Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2016.1451 iceweasel/firefox-esr security update 10 June 2016 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: firefox-esr Publisher: Debian Operating System: Debian GNU/Linux 8 Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Denial of Service -- Remote with User Interaction Provide Misleading Information -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2016-2831 CVE-2016-2828 CVE-2016-2822 CVE-2016-2821 CVE-2016-2819 CVE-2016-2818 Reference: ASB-2016.0063 Original Bulletin: http://www.debian.org/security/2016/dsa-3600 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - - ------------------------------------------------------------------------- Debian Security Advisory DSA-3600-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff June 09, 2016 https://www.debian.org/security/faq - - ------------------------------------------------------------------------- Package : firefox-esr CVE ID : CVE-2016-2818 CVE-2016-2819 CVE-2016-2821 CVE-2016-2822 CVE-2016-2828 CVE-2016-2831 Multiple security issues have been found in the Mozilla Firefox web browser: Multiple memory safety errors, buffer overflows and other implementation errors may lead to the execution of arbitrary code or spoofing. Wait, Firefox? No more references to Iceweasel? That's right, Debian no longer applies a custom branding. Please see these links for further information: https://glandium.org/blog/?p=3622 https://en.wikipedia.org/wiki/Mozilla_software_rebranded_by_Debian Debian follows the extended support releases (ESR) of Firefox. Support for the 38.x series has ended, so starting with this update we're now following the 45.x releases and this update to the next ESR is also the point where we reapply the original branding. Transition packages for the iceweasel packages are provided which automatically upgrade to the new version. Since new binary packages need to be installed, make sure to allow that in your upgrade procedure (e.g. by using "apt-get dist-upgrade" instead of "apt-get upgrade"). For the stable distribution (jessie), these problems have been fixed in version 45.2.0esr-1~deb8u1. For the unstable distribution (sid), these problems have been fixed in version 45.2.0esr-1. We recommend that you upgrade your firefox-esr packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org - -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAEBCAAGBQJXWdEpAAoJEBDCk7bDfE42cWcP/1QiyaD48+R+Fw33XpPLFMoo SLDVGAcjVVS4cXLPSOW23noxTn1rfB5/woCNDg6ojjiGCE+vWm6S1xSY2fU4SRfL mkHdAQYN/vk0tgnyLs2l2VMvvJw3lyRnACitcU1OsfFdn9wq7tgtgM+fdl7hJ9zE Nza4bXAuBDV4b01GXHLkHCVuh7lcJhRGu2gqzQXs2HsZBo12YYVMiwdpxNxzZDzx e06bMzW2TEWlk0YfjEA3EI5FQCENo7/qemqSe+4mlTUguT2YlLR56CTV5tbR+DGq jvxmKdwwcytyZJn2n4Yft5CafQfJbp928gSivMUvvMccTmgVH9FFtNbPI213tn05 TU2IzIFLZ+za/Kv1FirU6wZ/nXZFgJBIsd2w9K2fdM4uMQqvESLopxtw0VPxxSlV SmF07ONx1Yu9gsJcoVIy/nCbP0F9EtE0NA8cak1KE5in9Q5PCXRzQeDOlP3g93Fo 2FiH3sp6U8aJKBZaNnFJ1qfaWqbMO3vQu7hjj49kOpIHgWEOrpDTeEAvk+PXleMt WExEmzcbfXAmuEiLFmQd+BxR6yd6JyofnapxuThBqHq51grxAdW3gldrK8gPvpFd 1iKkY4w1wTcv8VkRhG0ErJa2B9DEWSAanI7WLMjoE4Vd2Buq4qjNpICWYkDdEvSu B2yCw5JgXx8eHngKUCDJ =RYDx - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBV1oXa4x+lLeg9Ub1AQhMzBAAlC/QJFyIss93yMQcM/RawduSIz4GRuMk p20TBYY7Lkih2uL1zcC5dMepmuT415LiHCCeuCiOSlNfTOkto4WWmdiT4zduiZMm mW9oDds1hyY+x8VZ1Y6P8qYQrjnx9yghlgsHLuGzm4GzQjhJjZ4uPUADQXo36jjb +AF2EQQVKWYBLY9h8eF5/Nibdvu3Cs/BUrcoyQhfKInJR4XBzizX6UeJG0j4Q5cS PuhOu36Ahb2wwjP5TEoxq1k0qXEvUIJcQBsVoJwixvOlK6/AshwUR8X52hNO2eyV y8WIDpjhqDTF4kdKstylFXQ9ujv2gx5Dgo2ZhJVb3VmuHoH2SNbJUnXD9u9k0pei iMHCfc/KWHsXTY6oFhn5/sy+Ot8gM6zqFvegZzPP2MZFKEQnOS7Rwjs6tgOrC8Vv 4VYaRW4OmAPsIEZLikIZOFauidXyw5I0fYEOtT4fhkT6HNbivuyFysl/5RwXUrhE asWV9ayzHj7VToAJWHIiwAKz85ETNZYjj5GzLjh+Knpy0YjB001jeVfn80Crx7HF evTVJtCAunbJWP4ZRCNIRxjfgTewGKms+lPBFr2jU2kqYH6SFiVV2hOMyWXFwXt0 hXAiSHCJEnVOmWfCDD7rBexSPttvOxJjkbjUu1PZjMeQA5Gpjtih4o/oqjP4Ove/ siQffewgc/I= =wGAq -----END PGP SIGNATURE-----