The following updates has been released for Debian 7 LTS:
DLA 1105-1: clamav security update
DLA 1106-1: libgd2 security update
DLA 1107-1: bzr security update
DLA 1105-1: clamav security update
DLA 1106-1: libgd2 security update
DLA 1107-1: bzr security update
DLA 1105-1: clamav security update
Package : clamav
Version : 0.99.2+dfsg-0+deb7u3
CVE ID : CVE-2017-6418 CVE-2017-6420
clamav is vulnerable to multiple issues that can lead
to denial of service when processing untrusted content.
CVE-2017-6418
out-of-bounds read in libclamav/message.c, allowing remote attackers
to cause a denial of service via a crafted e-mail message.
CVE-2017-6420
use-after-free in the wwunpack function (libclamav/wwunpack.c), allowing
remote attackers to cause a denial of service via a crafted PE file with
WWPack compression.
For Debian 7 "Wheezy", these problems have been fixed in version
0.99.2+dfsg-0+deb7u3.
We recommend that you upgrade your clamav packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
DLA 1106-1: libgd2 security update
Package : libgd2
Version : 2.0.36~rc1~dfsg-6.1+deb7u10
CVE ID : CVE-2017-6362
A double-free vulnerability was discovered in the gdImagePngPtr()
function in libgd2, a library for programmatic graphics creation and
manipulation, which may result in denial of service or potentially the
execution of arbitrary code if a specially crafted file is processed.
For Debian 7 "Wheezy", these problems have been fixed in version
2.0.36~rc1~dfsg-6.1+deb7u10.
We recommend that you upgrade your libgd2 packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
DLA 1107-1: bzr security update
Package : bzr
Version : 2.6.0~bzr6526-1+deb7u1
CVE ID : CVE-2013-2099 CVE-2017-14176
Debian Bug : 709068 874429
CVE-2013-2099
Bazaar bundles SSL certificate checking code from Python, which
had a bug that could cause a denial of service via resource
consumption through multiple wildcards in certificate hostnames.
CVE-2017-14176
Adam Collard found that host names in 'bzr+ssh' URLs were not
parsed correctly by Bazaar, allowing remote attackers to run
arbitrary code by tricking a user into a maliciously crafted
URL.
For Debian 7 "Wheezy", these problems have been fixed in version
2.6.0~bzr6526-1+deb7u1.
We recommend that you upgrade your bzr packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS