exploit the possibilities

Debian Security Advisory 4411-1

Debian Security Advisory 4411-1
Posted Mar 21, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4411-1 - Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code.

tags | advisory, web, arbitrary
systems | linux, debian
advisories | CVE-2018-18506, CVE-2019-9788, CVE-2019-9790, CVE-2019-9791, CVE-2019-9792, CVE-2019-9793, CVE-2019-9795, CVE-2019-9796
MD5 | a55828919dc149d864f25e35999b7b7d

Debian Security Advisory 4411-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4411-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
March 20, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : firefox-esr
CVE ID : CVE-2018-18506 CVE-2019-9788 CVE-2019-9790 CVE-2019-9791
CVE-2019-9792 CVE-2019-9793 CVE-2019-9795 CVE-2019-9796

Multiple security issues have been found in the Mozilla Firefox web
browser, which could potentially result in the execution of arbitrary
code.

For the stable distribution (stretch), these problems have been fixed in
version 60.6.0esr-1~deb9u1.

We recommend that you upgrade your firefox-esr packages.

For the detailed security status of firefox-esr please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/firefox-esr

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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VKkA
-----END PGP SIGNATURE-----

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

January 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    8 Files
  • 2
    Jan 2nd
    11 Files
  • 3
    Jan 3rd
    11 Files
  • 4
    Jan 4th
    2 Files
  • 5
    Jan 5th
    2 Files
  • 6
    Jan 6th
    18 Files
  • 7
    Jan 7th
    15 Files
  • 8
    Jan 8th
    16 Files
  • 9
    Jan 9th
    10 Files
  • 10
    Jan 10th
    13 Files
  • 11
    Jan 11th
    2 Files
  • 12
    Jan 12th
    4 Files
  • 13
    Jan 13th
    21 Files
  • 14
    Jan 14th
    18 Files
  • 15
    Jan 15th
    12 Files
  • 16
    Jan 16th
    18 Files
  • 17
    Jan 17th
    11 Files
  • 18
    Jan 18th
    0 Files
  • 19
    Jan 19th
    0 Files
  • 20
    Jan 20th
    0 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close