it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Moritz Muehlenhoff <jmm AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 5350-1] firefox-esr security update
- Date: Wed, 15 Feb 2023 22:15:01 +0000
- Authentication-results: mail.piratenpartei.de; dkim=none; spf=none (mail.piratenpartei.de: domain of "bounce-debian-security-announce=it-securitynotifies=lists.piratenpartei.de AT lists.debian.org" has no SPF policy when checking 82.195.75.100) smtp.mailfrom="bounce-debian-security-announce=it-securitynotifies=lists.piratenpartei.de AT lists.debian.org"; dmarc=none
- List-archive: https://lists.debian.org/msgid-search/Y+1ZZWgYCwgXtudV AT seger.debian.org
- List-id: <debian-security-announce.lists.debian.org>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Content-Type:MIME-Version:Message-ID:Subject:To:From:Date :Reply-To:Cc:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=cHwLTtjyhulnk9OrBWRex//AYNt63nCV6h9+p4TCtPU=; b=pA 0Ki0/AiyQHMZA1ulNpcn31Q9+5BztJITU7CeW4jgow3Wh9AhQuHHkp9x6yiYS1/2JkCxkGciDp2gT /+c6nmMU/ThsacxuwAHtqgzZ1W5Qh+ciYACozGbp0UL5SRllk9y8IHo7DfXKH0rAocLew3uNmfu/s Dkrv3Sn0msbh5Yq4OUIfXGAa8XtZJ7bpr8CsUz41i0ykl6DZ7O/RCa3DhtfOc16VUtfSM1k570oxg zui4r6wWXH/1WQKrG7eCU0uFnK4mrtvR0q4Q1L/IsKyi8CksbZX1uQJ1JUqiikmlMUqAjWJlngKQk L4rdzKDiTIa4CSHtpneHZsmKo4aUi76g==;
- Old-return-path: <jmm AT seger.debian.org>
- Priority: urgent
- Resent-date: Wed, 15 Feb 2023 22:15:28 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <WoH9p3hwroN.A.BhG.AmV7jB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5350-1 security AT debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
February 15, 2023 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : firefox-esr
CVE ID : CVE-2023-0767 CVE-2023-25728 CVE-2023-25729 CVE-2023-25730
CVE-2023-25732 CVE-2023-25735 CVE-2023-25737 CVE-2023-25739
CVE-2023-25742 CVE-2023-25744 CVE-2023-25746
Multiple security issues have been found in the Mozilla Firefox web
browser, which could potentially result in the execution of arbitrary
code, information disclosure or spoofing.
For the stable distribution (bullseye), these problems have been fixed in
version 102.8.0esr-1~deb11u1.
We recommend that you upgrade your firefox-esr packages.
For the detailed security status of firefox-esr please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/firefox-esr
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----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=us1V
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 5350-1] firefox-esr security update, Moritz Muehlenhoff, 15.02.2023
Archiv bereitgestellt durch MHonArc 2.6.24.