lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 4 Nov 2015 19:41:55 +0100
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3393-1] iceweasel security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3393-1                   security@...ian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
November 04, 2015                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : iceweasel
CVE ID         : CVE-2015-4513 CVE-2015-7181 CVE-2015-7182 CVE-2015-7183 
                 CVE-2015-7188 CVE-2015-7189 CVE-2015-7193 CVE-2015-7194
                 CVE-2015-7196 CVE-2015-7197 CVE-2015-7198 CVE-2015-7199
                 CVE-2015-7200

Multiple security issues have been found in Iceweasel, Debian's version
of the Mozilla Firefox web browser: Multiple memory safety errors,
integer overflows, buffer overflows and other implementation errors may
lead to the execution of arbitrary code, information disclosure or
denial of service.

For the oldstable distribution (wheezy), these problems have been fixed
in version 38.4.0esr-1~deb7u1.

For the stable distribution (jessie), these problems have been fixed in
version 38.4.0esr-1~deb8u1.

For the unstable distribution (sid), these problems have been fixed in
version 38.4.0esr-1.

We recommend that you upgrade your iceweasel packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=6psN
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux - Powered by OpenVZ