-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-5185-1
security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff
July 15, 2022
https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : mat2
CVE ID : CVE-2022-35410
A directory traversal vulnerability was discovered in the Metadata anonymisation toolkit, which could result in information disclosure via
a malformed ZIP archive.
For the oldstable distribution (buster), this problem has been fixed
in version 0.8.0-3+deb10u1.
For the stable distribution (bullseye), this problem has been fixed in
version 0.12.1-2+deb11u1.
We recommend that you upgrade your mat2 packages.
For the detailed security status of mat2 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/mat2
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at:
https://www.debian.org/security/
Mailing list:
debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmLRqrkACgkQEMKTtsN8 TjYXMw//fkBDlan95hjGQWOhqA/CCxxwf/C3eBWKRhtBkFvcWaIKFpVLzhZ/vqCx dM/B7ZhPBLI3SA/ZC1GPKL6GVTwySwfVryurYNoaSDdfPitzNEfxAUQthohb3K3A n+xey2CW21ntuCK+Nb4laIl3FnW5JcMDICsaqnhcmF3cxCQfmVApSZugViW3HW4W S43bghIKm8U1rpsd3bneGHHQ5CTf40Qh3DV6J3hpiWv4dhU+p7WbiOK+zv/4H0YP XTduxfI6elREYwJqGhjfptkjwLN35UVIOe0wNmZb9z0hqpjpALoh+8FRgGFCzOyJ Q71wDhSBV5w2r9ZRrguCpDSTrr8aBBWQ1s3sonH0AnLYD/puyilH+N2ygdkiDMyS hYH+dKZ03lchQv5ph6U/J8QkF36yCyblaLN6BYUTk2hOIYq3dWMvKgQ+TsoYAuV6 4ABTdHXChjfB0QGeqnJ0Fc1K23qQNOKootAqfl4+SNhnEmkkAz1JbQR4psGSZjeD nRQEqVmCIrmPJKCCLJXE7jxkR5AwQEZzL7MTbLwu6tIB9OvtIWOGPA9OCLsnsEM+ n6N4mtrQaUEXUNn4GC9lU/I6+SEbpeo9zjOpdaCEQpANw/k3poaHThCOlBIGkdli UbLYdKWNsHjaUbAwvMwBz2t+/qf78S1S56oEXBS25ipzYgybY/0=
=nFD9
-----END PGP SIGNATURE-----
--- SoupGate-Win32 v1.05
* Origin: fsxNet Usenet Gateway (21:1/5)