The following updates has been released for Debian GNU/Linux:
Debian GNU/Linux 7 Extended LTS:
ELA-43-1 php5 security update
Debian GNU/Linux 8 LTS:
DLA 1508-1: suricata security update
DLA 1509-1: php5 security update
Debian GNU/Linux 7 Extended LTS:
ELA-43-1 php5 security update
Debian GNU/Linux 8 LTS:
DLA 1508-1: suricata security update
DLA 1509-1: php5 security update
ELA-43-1 php5 security update
Package: php5
Version: 5.4.45-0+deb7u16
Related CVE: CVE-2018-17082
A vulnerability has been discovered in php5, a server-side, HTML-embedded scripting language. The Apache2 component allows XSS via the body of a “Transfer-Encoding: chunked” request because of a defect in request handling.
For Debian 7 Wheezy, these problems have been fixed in version 5.4.45-0+deb7u16.
We recommend that you upgrade your php5 packages.
Further information about Extended LTS security advisories can be found at: https://deb.freexian.com/extended-lts/
DLA 1508-1: suricata security update
Package : suricata
Version : 2.0.7-2+deb8u1
CVE ID : CVE-2016-10728
CVE-2016-10728
If an ICMPv4 error packet is received as the first packet on a flow
in the to_client direction, it can lead to missed TCP/UDP detection
in packets arriving afterwards.
For Debian 8 "Jessie", this problem has been fixed in version
2.0.7-2+deb8u1.
We recommend that you upgrade your suricata packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
DLA 1509-1: php5 security update
Package : php5
Version : 5.6.38+dfsg-0+deb8u1
CVE ID : CVE-2018-17082
A vulnerability has been discovered in php5, a server-side,
HTML-embedded scripting language. The Apache2 component allows XSS via
the body of a "Transfer-Encoding: chunked" request because of a defect
in request handling.
For Debian 8 "Jessie", this problem has been fixed in version
5.6.38+dfsg-0+deb8u1.
We recommend that you upgrade your php5 packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS