On Sat, Dec 12, 2020 at 10:32:06AM +0100, Salvatore Bonaccorso wrote:
> Source: libappimage
> Version: 0.1.9+dfsg-1
> Severity: important
> Tags: security upstream
> Forwarded: https://github.com/AppImage/libappimage/pull/146
> X-Debbugs-Cc: car...@debian.org, Debian Security Team 
> <t...@security.debian.org>
> 
> Hi,
> 
> The following vulnerability was published for libappimage.
> 
> CVE-2020-25265[0]:
> | AppImage libappimage before 1.0.3 allows attackers to trigger an
> | overwrite of a system-installed .desktop file by providing a .desktop
> | file that contains Name= with path components.

I'm not entirely sure if the issue is present as well in 0.1.9. The
code is different but 0.2.0 merged the desktop_integration part into
libappimage, before the rename/merge of the sources files.

I have one comment: There seem to be no users of libappimage within
Debian (anymore), and has low popcon, and said security issue. 

Should possibly libappimage be removed for bullseye? It would be
possible:

$ dak rm --suite=sid -n -R libappimage
Will remove the following packages from sid:

libappimage | 0.1.9+dfsg-1 | source
libappimage-dev | 0.1.9+dfsg-1+b1 | amd64, arm64, armel, armhf, i386, mips64el, 
mipsel, ppc64el, s390x
libappimage0 | 0.1.9+dfsg-1+b1 | amd64, arm64, armel, armhf, i386, mips64el, 
mipsel, ppc64el, s390x

Maintainer: Scarlett Moore <sgmo...@kde.org>

------------------- Reason -------------------

----------------------------------------------

Checking reverse dependencies...
No dependency problem found.

Or is there something I miss right now?

Otherwise it probably should be updated straight to 1.0.3 for bullseye
in time.


Regards,
Salvatore

Reply via email to