[SECURITY] [DSA 5246-1] php-twig security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - - Debian Security Advisory DSA-5246-1 secur...@debian.org https://www.debian.org/security/ Sebastien Delafond October 04, 2022 https://www.debian.org/security/faq - - Package: php-twig CVE ID : CVE-2022-39261 Debian Bug : 1020991 Marlon Starkloff discovered that twig, a template engine for PHP, did not correctly enforce sandboxing. This would allow a malicious user to execute arbitrary code. For the stable distribution (bullseye), this problem has been fixed in version 2.14.3-1+deb11u2. We recommend that you upgrade your php-twig packages. For the detailed security status of php-twig please refer to its security tracker page at: https://security-tracker.debian.org/tracker/php-twig Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -BEGIN PGP SIGNATURE- iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmM9FmYACgkQEL6Jg/PV nWSFYwgAoCAOajgv28W7jI5bDu/XCf3h/kmFfniaes3oEQd8H26pIHOOjLm5F4hc w1c6soR6UyuxkkpiIMucgqcRXXzWEgWg6fLb2PHe7Msot8aiDdH/u/KQfCwhJtQI alGalArG5IG73A/wSAo8GcH/f04u5wM8lOn/p821k9n0e4/9DgMA225KWeNYSrZJ 1FG5Q5pVl4+BEsyz2OEvSjgc/XcNOimQAk4Xauajab6eTMGCGdAnz7Tak4CDg7Q/ oCvu1sA2l+MS7G3fBu+nrK05EmQ2kmv57WgVHsqCli25crTbC13Y/k558DeoXp04 ocIzEOC1Bj/D9tKW+VONeJLutOluIA== =ZL2h -END PGP SIGNATURE-
[SECURITY] [DSA 5247-1] barbican security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - - Debian Security Advisory DSA-5247-1 secur...@debian.org https://www.debian.org/security/ Moritz Muehlenhoff October 04, 2022 https://www.debian.org/security/faq - - Package: barbican CVE ID : CVE-2022-3100 Debian Bug : 1021139 Douglas Mendizabal discovered that Barbican, the OpenStack Key Management Service, incorrectly parsed requests which could allow an authenticated user to bypass Barbican access policies. For the stable distribution (bullseye), this problem has been fixed in version 1:11.0.0-3+deb11u1. We recommend that you upgrade your barbican packages. For the detailed security status of barbican please refer to its security tracker page at: https://security-tracker.debian.org/tracker/barbican Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmM8g28ACgkQEMKTtsN8 TjazZRAAgQDNXOSVNcy2ZkIpXjw7LOp3SN3hVMIzhGURQKpsbHivgvSEHdRJbGRR E9gJDfavAAWpiOzOE9yK3w0w2EW+CbNnGC+OrIySqwvaWRj9kwkuoQUJj8gcrdV3 UD0pEZSaDRlhy42oXSGgd/OcjQYSHa3tOI+D1Q2EVc834dTUZWlU/opd5ZgidiHE YxJpSFW1kOHR1ZKAb3kduKF5G/n1ErdAcfvpDKITuaiPoXFI7s8a9lnGs+0Y+HcG 3c6ODUNe2FF+w+nihaDHpXnW2wBm8TYKcXGxkvDbZauAgLnVCCveUkgKqkBRXXn0 s6N1UvG0HuDpkYeksf7McC1/dKBkL+mDUo9Xauf6xXkzNdP43Ldhf+ujs5G/2BKm BrWCtKAKkhL39CrfOrPKzRb2X//CnKFTipR35HBJ62eheGyPkOgn0wgppY1ep9ao GyCHKkD51MkcPJ6ukIu9nlHjFEBqwAxYJ+mLzZRozgSBJnDeuWaHgdXIItMsfAJT gkVVpZICAWlBOJB9EbCgPUzdsR8yP5aHKuAUvAfbhLGuwLIvMhRja6Qe9hOkrgIW V4BTZwIjQMfdluo0ioYdqymRX0L83JXZDCgcnKelF5HRmJlU/KrDnhfS7scYJx1Z IiRx9HQ3L6Ftd3wmNbvpCB3hw05hk2u+E7la1lXVEJYYTG/POXk= =mpgp -END PGP SIGNATURE-
[SECURITY] [DSA 5246-1] mediawiki security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - - Debian Security Advisory DSA-5246-1 secur...@debian.org https://www.debian.org/security/ Moritz Muehlenhoff October 04, 2022 https://www.debian.org/security/faq - - Package: mediawiki CVE ID : CVE-2021-44854 CVE-2021-44855 CVE-2021-44856 CVE-2022-28201 CVE-2022-28202 CVE-2022-28203 CVE-2022-29248 CVE-2022-31042 CVE-2022-31043 CVE-2022-31090 CVE-2022-31091 CVE-2022-34911 CVE-2022-34912 CVE-2022-41765 CVE-2022-41767 Multiple security issues were discovered in MediaWiki, a website engine for collaborative work, which could result in restriction bypass, information leaks, cross-site scripting or denial of service. For the stable distribution (bullseye), these problems have been fixed in version 1:1.35.8-1~deb11u1. We recommend that you upgrade your mediawiki packages. For the detailed security status of mediawiki please refer to its security tracker page at: https://security-tracker.debian.org/tracker/mediawiki Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmM8gAYACgkQEMKTtsN8 TjZF9Q//Q4aOymd80Qw9dwB9MwCCVE26XSQrIJoANebX+AA4LMcXNpSj1GydUtnk zmbbZFD/JJHAphGCXswMeAlXzb4H6nH8YBehkxGMOFTLHESwSuKHHfkxWiIt+Btc HDJI2YwYYJQZT/DWTY1/VJP1A4yBgh+dOhx9GsuHLKNY8YjO0lwtFzHa2IELKF8v rgqg/VuQb/mzumEbI6SQXW7fUE3C/Afg9V9Y7v/f5ELXUkhGgaFDTEjpiB3ZN7GY jEwGboRIRATrjz51uu+pGP65ktpOtVb0azfblPaov8elCSjDtwL5BP5xCDk9s1YS iPoDyMnHTQDVx7C3hLPHMAGSWiMyqtTSZUXuBarCxvlvoldhvwxjrYtFDL6SsTQc rFHz1wdbka6HXFhVQ8gfAnI3mpMtnI5hikWWSX7bca1L+zKZcFHk1UXRLzm/4FdA HjkiyKjUyF8bKnIbonnskcLz6gELAcDU74GvDQLIBZlXSbOv9Sl670TJXa0M0JAs h7tYtiApHSePQ/0vC/dGT+bVkWWdthOdmMyBFlU7Qx9DG++UqWKkPJjF+4saZbdW e6yCFXY6l7+2fbAbV+lu2n193Ti2zcO8H5+7fu5TdA/GPsJH8S8C4jsLqIBS1xjq EzwZJuNHnfbHYx7HkudGEnixsFwB8uV0Sg46XDfZwVWmc9mjWhY= =8xpB -END PGP SIGNATURE-