The following updates for Debian GNU/Linux are available:
[DLA 1019-1] phpldapadmin security update
[DLA 1020-1] jetty security update
[DSA 3905-1] xorg-server security update
[DLA 1019-1] phpldapadmin security update
[DLA 1020-1] jetty security update
[DSA 3905-1] xorg-server security update
[DLA 1019-1] phpldapadmin security update
Package : phpldapadmin
Version : 1.2.2-5+deb7u1
CVE ID : CVE-2017-11107
Debian Bug : #867719
It was discovered that there was a cross-site scripting (XSS) vulnerability in
phpldapadmin, a web-based interface for administering LDAP servers.
For Debian 7 "Wheezy", this issue has been fixed in phpldapadmin version
1.2.2-5+deb7u1.
We recommend that you upgrade your phpldapadmin packages.
[DLA 1020-1] jetty security update
Package : jetty
Version : 6.1.26-1+deb7u1
CVE ID : CVE-2017-9735
Debian Bug : 864898
It was discovered that Jetty, a Java servlet engine and webserver, was
vulnerable to a timing attack which might reveal cryptographic
credentials such as passwords to a local user.
For Debian 7 "Wheezy", these problems have been fixed in version
6.1.26-1+deb7u1.
We recommend that you upgrade your jetty packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
[DSA 3905-1] xorg-server security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3905-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
July 09, 2017 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : xorg-server
CVE ID : CVE-2017-10971 CVE-2017-10972
Debian Bug : 867492
Two security issues have been discovered in the X.org X server, which
may lead to privilege escalation or an information leak.
For the oldstable distribution (jessie), these problems have been fixed
in version 2:1.16.4-1+deb8u1.
For the stable distribution (stretch), these problems have been fixed in
version 2:1.19.2-1+deb9u1. Setups running root-less X are not affected.
For the testing distribution (buster), these problems have been fixed
in version 2:1.19.3-2.
For the unstable distribution (sid), these problems have been fixed in
version 2:1.19.3-2.
We recommend that you upgrade your xorg-server packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/