exploit the possibilities

Debian Security Advisory 4474-1

Debian Security Advisory 4474-1
Posted Jul 2, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4474-1 - A sandbox escape was found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code if combined with additional vulnerabilities.

tags | advisory, web, arbitrary, vulnerability
systems | linux, debian
advisories | CVE-2019-11708
MD5 | ca6538055b670bc57db4e583fc68d053

Debian Security Advisory 4474-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4474-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
July 01, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : firefox-esr
CVE ID : CVE-2019-11708

A sandbox escape was found in the Mozilla Firefox web browser, which
could potentially result in the execution of arbitrary code if
combined with additional vulnerabilities.

For the stable distribution (stretch), this problem has been fixed in
version 60.7.2esr-1~deb9u1.

We recommend that you upgrade your firefox-esr packages.

For the detailed security status of firefox-esr please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/firefox-esr

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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uXCj
-----END PGP SIGNATURE-----

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

July 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    34 Files
  • 2
    Jul 2nd
    15 Files
  • 3
    Jul 3rd
    9 Files
  • 4
    Jul 4th
    8 Files
  • 5
    Jul 5th
    2 Files
  • 6
    Jul 6th
    3 Files
  • 7
    Jul 7th
    1 Files
  • 8
    Jul 8th
    15 Files
  • 9
    Jul 9th
    15 Files
  • 10
    Jul 10th
    20 Files
  • 11
    Jul 11th
    17 Files
  • 12
    Jul 12th
    16 Files
  • 13
    Jul 13th
    2 Files
  • 14
    Jul 14th
    1 Files
  • 15
    Jul 15th
    20 Files
  • 16
    Jul 16th
    27 Files
  • 17
    Jul 17th
    7 Files
  • 18
    Jul 18th
    5 Files
  • 19
    Jul 19th
    12 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close