Package: release.debian.org
Severity: normal
Tags: trixie
X-Debbugs-Cc: [email protected], [email protected], 
[email protected]
Control: affects -1 + src:jaraco.context
User: [email protected]
Usertags: pu

This update fixes the (non-dsa) path traversal vulnerability tracked
as CVE-2026-23949. The vulnerability may allow attackers to extract
files outside the intended extraction directory when malicious tar
archives are processed.

The only code change is a minimal backport of the upstream fix [2].
The patch is identical to the one used to fix the issue in unstable
and low risk.

All CI checks pass on trixie [3]. In addition, the update has been
manually checked against new upstream testcases specifically testing
for the security issue.


[1]https://security-tracker.debian.org/tracker/CVE-2026-23949
[2]https://github.com/jaraco/jaraco.context/commit/7b26a42b525735e4085d2e994e13802ea339d5f9
[3]https://salsa.debian.org/jcfp/jaraco.context/-/pipelines/1011444

Attachment: jaraco.context_6.0.1-1+deb13u1_source.debdiff
Description: Binary data

Attachment: pgp7H9lUbsioM.pgp
Description: OpenPGP digital signature

Reply via email to