-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-5028-1 security@debian.org https://www.debian.org/security/ Sebastien Delafond December 22, 2021 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : spip It was discovered that SPIP, a website engine for publishing, would allow a malicious user to perform cross-site scripting and SQL injection attacks, or execute arbitrary code. For the oldstable distribution (buster), this problem has been fixed in version 3.2.4-1+deb10u5. For the stable distribution (bullseye), this problem has been fixed in version 3.2.11-3+deb11u1. We recommend that you upgrade your spip packages. For the detailed security status of spip please refer to its security tracker page at: https://security-tracker.debian.org/tracker/spip Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmHC17MACgkQEL6Jg/PV nWSTCgf+Nnp2PRp1FvvagyvH02s9aGygJnBFzD4NVvJCpiO9YnXnMm1F1U2LLQCA usXjnMFG5Y45+8FSQQVW3IeQzUVWlHUXmON+F2rT32+JByqNwlsUEjGwNYvgO+EB jYnPqGRgqgq48POx9Csp4rZW/e0/HX7YSrSqgPQnNQh+LJPlIuN6KkJoNwJZiM8/ ZiedEtvNfyUmWSgHXytnpcqsHbb4Nyyquqxr42DEL83cd4++3/nwNtRwHInJYL/2 Jk1GxuOoJr1ogQyepOdsDpmM0Vxeh6uZWIrPaBWWhraLvwQ0f8z7V/V2rU82tz0g R4WR2hk3968GnkNOaRqSDDwquDQtYg== =3W1N -----END PGP SIGNATURE-----