Commit 2bf68dc4 authored by Thorsten Alteholz's avatar Thorsten Alteholz

dla 1741

parent 84ec28d2
<define-tag pagetitle>DLA-1741-1 php5</define-tag>
<define-tag report_date>2019-3-31</define-tag>
<define-tag secrefs>CVE-2019-9022 CVE-2019-9637 CVE-2019-9638 CVE-2019-9639 CVE-2019-9640 CVE-2019-9641</define-tag>
<define-tag packages>php5</define-tag>
<define-tag isvulnerable>yes</define-tag>
<define-tag fixed>yes</define-tag>
<define-tag fixed-section>no</define-tag>
#use wml::debian::security
<define-tag description>LTS security update</define-tag>
<define-tag moreinfo>
<p>Several vulnerabilities have been found in php5, a server-side,
HTML-embedded scripting language.</p>
<li><a href="">CVE-2019-9637</a>
<p>rename() across the device may allow unwanted access during
<li><a href="">CVE-2019-9638</a>
<p>, <a href="">CVE-2019-9639</a>
Uninitialized read in exif_process_IFD_in_MAKERNOTE.</p></li>
<li><a href="">CVE-2019-9640</a>
<p>Invalid Read on exif_process_SOFn.</p></li>
<li><a href="">CVE-2019-9641</a>
<p>Uninitialized read in exif_process_IFD_in_TIFF.</p></li>
<li><a href="">CVE-2019-9022</a>
<p>An issue during parsing of DNS responses allows a hostile DNS server
to misuse memcpy, which leads to a read operation past an allocated
<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
<p>We recommend that you upgrade your php5 packages.</p>
<p>Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: <a href=""></a></p></li>
# do not modify the following line
#include "$(ENGLISHDIR)/lts/security/2019/"
# $Id: $
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment