[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 1053-1] firefox-esr security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Package        : firefox-esr
Version        : 52.3.0esr-1~deb7u1
CVE ID         : CVE-2017-7753 CVE-2017-7779 CVE-2017-7784 CVE-2017-7785
                 CVE-2017-7786 CVE-2017-7787 CVE-2017-7791 CVE-2017-7792
                 CVE-2017-7798 CVE-2017-7800 CVE-2017-7801 CVE-2017-7802
                 CVE-2017-7803 CVE-2017-7807 CVE-2017-7809

Several security issues have been found in the Mozilla Firefox web
browser: Multiple memory safety errors, use-after-frees, buffer
overflows and other implementation errors may lead to the execution of
arbitrary code, denial of service, bypass of the same-origin policy or
incorrect enforcement of CSP.

For Debian 7 "Wheezy", these problems have been fixed in version
52.3.0esr-1~deb7u1.

We recommend that you upgrade your firefox-esr packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
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=ccUr
-----END PGP SIGNATURE-----


Reply to: