[SECURITY] [DSA 5510-1] libvpx security update

2023-09-29 Thread Salvatore Bonaccorso
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-5510-1   secur...@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
September 29, 2023https://www.debian.org/security/faq
- -

Package: libvpx
CVE ID : CVE-2023-5217
Debian Bug : 1053182

Clement Lecigne discovered a heap-based buffer overflow in libvpx, a
multimedia library for the VP8 and VP9 video codecs, which may result in
the execution of arbitrary code if a specially crafted VP8 media stream
is processed.

For the oldstable distribution (bullseye), this problem has been fixed
in version 1.9.0-1+deb11u1.

For the stable distribution (bookworm), this problem has been fixed in
version 1.12.0-1+deb12u1.

We recommend that you upgrade your libvpx packages.

For the detailed security status of libvpx please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/libvpx

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-

iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmUXPQxfFIAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND
z0RFDA/9GmZkMOfqEBNeItASvUeQAbPu9w7hh/Ah/Ox9gSFZMvD5QmGTs6Zp8lZY
TmOKS2Ls1rgQnfM/c+dm6Le4H9e+EtGYvLI0P6KjIk3T+rA+55os3WoUE99KJsZr
j0AZM0jsmaQVuV1MbJIJSGo6a49qRkSIF4eS7/rws8xImu73EgcPQiWep70kF8/i
dqnYYqFEKJwT3Oxp2h4zYLM8Jqt8ji4caTHle20rcQ1tdOBCcqDWH87aNk1kqhWE
Le281K7sDVYlpyIGSZRsvHbTusESlvp+92sRIQPRDdpMMkSgACBDcHpfCHiJDofD
Dn+6Z4zA5XRxHOKlHvYvrg9lDSA1eu9V7oaR2YoBRfIcwd4HxB535FjJRNDGtt+0
thJnuv+zjiA2yK/GTBju52q+96qGcXhPrGOZiQeth4SdxVnK3FKc3lB6HbMgs4ZE
RZNhs7AJ4I7pnyX6d8Zux3kPjejrdvBOFT8L+gNYzYn0tkcKHdpK2Xj0OMKboDLF
xw26i8GgNb9RUht6Seb1dk2bnel2fJ+rqgxkltpVuTIFjQ942YtHm/a9xj6FLK3D
6CtX1masIZ53uo51k2qWAGJWUqovasIQQHBUeOHgFHw+lHNHNlSsiblu6xc9y4B4
2vpozR449Q3volOr7t7oWv/pmsqrd48ByYXj7NESzD/bm4uOo9E=
=NrxQ
-END PGP SIGNATURE-



[SECURITY] [DSA 5509-1] firefox-esr security update

2023-09-29 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-5509-1   secur...@debian.org
https://www.debian.org/security/   Moritz Muehlenhoff
September 29, 2023https://www.debian.org/security/faq
- -

Package: firefox-esr
CVE ID : CVE-2023-5217

A buffer overflow in VP8 media stream processing has been found in the
Mozilla Firefox web browser, which could potentially result in the
execution of arbitrary code.

For the oldstable distribution (bullseye), this problem has been fixed
in version 115.3.1esr-1~deb11u1.

For the stable distribution (bookworm), this problem will be fixed
via the libvpx source package, Firefox ESR in Bookworm links dynamically
against libvpx.

We recommend that you upgrade your firefox-esr packages.

For the detailed security status of firefox-esr please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/firefox-esr

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-
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=CrEb
-END PGP SIGNATURE-



[SECURITY] [DSA 5508-1] chromium security update

2023-09-29 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-5508-1   secur...@debian.org
https://www.debian.org/security/   Moritz Muehlenhoff
September 29, 2023https://www.debian.org/security/faq
- -

Package: chromium
CVE ID : CVE-2023-5186 CVE-2023-5187 CVE-2023-5217

Multiple security issues were discovered in Chromium, which could result
in the execution of arbitrary code, denial of service or information
disclosure.

For the oldstable distribution (bullseye), these problems have been fixed
in version 117.0.5938.132-1~deb11u1.

For the stable distribution (bookworm), these problems have been fixed in
version 117.0.5938.132-1~deb12u1.

We recommend that you upgrade your chromium packages.

For the detailed security status of chromium please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/chromium

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-BEGIN PGP SIGNATURE-
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=nMGQ
-END PGP SIGNATURE-