[SECURITY] [DLA 1395-1] php-horde-image security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Package : php-horde-image
Version : 2.1.0-4+deb8u1
CVE IDs : CVE-2017-9774 CVE-2017-14650
Debian Bugs : #865505 876400
It was discovered that there were two remote code execution
vulnerabilities in php-horde-image, the image processing library for the
Horde <https://www.horde.org/> groupware tool:
* CVE-2017-9774: A remote code execution vulnerability (RCE) that was
exploitable by a logged-in user sending a maliciously crafted HTTP GET
request to various image backends.
Note that the fix applied upstream has a regression in that it ignores
the "force aspect ratio" option; see <https://github.com/horde/Image/pull/1>.
* CVE-2017-14650: Another RCE that was exploitable by a logged-in
user sending a maliciously crafted GET request specifically to the "im"
image backend.
For Debian 8 "Jessie", these issues have been fixed in php-horde-image
version 2.1.0-4+deb8u1.
We recommend that you upgrade your php-horde-image packages.
Regards,
- --
,''`.
: :' : Chris Lamb
`. `'` lamby@debian.org / chris-lamb.co.uk
`-
-----BEGIN PGP SIGNATURE-----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=bdlk
-----END PGP SIGNATURE-----
Reply to: