Debian 10229 Published by

The following updates are available for Debian 7 LTS:

[DLA 690-1] tar security update
[DLA 691-1] libxml2 security update



[DLA 690-1] tar security update

Package : tar
Version : 1.26+dfsg-0.1+deb7u1
CVE ID : CVE-2016-6321
Debian Bug : 842339

A vulnerability has been discovered in the tar package that could allow
an attacker to overwrite arbitrary files through crafted files.

For Debian 7 "Wheezy", these problems have been fixed in version
1.26+dfsg-0.1+deb7u1.

We recommend that you upgrade your tar packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


[DLA 691-1] libxml2 security update

Package : libxml2
Version : 2.8.0+dfsg1-7+wheezy7
CVE ID : CVE-2016-4658 CVE-2016-5131

CVE-2016-4658
Namespace nodes must be copied to avoid use-after-free errors.
But they don't necessarily have a physical representation in a
document, so simply disallow them in XPointer ranges.

CVE-2016-5131
The old code would invoke the broken xmlXPtrRangeToFunction.
range-to isn't really a function but a special kind of
location step. Remove this function and always handle range-to
in the XPath code.
The old xmlXPtrRangeToFunction could also be abused to trigger
a use-after-free error with the potential for remote code
execution.

For Debian 7 "Wheezy", these problems have been fixed in version
2.8.0+dfsg1-7+wheezy7.

We recommend that you upgrade your libxml2 packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS