Bugtraq: [SECURITY] [DSA 3600-1] iceweasel/firefox-esr security update

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA256

- ------------------------------------------------------------------------

-

Debian Security Advisory DSA-3600-1 security (at) debian (dot) org [email concealed]

http://ift.tt/1kZ5swi Moritz Muehlenhoff

June 09, 2016 http://ift.tt/1S3Txy1

- ------------------------------------------------------------------------

-

Package : firefox-esr

CVE ID : CVE-2016-2818 CVE-2016-2819 CVE-2016-2821 CVE-2016-2822

CVE-2016-2828 CVE-2016-2831

Multiple security issues have been found in the Mozilla Firefox web

browser: Multiple memory safety errors, buffer overflows and other

implementation errors may lead to the execution of arbitrary code or

spoofing.

Wait, Firefox? No more references to Iceweasel? That's right, Debian no

longer applies a custom branding. Please see these links for further

information:

http://ift.tt/1TOk3Qb

http://ift.tt/1TxO31T

Debian follows the extended support releases (ESR) of Firefox. Support

for the 38.x series has ended, so starting with this update we're now

following the 45.x releases and this update to the next ESR is also the

point where we reapply the original branding.

Transition packages for the iceweasel packages are provided which

automatically upgrade to the new version. Since new binary packages need

to be installed, make sure to allow that in your upgrade procedure (e.g.

by using "apt-get dist-upgrade" instead of "apt-get upgrade").

For the stable distribution (jessie), these problems have been fixed in

version 45.2.0esr-1~deb8u1.

For the unstable distribution (sid), these problems have been fixed in

version 45.2.0esr-1.

We recommend that you upgrade your firefox-esr packages.

Further information about Debian Security Advisories, how to apply

these updates to your system and frequently asked questions can be

found at: http://ift.tt/1kZ5swi

Mailing list: debian-security-announce (at) lists.debian (dot) org [email concealed]

-----BEGIN PGP SIGNATURE-----

Version: GnuPG v2

iQIcBAEBCAAGBQJXWdEpAAoJEBDCk7bDfE42cWcP/1QiyaD48+R+Fw33XpPLFMoo

SLDVGAcjVVS4cXLPSOW23noxTn1rfB5/woCNDg6ojjiGCE+vWm6S1xSY2fU4SRfL

mkHdAQYN/vk0tgnyLs2l2VMvvJw3lyRnACitcU1OsfFdn9wq7tgtgM+fdl7hJ9zE

Nza4bXAuBDV4b01GXHLkHCVuh7lcJhRGu2gqzQXs2HsZBo12YYVMiwdpxNxzZDzx

e06bMzW2TEWlk0YfjEA3EI5FQCENo7/qemqSe+4mlTUguT2YlLR56CTV5tbR+DGq

jvxmKdwwcytyZJn2n4Yft5CafQfJbp928gSivMUvvMccTmgVH9FFtNbPI213tn05

TU2IzIFLZ+za/Kv1FirU6wZ/nXZFgJBIsd2w9K2fdM4uMQqvESLopxtw0VPxxSlV

SmF07ONx1Yu9gsJcoVIy/nCbP0F9EtE0NA8cak1KE5in9Q5PCXRzQeDOlP3g93Fo

2FiH3sp6U8aJKBZaNnFJ1qfaWqbMO3vQu7hjj49kOpIHgWEOrpDTeEAvk+PXleMt

WExEmzcbfXAmuEiLFmQd+BxR6yd6JyofnapxuThBqHq51grxAdW3gldrK8gPvpFd

1iKkY4w1wTcv8VkRhG0ErJa2B9DEWSAanI7WLMjoE4Vd2Buq4qjNpICWYkDdEvSu

B2yCw5JgXx8eHngKUCDJ

=RYDx

-----END PGP SIGNATURE-----

[ reply ]


from SecurityFocus Vulnerabilities http://ift.tt/1VPOlBZ