Operating System:

[Debian]

Published:

15 January 2015

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2015.0098
                         iceweasel security update
                              15 January 2015

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           iceweasel
Publisher:         Debian
Operating System:  Debian GNU/Linux 7
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
                   Access Confidential Data        -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-8641 CVE-2014-8639 CVE-2014-8638
                   CVE-2014-8634  

Reference:         ASB-2015.0004
                   ESB-2015.0097
                   ESB-2015.0096

Original Bulletin: 
   http://www.debian.org/security/2014/dsa-3127

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-3127-1                   security@debian.org
http://www.debian.org/security/                        Moritz Muehlenhoff
January 14, 2015                       http://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : iceweasel
CVE ID         : CVE-2014-8634 CVE-2014-8638 CVE-2014-8639 CVE-2014-8641

Multiple security issues have been found in Iceweasel, Debian's version 
of the Mozilla Firefox web browser: Multiple memory safety errors
and implementation errors may lead to the execution of arbitrary code, 
information leaks or denial of service.

For the stable distribution (wheezy), these problems have been fixed in
version 31.4.0esr-1~deb7u1.

For the unstable distribution (sid), these problems have been fixed in
version 31.4.0esr-1.

We recommend that you upgrade your iceweasel packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=fSNI
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBVLb7dRLndAQH1ShLAQKg0xAAm4pPBuA+eHt5mICYsLY7s8Xt/x1TzPf9
MeJ4pxTC3+Sdh61FCxfSeBK3/4rWhTPAFW/gNbZdxFBRcyLqBm0AsudN9fRXKI5+
czwkTOy5/c3Mv0sEYKfPmf3DdZewUxgopu3wBX292docifOCvxDY6y7fAJQAntJU
zKVUFWeTmJwK9QbQ5zNmlsTPL35rtk/3RXFTFy39/7QHeRgRhZWbE2jOurVDNQ2o
+Uo5DoylgaxCtzTS8Pyk5X/f6jRRIFXD6HGuNXzaIo0yOE4F6nK3WDhRx3KdTR6c
N2htsFps9gTfrp+v9QnYXBG/8xlXhIjkyUgSGGXx0feKL2GIdf0LvTJkM2VLfjNT
YWhiDjJ5vH+90Bxg5eaibkgzosVyRVeo/T/9r6SAmjUDOZ7CI9NTQjjj66KdQ4+c
IRcM87Mbr1LzvQYuXjIm2edFh9UacRTV+zYsQnil3kQOB2z6LQh0ppGiuTAqL2AW
EDnX2dijTems4j1iUYACsh3vUOgs5W30G3mrnF5/UlaHcAcwOmdNeENQ/L/ur2dU
TR5geOWSKwxFk6LZe/0SdzB3It29hvtUkLRIXavOw5NpvfpClJ4q4zTs3mqEbOa7
Sddlgd6U0p3z9ffPCoPAM8qWb5m58RUu1nPHQTWBgwmSM7sPY/y5wYh8a11K+SA4
2T+4LuucKpU=
=wGpi
-----END PGP SIGNATURE-----