[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DSA 3928-1] firefox-esr security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3928-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
August 10, 2017                       https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : firefox-esr
CVE ID         : CVE-2017-7753 CVE-2017-7779 CVE-2017-7784 CVE-2017-7785 
                 CVE-2017-7786 CVE-2017-7787 CVE-2017-7791 CVE-2017-7792 
                 CVE-2017-7798 CVE-2017-7800 CVE-2017-7801 CVE-2017-7802 
                 CVE-2017-7803 CVE-2017-7807 CVE-2017-7809

Several security issues have been found in the Mozilla Firefox web
browser: Multiple memory safety errors, use-after-frees, buffer
overflows and other implementation errors may lead to the execution of
arbitrary code, denial of service, bypass of the same-origin policy or
incorrect enforcement of CSP.

For the oldstable distribution (jessie), these problems have been fixed
in version 52.3.0esr-1~deb8u1.

For the stable distribution (stretch), these problems have been fixed in
version 52.3.0esr-1~deb9u1.

We recommend that you upgrade your firefox-esr packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=ha95
-----END PGP SIGNATURE-----


Reply to: