Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.2569 firefox-esr security update 12 July 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: firefox-esr Publisher: Debian Operating System: Debian GNU/Linux 9 Debian GNU/Linux 10 Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Cross-site Request Forgery -- Remote with User Interaction Cross-site Scripting -- Remote with User Interaction Denial of Service -- Remote with User Interaction Access Confidential Data -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2019-11730 CVE-2019-11729 CVE-2019-11719 CVE-2019-11717 CVE-2019-11715 CVE-2019-11713 CVE-2019-11712 CVE-2019-11711 CVE-2019-11709 CVE-2019-9811 Reference: ASB-2019.0190 ESB-2019.2566 Original Bulletin: http://www.debian.org/security/2019/dsa-4479 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - - ------------------------------------------------------------------------- Debian Security Advisory DSA-4479-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff July 11, 2019 https://www.debian.org/security/faq - - ------------------------------------------------------------------------- Package : firefox-esr CVE ID : CVE-2019-9811 CVE-2019-11709 CVE-2019-11711 CVE-2019-11712 CVE-2019-11713 CVE-2019-11715 CVE-2019-11717 CVE-2019-11730 CVE-2019-11719 CVE-2019-11729 Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code, cross-site scripting, spoofing, information disclosure, denial of service or cross-site request forgery. For the oldstable distribution (stretch), these problems have been fixed in version 60.8.0esr-1~deb9u1. For the stable distribution (buster), these problems have been fixed in version 60.8.0esr-1~deb10u1. CVE-2019-11719 and CVE-2019-11729 are only addressed for stretch, in buster Firefox uses the system-wide copy of NSS which will be updated separately. We recommend that you upgrade your firefox-esr packages. For the detailed security status of firefox-esr please refer to its security tracker page at: https://security-tracker.debian.org/tracker/firefox-esr Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org - -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAl0noDwACgkQEMKTtsN8 TjbLRA//cEymXG0jRo2p08DcuBusA2UlGZWtq7tHUHgkhsy6xjIoH6v2YDv/A4oK jm9FZzGH6wv18eMv2x3LNuRsd2rsz3onK8/cCKhzv8SOSnQxxLA9u/MdH9x92ITX JQY3huO7jOjz5WfR1Bb1azY60sXFcNQBgbF2EW0pCAZ5ApLBzetxOyiN+yqU8Vl1 aQwdtT7xuH0z3uhkgqMc4slc4IWxNPoLqkVAFvB017W3zaDD+pVWZlG1V2lHU8XB wcFDEzDzlvQnqys2w2VCX0ZHPixwa/ZeYDrQSlUHTXWFchW2TPDR9HDBgEL6riTa GwQM3OmbnbEJDAwKdSbDZ+Z1vDlpEuFDwyPA9IepTx0ge7qU2eVgT1lWUJrHdMyX bDq9Vmqd8C8XG8q/d/u12WIV5XYOsyjQXqVSclbth7dwTz+PKdK19PfJXcx7JRie t7R/QcMF/lFG0tL+vf9N457g/A5vQ83WaEUaUNsQvJKvkIUriEjCLrzzQqwzZB7l e17ZVG1vwqaeOBUBlRzu9bSPY8NcbCg8KDVlyv1L4vEcyPSi3fGN6HwCf2lDn2uP kF2oK1Bleifj7cJAGg9MRo2S7php9brk59fs/FpBmTm3VEykZPoh2eFzW/U+L7EX +cp/1dGXbNeDiwxZMRdBJ5cI6OT6wsi8Mao9CdJ6XWn3iJnVVhw= =agp1 - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXSf9hWaOgq3Tt24GAQhTSw/+PPgUQORNXKn50m3sr1LQxdfj06561fpi F3xSk2if/5rKWioclcogWGud3udAEdaZqM9VMcBhAaTCu56IkizEnnUkmbbFlIl6 7b2iimqv7UuDm6uYcT25NIZIBdfB8WXX6g8Vy2nUCuonVJg9yDQg+HTDRnfhg7a5 5rYhr9YnoaIuoRt8t+wyiR/pvgESQ4jR8CCA8TmYRXllIm1GAOy3eFKfcmF7fO9D eXAfdo3uWbJOZjrfeZ2w8jvvEaavBV3DShx7LMMMcjo1uRa6gCTw6w6bzsjlAsOO bR0mrqo67r0Iq7T5nC351eiuRlXd1EoS4a9NNvRLanvOs58xcGdNO4Ekmyqk6fq1 Ul1DMdvdg5rTU6ysrhhIGK5Ma2bYUd0fGidXJPq5bA6C4TAb9ziriUb5bcB5/V/f aCN3VAgt9EKZu3eaGA064Q7xAdOb7rlgJRsfuvq7SZ2EfrrjbaXjZAMxTqs7GZtm DFny2SnWVvuC95N3icZMGBQaYebGYhR67JFtfn+7O6vvKjvRx4T+KcFYNVFviQEq oFEVnLHmxkcw2C/Q78M1X4m7Ji/+4JcVnAzj5mN2TvjL2o183OY2FCD8wLkOjfre cGgJbkPd8LavSQfWlNsSPvvLm4Zr3clgxZnke/pMx+DWDFuJP1p87sblLZ3DztlR qnkfeG8IuiI= =E4Pb -----END PGP SIGNATURE-----