Linux Security
    Linux Security
    Linux Security

    Debian: New icedove packages fix regression

    Date 17 Mar 2008
    Posted By LinuxSecurity Advisories
    Jesse Ruderman, Kai Engert, Martijn Wargers, Mats Palmgren and Paul Nickerson discovered crashes in the layout engine, which might allow the execution of arbitrary code.
    - ------------------------------------------------------------------------
    Debian Security Advisory DSA-1485-2                  This email address is being protected from spambots. You need JavaScript enabled to view it.                       Moritz Muehlenhoff
    March 17, 2008              
    - ------------------------------------------------------------------------
    Package        : icedove
    Vulnerability  : several
    Problem type   : remote
    Debian-specific: no
    CVE Id(s)      : CVE-2008-0412 CVE-2008-0413 CVE-2008-0414 CVE-2008-0415 CVE-2008-0416 CVE-2008-0417 CVE-2008-0418 CVE-2008-0419 CVE-2008-0591 CVE-2008-0592 CVE-2008-0593 CVE-2008-0594
    A regression has been fixed in icedove's frame handling code. For
    reference you can find the original update below:
    Several remote vulnerabilities have been discovered in the Icedove mail
    client, an unbranded version of the Thunderbird client. The Common
    Vulnerabilities and Exposures project identifies the following problems:
        Jesse Ruderman, Kai Engert, Martijn Wargers, Mats Palmgren and Paul
        Nickerson discovered crashes in the layout engine, which might allow
        the execution of arbitrary code.
        Carsten Book, Wesley Garland, Igor Bukanov, "moz_bug_r_a4", "shutdown",
        Philip Taylor and "tgirmann" discovered crashes in the Javascript
        engine, which might allow the execution of arbitrary code.
        "moz_bug_r_a4" and Boris Zbarsky discovered discovered several
        vulnerabilities in Javascript handling, which could allow
        privilege escalation.
        Gerry Eisenhaur and "moz_bug_r_a4" discovered that a directory
        traversal vulnerability in chrome: URI handling could lead to
        information disclosure.
        David Bloom discovered a race condition in the image handling of
        designMode elements, which can lead to information disclosure or
        potentially the execution of arbitrary code.
        Michal Zalewski discovered that timers protecting security-sensitive
        dialogs (which disable dialog elements until a timeout is reached)
        could be bypassed by window focus changes through Javascript.
    For the stable distribution (etch), these problems have been fixed in
    The Mozilla products in the old stable distribution (sarge) are no
    longer supported with security updates.
    We recommend that you upgrade your icedove packages.
    Upgrade instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian 4.0 (stable)
    - -------------------
    Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
    Source archives:
        Size/MD5 checksum:   641080 8da0c046148daa841941f8fdf7d3a468
        Size/MD5 checksum: 35174191 b1a02873d5e320b1a208dbffc256baee
        Size/MD5 checksum:     1934 ad83c84fbfa37e05030f04ab2beea2f0
    Architecture independent packages:
        Size/MD5 checksum:    29162 6aba3762846d6cc855b59449938897a1
        Size/MD5 checksum:    29154 02b82cfbeda2ea8ada9a0646fc5c0691
        Size/MD5 checksum:    29142 cd038ed9a2e5a6b40da1f18a5a2debc0
        Size/MD5 checksum:    29162 283d27da1071b1039ab81c9aa2dcd11d
        Size/MD5 checksum:    29138 93dd70cced9714a43b34624bc2695571
        Size/MD5 checksum:    29150 397ae77f472a060749d09ffbcd6299f6
        Size/MD5 checksum:    29162 1fa418c580e8c82435f91ecd4bf41090
        Size/MD5 checksum:    29136 b2ffd7bea2f595a1f6fdc96af8e0be87
        Size/MD5 checksum:    29148 a3a86d0d519201557f17e58d54db82fc
        Size/MD5 checksum:    29120 f318f2f878e868a74b1ead42db02fbff
    alpha architecture (DEC Alpha)
        Size/MD5 checksum:  3959884 710d3d698bf1179e55104abed949a6be
        Size/MD5 checksum:    64920 a3e95ad0027ccfc73fc8fb63e52e7484
        Size/MD5 checksum:    52788 a74420d45ab8a7ad2c435b2b54625570
        Size/MD5 checksum: 13477550 8249b008b7de20fca03a4cead73e025d
        Size/MD5 checksum:   201140 76410d580565d0e3877f34b88d68f977
        Size/MD5 checksum: 52398862 626fc104e22aa5e728495fc143c9b604
    amd64 architecture (AMD x86_64 (AMD64))
        Size/MD5 checksum: 51479922 fe1cc4dcd664e5c70d8c3394df0d61b0
        Size/MD5 checksum: 12176406 b64a56a7f9e06df18f61f00918b62946
        Size/MD5 checksum:   196168 e1b6a9ce58c58b8f14bc03cd41337e12
        Size/MD5 checksum:  3678408 ef8c2f54f89929428b6f3df2b7c17089
        Size/MD5 checksum:    52564 2a6ab2241730acdf6c3005259ef84098
        Size/MD5 checksum:    61606 b748a3852ed2568670430065a6bcf5e2
    arm architecture (ARM)
        Size/MD5 checksum:   190242 f01dc34e5354e61cb9b284513983e027
        Size/MD5 checksum:    47528 a8e89efce73f53de6675ea0bc29493dd
        Size/MD5 checksum: 10890322 f1c712ab506e05dbfcf6ed15e40ab267
        Size/MD5 checksum:  3921368 835fe66a9f284867ae50813ee52ea5b7
        Size/MD5 checksum:    59264 d116e875887ef623ea57b88b28b6ddf0
        Size/MD5 checksum: 50840090 24a227e1250d063269c58c271ebca291
    i386 architecture (Intel ia32)
        Size/MD5 checksum: 50740666 9b69293b1cbe427ed43818c1d2e18cc2
        Size/MD5 checksum:    48564 34c53bb12a93738db67d7769b67f2044
        Size/MD5 checksum:   191210 13114249b05826f62ba589e2eeac2d2a
        Size/MD5 checksum:    58590 6e1bec505bc3795924c9c6f4c63570e9
        Size/MD5 checksum: 10908406 aa36c6587227a61eb2cf9b5440671351
        Size/MD5 checksum:  3675024 95eed699227d9fbd5780c3d135a7d7d6
    ia64 architecture (Intel ia64)
        Size/MD5 checksum:    74640 c91145f299a8a2a1eb7046ea2aca52c6
        Size/MD5 checksum:  3727470 a792a88b248cb0a337ce5ca83b588422
        Size/MD5 checksum:   205256 6bcb0b58261a71e6e092d3b0058d4e7a
        Size/MD5 checksum:    59970 1c67ec1fc7b615abd19c1389582baf1f
        Size/MD5 checksum: 16555888 c50b8f8a39cc52c9c6ccd43bfd16e014
        Size/MD5 checksum: 51781970 bb9ee0dcf256a786651f84adf2358a0a
    mips architecture (MIPS (Big Endian))
        Size/MD5 checksum:  3947082 60d9ea6886588e9b41139780a903d69c
        Size/MD5 checksum:    48240 e5734152adc186470325e182d4b34f70
        Size/MD5 checksum: 11605920 2e0319113e5009c052cacc7d0307e813
        Size/MD5 checksum: 53114874 f2f4750010657a7adcf2911c57608309
        Size/MD5 checksum:    58754 6792b308b73e2150584ef6890a208552
        Size/MD5 checksum:   192942 88e0819fe73b595444f3dbd3a59232db
    mipsel architecture (MIPS (Little Endian))
        Size/MD5 checksum:  3682858 c932cc8a6829ca16e1f395b8e55fbebe
        Size/MD5 checksum: 51683616 b2813b38b94d3715df3fb42bf7c1dad9
        Size/MD5 checksum:    59210 5077fb067f758e5b9c5dfcf930cbfae2
        Size/MD5 checksum:    49522 e9ed5680a1d5ebc8afbb30d722ee6468
        Size/MD5 checksum: 11360126 2078cd56ce9db6fb6245b1a9ee276482
        Size/MD5 checksum:   192540 fdac9d9b390940dead89c96b3a730432
    powerpc architecture (PowerPC)
        Size/MD5 checksum:  3677952 a858d6b19632c1a9ae9914bc9a5adc5b
        Size/MD5 checksum: 53293566 63c20de9258639ff550589c12af40f8b
        Size/MD5 checksum:    60974 9f9e242dfbfbe84cde06b7b661fe0728
        Size/MD5 checksum: 11805570 d15eac8917db32cb04a8eac9d73a9c17
        Size/MD5 checksum:   193224 38fd2de7e4b8df743acb2217e54f8b04
        Size/MD5 checksum:    50124 61db63cfe9242e8379579bc3fcc32e88
    s390 architecture (IBM S/390)
        Size/MD5 checksum:    62754 19a0e3377467c5a1e5fd53a5cd5070d4
        Size/MD5 checksum:  3681554 395ed68c790698f0fcb30081ad1f9ea0
        Size/MD5 checksum:    53184 9076795f592696f61c34c53ce29e1ebc
        Size/MD5 checksum: 12835828 4d1137bbec37f67601f2a7eae99857b9
        Size/MD5 checksum: 52154562 fc8a7b1ff7d7f9cae755629cd19dab80
        Size/MD5 checksum:   197916 f7832e2b34d9142799b992794753aac4
    sparc architecture (Sun SPARC/UltraSPARC)
        Size/MD5 checksum: 50636782 35d513348d5dda2d7f4c682a7f3f639f
        Size/MD5 checksum:   190740 0b9a1afa87b0bb0e0bc3fa48d9e3e0bb
        Size/MD5 checksum:  3671694 d890eeed08ecb1f0eeeff46f09bdeea3
        Size/MD5 checksum: 11116804 ddb8b828546498479a3fddd718a0633c
        Size/MD5 checksum:    58654 35ee94e3ae7339f642ffce1fa42a7c29
        Size/MD5 checksum:    48644 147aa5f5592ba08bc7f2ec42453a6104
      These files will probably be moved into the stable distribution on
      its next update.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"11","type":"x","order":"1","pct":34.38,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"6","type":"x","order":"2","pct":18.75,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"15","type":"x","order":"3","pct":46.88,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.