-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Package : firefox-esr Version : 52.3.0esr-1~deb7u1 CVE ID : CVE-2017-7753 CVE-2017-7779 CVE-2017-7784 CVE-2017-7785 CVE-2017-7786 CVE-2017-7787 CVE-2017-7791 CVE-2017-7792 CVE-2017-7798 CVE-2017-7800 CVE-2017-7801 CVE-2017-7802 CVE-2017-7803 CVE-2017-7807 CVE-2017-7809
Several security issues have been found in the Mozilla Firefox web browser: Multiple memory safety errors, use-after-frees, buffer overflows and other implementation errors may lead to the execution of arbitrary code, denial of service, bypass of the same-origin policy or incorrect enforcement of CSP. For Debian 7 "Wheezy", these problems have been fixed in version 52.3.0esr-1~deb7u1. We recommend that you upgrade your firefox-esr packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAlmOsOUACgkQnUbEiOQ2 gwJTpBAAr62kqHc+Z1KeN8dnycC9GSTo5fVQTWXIe+/pQeDyPnKvdfv6C3uUTp+x H1hJHvrL3N4UcoOcNWcnQMFif7Ltmew8/kxaRLqEH3/kgJOSFC1GTO6MsUBd0NGp Kmkum216AboHHlqUzl+QmGZk9rPfMXxHAEaUJRrCG2HnDYyBWTLHWWL9TPA82aea BF8jknrZ9e8YUMWe2S4307D5QhEoj9YoKNtbJPgykaTU3zmcEWDTjZDo3WYcTYBI ZT51UHlaMrcodhe5x/E/BvOGazX+McyypGkqxcQZhK0mjLFwccZzIyXCk0VkRi27 sttzezbrETrFfFNhPlBeabspvIK6qxmCYJLDIcYPxL8JSreLOjIqwnhDj8BBE1Bi MS3yag151cZiEtbQs7VE3DSU0JR1chmZChs1WYiqYlOSBhok5jCSOgCt+vwukwBX 05aBaB3PLxnFnQguSK3wnDAgLSVc3p8AIf1jDIatd+CEAFAKsuIqtWkz2XMIrPJG 3JfTWAa2ujrnYC1wQ/zc9Nyo/6aHzNdDTc4vILwys3morcz8k6VF6VBimjbHeR4q lFizKvKHzaJQQjQvBKOGivdCPo+8KI/e5+s7Xs5Ut3ROKGsGz83gcReCXd1w/8JX Uj7D8o4BjXRzX5GnxmaWVXJFiJzr7ByhlwYAeaV9ityBY7j1id8= =ccUr -----END PGP SIGNATURE-----