[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DSA 3510-1] iceweasel security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3510-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
March 09, 2016                        https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : iceweasel
CVE ID         : CVE-2016-1950 CVE-2016-1952 CVE-2016-1954 CVE-2016-1957 
                 CVE-2016-1958 CVE-2016-1960 CVE-2016-1961 CVE-2016-1962
                 CVE-2016-1964 CVE-2016-1965 CVE-2016-1966 CVE-2016-1974
                 CVE-2016-1977 CVE-2016-2790 CVE-2016-2791 CVE-2016-2792
                 CVE-2016-2793 CVE-2016-2794 CVE-2016-2795 CVE-2016-2796
                 CVE-2016-2797 CVE-2016-2798 CVE-2016-2799 CVE-2016-2800
                 CVE-2016-2801 CVE-2016-2802

Multiple security issues have been found in Iceweasel, Debian's version
of the Mozilla Firefox web browser: Multiple memory safety errors,
buffer overflows, use-after-frees and other implementation errors may
lead to the execution of arbitrary code, denial of service, address bar
spoofing and overwriting local files.

For the oldstable distribution (wheezy), these problems have been fixed
in version 38.7.0esr-1~deb7u1.

For the stable distribution (jessie), these problems have been fixed in
version 38.7.0esr-1~deb8u1.

For the unstable distribution (sid), Debian is in the process of moving
back towards using the Firefox name. These problems will soon be fixed
in the firefox-esr source package.

We recommend that you upgrade your iceweasel packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=pcAG
-----END PGP SIGNATURE-----


Reply to: