DSA-4081-1 php5 -- security update

Related Vulnerabilities: CVE-2017-11142   CVE-2017-11143   CVE-2017-11144   CVE-2017-11145   CVE-2017-11628   CVE-2017-12933   CVE-2017-16642  

Several vulnerabilities were found in PHP, a widely-used open source general purpose scripting language: CVE-2017-11142 Denial of service via overly long form variables CVE-2017-11143 Invalid free() in wddx_deserialize() CVE-2017-11144 Denial of service in openssl extension due to incorrect return value check of OpenSSL sealing function. CVE-2017-11145 Out-of-bounds read in wddx_deserialize() CVE-2017-11628 Buffer overflow in PHP INI parsing API CVE-2017-12933 Buffer overread in finish_nested_data() CVE-2017-16642 Out-of-bounds read in timelib_meridian() For the oldstable distribution (jessie), these problems have been fixed in version 5.6.33+dfsg-0+deb8u1. We recommend that you upgrade your php5 packages. For the detailed security status of php5 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/php5

Debian Security Advisory

DSA-4081-1 php5 -- security update

Date Reported:
08 Jan 2018
Affected Packages:
php5
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2017-11142, CVE-2017-11143, CVE-2017-11144, CVE-2017-11145, CVE-2017-11628, CVE-2017-12933, CVE-2017-16642.
More information:

Several vulnerabilities were found in PHP, a widely-used open source general purpose scripting language:

For the oldstable distribution (jessie), these problems have been fixed in version 5.6.33+dfsg-0+deb8u1.

We recommend that you upgrade your php5 packages.

For the detailed security status of php5 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/php5