Debian 10228 Published by

The following updates has been released for Debian GNU/Linux:

Debian GNU/Linux 7 Extended LTS:
ELA-100-1 tiff3 security update

Debian GNU/Linux 8:
DLA 1733-1: wpa security update



ELA-100-1 tiff3 security update

Package: tiff3
Version: 3.9.6-11+deb7u14
Related CVE: CVE-2018-5360
A vulnerability has been discovered in tiff3, an older implementation of the libtiff library providing support for the Tag Image File Format (TIFF), a widely used format for storing image data. Mishandling the reading of TIFF files has been demonstrated by a heap-based buffer over-read in the ReadTIFFImage function in coders/tiff.c in GraphicsMagick.

For Debian 7 Wheezy, these problems have been fixed in version 3.9.6-11+deb7u14.

We recommend that you upgrade your tiff3 packages.

Further information about Extended LTS security advisories can be found at: https://deb.freexian.com/extended-lts/

DLA 1733-1: wpa security update




Package : wpa
Version : 2.3-1+deb8u7
CVE ID : CVE-2016-10743

It was found that the fallback mechanism for generating a WPS pin in
hostapd, an IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP Authenticator,
used a low quality pseudorandom number generator. This was resolved by
using only the high quality os_get_random function.

For Debian 8 "Jessie", this problem has been fixed in version
2.3-1+deb8u7.

We recommend that you upgrade your wpa packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS