[SECURITY] [DSA 5327-1] swift security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - - Debian Security Advisory DSA-5327-1 secur...@debian.org https://www.debian.org/security/ Moritz Muehlenhoff January 24, 2023 https://www.debian.org/security/faq - - Package: swift CVE ID : CVE-2022-47950 Debian Bug : 1029200 Sebastien Meriot discovered that the S3 API of Swift, a distributed virtual object store, was susceptible to information disclosure. For the stable distribution (bullseye), this problem has been fixed in version 2.26.0-10+deb11u1. We recommend that you upgrade your swift packages. For the detailed security status of swift please refer to its security tracker page at: https://security-tracker.debian.org/tracker/swift Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmPQNhQACgkQEMKTtsN8 TjY5qw//YHxQJWvmsTZRDzYbyllUh4hfXkfNDKDbMOYv53ebgTSci77Q3di54rXo k6OLR02mJaFsiccYVH8O9oWoEZveVkGhgB3fO5QcGhmHP218nXXknHtBWpfMrjzW IWQJLhU6lczlZtCuDxp4FGs1L/dw3HWDjRDC4/O6X4LDV11GGmM8v4OSEFicM5KM ih/kNYt/DLHl2J3vb1cOLxNZCPAQoHhknpoE4NXdWnBZju8ufT1E0+OqhAnOTS3S XTZ7LuBmtArY0XwK+rKLeXg65RiJchpNIS7uOi0x+ZgvMbmaad5gKm5hA6ZRDdvs Grw0hUu9Atj40QShghCWhjKVRxXu+jMgFZhew/3drqYERv1sdQr94frmagjLdTlI d6QYZCznfGEJTCL2cH+tlW4jBolL5cvS3UcrWHeFh6WNEb3fayeLr3811dJ0D+/b NXoiUTVPIBp37ycVg26Xehz4axrLPyHTDqXTqy5aEn1jee1810F1OeNfZODju8Bx XgRxLCQaR7VoWtux+0ZQBhBziii2D2BPSZBzIP14llkqyYdxgMVBI67zDOu1VUXM y2gqJRvlzclimpmWbXXVV16gB3I6Kxt8MQKdMZpinUIYUjdp4Dm7p5pgTU8Jk8qJ mdOu43mRnAgMOavLO7/1GeyOvDFnnW0gDsBbGLWRM7VbHGmB+7M= =QW6t -END PGP SIGNATURE-
[SECURITY] [DSA 5326-1] nodejs security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - - Debian Security Advisory DSA-5326-1 secur...@debian.org https://www.debian.org/security/ Aron Xu January 24, 2023 https://www.debian.org/security/faq - - Package: nodejs CVE ID : CVE-2022-32212 CVE-2022-32213 CVE-2022-32214 CVE-2022-32215 CVE-2022-35255 CVE-2022-35256 CVE-2022-43548 Multiple vulnerabilities were discovered in Node.js, which could result in HTTP request smuggling, bypass of host IP address validation and weak randomness setup. For the stable distribution (bullseye), these problems have been fixed in version 12.22.12~dfsg-1~deb11u3. We recommend that you upgrade your nodejs packages. For the detailed security status of nodejs please refer to its security tracker page at: https://security-tracker.debian.org/tracker/nodejs Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmPQNhIACgkQEMKTtsN8 TjaRmA/+KDFkQcd2sE/eAAx9cVikICNkfu7uIVKHpeDH9o5oq5M2nj4zHJCeAArp WblguyZwEtqzAOO2WesbrmwfXLmglhrNZwRMOrsbu63JxSnecp7qcMwR8A4JWdmd Txb4aZr6Prmwq6fT0G3K6oV8Hw+OeqYA/RZKenxtkBf/jdzVahGJHJ/NrFKKWVQW xbqHwCkP7uUlm+5UR5XzNrodTRCQYHJvUmDUrjEOjM6x+sqYirKWiERN0A14kVn9 0Ufrw6+Z2tKhdKFZfU1BtDthhlH/nybz0h3aHsk+E5/vx20WAURiCEDVi7nf8+Rf EtbCxaqV+/xVoPmXStHY/ogCo8CgRVsyYUIemgi4q5LwVx/Oqjm2CJ/xCwOKh0E2 idXLJfLSpxxBe598MUn9iKbnFFCN9DQZXf7BYs3djtn8ALFVBSHZSF1QXFoFQ86w Y9xGhBQzfEgCoEW7H4S30ZQ+Gz+ZnOMCSH+MKIMtSpqbc7wLtrKf839DO6Uux7B7 u0WR3lZlsihi92QKq9X/VRkyy8ZiA2TYy3IE+KDKlXDHKls9FR9BUClYe9L8RiRu boP8KPFUHUsSVaTzkufMStdKkcXCqgj/6KhJL6E9ZunTBpTmqx1Ty7/N2qktLFnH ujrffzV3rCE6eIg7ps8OdZbjCfqUqmQk9/pV6ZDjymqjZ1LKZDs= =FERn -END PGP SIGNATURE-
[SECURITY] [DSA 5325-1] spip security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - - Debian Security Advisory DSA-5325-1 secur...@debian.org https://www.debian.org/security/ Sebastien Delafond January 24, 2023 https://www.debian.org/security/faq - - Package: spip It was discovered that SPIP, a website engine for publishing, would allow a malicious user to SQL injection attacks, or bypass authorization access. For the stable distribution (bullseye), this problem has been fixed in version 3.2.11-3+deb11u6. We recommend that you upgrade your spip packages. For the detailed security status of spip please refer to its security tracker page at: https://security-tracker.debian.org/tracker/spip Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -BEGIN PGP SIGNATURE- iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmPPpdYACgkQEL6Jg/PV nWT7GQgAgemz9C/cvulSLwEuV38WAaZwy8RFC3CGw3DirFLf2tVeC6KDI+tGs/u4 XSY7M45xEr4y1TR3NMfovrnX6iR/JgPU/3ZJsFquq8O5Z9WCeZFe2YCkmuqP9hQv txXfOoL4c9b1hfgtv4nVcqLyCFFJhfqLiAy8Eb18vzuggjLVYKa1kioa8wAGk/YB B9rvoKNN1bBfow7A7704Gk2bJMfcxIC9P4anHm6u0OZ4HgC0GYpVYZXegfrFICs7 fylqgcg6Ub+HH+6e3wEDN1oqnj0IQDy09lFj4kCT5xQjhQM8oMZChExndWdmRRI2 iEmUN/gg7RVhdUfNvv8VTy1lo+wd4g== =XA3L -END PGP SIGNATURE-