lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 19 Mar 2014 15:43:46 +0100
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 2881-1] iceweasel security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-2881-1                   security@...ian.org
http://www.debian.org/security/                        Moritz Muehlenhoff
March 19, 2014                         http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : iceweasel
CVE ID         : CVE-2014-1493 CVE-2014-1497 CVE-2014-1505 CVE-2014-1508 
                 CVE-2014-1510 CVE-2014-1511 CVE-2014-1512 CVE-2014-1513 
                 CVE-2014-1514

Multiple security issues have been found in Iceweasel, Debian's version
of the Mozilla Firefox web browser: Multiple memory safety errors, out of
bound reads, use-after-frees and other implementation errors may lead to
the execution of arbitrary code, information disclosure, denial of
service.

For the stable distribution (wheezy), these problems have been fixed in
version 24.4.0esr-1~deb7u2.

For the unstable distribution (sid), these problems have been fixed in
version 24.4.0esr-1.

We recommend that you upgrade your iceweasel packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=oh+R
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ