[SECURITY] [DSA 3600-1] iceweasel/firefox-esr security update

Fabricante: Debian
Fecha: 09/06/2016
Identificador: DSA 3600-1
[SECURITY] [DSA 3600-1] iceweasel/firefox-esr security update
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3600-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff June 09, 2016 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : firefox-esr CVE ID : CVE-2016-2818 CVE-2016-2819 CVE-2016-2821 CVE-2016-2822 CVE-2016-2828 CVE-2016-2831 Multiple security issues have been found in the Mozilla Firefox web browser: Multiple memory safety errors, buffer overflows and other implementation errors may lead to the execution of arbitrary code or spoofing. Wait, Firefox? No more references to Iceweasel? That's right, Debian no longer applies a custom branding. Please see these links for further information: https://glandium.org/blog/?p=3622 https://en.wikipedia.org/wiki/Mozilla_software_rebranded_by_Debian Debian follows the extended support releases (ESR) of Firefox. Support for the 38.x series has ended, so starting with this update we're now following the 45.x releases and this update to the next ESR is also the point where we reapply the original branding. Transition packages for the iceweasel packages are provided which automatically upgrade to the new version. Since new binary packages need to be installed, make sure to allow that in your upgrade procedure (e.g. by using "apt-get dist-upgrade" instead of "apt-get upgrade"). For the stable distribution (jessie), these problems have been fixed in version 45.2.0esr-1~deb8u1. For the unstable distribution (sid), these problems have been fixed in version 45.2.0esr-1. We recommend that you upgrade your firefox-esr packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAEBCAAGBQJXWdEpAAoJEBDCk7bDfE42cWcP/1QiyaD48+R+Fw33XpPLFMoo SLDVGAcjVVS4cXLPSOW23noxTn1rfB5/woCNDg6ojjiGCE+vWm6S1xSY2fU4SRfL mkHdAQYN/vk0tgnyLs2l2VMvvJw3lyRnACitcU1OsfFdn9wq7tgtgM+fdl7hJ9zE Nza4bXAuBDV4b01GXHLkHCVuh7lcJhRGu2gqzQXs2HsZBo12YYVMiwdpxNxzZDzx e06bMzW2TEWlk0YfjEA3EI5FQCENo7/qemqSe+4mlTUguT2YlLR56CTV5tbR+DGq jvxmKdwwcytyZJn2n4Yft5CafQfJbp928gSivMUvvMccTmgVH9FFtNbPI213tn05 TU2IzIFLZ+za/Kv1FirU6wZ/nXZFgJBIsd2w9K2fdM4uMQqvESLopxtw0VPxxSlV SmF07ONx1Yu9gsJcoVIy/nCbP0F9EtE0NA8cak1KE5in9Q5PCXRzQeDOlP3g93Fo 2FiH3sp6U8aJKBZaNnFJ1qfaWqbMO3vQu7hjj49kOpIHgWEOrpDTeEAvk+PXleMt WExEmzcbfXAmuEiLFmQd+BxR6yd6JyofnapxuThBqHq51grxAdW3gldrK8gPvpFd 1iKkY4w1wTcv8VkRhG0ErJa2B9DEWSAanI7WLMjoE4Vd2Buq4qjNpICWYkDdEvSu B2yCw5JgXx8eHngKUCDJ =RYDx -----END PGP SIGNATURE-----