Debian 10203 Published by

The following updates has been released for Debian:

[DSA 2922-1] strongswan security update
[DSA 2923-1] openjdk-7 security update
[DSA 2924-1] icedove security update



[DSA 2922-1] strongswan security update

- -------------------------------------------------------------------------
Debian Security Advisory DSA-2922-1 security@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
May 05, 2014 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : strongswan
CVE ID : CVE-2014-2891

A vulnerability has been found in the ASN.1 parser of strongSwan, an
IKE/IPsec suite used to establish IPsec protected links.

By sending a crafted ID_DER_ASN1_DN ID payload to a vulnerable pluto or
charon daemon, a malicious remote user can provoke a null pointer
dereference in the daemon parsing the identity, leading to a crash and a
denial of service.

For the oldstable distribution (squeeze), this problem has been fixed in
version 4.4.1-5.6.

For the stable distribution (wheezy), this problem has been fixed in
version 4.5.2-1.5+deb7u4.

For the testing distribution (jessie), this problem has been fixed in
version 5.1.2-1.

For the unstable distribution (sid), this problem has been fixed in
version 5.1.2-1.

We recommend that you upgrade your strongswan packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

[DSA 2923-1] openjdk-7 security update

- -------------------------------------------------------------------------
Debian Security Advisory DSA-2923-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
May 05, 2014 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : openjdk-7
CVE ID : CVE-2013-6629 CVE-2013-6954 CVE-2014-0429 CVE-2014-0446
CVE-2014-0451 CVE-2014-0452 CVE-2014-0453 CVE-2014-0454
CVE-2014-0455 CVE-2014-0456 CVE-2014-0457 CVE-2014-0458
CVE-2014-0459 CVE-2014-0460 CVE-2014-0461 CVE-2014-1876
CVE-2014-2397 CVE-2014-2398 CVE-2014-2402 CVE-2014-2403
CVE-2014-2412 CVE-2014-2413 CVE-2014-2414 CVE-2014-2421
CVE-2014-2423 CVE-2014-2427

Several vulnerabilities have been discovered in OpenJDK, an
implementation of the Oracle Java platform, resulting in the execution
of arbitrary code, breakouts of the Java sandbox, information disclosure
or denial of service.

For the stable distribution (wheezy), these problems have been fixed in
version 7u55-2.4.7-1~deb7u1.

For the unstable distribution (sid), these problems have been fixed in
version 7u55-2.4.7-1.

We recommend that you upgrade your openjdk-7 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

[DSA 2924-1] icedove security update

- -------------------------------------------------------------------------
Debian Security Advisory DSA-2924-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
May 05, 2014 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : icedove
CVE ID : CVE-2014-1518 CVE-2014-1523 CVE-2014-1524 CVE-2014-1529
CVE-2014-1530 CVE-2014-1531 CVE-2014-1532

Multiple security issues have been found in Icedove, Debian's version
of the Mozilla Thunderbird mail and news client: Multiple memory safety
errors, buffer overflows, missing permission checks, out of bound reads,
use-after-frees and other implementation errors may lead to the
execution of arbitrary code, privilege escalation, cross-site scripting
or denial of service.

For the stable distribution (wheezy), these problems have been fixed in
version 24.5.0-1~deb7u1.

For the testing distribution (jessie), these problems have been fixed in
version 24.5.0-1.

For the unstable distribution (sid), these problems have been fixed in
version 24.5.0-1.

We recommend that you upgrade your icedove packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/