[SECURITY] [DLA 1741-1] php5 security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Package : php5
Version : 5.6.40+dfsg-0+deb8u2
CVE ID : CVE-2019-9022 CVE-2019-9637 CVE-2019-9638 CVE-2019-9639
CVE-2019-9640 CVE-2019-9641
Several vulnerabilities have been found in php5, a server-side,
HTML-embedded scripting language.
CVE-2019-9637
rename() across the device may allow unwanted access during
processing.
CVE-2019-9638, CVE-2019-9639
Uninitialized read in exif_process_IFD_in_MAKERNOTE.
CVE-2019-9640
Invalid Read on exif_process_SOFn.
CVE-2019-9641
Uninitialized read in exif_process_IFD_in_TIFF.
CVE-2019-9022
An issue during parsing of DNS responses allows a hostile DNS server
to misuse memcpy, which leads to a read operation past an allocated
buffer.
For Debian 8 "Jessie", these problems have been fixed in version
5.6.40+dfsg-0+deb8u2.
We recommend that you upgrade your php5 packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----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=4e6S
-----END PGP SIGNATURE-----
Reply to: