[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 1674-1] php5 security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : php5
Version        : 5.6.39+dfsg-0+deb8u2
CVE ID         : CVE-2018-1000888


php-pear in php5 contains CWE-502 (Deserialization of Untrusted Data)
and CWE-915 (Improperly Controlled Modification of
Dynamically-Determined Object Attributes) vulnerabilities in its
Archive_Tar class. When extract is called without a specific prefix
path, can trigger unserialization by crafting a tar file with
`phar://[path_to_malicious_phar_file]` as path. Object injection can
be used to trigger destruct in the loaded PHP classes, all with
possible remote code execution that can result in files being deleted
or possibly modified.

For Debian 8 "Jessie", this problem has been fixed in version
5.6.39+dfsg-0+deb8u2.

We recommend that you upgrade your php5 packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
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=2Oox
-----END PGP SIGNATURE-----


Reply to: