-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-5093-1 security@debian.org https://www.debian.org/security/ Sebastien Delafond March 08, 2022 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : spip It was discovered that SPIP, a website engine for publishing, would allow a malicious user to execute arbitrary code. For the oldstable distribution (buster), this problem has been fixed in version 3.2.4-1+deb10u7. For the stable distribution (bullseye), this problem has been fixed in version 3.2.11-3+deb11u3. We recommend that you upgrade your spip packages. For the detailed security status of spip please refer to its security tracker page at: https://security-tracker.debian.org/tracker/spip Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmIneEMACgkQEL6Jg/PV nWTmtwf/elvZeq4j7byfvYbUCBPgrtv6qJEmuqD6pYAd3F2siK5RH0mn9LRnzsp2 VpFlhbEHtC5YD73ulqaUQk4SRX2AXfmYDxvj3H1xxhK/wCPrE+UajMGYo2/d4Ig+ 2SUg1oeVqB3X6S5ePKmTafdTfMDTQmH7gOTW6f80ZhgbAbMz/832rGvjH7arYprW 8v0dokNWq37zo0TH6du+J30jrKGeoMuMHY0ACNr+4BlZLBcXYJPDvZsRv0tzLewK trP4t/FqSh/Dr2v0+6o/f3Gk7J/f1VOv1plOf2PGh5xz7GRRR6cFPhw12Hvli+hY A+rjnaDUUklXvQFWW45+T6uokfY8zQ== =k7Wq -----END PGP SIGNATURE-----