The following updates has been released for Debian GNU/Linux 7 LTS:
DLA 1076-1: php5 security update
DLA 1077-1: faad2 security update
DLA 1078-1: connman security update
DLA 1076-1: php5 security update
DLA 1077-1: faad2 security update
DLA 1078-1: connman security update
DLA 1076-1: php5 security update
Package : php5
Version : 5.4.45-0+deb7u11
CVE ID : CVE-2017-12933
The finish_nested_data function in ext/standard/var_unserializer.re in PHP is
prone to a buffer over-read while unserializing untrusted data. Exploitation of
this issue can have an unspecified impact on the integrity of PHP.
For Debian 7 "Wheezy", these problems have been fixed in version
5.4.45-0+deb7u11.
We recommend that you upgrade your php5 packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
DLA 1077-1: faad2 security update
Package : faad2
Version : 2.7-8+deb7u1
CVE ID : CVE-2017-9218 CVE-2017-9219 CVE-2017-9220 CVE-2017-9221
CVE-2017-9222 CVE-2017-9223 CVE-2017-9253 CVE-2017-9254
CVE-2017-9255 CVE-2017-9256 CVE-2017-9257
Debian Bug : 867724
Various security issues were discovered in faad2, a fast audio
decoder, that would allow remote attackers to cause a denial of
service (application crash due to memory failures or large CPU
consumption) via a crafted mp4 file.
For Debian 7 "Wheezy", these problems have been fixed in version
2.7-8+deb7u1.
We recommend that you upgrade your faad2 packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
DLA 1078-1: connman security update
Package : connman
Version : 1.0-1.1+wheezy2
CVE ID : CVE-2017-12865
Debian Bug : 872844
In connman, stack-based buffer overflow in "dnsproxy.c" allows remote attackers
to cause a denial of service (crash) or execute arbitrary code via a crafted
response query string passed to the "name" variable.
For Debian 7 "Wheezy", these problems have been fixed in version
1.0-1.1+wheezy2.
We recommend that you upgrade your connman packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS