Debian 10233 Published by

The following updates has been released for Debian GNU/Linux 7 LTS:

DLA 1076-1: php5 security update
DLA 1077-1: faad2 security update
DLA 1078-1: connman security update



DLA 1076-1: php5 security update




Package : php5
Version : 5.4.45-0+deb7u11
CVE ID : CVE-2017-12933

The finish_nested_data function in ext/standard/var_unserializer.re in PHP is
prone to a buffer over-read while unserializing untrusted data. Exploitation of
this issue can have an unspecified impact on the integrity of PHP.

For Debian 7 "Wheezy", these problems have been fixed in version
5.4.45-0+deb7u11.

We recommend that you upgrade your php5 packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


DLA 1077-1: faad2 security update




Package : faad2
Version : 2.7-8+deb7u1
CVE ID : CVE-2017-9218 CVE-2017-9219 CVE-2017-9220 CVE-2017-9221
CVE-2017-9222 CVE-2017-9223 CVE-2017-9253 CVE-2017-9254
CVE-2017-9255 CVE-2017-9256 CVE-2017-9257
Debian Bug : 867724

Various security issues were discovered in faad2, a fast audio
decoder, that would allow remote attackers to cause a denial of
service (application crash due to memory failures or large CPU
consumption) via a crafted mp4 file.

For Debian 7 "Wheezy", these problems have been fixed in version
2.7-8+deb7u1.

We recommend that you upgrade your faad2 packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


DLA 1078-1: connman security update




Package : connman
Version : 1.0-1.1+wheezy2
CVE ID : CVE-2017-12865
Debian Bug : 872844

In connman, stack-based buffer overflow in "dnsproxy.c" allows remote attackers
to cause a denial of service (crash) or execute arbitrary code via a crafted
response query string passed to the "name" variable.

For Debian 7 "Wheezy", these problems have been fixed in version
1.0-1.1+wheezy2.

We recommend that you upgrade your connman packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS