The following updates has been released for Debian 8:
[DSA 3782-1] openjdk-7 security update
[DSA 3783-1] php5 security update
[DSA 3782-1] openjdk-7 security update
[DSA 3783-1] php5 security update
[DSA 3782-1] openjdk-7 security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3782-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
February 08, 2017 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : openjdk-7
CVE ID : CVE-2016-5546 CVE-2016-5547 CVE-2016-5548 CVE-2016-5552
CVE-2017-3231 CVE-2017-3241 CVE-2017-3252 CVE-2017-3253
CVE-2017-3260 CVE-2017-3261 CVE-2017-3272 CVE-2017-3289
Several vulnerabilities have been discovered in OpenJDK, an
implementation of the Oracle Java platform, resulting in the bypass of
Java sandbox restrictions, denial of service, arbitrary code execution,
incorrect parsing or URLs/LDAP DNs or cryptoraphice timing side channel
attacks.
For the stable distribution (jessie), these problems have been fixed in
version 7u121-2.6.8-2~deb8u1.
We recommend that you upgrade your openjdk-7 packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
[DSA 3783-1] php5 security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3783-1 security@debian.org
https://www.debian.org/security/ Luciano Bello
February 08, 2017 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : php5
CVE ID : CVE-2016-10158 CVE-2016-10159 CVE-2016-10160
CVE-2016-10161
Several issues have been discovered in PHP, a widely-used open source
general-purpose scripting language.
CVE-2016-10158
Loading a TIFF or JPEG malicious file can lead to a Denial-of-Service
attack when the EXIF header is being parsed.
CVE-2016-10159
Loading a malicious phar archive can cause an extensive memory
allocation, leading to a Denial-of-Service attack on 32 bit
computers.
CVE-2016-10160
An attacker might remotely execute arbitrary code using a malicious
phar archive. This is the consequence of an off-by-one memory
corruption.
CVE-2016-10161
An attacker with control of the unserialize() function argument can
cause an out-of-bounce read. This could lead to a Denial-of-Service
attack or a remote code execution.
For the stable distribution (jessie), these problems have been fixed in
version 5.6.30+dfsg-0+deb8u1.
We recommend that you upgrade your php5 packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/