Debian Security Advisory DSA-3766-1 [email protected]
https://www.debian.org/security/ Sebastien Delafond
January 19, 2017 https://www.debian.org/security/faq
Package : mapserver
CVE ID : CVE-2017-5522
It was discovered that mapserver, a CGI-based framework for Internet
map services, was vulnerable to a stack-based overflow. This issue
allowed a remote user to crash the service, or potentially execute
arbitrary code.
For the stable distribution (jessie), this problem has been fixed in
version 6.4.1-5+deb8u3.
For the unstable distribution (sid), this problem has been fixed in
version 7.0.4-1.
We recommend that you upgrade your mapserver packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 8 | kfreebsd-amd64 | ruby-mapscript | < 6.4.1-5+deb8u3 | ruby-mapscript_6.4.1-5+deb8u3_kfreebsd-amd64.deb |
Debian | 8 | arm64 | libmapserver1 | < 6.4.1-5+deb8u3 | libmapserver1_6.4.1-5+deb8u3_arm64.deb |
Debian | 7 | armel | cgi-mapserver | < 6.0.1-3.2+deb7u4 | cgi-mapserver_6.0.1-3.2+deb7u4_armel.deb |
Debian | 8 | mipsel | libmapserver1 | < 6.4.1-5+deb8u3 | libmapserver1_6.4.1-5+deb8u3_mipsel.deb |
Debian | 8 | all | mapserver-doc | < 6.4.1-5+deb8u3 | mapserver-doc_6.4.1-5+deb8u3_all.deb |
Debian | 8 | kfreebsd-i386 | cgi-mapserver | < 6.4.1-5+deb8u3 | cgi-mapserver_6.4.1-5+deb8u3_kfreebsd-i386.deb |
Debian | 8 | armel | libmapscript-ruby1.9.1 | < 6.4.1-5+deb8u3 | libmapscript-ruby1.9.1_6.4.1-5+deb8u3_armel.deb |
Debian | 8 | mipsel | libmapscript-ruby1.8 | < 6.4.1-5+deb8u3 | libmapscript-ruby1.8_6.4.1-5+deb8u3_mipsel.deb |
Debian | 8 | ppc64el | php5-mapscript | < 6.4.1-5+deb8u3 | php5-mapscript_6.4.1-5+deb8u3_ppc64el.deb |
Debian | 8 | i386 | libmapserver1 | < 6.4.1-5+deb8u3 | libmapserver1_6.4.1-5+deb8u3_i386.deb |