Debian 10230 Published by

The following updates has been released for Debian GNU/Linux 7 LTS:

DLA 1374-1: firebird2.5 security update
DLA 1375-1: wget security update
DLA 1376-1: firefox-esr security update



DLA 1374-1: firebird2.5 security update




Package : firebird2.5
Version : 2.5.2.26540.ds4-1~deb7u4
CVE ID : CVE-2017-11509

An authenticated remote attacker can execute arbitrary code in Firebird SQL
Server versions 2.5.7 and 3.0.2 by executing a malformed SQL statement. The
only known solution is to disable external UDF libraries from being loaded. In
order to achieve this, the default configuration has changed to UdfAccess=None.
This will prevent the fbudf module from being loaded, but may also break other
functionality relying on modules.

For Debian 7 "Wheezy", these problems have been fixed in version
2.5.2.26540.ds4-1~deb7u4.

We recommend that you upgrade your firebird2.5 packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


DLA 1375-1: wget security update




Package : wget
Version : 1.13.4-3+deb7u6
CVE ID : CVE-2018-0494
Debian Bug : 898076


Harry Sintonen have discovered a cookie injection vulnerability in
wget caused by insufficient input validation, enabling an external
attacker to inject arbitrary cookie values cookie jar file, adding new
or replacing existing cookie values.

For Debian 7 "Wheezy", these problems have been fixed in version
1.13.4-3+deb7u6.

We recommend that you upgrade your wget packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


DLA 1376-1: firefox-esr security update




Package : firefox-esr
Version : 52.8.0esr-1~deb7u1
CVE ID : CVE-2018-5150 CVE-2018-5154 CVE-2018-5155 CVE-2018-5157
CVE-2018-5158 CVE-2018-5159 CVE-2018-5168 CVE-2018-5178
CVE-2018-5183

Several security issues have been found in the Mozilla Firefox web
browser: Multiple memory safety errors and other implementation errors
may lead to the execution of arbitrary code or denial of service.

For Debian 7 "Wheezy", these problems have been fixed in version
52.8.0esr-1~deb7u1.

We recommend that you upgrade your firefox-esr packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS