-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA256- -------------------------------------------------------------------------Debian Security Advisory DSA-3600-1 security (at) debian (dot) org [email concealed]http://ift.tt/1kZ5swi Moritz MuehlenhoffJune 09, 2016 http://ift.tt/1S3Txy1- -------------------------------------------------------------------------Package : firefox-esrCVE ID : CVE-2016-2818 CVE-2016-2819 CVE-2016-2821 CVE-2016-2822CVE-2016-2828 CVE-2016-2831Multiple security issues have been found in the Mozilla Firefox webbrowser: Multiple memory safety errors, buffer overflows and otherimplementation errors may lead to the execution of arbitrary code orspoofing.Wait, Firefox? No more references to Iceweasel? That's right, Debian nolonger applies a custom branding. Please see these links for furtherinformation:http://ift.tt/1TOk3Qbhttp://ift.tt/1TxO31TDebian follows the extended support releases (ESR) of Firefox. Supportfor the 38.x series has ended, so starting with this update we're nowfollowing the 45.x releases and this update to the next ESR is also thepoint where we reapply the original branding.Transition packages for the iceweasel packages are provided whichautomatically upgrade to the new version. Since new binary packages needto be installed, make sure to allow that in your upgrade procedure (e.g.by using "apt-get dist-upgrade" instead of "apt-get upgrade").For the stable distribution (jessie), these problems have been fixed inversion 45.2.0esr-1~deb8u1.For the unstable distribution (sid), these problems have been fixed inversion 45.2.0esr-1.We recommend that you upgrade your firefox-esr packages.Further information about Debian Security Advisories, how to applythese updates to your system and frequently asked questions can befound at: http://ift.tt/1kZ5swiMailing list: debian-security-announce (at) lists.debian (dot) org [email concealed]-----BEGIN PGP SIGNATURE-----Version: GnuPG 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RYDx-----END PGP SIGNATURE-----[ reply ]from SecurityFocus Vulnerabilities http://ift.tt/1VPOlBZ
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3600-1 security (at) debian (dot) org [email concealed]
http://ift.tt/1kZ5swi Moritz Muehlenhoff
June 09, 2016 http://ift.tt/1S3Txy1
- ------------------------------------------------------------------------
-
Package : firefox-esr
CVE ID : CVE-2016-2818 CVE-2016-2819 CVE-2016-2821 CVE-2016-2822
CVE-2016-2828 CVE-2016-2831
Multiple security issues have been found in the Mozilla Firefox web
browser: Multiple memory safety errors, buffer overflows and other
implementation errors may lead to the execution of arbitrary code or
spoofing.
Wait, Firefox? No more references to Iceweasel? That's right, Debian no
longer applies a custom branding. Please see these links for further
information:
http://ift.tt/1TOk3Qb
http://ift.tt/1TxO31T
Debian follows the extended support releases (ESR) of Firefox. Support
for the 38.x series has ended, so starting with this update we're now
following the 45.x releases and this update to the next ESR is also the
point where we reapply the original branding.
Transition packages for the iceweasel packages are provided which
automatically upgrade to the new version. Since new binary packages need
to be installed, make sure to allow that in your upgrade procedure (e.g.
by using "apt-get dist-upgrade" instead of "apt-get upgrade").
For the stable distribution (jessie), these problems have been fixed in
version 45.2.0esr-1~deb8u1.
For the unstable distribution (sid), these problems have been fixed in
version 45.2.0esr-1.
We recommend that you upgrade your firefox-esr packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://ift.tt/1kZ5swi
Mailing list: debian-security-announce (at) lists.debian (dot) org [email concealed]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2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=RYDx
-----END PGP SIGNATURE-----
[ reply ]