[SECURITY] [DLA 1020-1] jetty security update

2017-07-09 Thread Markus Koschany
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Package: jetty
Version: 6.1.26-1+deb7u1
CVE ID : CVE-2017-9735
Debian Bug : 864898

It was discovered that Jetty, a Java servlet engine and webserver, was
vulnerable to a timing attack which might reveal cryptographic
credentials such as passwords to a local user.

For Debian 7 "Wheezy", these problems have been fixed in version
6.1.26-1+deb7u1.

We recommend that you upgrade your jetty packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-BEGIN PGP SIGNATURE-
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=56ID
-END PGP SIGNATURE-



[SECURITY] [DLA 1019-1] phpldapadmin security update

2017-07-09 Thread Chris Lamb
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Package: phpldapadmin
Version: 1.2.2-5+deb7u1
CVE ID : CVE-2017-11107
Debian Bug : #867719

It was discovered that there was a cross-site scripting (XSS) vulnerability in
phpldapadmin, a web-based interface for administering LDAP servers.

For Debian 7 "Wheezy", this issue has been fixed in phpldapadmin version
1.2.2-5+deb7u1.

We recommend that you upgrade your phpldapadmin packages.


Regards,

- -- 
  ,''`.
 : :'  : Chris Lamb
 `. `'`  la...@debian.org / chris-lamb.co.uk
   `-

-BEGIN PGP SIGNATURE-
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=ExFZ
-END PGP SIGNATURE-



[SECURITY] [DLA 1018-1] sqlite3 security update

2017-07-09 Thread Chris Lamb
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Package: sqlite3
Version: 3.7.13-1+deb7u4
CVE ID : CVE-2017-10989
Debian Bug : #867618

It was discovered that there was a heap-based buffer over-read vulnerability in
SQLite, a lightweight database engine. The getNodeSize function in
ext/rtree/rtree.c mishandled undersized RTree blobs in a specially-crafted
database,

For Debian 7 "Wheezy", this issue has been fixed in sqlite3 version
3.7.13-1+deb7u4.

We recommend that you upgrade your sqlite3 packages.


Regards,

- -- 
  ,''`.
 : :'  : Chris Lamb, Debian Project Leader
 `. `'`  la...@debian.org / chris-lamb.co.uk
   `-

-BEGIN PGP SIGNATURE-
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=cyJg
-END PGP SIGNATURE-