[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 3568-1] firefox-esr security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3568-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/               Emilio Pozuelo Monfort
September 16, 2023                            https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : firefox-esr
Version        : 102.15.1esr-1~deb10u1
CVE ID         : CVE-2023-4863

A buffer overflow in parsing WebP images may result in the execution of
arbitrary code.

For Debian 10 buster, this problem has been fixed in version
102.15.1esr-1~deb10u1.

We recommend that you upgrade your firefox-esr packages.

For the detailed security status of firefox-esr please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/firefox-esr

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
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=t9jN
-----END PGP SIGNATURE-----


Reply to: