Mehrere Probleme in PHP
ID: | DSA-3618-1 |
Distribution: | Debian |
Plattformen: | Debian sid, Debian jessie |
Datum: | Fr, 15. Juli 2016, 00:07 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5773
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5770 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5771 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5769 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5768 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5772 |
Applikationen: | PHP |
Originalnachricht |
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3618-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff July 14, 2016 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : php5 CVE ID : CVE-2016-5768 CVE-2016-5769 CVE-2016-5770 CVE-2016-5771 CVE-2016-5772 CVE-2016-5773 Several vulnerabilities were found in PHP, a general-purpose scripting language commonly used for web application development. The vulnerabilities are addressed by upgrading PHP to the new upstream version 5.6.23, which includes additional bug fixes. Please refer to the upstream changelog for more information: https://php.net/ChangeLog-5.php#5.6.23 For the stable distribution (jessie), these problems have been fixed in version 5.6.23+dfsg-0+deb8u1. For the unstable distribution (sid), these problems have been fixed in version 7.0.8-1 of the php7.0 source package. We recommend that you upgrade your php5 packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJXh+ymAAoJEBDCk7bDfE42rZYP/00ANM5/xIIfNMVTjigRoqfQ eT2Zg+PuLCPUEPO77azJ4XnXh4HjQ+JGPIEq4OhIDj0tPOMUaIXTm68RBWZUolGv fmihSG2Z77EHCYLA4BO7lwmlaF2J+PifztUHqqjaRgmq65//4OQ8qOxVA1IC991P sueFI2mwl8g4veKplVu31VAX8qiin/Jupd7gs0qiDPC8GCgNJWLF8QejR6S6p0XK CvRnvx6tC8U+AzRdNgovsBep15wrrU2oJzUNPQoI292y0aEZoG8rnETI5tFVQtEN yo/70jbfTaH5s0DUFeoZcY6BHbveFUYDMCSkNjVBQlVrEknyLvKcLV+3AVZsXbdm YgTJcSgvReY67iYkrnl4hRNbC6jvPlc4uN8PGiF7Gr1zCmQwRyCnbHTB5fi2S8Rn uKGbpUdnwA45kh63XUUqQTCAmaqy2n+ufRRQ7igepP50ZWODmgnIOoap+3W0LL7B O8ArhlYykG/SGFqgas74iQO8r1/CcznRmPtQ1UCD0zosMZtIWMQjmUatGOrEVJXc /Ju8Di4zk/y315LOSAEKjqvamvWk+GfnHNx3FkCo1pdmN50jLAgYo12Ox4D4YW31 5dOlmG8KHfEuy7qWYjZ93wTs1qktAMHoLdopB5j5NziAEb5/444FSeR/jZoIJij3 apFWIW59hNPHkh1W8001 =GZoU -----END PGP SIGNATURE----- |