Debian 10203 Published by

The following updates for Debian GNU/Linux are available:

[DLA 1019-1] phpldapadmin security update
[DLA 1020-1] jetty security update
[DSA 3905-1] xorg-server security update



[DLA 1019-1] phpldapadmin security update

Package : phpldapadmin
Version : 1.2.2-5+deb7u1
CVE ID : CVE-2017-11107
Debian Bug : #867719

It was discovered that there was a cross-site scripting (XSS) vulnerability in
phpldapadmin, a web-based interface for administering LDAP servers.

For Debian 7 "Wheezy", this issue has been fixed in phpldapadmin version
1.2.2-5+deb7u1.

We recommend that you upgrade your phpldapadmin packages.

[DLA 1020-1] jetty security update

Package : jetty
Version : 6.1.26-1+deb7u1
CVE ID : CVE-2017-9735
Debian Bug : 864898

It was discovered that Jetty, a Java servlet engine and webserver, was
vulnerable to a timing attack which might reveal cryptographic
credentials such as passwords to a local user.

For Debian 7 "Wheezy", these problems have been fixed in version
6.1.26-1+deb7u1.

We recommend that you upgrade your jetty packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

[DSA 3905-1] xorg-server security update

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3905-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
July 09, 2017 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : xorg-server
CVE ID : CVE-2017-10971 CVE-2017-10972
Debian Bug : 867492

Two security issues have been discovered in the X.org X server, which
may lead to privilege escalation or an information leak.

For the oldstable distribution (jessie), these problems have been fixed
in version 2:1.16.4-1+deb8u1.

For the stable distribution (stretch), these problems have been fixed in
version 2:1.19.2-1+deb9u1. Setups running root-less X are not affected.

For the testing distribution (buster), these problems have been fixed
in version 2:1.19.3-2.

For the unstable distribution (sid), these problems have been fixed in
version 2:1.19.3-2.

We recommend that you upgrade your xorg-server packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/