exploit the possibilities

Debian Security Advisory 4474-1

Debian Security Advisory 4474-1
Posted Jul 2, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4474-1 - A sandbox escape was found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code if combined with additional vulnerabilities.

tags | advisory, web, arbitrary, vulnerability
systems | linux, debian
advisories | CVE-2019-11708
MD5 | ca6538055b670bc57db4e583fc68d053

Debian Security Advisory 4474-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4474-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
July 01, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : firefox-esr
CVE ID : CVE-2019-11708

A sandbox escape was found in the Mozilla Firefox web browser, which
could potentially result in the execution of arbitrary code if
combined with additional vulnerabilities.

For the stable distribution (stretch), this problem has been fixed in
version 60.7.2esr-1~deb9u1.

We recommend that you upgrade your firefox-esr packages.

For the detailed security status of firefox-esr please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/firefox-esr

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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uXCj
-----END PGP SIGNATURE-----

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

November 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    28 Files
  • 2
    Nov 2nd
    1 Files
  • 3
    Nov 3rd
    1 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    19 Files
  • 6
    Nov 6th
    65 Files
  • 7
    Nov 7th
    22 Files
  • 8
    Nov 8th
    18 Files
  • 9
    Nov 9th
    1 Files
  • 10
    Nov 10th
    1 Files
  • 11
    Nov 11th
    11 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close