Debian 9902 Published by

The following two security updates are available for Debian GNU/Linux:

[DLA 3736-1] unbound security update
[DSA 5627-1] firefox-esr security update




[DLA 3736-1] unbound security update


-------------------------------------------------------------------------
Debian LTS Advisory DLA-3736-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Markus Koschany
February 21, 2024 https://wiki.debian.org/LTS
-------------------------------------------------------------------------

Package : unbound
Version : 1.9.0-2+deb10u4
CVE ID : CVE-2023-50387 CVE-2023-50868
Debian Bug : 1063845

Two vulnerabilities were discovered in unbound, a validating, recursive,
caching DNS resolver. Specially crafted DNSSEC answers could lead unbound
down a very CPU intensive and time costly DNSSEC (CVE-2023-50387) or NSEC3
hash (CVE-2023-50868) validation path, resulting in denial of service.

For Debian 10 buster, these problems have been fixed in version
1.9.0-2+deb10u4.

We recommend that you upgrade your unbound packages.

For the detailed security status of unbound please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/unbound

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



[DSA 5627-1] firefox-esr security update


- -------------------------------------------------------------------------
Debian Security Advisory DSA-5627-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
February 21, 2024 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : firefox-esr
CVE ID : CVE-2024-1546 CVE-2024-1547 CVE-2024-1548 CVE-2024-1549
CVE-2024-1550 CVE-2024-1551 CVE-2024-1552 CVE-2024-1553

Multiple security issues have been found in the Mozilla Firefox web
browser, which could potentially result in the execution of arbitrary
code, information disclosure or spoofing.

For the oldstable distribution (bullseye), these problems have been fixed
in version 115.8.0esr-1~deb11u1.

For the stable distribution (bookworm), these problems have been fixed in
version 115.8.0esr-1~deb12u1.

We recommend that you upgrade your firefox-esr packages.

For the detailed security status of firefox-esr please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/firefox-esr

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/