Updated firefox-esr packages has been released for Debian GNU/Linux 8 and 9
- -------------------------------------------------------------------------Firefox-esr security update for Debian 8 and 9
Debian Security Advisory DSA-3928-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
August 10, 2017 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : firefox-esr
CVE ID : CVE-2017-7753 CVE-2017-7779 CVE-2017-7784 CVE-2017-7785
CVE-2017-7786 CVE-2017-7787 CVE-2017-7791 CVE-2017-7792
CVE-2017-7798 CVE-2017-7800 CVE-2017-7801 CVE-2017-7802
CVE-2017-7803 CVE-2017-7807 CVE-2017-7809
Several security issues have been found in the Mozilla Firefox web
browser: Multiple memory safety errors, use-after-frees, buffer
overflows and other implementation errors may lead to the execution of
arbitrary code, denial of service, bypass of the same-origin policy or
incorrect enforcement of CSP.
For the oldstable distribution (jessie), these problems have been fixed
in version 52.3.0esr-1~deb8u1.
For the stable distribution (stretch), these problems have been fixed in
version 52.3.0esr-1~deb9u1.
We recommend that you upgrade your firefox-esr packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/