Debian Security Advisory 1614-1 - Several remote vulnerabilities have been discovered in the Iceweasel web browser, an unbranded version of the Firefox browser. It was discovered that missing boundary checks on a reference counter for CSS objects can lead to the execution of arbitrary code. Billy Rios discovered that passing an URL containing a pipe symbol to Iceweasel can lead to Chrome privilege escalation.
59ff1e0473a5b291feb220328e663ac8016843d8bd53f10e2bf2127d720e8f71
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- ------------------------------------------------------------------------
Debian Security Advisory DSA-1614-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
July 23, 2008 http://www.debian.org/security/faq
- ------------------------------------------------------------------------
Package : iceweasel
Vulnerability : several
Problem-Type : remote
Debian-specific: no
CVE ID : CVE-2008-2785 CVE-2008-2933
Several remote vulnerabilities have been discovered in the Iceweasel
web browser, an unbranded version of the Firefox browser. The Common
Vulnerabilities and Exposures project identifies the following problems:
CVE-2008-2785
It was discovered that missing boundary checks on a reference
counter for CSS objects can lead to the execution of arbitrary code.
CVE-2008-2933
Billy Rios discovered that passing an URL containing a pipe symbol
to Iceweasel can lead to Chrome privilege escalation.
For the stable distribution (etch), these problems have been fixed in
version 2.0.0.16-0etch1. Updated packages for ia64, arm and mips are
not yet available and will be released as soon as they have been built.
For the unstable distribution (sid), these problems have been fixed in
xulrunner 1.9.0.1-1 and iceweasel 3.0.1-1.
We recommend that you upgrade your iceweasel package.
Upgrade instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 4.0 alias etch
- -------------------------------
Stable updates are available for alpha, amd64, hppa, i386, mipsel, powerpc, s390 and sparc.
Source archives:
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.16-0etch1.diff.gz
Size/MD5 checksum: 186601 1a6e2029bb1be403464dc05d0d7056f3
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.16.orig.tar.gz
Size/MD5 checksum: 47244084 838ff458cac5da69ac0f2102c9a4fa43
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.16-0etch1.dsc
Size/MD5 checksum: 1289 b20f98b6d9dea662336b8287164b326e
Architecture independent packages:
http://security.debian.org/pool/updates/main/i/iceweasel/mozilla-firefox-dom-inspector_2.0.0.16-0etch1_all.deb
Size/MD5 checksum: 54310 13d18b856d4e0a01e7931afef496e3ec
http://security.debian.org/pool/updates/main/i/iceweasel/firefox-dom-inspector_2.0.0.16-0etch1_all.deb
Size/MD5 checksum: 54460 dc8582c2f9b6f7be94c881596ce9d191
http://security.debian.org/pool/updates/main/i/iceweasel/mozilla-firefox-gnome-support_2.0.0.16-0etch1_all.deb
Size/MD5 checksum: 54310 816c6f0fd47121ca9ab87116b631c210
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dom-inspector_2.0.0.16-0etch1_all.deb
Size/MD5 checksum: 239618 b130c9f2f2e153789d4081b03c1f3ecf
http://security.debian.org/pool/updates/main/i/iceweasel/mozilla-firefox_2.0.0.16-0etch1_all.deb
Size/MD5 checksum: 55096 c080b75d5a9b47353c070c8ae018ee93
http://security.debian.org/pool/updates/main/i/iceweasel/firefox-gnome-support_2.0.0.16-0etch1_all.deb
Size/MD5 checksum: 54428 6ef73c9c91f47d9d3b9695b0baba16e0
http://security.debian.org/pool/updates/main/i/iceweasel/firefox_2.0.0.16-0etch1_all.deb
Size/MD5 checksum: 54572 fc0e196c2ac5634b69c8d393eaa83809
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.16-0etch1_alpha.deb
Size/MD5 checksum: 90158 d993f5d5638bf2644992c3a51cb07aaf
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.16-0etch1_alpha.deb
Size/MD5 checksum: 51153588 537368b3db70016472e36fa96fa6d45f
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.16-0etch1_alpha.deb
Size/MD5 checksum: 11577992 dfcf655ebf1ab9f30e2fdd10aee79b77
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.16-0etch1_amd64.deb
Size/MD5 checksum: 87828 bedb77649ba472190d25054b192b6209
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.16-0etch1_amd64.deb
Size/MD5 checksum: 10203870 5de267d5ee71e3847e73ae64872100ad
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.16-0etch1_amd64.deb
Size/MD5 checksum: 50156988 105ffac099d3a73aa40be32a44cd7212
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.16-0etch1_hppa.deb
Size/MD5 checksum: 89332 ca1481f5414cf4faf8a5a370906d8f64
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.16-0etch1_hppa.deb
Size/MD5 checksum: 11108696 06ec3f1f3819d33be04502e5bce656e0
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.16-0etch1_hppa.deb
Size/MD5 checksum: 50532424 9971def7580d2166292c8547f27dd2b4
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.16-0etch1_i386.deb
Size/MD5 checksum: 49553762 65280e9ae0c54fc73e75a361dbe722fe
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.16-0etch1_i386.deb
Size/MD5 checksum: 9119010 de6f68bb7acdf4cfdf74030cd2333de8
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.16-0etch1_i386.deb
Size/MD5 checksum: 81938 a7eb73d423a318b5901eb3a8a06685b9
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.16-0etch1_mipsel.deb
Size/MD5 checksum: 10760324 2c0b072407554c994af92a170313e26d
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.16-0etch1_mipsel.deb
Size/MD5 checksum: 52504852 d2a9840321f5daf57e6dc31be4d001ec
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.16-0etch1_mipsel.deb
Size/MD5 checksum: 83096 610122542964f56450722b5a1268f9f7
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.16-0etch1_powerpc.deb
Size/MD5 checksum: 9935532 8ef7577d3ee21a66ed0f3dd49554228b
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.16-0etch1_powerpc.deb
Size/MD5 checksum: 83658 bb96af576cc431bc5d2395065cc26519
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.16-0etch1_powerpc.deb
Size/MD5 checksum: 51951260 ce9193a0f59b5f6ebe385a6b99d81082
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.16-0etch1_s390.deb
Size/MD5 checksum: 10361684 97e6a00b1925964345ab444e08decfd7
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.16-0etch1_s390.deb
Size/MD5 checksum: 50833158 e7d855931549380a580cca41b16eb132
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.16-0etch1_s390.deb
Size/MD5 checksum: 88076 3718818f93134dd2bdbd830839c77cac
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel_2.0.0.16-0etch1_sparc.deb
Size/MD5 checksum: 9141294 fbb65f64f8cc4e8580582633b447a9c5
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-dbg_2.0.0.16-0etch1_sparc.deb
Size/MD5 checksum: 49164530 d54078908cc2adaecb5f492b13a966eb
http://security.debian.org/pool/updates/main/i/iceweasel/iceweasel-gnome-support_2.0.0.16-0etch1_sparc.deb
Size/MD5 checksum: 81782 bb4025ab732da55e1d29d7ade28d10aa
These files will probably be moved into the stable distribution on
its next update.
- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iEYEARECAAYFAkiHjzcACgkQXm3vHE4uylrfBACfazgN5N7zWyjfx0t8352hmxdz
gToAoNgpvd+QR2mhCxHUuFFpXk6DA1C9
=nFWu
-----END PGP SIGNATURE-----