[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 2863-1] firefox-esr security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian LTS Advisory DLA-2863-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/               Emilio Pozuelo Monfort
December 29, 2021                             https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : firefox-esr
Version        : 91.4.1esr-1~deb9u1
CVE ID         : CVE-2021-38503 CVE-2021-38504 CVE-2021-38506 CVE-2021-38507
                 CVE-2021-38508 CVE-2021-38509 CVE-2021-43534 CVE-2021-43535
                 CVE-2021-43536 CVE-2021-43537 CVE-2021-43538 CVE-2021-43539
                 CVE-2021-43541 CVE-2021-43542 CVE-2021-43543 CVE-2021-43545
                 CVE-2021-43546

Multiple security issues have been found in the Mozilla Firefox
web browser, which could potentially result in the execution
of arbitrary code, information disclosure or spoofing.

Debian follows the extended support releases (ESR) of Firefox. Support
for the 78.x series has ended, so starting with this update we're now
following the 91.x releases.

For Debian 9 stretch, these problems have been fixed in version
91.4.1esr-1~deb9u1.

We recommend that you upgrade your firefox-esr packages.

For the detailed security status of firefox-esr please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/firefox-esr

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
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=pQH3
-----END PGP SIGNATURE-----


Reply to: