-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.2569
                        firefox-esr security update
                               12 July 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           firefox-esr
Publisher:         Debian
Operating System:  Debian GNU/Linux 9
                   Debian GNU/Linux 10
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Cross-site Request Forgery      -- Remote with User Interaction
                   Cross-site Scripting            -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
                   Access Confidential Data        -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-11730 CVE-2019-11729 CVE-2019-11719
                   CVE-2019-11717 CVE-2019-11715 CVE-2019-11713
                   CVE-2019-11712 CVE-2019-11711 CVE-2019-11709
                   CVE-2019-9811  

Reference:         ASB-2019.0190
                   ESB-2019.2566

Original Bulletin: 
   http://www.debian.org/security/2019/dsa-4479

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4479-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
July 11, 2019                         https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : firefox-esr
CVE ID         : CVE-2019-9811 CVE-2019-11709 CVE-2019-11711 CVE-2019-11712 
                 CVE-2019-11713 CVE-2019-11715 CVE-2019-11717 CVE-2019-11730
                 CVE-2019-11719 CVE-2019-11729

Multiple security issues have been found in the Mozilla Firefox web
browser, which could potentially result in the execution of arbitrary
code, cross-site scripting, spoofing, information disclosure, denial of
service or cross-site request forgery.


For the oldstable distribution (stretch), these problems have been fixed
in version 60.8.0esr-1~deb9u1.

For the stable distribution (buster), these problems have been fixed in
version 60.8.0esr-1~deb10u1.

CVE-2019-11719 and CVE-2019-11729 are only addressed for stretch, in
buster Firefox uses the system-wide copy of NSS which will be updated
separately.

We recommend that you upgrade your firefox-esr packages.

For the detailed security status of firefox-esr please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/firefox-esr

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=agp1
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=E4Pb
-----END PGP SIGNATURE-----