From c6c753ef8e236d4c67809645dde82d11d9dc1f4e Mon Sep 17 00:00:00 2001 From: Abhijith PA Date: Mon, 28 Dec 2020 16:39:12 +0530 Subject: DLA-2505-1 --- english/lts/security/2020/dla-2505.data | 10 ++++++++++ english/lts/security/2020/dla-2505.wml | 24 ++++++++++++++++++++++++ 2 files changed, 34 insertions(+) create mode 100644 english/lts/security/2020/dla-2505.data create mode 100644 english/lts/security/2020/dla-2505.wml diff --git a/english/lts/security/2020/dla-2505.data b/english/lts/security/2020/dla-2505.data new file mode 100644 index 00000000000..a843768809b --- /dev/null +++ b/english/lts/security/2020/dla-2505.data @@ -0,0 +1,10 @@ +DLA-2505-1 spip +2020-12-28 +CVE-2020-28984 +spip +yes +yes +no + +#use wml::debian::security + diff --git a/english/lts/security/2020/dla-2505.wml b/english/lts/security/2020/dla-2505.wml new file mode 100644 index 00000000000..3401b0809f0 --- /dev/null +++ b/english/lts/security/2020/dla-2505.wml @@ -0,0 +1,24 @@ +LTS security update + +

It was found that spip, a website engine for publishing, did not correctly +validate its input (couleur, display, display_navigation, display_outils, +imessage, and spip_ecran) allowing authenticated users to execute arbitrary +code.

+ +

For Debian 9 stretch, this problem has been fixed in version +3.1.4-4~deb9u4.

+ +

We recommend that you upgrade your spip packages.

+ +

For the detailed security status of spip please refer to +its security tracker page at: +https://security-tracker.debian.org/tracker/spip

+ +

Further information about Debian LTS security advisories, how to apply +these updates to your system and frequently asked questions can be +found at: https://wiki.debian.org/LTS

+
+ +# do not modify the following line +#include "$(ENGLISHDIR)/lts/security/2020/dla-2505.data" +# $Id: $ -- cgit v1.2.3