The following Debian updates are available:
[DSA 2808-2] openjpeg regression update
[DSA 2911-1] icedove security update
[DSA 2808-2] openjpeg regression update
[DSA 2911-1] icedove security update
[DSA 2808-2] openjpeg regression update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-2808-2 security@debian.org
http://www.debian.org/security/ Raphael Geissert
April 22, 2014 http://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : openjpeg
A regression in the decoding of chroma-subsampled images in OpenJPEG
was introduced by one of the patches for CVE-2013-6045. This update
fixes the regression.
For reference, the original text of DSA-2808-1 is reproduced below:
Several vulnerabilities have been discovered in OpenJPEG, a JPEG 2000
image library, that may lead to denial of service (CVE-2013-1447) via
application crash or high memory consumption, possible code execution
through heap buffer overflows (CVE-2013-6045), information disclosure
(CVE-2013-6052), or yet another heap buffer overflow that only appears
to affect OpenJPEG 1.3 (CVE-2013-6054).
For the oldstable distribution (squeeze), this problem has been fixed in
version 1.3+dfsg-4+squeeze3.
For the stable distribution (wheezy), this problem has been fixed in
version 1.3+dfsg-4.8.
We recommend that you upgrade your openjpeg packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/
[DSA 2911-1] icedove security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-2911-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
April 22, 2014 http://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : icedove
CVE ID : CVE-2014-1493 CVE-2014-1497 CVE-2014-1505 CVE-2014-1508
CVE-2014-1510 CVE-2014-1511 CVE-2014-1512 CVE-2014-1513
CVE-2014-1514
Multiple security issues have been found in Icedove, Debian's version of
the Mozilla Thunderbird mail and news client. Multiple memory safety
errors, out of bound reads, use-after-frees and other implementation
errors may lead to the execution of arbitrary code, information
disclosure or denial of service.
For the stable distribution (wheezy), these problems have been fixed in
version 24.4.0-1~deb7u1. This updates Icedove to the Extended Support
Release (ESR) branch 24. An updated and compatible version of Enigmail
is included with this update.
For the testing distribution (jessie), these problems have been fixed in
version 24.4.0esr-1.
For the unstable distribution (sid), these problems have been fixed in
version 24.4.0esr-1.
We recommend that you upgrade your icedove packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/