Debian 10225 Published by

The following Debian updates has been released:

[DLA 896-1] icedove/thunderbird security update
[DLA 902-1] imagemagick security update
[DSA 3830-1] icu security update



[DLA 896-1] icedove/thunderbird security update

Package : icedove
Version : 1:45.8.0-3~deb7u1
CVE ID : CVE-2017-5373 CVE-2017-5375 CVE-2017-5376 CVE-2017-5378
CVE-2017-5380 CVE-2017-5383 CVE-2017-5390 CVE-2017-5396
CVE-2017-5398 CVE-2017-5400 CVE-2017-5401 CVE-2017-5402
CVE-2017-5404 CVE-2017-5405 CVE-2017-5407 CVE-2017-5408
CVE-2017-5410

Multiple security issues have been found in the Mozilla Thunderbird mail
client: Multiple memory safety errors, buffer overflows and other
implementation errors may lead to the execution of arbitrary code or spoofing.

With version 45.8 Debian drops it's custom branding from the Icedove package
and ships the mail client as Thunderbird again. Please see the link below for
further information:
https://wiki.debian.org/Thunderbird

Transition packages for the Icedove packages are provided which
automatically upgrade to the new version. Since new binary packages need
to be installed, make sure to allow that in your upgrade procedure (e.g.
by using "apt-get dist-upgrade" instead of "apt-get upgrade").

For Debian 7 "Wheezy", these problems have been fixed in version
1:45.8.0-3~deb7u1.

We recommend that you upgrade your icedove packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


[DLA 902-1] imagemagick security update

Package : imagemagick
Version : 8:6.7.7.10-5+deb7u13
CVE ID : CVE-2017-7606 CVE-2017-7619
Debian Bug : 859771 859769

Two security vulnerabilities were discovered in imagemagick that allow
remote attackers to cause a denial of service (application crash and
infinite loop) or possibly other unspecified impact via a crafted image.

For Debian 7 "Wheezy", these problems have been fixed in version
8:6.7.7.10-5+deb7u13.

We recommend that you upgrade your imagemagick packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

[DSA 3830-1] icu security update

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3830-1 security@debian.org
https://www.debian.org/security/ Sebastien Delafond
April 19, 2017 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : icu
CVE ID : CVE-2017-7867 CVE-2017-7868
Debian Bug : 860314

It was discovered that icu, the International Components for Unicode
library, did not correctly validate its input. An attacker could use
this problem to trigger an out-of-bound write through a heap-based
buffer overflow, thus causing a denial of service via application
crash, or potential execution of arbitrary code.

For the stable distribution (jessie), these problems have been fixed in
version 52.1-8+deb8u5.

For the upcoming stable (stretch) and unstable (sid) distributions,
these problems have been fixed in version 57.1-6.

We recommend that you upgrade your icu packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/