-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2023.0934
                        firefox-esr security update
                             16 February 2023

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           firefox-esr
Publisher:         Debian
Operating System:  Debian GNU/Linux
Resolution:        Patch/Upgrade
CVE Names:         CVE-2023-25746 CVE-2023-25744 CVE-2023-25742
                   CVE-2023-25739 CVE-2023-25737 CVE-2023-25735
                   CVE-2023-25732 CVE-2023-25730 CVE-2023-25729
                   CVE-2023-25728 CVE-2023-0767 

Original Bulletin: 
   http://www.debian.org/security/2023/dsa-5350

Comment: CVSS (Max):  8.1* CVE-2023-0767 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)
         CVSS Source: SUSE
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
         * Not all CVSS available when published

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-5350-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
February 15, 2023                     https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : firefox-esr
CVE ID         : CVE-2023-0767 CVE-2023-25728 CVE-2023-25729 CVE-2023-25730 
                 CVE-2023-25732 CVE-2023-25735 CVE-2023-25737 CVE-2023-25739 
                 CVE-2023-25742 CVE-2023-25744 CVE-2023-25746

Multiple security issues have been found in the Mozilla Firefox web
browser, which could potentially result in the execution of arbitrary
code, information disclosure or spoofing.

For the stable distribution (bullseye), these problems have been fixed in
version 102.8.0esr-1~deb11u1.

We recommend that you upgrade your firefox-esr packages.

For the detailed security status of firefox-esr please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/firefox-esr

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=us1V
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=LjKi
-----END PGP SIGNATURE-----