2022/dla-3056.wml diff --git a/english/lts/security/2022/dla-3056.data b/english/lts/security/2022/dla-3056.data new file mode 100644 index 00000000000..81b7ba27640 --- /dev/null +++ b/english/lts/security/2022/dla-3056.data @@ -0,0 +1,9 @@ +DLA-3056-1 exo +2022-06-22 +CVE-2022-32278 +exo +yes +yes +no + +#use wml::debian::security diff --git a/english/lts/security/2022/dla-3056.wml b/english/lts/security/2022/dla-3056.wml new file mode 100644 index 00000000000..cbc3d528057 --- /dev/null +++ b/english/lts/security/2022/dla-3056.wml @@ -0,0 +1,29 @@ +LTS security update + + +

It was discovered that there was an issue in XFCE where allowed attackers +could execute arbitrary code because xdg-open could execute a .desktop file on +an attacker-controlled FTP server.

+ + + +

For Debian 9 Stretch, this problem has been fixed in version +0.10.7-1+deb9u1.

+ +

We recommend that you upgrade your exo packages.

+ +

Further information about Debian LTS security advisories, how to apply +these updates to your system and frequently asked questions can be +found at: https://wiki.debian.org/LTS

+
+ +# do not modify the following line +#include "$(ENGLISHDIR)/lts/security/2022/dla-3056.data" +# $Id: $ -- cgit v1.2.3