The following updates are available for Debian 7 LTS:
[DLA 690-1] tar security update
[DLA 691-1] libxml2 security update
[DLA 690-1] tar security update
[DLA 691-1] libxml2 security update
[DLA 690-1] tar security update
Package : tar
Version : 1.26+dfsg-0.1+deb7u1
CVE ID : CVE-2016-6321
Debian Bug : 842339
A vulnerability has been discovered in the tar package that could allow
an attacker to overwrite arbitrary files through crafted files.
For Debian 7 "Wheezy", these problems have been fixed in version
1.26+dfsg-0.1+deb7u1.
We recommend that you upgrade your tar packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
[DLA 691-1] libxml2 security update
Package : libxml2
Version : 2.8.0+dfsg1-7+wheezy7
CVE ID : CVE-2016-4658 CVE-2016-5131
CVE-2016-4658
Namespace nodes must be copied to avoid use-after-free errors.
But they don't necessarily have a physical representation in a
document, so simply disallow them in XPointer ranges.
CVE-2016-5131
The old code would invoke the broken xmlXPtrRangeToFunction.
range-to isn't really a function but a special kind of
location step. Remove this function and always handle range-to
in the XPath code.
The old xmlXPtrRangeToFunction could also be abused to trigger
a use-after-free error with the potential for remote code
execution.
For Debian 7 "Wheezy", these problems have been fixed in version
2.8.0+dfsg1-7+wheezy7.
We recommend that you upgrade your libxml2 packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS