exploit the possibilities

Debian Security Advisory 4035-1

Debian Security Advisory 4035-1
Posted Nov 16, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4035-1 - Several security issues have been found in the Mozilla Firefox web implementation errors may lead to the execution of arbitrary code, denial of service or bypass of the same origin policy.

tags | advisory, web, denial of service, arbitrary
systems | linux, debian
advisories | CVE-2017-7826, CVE-2017-7828, CVE-2017-7830
MD5 | 063f2feaeb7ece66e2ed0a93f6ec7714

Debian Security Advisory 4035-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4035-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
November 15, 2017 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : firefox-esr
CVE ID : CVE-2017-7826 CVE-2017-7828 CVE-2017-7830

Several security issues have been found in the Mozilla Firefox web
browser: Multiple memory safety errors, use-after-frees and other
implementation errors may lead to the execution of arbitrary code, denial
of service or bypass of the same origin policy.

For the oldstable distribution (jessie), these problems have been fixed
in version 52.5.0esr-1~deb8u1.

For the stable distribution (stretch), these problems have been fixed in
version 52.5.0esr-1~deb9u1.

We recommend that you upgrade your firefox-esr packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=cllw
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

October 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    25 Files
  • 2
    Oct 2nd
    13 Files
  • 3
    Oct 3rd
    1 Files
  • 4
    Oct 4th
    1 Files
  • 5
    Oct 5th
    15 Files
  • 6
    Oct 6th
    15 Files
  • 7
    Oct 7th
    15 Files
  • 8
    Oct 8th
    11 Files
  • 9
    Oct 9th
    3 Files
  • 10
    Oct 10th
    1 Files
  • 11
    Oct 11th
    1 Files
  • 12
    Oct 12th
    8 Files
  • 13
    Oct 13th
    12 Files
  • 14
    Oct 14th
    23 Files
  • 15
    Oct 15th
    4 Files
  • 16
    Oct 16th
    13 Files
  • 17
    Oct 17th
    1 Files
  • 18
    Oct 18th
    1 Files
  • 19
    Oct 19th
    27 Files
  • 20
    Oct 20th
    41 Files
  • 21
    Oct 21st
    18 Files
  • 22
    Oct 22nd
    16 Files
  • 23
    Oct 23rd
    2 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close