what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Security Advisory 3560-1

Debian Security Advisory 3560-1
Posted Apr 28, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3560-1 - Several vulnerabilities were found in PHP, a general-purpose scripting language commonly used for web application development.

tags | advisory, web, php, vulnerability
systems | linux, debian
advisories | CVE-2015-8865, CVE-2016-4070, CVE-2016-4071, CVE-2016-4072, CVE-2016-4073
SHA-256 | 0823460b2d4bc6ef5d63b5785ab262127bc73b4bf73dd3927aedf0f2de56e342

Debian Security Advisory 3560-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3560-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
April 27, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : php5
CVE ID : CVE-2015-8865 CVE-2016-4070 CVE-2016-4071 CVE-2016-4072
CVE-2016-4073

Several vulnerabilities were found in PHP, a general-purpose scripting
language commonly used for web application development.

The vulnerabilities are addressed by upgrading PHP to the new upstream
version 5.6.20, which includes additional bug fixes. Please refer to the
upstream changelog for more information:

https://php.net/ChangeLog-5.php#5.6.20

For the stable distribution (jessie), these problems have been fixed in
version 5.6.20+dfsg-0+deb8u1.

We recommend that you upgrade your php5 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=9LnB
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

June 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    0 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    18 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    57 Files
  • 7
    Jun 7th
    6 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    12 Files
  • 11
    Jun 11th
    27 Files
  • 12
    Jun 12th
    38 Files
  • 13
    Jun 13th
    16 Files
  • 14
    Jun 14th
    14 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    16 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close