Debian: DSA-2433-1: iceweasel security update

    Date15 Mar 2012
    CategoryDebian
    63
    Posted ByLinuxSecurity Advisories
    Several vulnerabilities have been discovered in Iceweasel, a web browser based on Firefox. The included XULRunner library provides rendering services for several other applications included in Debian.
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-2433-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                        Moritz Muehlenhoff
    March 15, 2012                         http://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : iceweasel
    Vulnerability  : several
    Problem type   : remote
    Debian-specific: no
    CVE ID         : CVE-2012-0455 CVE-2012-0456 CVE-2012-0458 CVE-2012-0461
    
    Several vulnerabilities have been discovered in Iceweasel, a web browser
    based on Firefox. The included XULRunner library provides rendering
    services for several other applications included in Debian.
    
    CVE-2012-0455
    
       Soroush Dalili discovered that a cross-site scripting countermeasure
       related to Javascript URLs could be bypassed.
    
    CVE-2012-0456
    
       Atte Kettunen discovered an out of bounds read in the SVG Filters,
       resulting in memory disclosure.
    
    CVE-2012-0458
    
       Mariusz Mlynski discovered that privileges could be escalated through
       a Javascript URL as the home page.
    
    CVE-2012-0461
    
       Bob Clary discovered memory corruption bugs, which may lead to the 
       execution of arbitrary code.
    
    For the stable distribution (squeeze), this problem has been fixed in
    version 3.5.16-13.
    
    For the unstable distribution (sid), this problem has been fixed in
    version 10.0.3esr-1.
    
    For the experimental distribution, this problem has been fixed in
    version 11.0-1.
    
    We recommend that you upgrade your iceweasel packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: http://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"40","type":"x","order":"1","pct":48.78,"resources":[]},{"id":"88","title":"Should be more technical","votes":"13","type":"x","order":"2","pct":15.85,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"29","type":"x","order":"3","pct":35.37,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.