-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Package : firefox-esr Version : 52.2.0esr-1~deb7u1 CVE ID : CVE-2017-5470 CVE-2017-5472 CVE-2017-7749 CVE-2017-7750 CVE-2017-7751 CVE-2017-7752 CVE-2017-7754 CVE-2017-7756 CVE-2017-7757 CVE-2017-7758 CVE-2017-7764 CVE-2017-7771 CVE-2017-7772 CVE-2017-7773 CVE-2017-7774 CVE-2017-7775 CVE-2017-7776 CVE-2017-7777 CVE-2017-7778
Several security issues have been found in the Mozilla Firefox web browser: Multiple memory safety errors, use-after-frees, buffer overflows and other implementation errors may lead to the execution of arbitrary code, denial of service or domain spoofing. Debian follows the extended support releases (ESR) of Firefox. Support for the 45.x series has ended, so starting with this update we're now following the 52.x releases. For Debian 7 "Wheezy", these problems have been fixed in version 52.2.0esr-1~deb7u1. We recommend that you upgrade your firefox-esr packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAllGTXcACgkQnUbEiOQ2 gwKEkw/+N/77Sg0OPqLou0rr/Nc56adwAVuKXaeB9lwxUPIYfdUbne0UeOs2tkO2 xHx/09ZW9A25XJcDSGpYhXbZKDoFB6IqjOWxI8EGaeQgW8qOtkY6v7d2oShQz4FE kfUpTOLTErmHThZEryBsXtbDw8/tE4DONQDyu5AFyTPPdU+fUlp1/euVSw05vND9 6Df0Ralj8uKzXXIbvqRBZQZUlJ8413+EGVamNu/nvsZzc0sSIGyYBdqkN1LrhKcu WT65hzN9Rx8YvXWEhaLxPt7MagaqEg9f8fG482t1I6jqUXwc+C/htWYHs77GVCxo 4IN65n/1MHFfoRTdQ6lc6J0F925Kk04fYPg5tCNXZGZ2HvqwOo2Y2zpiG6oJoDtU uZT4365611WO182+qMtXRKmrOLYnaqBy177oQkQtDeH2xYtgQH+O4R9htiba3SGq YmG76pmLhHMEe6qmo+u/m6AkplH91S1qWhPjm7pxJ8ksn6HKTrcfLL0HjVBRILAs d2Rt6OOo4SBXS93g6vWT8Qra85yS5/4fGyVHCP1eEWBOgjaDsrMwGTvrupJKENNc F0BLSSHFqW4Qd0JFlNy6Zmi7iO+MnB4u6etWdKEY5GO93ZIkJCJsOD7LOKLd8lRj eqLIV8aTYmhdFFpX/IKnsb/NlAxN5trh8jQorEOyi8kSlSbDxBA= =Iin0 -----END PGP SIGNATURE-----