Debian: DSA-2488-1: iceweasel security update

    Date 07 Jun 2012
    90
    Posted By LinuxSecurity Advisories
    Several vulnerabilities have been discovered in Iceweasel, a web browser based on Firefox. The included XULRunner library provides rendering services for several other applications included in Debian.
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-2488-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                           Thijs Kinkhorst
    June 7, 2012                           https://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : iceweasel
    Vulnerability  : several vulnerabilities
    Problem type   : local (remote)
    Debian-specific: no
    CVE ID         : CVE-2012-1937 CVE-2012-1940 CVE-2012-1947
    
    Several vulnerabilities have been discovered in Iceweasel, a web
    browser based on Firefox. The included XULRunner library provides
    rendering services for several other applications included in Debian.
    
    CVE-2012-1937
    
      Mozilla developers discovered several memory corruption bugs,
      which may lead to the execution of arbitrary code.
    
    CVE-2012-1940
    
      Abhishek Arya discovered a use-after-free problem when working
      with column layout with absolute positioning in a container that
      changes size, which may lead to the execution of arbitrary code.
    
    CVE-2012-1947
    
      Abhishek Arya discovered a heap buffer overflow in utf16 to latin1
      character set conersion, allowing to execute arbitray code.
    
    
    Note: We'd like to advise users of Iceweasel's 3.5 branch in Debian
    stable to consider to upgrade to the Iceweasel 10.0 ESR (Extended
    Support Release) which is now availble in Debian Backports.
    Although Debian will continue to support Iceweasel 3.5 in stable with
    security updates, this can only be done on a best effort base as
    upstream provides no such support anymore. On top of that, the 10.0
    branch adds proactive security features to the browser.
    
    For the stable distribution (squeeze), this problem has been fixed in
    version 3.5.16-16.
    
    For the unstable distribution (sid), this problem has been fixed in
    version 10.0.5esr-1.
    
    We recommend that you upgrade your iceweasel packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    

    LinuxSecurity Poll

    If you are using full-disk encryption: are you concerned about the resulting performance hit?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /main-polls/34-if-you-are-using-full-disk-encryption-are-you-concerned-about-the-resulting-performance-hit?task=poll.vote&format=json
    34
    radio
    [{"id":"120","title":"Yes","votes":"13","type":"x","order":"1","pct":59.09,"resources":[]},{"id":"121","title":"No ","votes":"9","type":"x","order":"2","pct":40.91,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Advisories

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.