The following updates has been released for Debian GNU/Linux:
Debian GNU/Linux 7 Extended LTS:
ELA-100-1 tiff3 security update
Debian GNU/Linux 8:
DLA 1733-1: wpa security update
Debian GNU/Linux 7 Extended LTS:
ELA-100-1 tiff3 security update
Debian GNU/Linux 8:
DLA 1733-1: wpa security update
ELA-100-1 tiff3 security update
Package: tiff3
Version: 3.9.6-11+deb7u14
Related CVE: CVE-2018-5360
A vulnerability has been discovered in tiff3, an older implementation of the libtiff library providing support for the Tag Image File Format (TIFF), a widely used format for storing image data. Mishandling the reading of TIFF files has been demonstrated by a heap-based buffer over-read in the ReadTIFFImage function in coders/tiff.c in GraphicsMagick.
For Debian 7 Wheezy, these problems have been fixed in version 3.9.6-11+deb7u14.
We recommend that you upgrade your tiff3 packages.
Further information about Extended LTS security advisories can be found at: https://deb.freexian.com/extended-lts/
DLA 1733-1: wpa security update
Package : wpa
Version : 2.3-1+deb8u7
CVE ID : CVE-2016-10743
It was found that the fallback mechanism for generating a WPS pin in
hostapd, an IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP Authenticator,
used a low quality pseudorandom number generator. This was resolved by
using only the high quality os_get_random function.
For Debian 8 "Jessie", this problem has been fixed in version
2.3-1+deb8u7.
We recommend that you upgrade your wpa packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS