[SECURITY] [DLA 3762-1] unadf security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - - Debian LTS Advisory DLA-3762-1debian-...@lists.debian.org https://www.debian.org/lts/security/ Adrian Bunk March 15, 2024https://wiki.debian.org/LTS - - Package: unadf Version: 0.7.11a-4+deb11u1~deb10u1 CVE ID : CVE-2016-1243 CVE-2016-1244 Debian Bug : 838248 Two vulnerabilities have been fixed in unADF, a tool to extract files from an Amiga Disk File dump. CVE-2016-1243 arbitrary code execution via long pathname CVE-2016-1244 arbitrary code execution via shell metacharacters in directory names For Debian 10 buster, these problems have been fixed in version 0.7.11a-4+deb11u1~deb10u1. We recommend that you upgrade your unadf packages. For the detailed security status of unadf please refer to its security tracker page at: https://security-tracker.debian.org/tracker/unadf Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEOvp1f6xuoR0v9F3wiNJCh6LYmLEFAmX0iesACgkQiNJCh6LY mLEa5A//dCcRQ/F3RSGxGnTYA+jEBts+ScHNFoQ7vypF48L8j2lehek8bnlonCIj Wx9otRF+HCnWOWxriGw/h9E1vfIizU2mNZF9eGqjy5nGeAcRmziiX64mzCViuQyp 79YoWwNVqe0CfZDnsCJh7Pajmv9RPAAhwiOzYZ2neZzEBNrsawejA7s8pE4pw3Yw QrSV12ZWh/XhiFVy1k/UHXhXRhiarz5z8ViBPY17gsfB3M4tDMNofOV/sVajt7NS awKLemJMIevWt8a4+cIDder0UhXJRcElUy69DYL9X9XxFdaOWl4nTwpC6X1iyEd/ avnDJK22P9KsMPqGGOBpQX6WJunVfw2N3ygfmEXcxITqdYCSMRQECK011Atu7ceC bka0CurZSeDa8rGRebjqLEfyWPaukj/xRyJzQk/8VYq8PADQix2Hn/3/1q0GyP6F yfZCbYT7Wr+kOKHD7uQMeI9b6OrpNZ7ZxHcFq1kP9Nuhsjz9DQgo6RPkEAo5vbJo AdhW0dMBWqZ8rKXt0dXYZUUTV9O1zzoP4slKeDXstNHHqZTIm0aiBcqGDp6SsLZi Vq6hb9L8u1qhfsPK/VgiPef58QvjCYUVEFAc1/pcXw4MCQBc7bcmaVgsHNR32rSO ZFY6fHkNND5weYuktNK5wjWRsA6I2PKMX9/zaAQM0qaKYB3BYnY= =3U3n -END PGP SIGNATURE-
[SECURITY] [DLA 3761-1] spip security update
- Debian LTS Advisory DLA-3761-1debian-...@lists.debian.org https://www.debian.org/lts/security/ Guilhem Moulin March 15, 2024https://wiki.debian.org/LTS - Package: spip Version: 3.2.4-1+deb10u13 CVE ID : CVE-2023-52322 Debian Bug : 1059331 Hatim Chabik discovered a cross-site scripting (XSS) vulnerability in spip, a content management system, which can lead to privilege escalation or information disclosure. For Debian 10 buster, this problem has been fixed in version 3.2.4-1+deb10u13. We recommend that you upgrade your spip packages. For the detailed security status of spip please refer to its security tracker page at: https://security-tracker.debian.org/tracker/spip Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS signature.asc Description: PGP signature