[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20090914171650.GA20429@galadriel.inutil.org>
Date: Mon, 14 Sep 2009 19:16:50 +0200
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 1886-1] New iceweasel packages fix several vulnerabilities
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- ------------------------------------------------------------------------
Debian Security Advisory DSA-1886-1 security@...ian.org
http://www.debian.org/security/ Moritz Muehlenhoff
September 14, 2009 http://www.debian.org/security/faq
- ------------------------------------------------------------------------
Package : iceweasel
Vulnerability : several
Problem type : remote
Debian-specific: no
CVE Id(s) : CVE-2009-1310 CVE-2009-3079
Several remote vulnerabilities have been discovered in the Iceweasel web
browser, an unbranded version of the Firefox browser. The Common
Vulnerabilities and Exposures project identifies the following problems:
CVE-2009-3079
"moz_bug_r_a4" discovered that a programming error in the FeedWriter
module could lead to the execution of Javascript code with elevated
privileges.
CVE-2009-1310
Prateek Saxena discovered a cross-site scripting vulnerability in
the MozSearch plugin interface.
For the stable distribution (lenny), these problems have been fixed in
version 3.0.6-3.
As indicated in the Etch release notes, security support for the
Mozilla products in the oldstable distribution needed to be stopped
before the end of the regular Etch security maintenance life cycle.
You are strongly encouraged to upgrade to stable or switch to a still
supported browser.
For the unstable distribution (sid), these problems have been fixed in
version 3.0.14-1.
For the experimental distribution, these problems have been fixed in
version 3.5.3-1.
We recommend that you upgrade your iceweasel packages.
Upgrade instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 5.0 alias lenny
- --------------------------------
Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
Source archives:
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_3.0.6.orig.tar.gz
Size/MD5 checksum: 43638341 123875f8a441c8dc950088229a23af8e
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_3.0.6-3.dsc
Size/MD5 checksum: 1352 12684eeb2239d0e12b736140cbc7f970
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_3.0.6-3.diff.gz
Size/MD5 checksum: 159783 ca3ee1ad4a9fa69288208e5409d915d6
Architecture independent packages:
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_3.0.6-3_all.deb
Size/MD5 checksum: 68942 32d1b0b1fa5320ace47f863a8d73698b
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_3.0.6-3_alpha.deb
Size/MD5 checksum: 435752 4f1f3bab9a0249a2c2675def1e2486d5
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_3.0.6-3_alpha.deb
Size/MD5 checksum: 1163948 65f8c23d44cd0e107e240d9cf340b1ba
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_3.0.6-3_amd64.deb
Size/MD5 checksum: 432332 05fc420b5d153046dff84e114bfef28b
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_3.0.6-3_amd64.deb
Size/MD5 checksum: 1142034 59351920cef676904d991be488e09e0c
arm architecture (ARM)
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_3.0.6-3_arm.deb
Size/MD5 checksum: 423356 99b03476daadb9bb7a1d4a70e765f659
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_3.0.6-3_arm.deb
Size/MD5 checksum: 1130994 1a5f67c727c5c58a48319c9c0279a808
armel architecture (ARM EABI)
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_3.0.6-3_armel.deb
Size/MD5 checksum: 429092 208d4fa68daf2ca9c746f431ce2e9756
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_3.0.6-3_armel.deb
Size/MD5 checksum: 1132786 9f744b400706d3091f09a5f2cc5e3b4c
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_3.0.6-3_hppa.deb
Size/MD5 checksum: 435772 c5d7f8f7dcd5276bc0646f7e8a35d3e1
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_3.0.6-3_hppa.deb
Size/MD5 checksum: 1169756 cdb9c075d664b926f7dc62fbff8b0727
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_3.0.6-3_i386.deb
Size/MD5 checksum: 420584 2aeb1ad62ab939d7498be272a4a575a5
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_3.0.6-3_i386.deb
Size/MD5 checksum: 1131612 bcc6ca219fbb55a5bd20611b02063df4
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_3.0.6-3_ia64.deb
Size/MD5 checksum: 1199118 ae72d8c7431c381cf79ad12c0360ead5
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_3.0.6-3_ia64.deb
Size/MD5 checksum: 436604 cf93b9ef796cdf4cbf0fc72cab93c7da
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_3.0.6-3_mips.deb
Size/MD5 checksum: 1144732 c764b1ed2063a6dc4f98d65cc0639363
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_3.0.6-3_mips.deb
Size/MD5 checksum: 438148 552153b0da7f50524c3ee7823850c78a
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_3.0.6-3_mipsel.deb
Size/MD5 checksum: 429616 8fd200e19225a042abff6cdcadc6bb9b
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_3.0.6-3_mipsel.deb
Size/MD5 checksum: 1141736 c379eec5c0e2d37840085673b575d697
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_3.0.6-3_powerpc.deb
Size/MD5 checksum: 1136472 2e6082a6e03021adaad594a32b023fc2
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_3.0.6-3_powerpc.deb
Size/MD5 checksum: 436634 1d0edb2a7c17793192d4f02bf70e9548
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_3.0.6-3_s390.deb
Size/MD5 checksum: 429556 f384b41f0d382cb5667d43eabae592ca
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_3.0.6-3_s390.deb
Size/MD5 checksum: 1153486 b8f5172db08bc8f65d4eb316fdccdfa4
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_3.0.6-3_sparc.deb
Size/MD5 checksum: 412450 5f5fe48af9929dab6570991536f70857
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_3.0.6-3_sparc.deb
Size/MD5 checksum: 1132022 e5f5be8a294d71007886daffcad713f5
These files will probably be moved into the stable distribution on
its next update.
- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@...ts.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAkquegAACgkQXm3vHE4uylpcmgCfSBMzUdIvfgRvQNew2qzdIc2q
/VYAnijrV8nYxEVdlR/1KBd1EBdeotMQ
=JYHV
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists