The following updates has been released for Debian GNU/Linux:
Debian GNU/Linux 7 LTS:
DLA 1100-1: gdk-pixbuf security update
Debian GNU/Linux 8 and 9:
DSA 3979-1: pyjwt security update
Debian GNU/Linux 7 LTS:
DLA 1100-1: gdk-pixbuf security update
Debian GNU/Linux 8 and 9:
DSA 3979-1: pyjwt security update
DLA 1100-1: gdk-pixbuf security update
Package : gdk-pixbuf
Version : 2.26.1-1+deb7u6
CVE ID : CVE-2017-2862
Debian Bug : 874552
Marcin Noga discovered a buffer overflow in the JPEG loader of the GDK
Pixbuf library, which may result in the execution of arbitrary code if
a malformed file is opened.
For Debian 7 "Wheezy", these problems have been fixed in version
2.26.1-1+deb7u6.
We recommend that you upgrade your gdk-pixbuf packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
DSA 3979-1: pyjwt security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3979-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
September 19, 2017 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : pyjwt
CVE ID : CVE-2017-11424
It was discovered that PyJWT, a Python implementation of JSON Web Token
performed insufficient validation of some public key types, which could
allow a remote attacker to craft JWTs from scratch.
For the oldstable distribution (jessie), this problem has been fixed
in version 0.2.1-1+deb8u2.
For the stable distribution (stretch), this problem has been fixed in
version 1.4.2-1+deb9u1.
We recommend that you upgrade your pyjwt packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/