- -------------------------------------------------------------------------
Debian Security Advisory DSA-3345-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
August 29, 2015                       https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : iceweasel
CVE ID         : CVE-2015-4497 CVE-2015-4498

Multiple security issues have been found in Iceweasel, Debian's version
of the Mozilla Firefox web browser. The Common Vulnerabilities and
Exposures project identifies the following problems:

CVE-2015-4497

    Jean-Max Reymond and Ucha Gobejishvili discovered a use-after-free
    vulnerability which occurs when resizing of a canvas element is
    triggered in concert with style changes. A web page containing
    malicious content can cause Iceweasel to crash, or potentially,
    execute arbitrary code with the privileges of the user running
    Iceweasel.

CVE-2015-4498

    Bas Venis reported a flaw in the handling of add-ons installation. A
    remote attacker can take advantage of this flaw to bypass the add-on
    installation prompt and trick a user into installing an add-on from
    a malicious source.

For the oldstable distribution (wheezy), these problems have been fixed
in version 38.2.1esr-1~deb7u1.

For the stable distribution (jessie), these problems have been fixed in
version 38.2.1esr-1~deb8u1.

For the unstable distribution (sid), these problems have been fixed in
version 38.2.1esr-1.

We recommend that you upgrade your iceweasel packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org

Debian: DSA-3345-1: iceweasel security update

August 29, 2015
Multiple security issues have been found in Iceweasel, Debian's version of the Mozilla Firefox web browser

Summary

CVE-2015-4497

Jean-Max Reymond and Ucha Gobejishvili discovered a use-after-free
vulnerability which occurs when resizing of a canvas element is
triggered in concert with style changes. A web page containing
malicious content can cause Iceweasel to crash, or potentially,
execute arbitrary code with the privileges of the user running
Iceweasel.

CVE-2015-4498

Bas Venis reported a flaw in the handling of add-ons installation. A
remote attacker can take advantage of this flaw to bypass the add-on
installation prompt and trick a user into installing an add-on from
a malicious source.

For the oldstable distribution (wheezy), these problems have been fixed
in version 38.2.1esr-1~deb7u1.

For the stable distribution (jessie), these problems have been fixed in
version 38.2.1esr-1~deb8u1.

For the unstable distribution (sid), these problems have been fixed in
version 38.2.1esr-1.

We recommend that you upgrade your iceweasel packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org

Severity
Multiple security issues have been found in Iceweasel, Debian's version
of the Mozilla Firefox web browser. The Common Vulnerabilities and
Exposures project identifies the following problems:

Related News