lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20161116212757.6d6okljuofh6rpfm@pisco.westfalen.local>
Date: Wed, 16 Nov 2016 22:27:57 +0100
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3716-1] firefox-esr security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3716-1                   security@...ian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
November 16, 2016                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : firefox-esr
CVE ID         : CVE-2016-5290 CVE-2016-5291 CVE-2016-5296 CVE-2016-5297 
                 CVE-2016-9064 CVE-2016-9066 CVE-2016-9074

Multiple security issues have been found in the Mozilla Firefox web
browser: Multiple memory safety errors, buffer overflows and other
implementation errors may lead to the execution of arbitrary code or
bypass of the same-origin policy. Also, a man-in-the-middle attack in
the addon update mechanism has been fixed.

For the stable distribution (jessie), these problems have been fixed in
version 45.5.0esr-1~deb8u1.

For the unstable distribution (sid), these problems have been fixed in
version 45.5.0esr-1 and version 50.0-1 of the firefox source package.

We recommend that you upgrade your firefox-esr packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
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=aNFP
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ