-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.1034
                        firefox-esr security update
                               25 March 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           firefox-esr
Publisher:         Debian
Operating System:  Debian GNU/Linux
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
                   Provide Misleading Information  -- Remote with User Interaction
                   Access Confidential Data        -- Remote with User Interaction
                   Reduced Security                -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-23987 CVE-2021-23984 CVE-2021-23982
                   CVE-2021-23981  

Reference:         ESB-2021.1004
                   ESB-2021.1003

Original Bulletin: 
   http://www.debian.org/security/2021/dsa-4874

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4874-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
March 24, 2021                        https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : firefox-esr
CVE ID         : CVE-2021-23981 CVE-2021-23982 CVE-2021-23984 CVE-2021-23987

Multiple security issues have been found in the Mozilla Firefox
web browser, which could potentially result in the execution
of arbitrary code, information disclosure or spoofing attacks.

For the stable distribution (buster), these problems have been fixed in
version 78.9.0esr-1~deb10u1.

We recommend that you upgrade your firefox-esr packages.

For the detailed security status of firefox-esr please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/firefox-esr

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=FtyV
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=+vWJ
-----END PGP SIGNATURE-----