Several vulnerabilities were found in PHP, a general-purpose scripting
language commonly used for web application development.
Category Archives: Debian
Debian Security Advisories
DSA-3687 nspr – security update
Two vulnerabilities were reported in NSPR, a library to abstract over
operating system interfaces developed by the Mozilla project.
DSA-3688 nss – security update
Several vulnerabilities were discovered in NSS, the cryptography
library developed by the Mozilla project.
DSA-3686 icedove – security update
Multiple security issues have been found in Icedove, Debian’s version of
the Mozilla Thunderbird mail client: Multiple memory safety errors may
lead to the execution of arbitrary code or denial of service.
DSA-3685 libav – security update
Several security issues have been corrected in multiple demuxers and
decoders of the libav multimedia library. A full list of the changes is
available at
https://git.libav.org/?p=libav.git;a=blob;f=Changelog;hb=refs/tags/v11.8
DSA-3684 libdbd-mysql-perl – security update
Paul Rohar discovered that libdbd-mysql-perl, the Perl DBI database
driver for MySQL and MariaDB, constructed an error message in a
fixed-length buffer, leading to a crash (_FORTIFY_SOURCE failure) and,
potentially, to denial of service.
DSA-3683 chromium-browser – security update
Several vulnerabilities have been discovered in the chromium web browser.
DSA-3682 c-ares – security update
Gzob Qq discovered that the query-building functions in c-ares, an
asynchronous DNS request library would not correctly process crafted
query names, resulting in a heap buffer overflow and potentially
leading to arbitrary code execution.
DSA-3681 wordpress – security update
Several vulnerabilities were discovered in wordpress, a web blogging tool,
which could allow remote attackers to compromise a site via cross-site
scripting, cross-site request forgery, path traversal, or bypass restrictions.
DSA-3679 jackrabbit – security update
Lukas Reschke discovered that Apache Jackrabbit, an implementation of
the Content Repository for Java Technology API, did not correctly
check the Content-Type header on HTTP POST requests, enabling
Cross-Site Request Forgery (CSRF) attacks by malicious web sites.