it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Salvatore Bonaccorso <carnil AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 3345-1] iceweasel security update
- Date: Sat, 29 Aug 2015 04:45:33 +0000
- List-archive: <https://service.piratenpartei.de/pipermail/it-securitynotifies>
- List-id: Sicherheitsankündigungen <it-securitynotifies.lists.piratenpartei.de>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-return-path: <carnil AT master.debian.org>
- Priority: urgent
- Resent-date: Sat, 29 Aug 2015 04:45:51 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <MY4SlZprVzP.A.EP._jT4VB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3345-1 security AT debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
August 29, 2015 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : iceweasel
CVE ID : CVE-2015-4497 CVE-2015-4498
Multiple security issues have been found in Iceweasel, Debian's version
of the Mozilla Firefox web browser. The Common Vulnerabilities and
Exposures project identifies the following problems:
CVE-2015-4497
Jean-Max Reymond and Ucha Gobejishvili discovered a use-after-free
vulnerability which occurs when resizing of a canvas element is
triggered in concert with style changes. A web page containing
malicious content can cause Iceweasel to crash, or potentially,
execute arbitrary code with the privileges of the user running
Iceweasel.
CVE-2015-4498
Bas Venis reported a flaw in the handling of add-ons installation. A
remote attacker can take advantage of this flaw to bypass the add-on
installation prompt and trick a user into installing an add-on from
a malicious source.
For the oldstable distribution (wheezy), these problems have been fixed
in version 38.2.1esr-1~deb7u1.
For the stable distribution (jessie), these problems have been fixed in
version 38.2.1esr-1~deb8u1.
For the unstable distribution (sid), these problems have been fixed in
version 38.2.1esr-1.
We recommend that you upgrade your iceweasel packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=tzb9
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 3345-1] iceweasel security update, Salvatore Bonaccorso, 29.08.2015
Archiv bereitgestellt durch MHonArc 2.6.19.