Jump to content
Compatible Support Forums
Sign in to follow this  
news

[SECURITY] [DLA 521-1] firefox-esr security update

Recommended Posts

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA256

 

Package : firefox-esr

Version : 45.2.0esr-1~deb7u1

CVE ID : CVE-2016-2818 CVE-2016-2819 CVE-2016-2821 CVE-2016-2822

CVE-2016-2828 CVE-2016-2831

 

Multiple security issues have been found in the Mozilla Firefox web

browser: Multiple memory safety errors, buffer overflows and other

implementation errors may lead to the execution of arbitrary code or

spoofing.

 

Wait, Firefox? No more references to Iceweasel? That's right, Debian no

longer applies a custom branding. Please see these links for further

information:

https://glandium.org/blog/?p=3622

https://en.wikipedia.org/wiki/Mozilla_software_rebranded_by_Debian

 

Debian follows the extended support releases (ESR) of Firefox. Support

for the 38.x series has ended, so starting with this update we're now

following the 45.x releases and this update to the next ESR is also the

point where we reapply the original branding.

 

Transition packages for the iceweasel packages are provided which

automatically upgrade to the new version. Since new binary packages need

to be installed, make sure to allow that in your upgrade procedure (e.g.

by using "apt-get dist-upgrade" instead of "apt-get upgrade").

 

For Debian 7 "Wheezy", these problems have been fixed in version

45.2.0esr-1~deb7u1.

 

We recommend that you upgrade your firefox-esr packages.

 

Further information about Debian LTS security advisories, how to apply

these updates to your system and frequently asked questions can be

found at: https://wiki.debian.org/LTS

-----BEGIN PGP SIGNATURE-----

 

iQIcBAEBCAAGBQJXZvmXAAoJEAe4t7DqmBILoTEP/jc/weJ0vSIDIEEwdrWlcOSM

nf51J3IQ/uaxLVGQAsLuusr1qUl5xkDmqxjAfaBO/y2FppllSbx3kkQHcv6lqXdf

EeeYNuO3Jt+q7PrqenQGv4u9JahMz5tToY8BuB/sbLaymVgAZYsRluRdjkm60OOw

DsRJ5di+wXc0tykkQjCr14Hd8LLnQhMLSzF89LBVBxe32k5GBYTJjsdkpMQWmDvQ

WHUi1rVmK4RmkY2UwdcfNcWbPC/0f1MQPATEgQ1DHjbI+hdKudScF5ksx3SWN6Ev

GNtGnLafuY7St6oevjbjmZi540T3yTeD4Nq6rsVHMaIaUIc52aGkbP/5tj7t8P0J

xDKQMWGRgEfV0kVuxUuHxtrjei0mjFOvLCk8ltRHNPRlIv5DYsx8euDrSjQ0KCDt

jG9AOBXTT99RNGEV014iu9JecGG50fLvJzgo0Qw8+0IfHliAtLZhzIXnNCeJwXrD

vrVIvIJswIqvUZ/mLRnqU6tM4xZDANRQ0LjHDKAY4dA7cvkGrVsw5PtCsqn+RK0N

aJEN11q8uMuOJdiNvQMWcAjiEPPGCVSiWU/GC8lohYUMOE9dzosl7pk+Op25c5ja

GHEhas+YnI1fcqzKNLDxFHxUxaeiHt7jrHHemKeKvWw/jBg2QPuU0MzJQwipUCeb

38vXoFb8WvITNf+T7NGV

=OZJq

-----END PGP SIGNATURE-----

 

 

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×