The following updates has been released for Debian GNU/Linux 7 LTS:
DLA 1144-1: git-annex security update
DLA 1148-1: golang security update
DLA 1144-1: git-annex security update
DLA 1148-1: golang security update
DLA 1144-1: git-annex security update
Package : git-annex
Version : 3.20120629+deb7u1
CVE ID : CVE-2017-12976
Debian Bug : 873088
git-annex before 6.20170818 allows remote attackers to execute arbitrary
commands via an ssh URL with an initial dash character in the hostname,
as demonstrated by an ssh://-eProxyCommand= URL, a related issue to
CVE-2017-9800, CVE-2017-12836, CVE-2017-1000116, and CVE-2017-1000117.
For Debian 7 "Wheezy", these problems have been fixed in version
3.20120629+deb7u1.
We recommend that you upgrade your git-annex packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
DLA 1148-1: golang security update
Package : golang
Version : 2:1.0.2-1.1+deb7u2
CVE ID : CVE-2017-15041
Go before 1.8.4 and 1.9.x before 1.9.1 allows "go get" remote command
execution. Using custom domains, it is possible to arrange things so
that example.com/pkg1 points to a Subversion repository but
example.com/pkg1/pkg2 points to a Git repository. If the Subversion
repository includes a Git checkout in its pkg2 directory and some
other work is done to ensure the proper ordering of operations, "go
get" can be tricked into reusing this Git checkout for the fetch of
code from pkg2. If the Subversion repository's Git checkout has
malicious commands in .git/hooks/, they will execute on the system
running "go get."
For Debian 7 "Wheezy", these problems have been fixed in version
2:1.0.2-1.1+deb7u2.
We recommend that you upgrade your golang packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS