[SECURITY] [DSA 5510-1] libvpx security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - - Debian Security Advisory DSA-5510-1 secur...@debian.org https://www.debian.org/security/ Salvatore Bonaccorso September 29, 2023https://www.debian.org/security/faq - - Package: libvpx CVE ID : CVE-2023-5217 Debian Bug : 1053182 Clement Lecigne discovered a heap-based buffer overflow in libvpx, a multimedia library for the VP8 and VP9 video codecs, which may result in the execution of arbitrary code if a specially crafted VP8 media stream is processed. For the oldstable distribution (bullseye), this problem has been fixed in version 1.9.0-1+deb11u1. For the stable distribution (bookworm), this problem has been fixed in version 1.12.0-1+deb12u1. We recommend that you upgrade your libvpx packages. For the detailed security status of libvpx please refer to its security tracker page at: https://security-tracker.debian.org/tracker/libvpx Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -BEGIN PGP SIGNATURE- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmUXPQxfFIAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0RFDA/9GmZkMOfqEBNeItASvUeQAbPu9w7hh/Ah/Ox9gSFZMvD5QmGTs6Zp8lZY TmOKS2Ls1rgQnfM/c+dm6Le4H9e+EtGYvLI0P6KjIk3T+rA+55os3WoUE99KJsZr j0AZM0jsmaQVuV1MbJIJSGo6a49qRkSIF4eS7/rws8xImu73EgcPQiWep70kF8/i dqnYYqFEKJwT3Oxp2h4zYLM8Jqt8ji4caTHle20rcQ1tdOBCcqDWH87aNk1kqhWE Le281K7sDVYlpyIGSZRsvHbTusESlvp+92sRIQPRDdpMMkSgACBDcHpfCHiJDofD Dn+6Z4zA5XRxHOKlHvYvrg9lDSA1eu9V7oaR2YoBRfIcwd4HxB535FjJRNDGtt+0 thJnuv+zjiA2yK/GTBju52q+96qGcXhPrGOZiQeth4SdxVnK3FKc3lB6HbMgs4ZE RZNhs7AJ4I7pnyX6d8Zux3kPjejrdvBOFT8L+gNYzYn0tkcKHdpK2Xj0OMKboDLF xw26i8GgNb9RUht6Seb1dk2bnel2fJ+rqgxkltpVuTIFjQ942YtHm/a9xj6FLK3D 6CtX1masIZ53uo51k2qWAGJWUqovasIQQHBUeOHgFHw+lHNHNlSsiblu6xc9y4B4 2vpozR449Q3volOr7t7oWv/pmsqrd48ByYXj7NESzD/bm4uOo9E= =NrxQ -END PGP SIGNATURE-
[SECURITY] [DSA 5509-1] firefox-esr security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - - Debian Security Advisory DSA-5509-1 secur...@debian.org https://www.debian.org/security/ Moritz Muehlenhoff September 29, 2023https://www.debian.org/security/faq - - Package: firefox-esr CVE ID : CVE-2023-5217 A buffer overflow in VP8 media stream processing has been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code. For the oldstable distribution (bullseye), this problem has been fixed in version 115.3.1esr-1~deb11u1. For the stable distribution (bookworm), this problem will be fixed via the libvpx source package, Firefox ESR in Bookworm links dynamically against libvpx. We recommend that you upgrade your firefox-esr packages. For the detailed security status of firefox-esr please refer to its security tracker page at: https://security-tracker.debian.org/tracker/firefox-esr Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmUXDYAACgkQEMKTtsN8 TjbJSRAAsv7xfSOoUGua0jPwrm84IUtEhshl1L3KhatogD2HbIIVZzDOBjcpR4oQ wXGtLUjJJTnwZPwey9tNQQAzIBtPA+u/0Eow2eeUyqtUSEIqBUImdMH6m8GYqQ+Z uGdyvSa+IvbffJqPf4LzzCIZoxo9qQyz6F6K0xQ6c0kv2CCRYpDQHAgP4/E/VNfd OGhoTYhgRinAjeVY/I91hxfYm4783EMoc7L7vXgjOWxXNiPllmAIddCKlIdtgW02 fq0lsqOljRfPYsAbc9xe1aVZlCVi+6nJj/jDxhqENn4XLAVJYdZr6W8hevQLADGu wzrTyACeusDaSHdW64X15TDnY8z5wOP/Vj4T9CpRhkQ396fn1eq+x4HF/iUim4of pDBtb1xa/jAT+OuejqATdku8XvNzZ4l6KkJ7PuotMHvIXxsduNtesPmPUvFWeprC umojh6SbVhlf8YnM6c0c6spMyp3nKqHS59vDkzhKYbz50eFnNw0/q3OvZHndXZOi EjMxCR2GcElaejC8MAei4NuZm57VM5sfSqAUOCOZ1RJNRwsP6HkohmKNfklryjDj BMNudjRuPjVYX6d3Qoi1krDszjvRa+ui6ZljoKrKQFLg2SDEhbxt9akey/ZBr1lq EYNj6QubPNMlkVHYySVcv+IsEK2yww2S9CmCifLrKbNeOoE9o6I= =CrEb -END PGP SIGNATURE-
[SECURITY] [DSA 5508-1] chromium security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - - Debian Security Advisory DSA-5508-1 secur...@debian.org https://www.debian.org/security/ Moritz Muehlenhoff September 29, 2023https://www.debian.org/security/faq - - Package: chromium CVE ID : CVE-2023-5186 CVE-2023-5187 CVE-2023-5217 Multiple security issues were discovered in Chromium, which could result in the execution of arbitrary code, denial of service or information disclosure. For the oldstable distribution (bullseye), these problems have been fixed in version 117.0.5938.132-1~deb11u1. For the stable distribution (bookworm), these problems have been fixed in version 117.0.5938.132-1~deb12u1. We recommend that you upgrade your chromium packages. For the detailed security status of chromium please refer to its security tracker page at: https://security-tracker.debian.org/tracker/chromium Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmUXDXcACgkQEMKTtsN8 TjaQhhAAq9gEaLM0MplRerbQ0xg7lYNIiyCwlFBVM7VgHRIrE13c3T0twkB1JNOu v+5IVyej3L5AITp5VZsQSf1IcYVydf2ABEo/3qU3SEpAg/P/ZLR8ODQA/VGoUXiB RDSr2EwFFmNFNUCIbpea9OqBpxMCsCQkd7fTbcK4GpvSZby9ZnNkSu6o9ZBCoA1B qFsHElijcwvdx7x/+OLtFHT/2NDArgsDHt/1QvocsdxyXVHgbCZ3MVNo2uG1uWaN NsPzoOF5oMe732jTuAFs06/q3e7N7zOyBn13thxGEgSoUS9LA7Ow5kbAU7JGC24n bdEwb2iN69sGPt2N7C8VfPdZQeIpg2SV+3ZOKqKSRdozgUZA52+WEhwqV2TNDlrd cCRqfmW/aRQEEvogs9NolejtkajTR3th99aN0KKDqHR66Syzb7SNggOoXpH8bCi8 3WvoZKHPh1UjJeaVDDBb3RyioTg9HUfddDicxJoYFmAwSjVuD4LR6leW/q0zP+aU eCBUXVVIU2XMSmiegrrnzAF+oNGVpj2ATn4ecoB+N/6sS9Hg+0FdpoeY9nB1PIRk ccP0sURvabZBoyExknsQPdLb3GxmvOXBRmM2Gbup76HrSNmkmgGXbsUEfeUBmPws qiEceUn4yVSkIv/2LDHZN5hWk9MO+u3qnaT4xiXS5Y2vq6KP89M= =nMGQ -END PGP SIGNATURE-