Debian 10225 Published by

The following Debian updates has been released:

[DLA 327-1] freeimage security update
[DLA 328-1] tzdata new upstream version
[DSA 3373-1] owncloud security update



[DLA 327-1] freeimage security update

Package : freeimage
Version : 3.10.0-4+deb6u1
CVE ID : CVE-2015-0852

Multiple integer underflows in PluginPCX.cpp in FreeImage 3.17.0 and
earlier allow remote attackers to cause a denial of service (heap memory
corruption) via vectors related to the height and width of a window.

[DLA 328-1] tzdata new upstream version

Package : tzdata
Version : 2015g-0+deb6u1

Upstream published version 2015g, with changes to the following
timezones compared to the current version in squeeze-lts:
- Fiji
- Fort Nelson, British Columbia
- Morroco
- Norfolk Island
- North Korea
- Turkey
- Uruguay

[DSA 3373-1] owncloud security update

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3373-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
October 18, 2015 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : owncloud
CVE ID : CVE-2015-4716 CVE-2015-4717 CVE-2015-4718 CVE-2015-5953
CVE-2015-5954 CVE-2015-6500 CVE-2015-6670 CVE-2015-7699
Debian Bug : 800126

Multiple vulnerabilities were discovered in ownCloud, a cloud storage
web service for files, music, contacts, calendars and many more. These
flaws may lead to the execution of arbitrary code, authorization bypass,
information disclosure, cross-site scripting or denial of service.

For the stable distribution (jessie), these problems have been fixed in
version 7.0.4+dfsg-4~deb8u3.

For the testing distribution (stretch), these problems have been fixed
in version 7.0.10~dfsg-2 or earlier versions.

For the unstable distribution (sid), these problems have been fixed in
version 7.0.10~dfsg-2 or earlier versions.

We recommend that you upgrade your owncloud packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/