Debian 10225 Published by

The following updates has been released for Debian GNU/Linux:

[DLA 997-1] libffi security update
[DSA 3890-1] spip security update



[DLA 997-1] libffi security update

Package : libffi
Version : 3.0.10-3+deb7u1
CVE ID : CVE-2017-1000376

libffi requests an executable stack allowing attackers to more easily trigger
arbitrary code execution by overwriting the stack. Please note that libffi is
used by a number of other libraries.

For Debian 7 "Wheezy", these problems have been fixed in version
3.0.10-3+deb7u1.

We recommend that you upgrade your libffi packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

[DSA 3890-1] spip security update

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3890-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
June 21, 2017 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : spip
CVE ID : CVE-2017-9736
Debian Bug : 864921

Emeric Boit of ANSSI reported that SPIP, a website engine for
publishing, insufficiently sanitises the value from the X-Forwarded-Host
HTTP header field. An unauthenticated attacker can take advantage of
this flaw to cause remote code execution.

For the stable distribution (stretch), this problem has been fixed in
version 3.1.4-3~deb9u1.

For the testing distribution (buster), this problem has been fixed
in version 3.1.4-3.

For the unstable distribution (sid), this problem has been fixed in
version 3.1.4-3.

We recommend that you upgrade your spip packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/