-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2019.4592.2
                        firefox-esr security update
                             11 December 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           firefox-esr
Publisher:         Debian
Operating System:  Debian GNU/Linux 9
                   Debian GNU/Linux 10
                   Debian GNU/Linux 8
Impact/Access:     Denial of Service        -- Remote with User Interaction
                   Access Confidential Data -- Remote with User Interaction
                   Reduced Security         -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-17012 CVE-2019-17011 CVE-2019-17010
                   CVE-2019-17008 CVE-2019-17005 

Reference:         ESB-2019.4563
                   ESB-2019.4555
                   ESB-2019.4553
                   ESB-2019.4552

Original Bulletin: 
   http://www.debian.org/security/2019/dsa-4580
   https://lists.debian.org/debian-lts-announce/2019/12/msg00010.html

Comment: This bulletin contains two (2) Debian security advisories.

Revision History:  December 11 2019: Added DLA 2029-1
                   December 10 2019: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4580-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
December 09, 2019                     https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : firefox-esr
CVE ID         : CVE-2019-17005 CVE-2019-17008 CVE-2019-17010 
                 CVE-2019-17011 CVE-2019-17012

Multiple security issues have been found in the Mozilla Firefox web
browser, which could potentially result in the execution of arbitrary
code.

For the oldstable distribution (stretch), these problems have been fixed
in version 68.3.0esr-1~deb9u1.

For the stable distribution (buster), these problems have been fixed in
version 68.3.0esr-1~deb10u1.

We recommend that you upgrade your firefox-esr packages.

For the detailed security status of firefox-esr please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/firefox-esr

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAl3upmEACgkQEMKTtsN8
TjakxQ//bie3cLlr9VtdzJfeSK3l7VRorAH8ZjKDYB5Ybyson39Esmfpxk0P8AlO
YwTr8xHqQPrtZhmp2srFgGV+TaB7kDLSpFHa+57mR0W9rl59l2pbYlzGC2IuF+6h
+4FbNdAwbdX+crjvi4lLtwekoUV391FYRHo722WNX8rAyvg6K7MTMq4NinOsA/Yy
pBsxOpgkJFgJ6GtGQhBrs39CIJ9shOg/Qb/dE39a3fbq54s/7CdAq5eAI3EhDSLX
jDSO6d+1GuWtU/eIKIS7Bp3+1fsmgVrtbgbL9jcSar/Entg6i64w48Ecy9P0VKVl
IGn8ESwbYBhJ2gazuwpRp8hmn4dkwb0tP7JR3g8CA0Na2uI1tC/1rruQS0PPIJbd
voPmllmDhW/dOXThwzYvpVzv6o0zmbNDah39YaGPl/goPauqRlQ7k7KWCK+WOUTA
1lNx0aMvj9SXENVg7cD5vQISEisc26r/yOfIYFg9XT1zqBeVyz9U4yIqlRpDcMuB
pne85VZ3uutMD6Yg6Xnxi+RwBB+/vLUBh+lBMvUJ+q6UKZOwj6/ddsF2IZfjLHRM
+9ZKzR6OTJXj1uqS7BH5hPsqyJdn8kOzrbfvpYRi3lgvibfYvFrEQ2CEU665ZOoW
ZXEmx+LiL4RpghNjhFGBqekJYaQY0jDh0uF1jBcq2uMI7lF88oo=
=fASS
- -----END PGP SIGNATURE-----

- --------------------------------------------------------------------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Package        : firefox-esr
Version        : 68.3.0esr-1~deb8u1
CVE ID         : CVE-2019-17005 CVE-2019-17008 CVE-2019-17010 CVE-2019-17011
                 CVE-2019-17012

Multiple security issues have been found in the Mozilla Firefox web
browser, which could potentially result in the execution of arbitrary
code.

For Debian 8 "Jessie", these problems have been fixed in version
68.3.0esr-1~deb8u1.

We recommend that you upgrade your firefox-esr packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
- -----BEGIN PGP SIGNATURE-----
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=2dew
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=rcAW
-----END PGP SIGNATURE-----