-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Package : php-horde-image Version : 2.1.0-4+deb8u1 CVE IDs : CVE-2017-9774 CVE-2017-14650 Debian Bugs : #865505 876400
It was discovered that there were two remote code execution vulnerabilities in php-horde-image, the image processing library for the Horde <https://www.horde.org/> groupware tool: * CVE-2017-9774: A remote code execution vulnerability (RCE) that was exploitable by a logged-in user sending a maliciously crafted HTTP GET request to various image backends. Note that the fix applied upstream has a regression in that it ignores the "force aspect ratio" option; see <https://github.com/horde/Image/pull/1>. * CVE-2017-14650: Another RCE that was exploitable by a logged-in user sending a maliciously crafted GET request specifically to the "im" image backend. For Debian 8 "Jessie", these issues have been fixed in php-horde-image version 2.1.0-4+deb8u1. We recommend that you upgrade your php-horde-image packages. Regards, - -- ,''`. : :' : Chris Lamb `. `'` la...@debian.org / chris-lamb.co.uk `- -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEwv5L0nHBObhsUz5GHpU+J9QxHlgFAlsszcQACgkQHpU+J9Qx HljSXA/+JFT5MsPTrxe3hawjb3VrQt43OuDs20YkqEb37rz3OV/UGFiGLiIWKSFc cSeyNhxRL6FTj7OZzSiQBHMwWzRDpPp9jxJqJEDwnR3M/Il2gsZbRgFAg8xCEDkH JMIb0ExhwNmMPTnbPkWlWEd5PAn1VdfJAW3IgIHIlr9vgTeDXocSw82GNKQAEFMy ZEz1Wxdt0/Od43bRJtieNU5fd+JOCDcLTMVgUrozwTMdhZpPC0VEXIjWI4/zah56 LD8GTe1tQ1CST1PE29/GWsU05onARaWRVKzC0fL9YOQnh3SuHKUM9kHA48LlXFBu ruacoZolYwfwFrkbv1Z89+03wRvTL90QWpHPLfrE/oVQKtG1nSqY7jlrVOO22LGC YJWtOPnV9l8UEUHrbCKvd5TjFYsK6n1Yl/Dsud9LQhs9yUAveQ/ncGmmvk3TKKvI 9ETujsbNcTPczINqqiZSHBgU5e9mgK0FZq+6fA0CaAwHPeAb2hlLySOql2mMmhaj +YRgpM/v6t7cgvZdxvgwtU6qPxR7LbkGRGOtuSKBpp0ydDHaqP6UmfbYeYoQnNTs QzrSDE+IS1K5srytHugVq/ry/xZd223/6gmuyw9MP7yAMRp4pra8hluT8zS930Jv r7E3mKW9IgA8ZDq5VClAO+5FKiX5ljYlIjGQQm3RpcCuZv3dM/E= =bdlk -----END PGP SIGNATURE-----