Security
Headlines
HeadlinesLatestCVEs

Headline

Debian Security Advisory 5788-1

Debian Linux Security Advisory 5788-1 - Damien Schaeffer discovered a use-after-free in the Mozilla Firefox web browser, which could result in the execution of arbitrary code.

Packet Storm
#web#linux#debian#ssh#firefox
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA512- -------------------------------------------------------------------------Debian Security Advisory DSA-5788-1                   [email protected]://www.debian.org/security/                       Moritz MuehlenhoffOctober 10, 2024                      https://www.debian.org/security/faq- -------------------------------------------------------------------------Package        : firefox-esrCVE ID         : CVE-2024-9680Damien Schaeffer discovered a use-after-free in the Mozilla Firefox webbrowser, which could result in the execution of arbitrary code.For the stable distribution (bookworm), this problem has been fixed inversion 128.3.1esr-1~deb12u1.We recommend that you upgrade your firefox-esr packages.For the detailed security status of firefox-esr please refer toits security tracker page at:https://security-tracker.debian.org/tracker/firefox-esrFurther information about Debian Security Advisories, how to applythese updates to your system and frequently asked questions can befound at: https://www.debian.org/security/Mailing list: [email protected] PGP SIGNATURE-----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z+e7-----END PGP SIGNATURE-----

Related news

Red Hat Security Advisory 2024-7977-03

Red Hat Security Advisory 2024-7977-03 - An update for firefox is now available for Red Hat Enterprise Linux 8. Issues addressed include a use-after-free vulnerability.

Critical Mozilla Firefox Zero-Day Allows Code Execution

The bug is already being exploited in the wild, but Firefox has provided patches for those who may be vulnerable.

Red Hat Security Advisory 2024-7958-03

Red Hat Security Advisory 2024-7958-03 - An update for firefox is now available for Red Hat Enterprise Linux 9. Issues addressed include a use-after-free vulnerability.

Firefox Zero-Day Under Attack: Update Your Browser Immediately

Mozilla has revealed that a critical security flaw impacting Firefox and Firefox Extended Support Release (ESR) has come under active exploitation in the wild. The vulnerability, tracked as CVE-2024-9680, has been described as a use-after-free bug in the Animation timeline component. "An attacker was able to achieve code execution in the content process by exploiting a use-after-free in

Packet Storm: Latest News

ABB Cylon Aspect 3.07.02 user.properties Default Credentials