[SECURITY] [DSA 5153-1] trafficserver security update

2022-05-30 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-5153-1   secur...@debian.org
https://www.debian.org/security/   Moritz Muehlenhoff
May 30, 2022  https://www.debian.org/security/faq
- -

Package: trafficserver
CVE ID : CVE-2021-37147 CVE-2021-37148 CVE-2021-37149 CVE-2021-38161 
 CVE-2021-44040 CVE-2021-44759

Several vulnerabilities were discovered in Apache Traffic Server, a
reverse and forward proxy server, which could result in HTTP request
smuggling or MITM attacks.

For the oldstable distribution (buster), these problems have been fixed
in version 8.0.2+ds-1+deb10u6.

For the stable distribution (bullseye), these problems have been fixed in
version 8.1.1+ds-1.1+deb11u1.

We recommend that you upgrade your trafficserver packages.

For the detailed security status of trafficserver please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/trafficserver

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-
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=Dsxv
-END PGP SIGNATURE-



[SECURITY] [DSA 5152-1] spip security update

2022-05-30 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-5152-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
May 30, 2022  https://www.debian.org/security/faq
- -

Package: spip

It was discovered that SPIP, a website engine for publishing, would
allow a malicious user to perform cross-site scripting attacks.

For the oldstable distribution (buster), this problem has been fixed
in version 3.2.4-1+deb10u8.

For the stable distribution (bullseye), this problem has been fixed in
version 3.2.11-3+deb11u4.

We recommend that you upgrade your spip packages.

For the detailed security status of spip please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/spip

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmKUyKkACgkQEL6Jg/PV
nWTbkgf+J37VfIWXY24URdU6ql2hCwQIEy7liMvtPk5Mu7tYdTR716q0tMZ2nglj
NGFQg2mJjppcKYAMM8Z9JI/KFgAT9qI+U0gAdvlbx7wS8yuIoi9cptSPpctP5esB
Xjq9Xj4lHc50CH7hVEhZZIhCMsa4frgC/QMBhopfVIzOlRBGX5MTjonYmkQKKplG
JkBP3YhT5rRkWCcOFOjQoeH/995tDj/PssJeYPY/giyvOvgO1OKupfmHXalZdTko
cptwCNXqN2vElcwY+1cTatTTQZZBqen22QViHTgqZNrdGg25iBKrOhW5t63810NX
0X1hWCaJJrY3PSL+BmQR6xJkgbngmQ==
=IRRI
-END PGP SIGNATURE-