9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.007 Low
EPSS
Percentile
79.2%
Debian Security Advisory DSA-4287-1 [email protected]
https://www.debian.org/security/ Moritz Muehlenhoff
September 07, 2018 https://www.debian.org/security/faq
Package : firefox-esr
CVE ID : CVE-2018-12376 CVE-2018-12377 CVE-2018-12378
Several security issues have been found in the Mozilla Firefox web
browser: Multiple memory safety errors and use-after-frees may lead to
the execution of arbitrary code or denial of service.
Debian follows the extended support releases (ESR) of Firefox. Support
for the 52.x series has ended, so starting with this update we're now
following the 60.x releases.
Between 52.x and 60.x, Firefox has undergone significant internal
updates, which makes it incompatible with a number of extensions. For
more information please refer to
https://www.mozilla.org/en-US/firefox/60.0esr/releasenotes/
In addition, the new Firefox packages require Rust to build. A
compatible Rust toolchain has been backported to Debian stretch, but is
not available for all architectures which previously supported the
purely C+±based Firefox packages. Thus, the new Firefox packages
don't support the armel, armhf, mips, mips64el and mipsel architectures
at this point.
For the stable distribution (stretch), these problems have been fixed in
version 60.2.0esr-1~deb9u2.
We recommend that you upgrade your firefox-esr packages.
For the detailed security status of firefox-esr please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/firefox-esr
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 9 | all | firefox-esr-l10n-gl | < 60.2.0esr-1~deb9u2 | firefox-esr-l10n-gl_60.2.0esr-1~deb9u2_all.deb |
Debian | 8 | all | icedove | < 1:60.3.0-1~deb8u1 | icedove_1:60.3.0-1~deb8u1_all.deb |
Debian | 8 | all | thunderbird-l10n-ga-ie | < 1:60.3.0-1~deb8u1 | thunderbird-l10n-ga-ie_1:60.3.0-1~deb8u1_all.deb |
Debian | 9 | all | icedove-l10n-gd | < 1:60.2.1-2~deb9u1 | icedove-l10n-gd_1:60.2.1-2~deb9u1_all.deb |
Debian | 9 | all | lightning-l10n-da | < 1:60.2.1-2~deb9u1 | lightning-l10n-da_1:60.2.1-2~deb9u1_all.deb |
Debian | 9 | all | firefox-esr-l10n-fa | < 60.2.0esr-1~deb9u2 | firefox-esr-l10n-fa_60.2.0esr-1~deb9u2_all.deb |
Debian | 9 | all | firefox-esr-l10n-da | < 60.2.0esr-1~deb9u2 | firefox-esr-l10n-da_60.2.0esr-1~deb9u2_all.deb |
Debian | 9 | all | firefox-esr-l10n-is | < 60.2.0esr-1~deb9u2 | firefox-esr-l10n-is_60.2.0esr-1~deb9u2_all.deb |
Debian | 9 | all | iceweasel-l10n-af | < 1:60.2.0esr-1~deb9u2 | iceweasel-l10n-af_1:60.2.0esr-1~deb9u2_all.deb |
Debian | 8 | all | thunderbird-l10n-ru | < 1:60.3.0-1~deb8u1 | thunderbird-l10n-ru_1:60.3.0-1~deb8u1_all.deb |
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.007 Low
EPSS
Percentile
79.2%