- -------------------------------------------------------------------------
Debian Security Advisory DSA-2794-1                   security@debian.org
http://www.debian.org/security/                      Salvatore Bonaccorso
November 10, 2013                      http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : spip
Vulnerability  : several
Problem type   : remote
Debian-specific: no
Debian Bug     : 729172

Several vulnerabilities have been found in SPIP, a website engine for
publishing, resulting in cross-site request forgery on logout,
cross-site scripting on author page, and PHP injection.

For the oldstable distribution (squeeze), these problems have been fixed
in version 2.1.1-3squeeze7.

For the stable distribution (wheezy), these problems have been fixed in
version 2.1.17-1+deb7u2.

For the testing distribution (jessie), these problems will be fixed
soon.

For the unstable distribution (sid), these problems have been fixed in
version 2.1.24-1.

For the experimental distribution, these problems have been fixed in
version 3.0.12-1.

We recommend that you upgrade your spip packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org

Debian: DSA-2794-1: spip security update

November 10, 2013
Several vulnerabilities have been found in SPIP, a website engine for publishing, resulting in cross-site request forgery on logout, cross-site scripting on author page, and PHP in...

Summary

For the oldstable distribution (squeeze), these problems have been fixed
in version 2.1.1-3squeeze7.

For the stable distribution (wheezy), these problems have been fixed in
version 2.1.17-1+deb7u2.

For the testing distribution (jessie), these problems will be fixed
soon.

For the unstable distribution (sid), these problems have been fixed in
version 2.1.24-1.

For the experimental distribution, these problems have been fixed in
version 3.0.12-1.

We recommend that you upgrade your spip packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org

Severity
Several vulnerabilities have been found in SPIP, a website engine for
publishing, resulting in cross-site request forgery on logout,
cross-site scripting on author page, and PHP injection.

Related News