[SECURITY] [DSA 5246-1] php-twig security update

2022-10-04 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-5246-1   secur...@debian.org
https://www.debian.org/security/   Sebastien Delafond
October 04, 2022  https://www.debian.org/security/faq
- -

Package: php-twig
CVE ID : CVE-2022-39261
Debian Bug : 1020991

Marlon Starkloff discovered that twig, a template engine for PHP, did
not correctly enforce sandboxing. This would allow a malicious user to
execute arbitrary code.

For the stable distribution (bullseye), this problem has been fixed in
version 2.14.3-1+deb11u2.

We recommend that you upgrade your php-twig packages.

For the detailed security status of php-twig please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/php-twig

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmM9FmYACgkQEL6Jg/PV
nWSFYwgAoCAOajgv28W7jI5bDu/XCf3h/kmFfniaes3oEQd8H26pIHOOjLm5F4hc
w1c6soR6UyuxkkpiIMucgqcRXXzWEgWg6fLb2PHe7Msot8aiDdH/u/KQfCwhJtQI
alGalArG5IG73A/wSAo8GcH/f04u5wM8lOn/p821k9n0e4/9DgMA225KWeNYSrZJ
1FG5Q5pVl4+BEsyz2OEvSjgc/XcNOimQAk4Xauajab6eTMGCGdAnz7Tak4CDg7Q/
oCvu1sA2l+MS7G3fBu+nrK05EmQ2kmv57WgVHsqCli25crTbC13Y/k558DeoXp04
ocIzEOC1Bj/D9tKW+VONeJLutOluIA==
=ZL2h
-END PGP SIGNATURE-



[SECURITY] [DSA 5247-1] barbican security update

2022-10-04 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-5247-1   secur...@debian.org
https://www.debian.org/security/   Moritz Muehlenhoff
October 04, 2022  https://www.debian.org/security/faq
- -

Package: barbican
CVE ID : CVE-2022-3100
Debian Bug : 1021139

Douglas Mendizabal discovered that Barbican, the OpenStack Key Management
Service, incorrectly parsed requests which could allow an authenticated
user to bypass Barbican access policies.

For the stable distribution (bullseye), this problem has been fixed in
version 1:11.0.0-3+deb11u1.

We recommend that you upgrade your barbican packages.

For the detailed security status of barbican please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/barbican

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-
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=mpgp
-END PGP SIGNATURE-



[SECURITY] [DSA 5246-1] mediawiki security update

2022-10-04 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-5246-1   secur...@debian.org
https://www.debian.org/security/   Moritz Muehlenhoff
October 04, 2022  https://www.debian.org/security/faq
- -

Package: mediawiki
CVE ID : CVE-2021-44854 CVE-2021-44855 CVE-2021-44856 CVE-2022-28201 
 CVE-2022-28202 CVE-2022-28203 CVE-2022-29248 CVE-2022-31042 
 CVE-2022-31043 CVE-2022-31090 CVE-2022-31091 CVE-2022-34911 
 CVE-2022-34912 CVE-2022-41765 CVE-2022-41767

Multiple security issues were discovered in MediaWiki, a website engine
for collaborative work, which could result in restriction bypass,
information leaks, cross-site scripting or denial of service.

For the stable distribution (bullseye), these problems have been fixed in
version 1:1.35.8-1~deb11u1.

We recommend that you upgrade your mediawiki packages.

For the detailed security status of mediawiki please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/mediawiki

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-
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=8xpB
-END PGP SIGNATURE-