Red Hat Security Advisory 2018-2834-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 60.2.1 ESR. Issues addressed include a crash.
368165b65635e6cd55b2ff023acfe7a01b41cbdac7daee1974dc6d97fb5849dc
Red Hat Security Advisory 2018-2768-01 - Network Security Services is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Issues addressed include a ClientHello issue with nss.
d60f75d418d1de32ebb20da317060c0d372fc15bfcfe685a16247f8fda85737b
Debian Linux Security Advisory 4304-1 - Two security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code and local information disclosure.
4f65041dee741f4361f984b6216d05c5ddb952b9aff630fedfb77f36f7aff7a8
Slackware Security Advisory - New mozilla-firefox packages are available for Slackware 14.2 and -current to fix security issues.
0ce385df00643a278dcd61d531f395ddba6492de4cfe175b7c1ea093ee8ccf5d
Ubuntu Security Notice 3761-3 - USN-3761-1 fixed vulnerabilities in Firefox. The update caused several regressions affecting spellchecker dictionaries and search engines, which were partially fixed by USN-3761-2. This update contains the remaining fix. Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, or execute arbitrary code. It was discovered that if a user saved passwords before Firefox 58 and then later set a master password, an unencrypted copy of these passwords would still be accessible. A local user could exploit this to obtain sensitive information. Various other issues were also addressed.
8c650b9d8ce919aff2f38f5ef9e84c1ecb7288b8019a119d2670ebf11068cb99
Ubuntu Security Notice 3761-1 - Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, or execute arbitrary code. It was discovered that if a user saved passwords before Firefox 58 and then later set a master password, an unencrypted copy of these passwords would still be accessible. A local user could exploit this to obtain sensitive information. Various other issues were also addressed.
5250f9b22135e87b334a076a8fd606b93af51fe81a2760f9e0440c740663d869
Dell EMC ScaleIO customers are encouraged to update to ScaleIO version 2.5, which contains fixes for multiple security vulnerabilities in earlier ScaleIO software versions that could potentially be exploited by malicious users to compromise the affected system.
3507cdff27820aa937d3111f0f6bd571ce359e4860750499ab690e86563a2437