exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Security Advisory 4035-1

Debian Security Advisory 4035-1
Posted Nov 16, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4035-1 - Several security issues have been found in the Mozilla Firefox web implementation errors may lead to the execution of arbitrary code, denial of service or bypass of the same origin policy.

tags | advisory, web, denial of service, arbitrary
systems | linux, debian
advisories | CVE-2017-7826, CVE-2017-7828, CVE-2017-7830
SHA-256 | 1acda4f902a26eda78668456bf7fdcdef130e7ff2ba1aa57be0f39a6e75d307d

Debian Security Advisory 4035-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4035-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
November 15, 2017 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : firefox-esr
CVE ID : CVE-2017-7826 CVE-2017-7828 CVE-2017-7830

Several security issues have been found in the Mozilla Firefox web
browser: Multiple memory safety errors, use-after-frees and other
implementation errors may lead to the execution of arbitrary code, denial
of service or bypass of the same origin policy.

For the oldstable distribution (jessie), these problems have been fixed
in version 52.5.0esr-1~deb8u1.

For the stable distribution (stretch), these problems have been fixed in
version 52.5.0esr-1~deb9u1.

We recommend that you upgrade your firefox-esr packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=cllw
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close