[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DSA 4479-1] firefox-esr security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4479-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
July 11, 2019                         https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : firefox-esr
CVE ID         : CVE-2019-9811 CVE-2019-11709 CVE-2019-11711 CVE-2019-11712 
                 CVE-2019-11713 CVE-2019-11715 CVE-2019-11717 CVE-2019-11730
                 CVE-2019-11719 CVE-2019-11729

Multiple security issues have been found in the Mozilla Firefox web
browser, which could potentially result in the execution of arbitrary
code, cross-site scripting, spoofing, information disclosure, denial of
service or cross-site request forgery.


For the oldstable distribution (stretch), these problems have been fixed
in version 60.8.0esr-1~deb9u1.

For the stable distribution (buster), these problems have been fixed in
version 60.8.0esr-1~deb10u1.

CVE-2019-11719 and CVE-2019-11729 are only addressed for stretch, in
buster Firefox uses the system-wide copy of NSS which will be updated
separately.

We recommend that you upgrade your firefox-esr packages.

For the detailed security status of firefox-esr please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/firefox-esr

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=agp1
-----END PGP SIGNATURE-----


Reply to: