Rocky Linux: RLSA-2023:0808 firefox security update | LinuxSecurit...
{"type":"TYPE_SECURITY","shortCode":"RL","name":"RLSA-2023:0808","synopsis":"Important: firefox security update","severity":"SEVERITY_IMPORTANT","topic":"An update is available for firefox.\nThis update affects Rocky Linux 8.\nA Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list","description":"Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.\n\nThis update upgrades Firefox to version 102.8.0 ESR.\n\nSecurity Fix(es):\n\n* Mozilla: Arbitrary memory write via PKCS 12 in NSS (CVE-2023-0767)\n\n* Mozilla: Content security policy leak in violation reports using iframes (CVE-2023-25728)\n\n* Mozilla: Screen hijack via browser fullscreen mode (CVE-2023-25730)\n\n* Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-25735)\n\n* Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry (CVE-2023-25737)\n\n* Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext (CVE-2023-25739)\n\n* Mozilla: Fullscreen notification not shown in Firefox Focus (CVE-2023-25743)\n\n* Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 (CVE-2023-25744)\n\n* Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 (CVE-2023-25746)\n\n* Mozilla: Extensions could have opened external schemes without user knowledge (CVE-2023-25729)\n\n* Mozilla: Out of bounds memory write from EncodeInputStream (CVE-2023-25732)\n\n* Mozilla: Web Crypto ImportKey crashes tab (CVE-2023-25742)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.","solution":null,"affectedProducts":["Rocky Linux 8"],"fixes":[{"ticket":"2170374","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2170374","description":""},{"ticket":"2170375","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2170375","description":""},{"ticket":"2170376","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2170376","description":""},{"ticket":"2170377","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2170377","description":""},{"ticket":"2170378","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2170378","description":""},{"ticket":"2170379","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2170379","description":""},{"ticket":"2170381","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2170381","description":""},{"ticket":"2170382","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2170382","description":""},{"ticket":"2170383","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2170383","description":""},{"ticket":"2170390","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2170390","description":""},{"ticket":"2170391","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2170391","description":""},{"ticket":"2170402","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2170402","description":""}],"cves":[{"name":"CVE-2023-0767","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-0767","cvss3ScoringVector":"CVSS:3.1\/AV:N\/AC:H\/PR:N\/UI:R\/S:U\/C:H\/I:H\/A:H","cvss3BaseScore":"7.5","cwe":"CWE-119"},{"name":"CVE-2023-25728","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-25728","cvss3ScoringVector":"CVSS:3.1\/AV:N\/AC:H\/PR:N\/UI:R\/S:U\/C:H\/I:H\/A:H","cvss3BaseScore":"7.5","cwe":"CWE-1021"},{"name":"CVE-2023-25729","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-25729","cvss3ScoringVector":"CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:R\/S:C\/C:L\/I:L\/A:N","cvss3BaseScore":"6.1","cwe":"CWE-84"},{"name":"CVE-2023-25730","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-25730","cvss3ScoringVector":"CVSS:3.1\/AV:N\/AC:H\/PR:N\/UI:R\/S:U\/C:H\/I:H\/A:H","cvss3BaseScore":"7.5","cwe":"CWE-821"},{"name":"CVE-2023-25732","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-25732","cvss3ScoringVector":"CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:R\/S:C\/C:L\/I:L\/A:N","cvss3BaseScore":"6.1","cwe":"CWE-787"},{"name":"CVE-2023-25735","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-25735","cvss3ScoringVector":"CVSS:3.1\/AV:N\/AC:H\/PR:N\/UI:R\/S:U\/C:H\/I:H\/A:H","cvss3BaseScore":"7.5","cwe":"CWE-416"},{"name":"CVE-2023-25737","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-25737","cvss3ScoringVector":"CVSS:3.1\/AV:N\/AC:H\/PR:N\/UI:R\/S:U\/C:H\/I:H\/A:H","cvss3BaseScore":"7.5","cwe":"CWE-704"},{"name":"CVE-2023-25739","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-25739","cvss3ScoringVector":"CVSS:3.1\/AV:N\/AC:H\/PR:N\/UI:R\/S:U\/C:H\/I:H\/A:H","cvss3BaseScore":"7.5","cwe":"CWE-416"},{"name":"CVE-2023-25742","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-25742","cvss3ScoringVector":"CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:R\/S:U\/C:N\/I:N\/A:L","cvss3BaseScore":"4.3","cwe":"CWE-173"},{"name":"CVE-2023-25743","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-25743","cvss3ScoringVector":"CVSS:3.1\/AV:N\/AC:H\/PR:N\/UI:R\/S:U\/C:H\/I:H\/A:H","cvss3BaseScore":"7.5","cwe":"CWE-357"},{"name":"CVE-2023-25744","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-25744","cvss3ScoringVector":"CVSS:3.1\/AV:N\/AC:H\/PR:N\/UI:R\/S:U\/C:H\/I:H\/A:H","cvss3BaseScore":"7.5","cwe":"CWE-120"},{"name":"CVE-2023-25746","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-25746","cvss3ScoringVector":"CVSS:3.1\/AV:N\/AC:H\/PR:N\/UI:R\/S:U\/C:H\/I:H\/A:H","cvss3BaseScore":"7.5","cwe":"CWE-120"}],"references":[],"publishedAt":"2023-02-22T01:08:53.668036Z","rpms":{"Rocky Linux 8":{"nvras":["firefox-0:102.8.0-2.el8_7.aarch64.rpm","firefox-0:102.8.0-2.el8_7.src.rpm","firefox-0:102.8.0-2.el8_7.x86_64.rpm","firefox-debuginfo-0:102.8.0-2.el8_7.aarch64.rpm","firefox-debuginfo-0:102.8.0-2.el8_7.x86_64.rpm","firefox-debugsource-0:102.8.0-2.el8_7.aarch64.rpm","firefox-debugsource-0:102.8.0-2.el8_7.x86_64.rpm"]}},"rebootSuggested":false,"buildReferences":[]}

Rocky Linux: RLSA-2023:0808 firefox security update

February 22, 2023
An update is available for firefox. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list

Summary

An update is available for firefox. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list


Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.8.0 ESR. Security Fix(es): * Mozilla: Arbitrary memory write via PKCS 12 in NSS (CVE-2023-0767) * Mozilla: Content security policy leak in violation reports using iframes (CVE-2023-25728) * Mozilla: Screen hijack via browser fullscreen mode (CVE-2023-25730) * Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-25735) * Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry (CVE-2023-25737) * Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext (CVE-2023-25739) * Mozilla: Fullscreen notification not shown in Firefox Focus (CVE-2023-25743) * Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 (CVE-2023-25744) * Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 (CVE-2023-25746) * Mozilla: Extensions could have opened external schemes without user knowledge (CVE-2023-25729) * Mozilla: Out of bounds memory write from EncodeInputStream (CVE-2023-25732) * Mozilla: Web Crypto ImportKey crashes tab (CVE-2023-25742) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

RPMs

firefox-0:102.8.0-2.el8_7.aarch64.rpm

firefox-0:102.8.0-2.el8_7.src.rpm

firefox-0:102.8.0-2.el8_7.x86_64.rpm

firefox-debuginfo-0:102.8.0-2.el8_7.aarch64.rpm

firefox-debuginfo-0:102.8.0-2.el8_7.x86_64.rpm

firefox-debugsource-0:102.8.0-2.el8_7.aarch64.rpm

firefox-debugsource-0:102.8.0-2.el8_7.x86_64.rpm

References

No References

CVEs

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25728

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25729

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25730

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25732

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25735

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25737

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25739

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25742

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25743

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25744

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25746

Severity
Name: RLSA-2023:0808
Affected Products: Rocky Linux 8

Fixes

https://bugzilla.redhat.com/show_bug.cgi?id=2170374

https://bugzilla.redhat.com/show_bug.cgi?id=2170375

https://bugzilla.redhat.com/show_bug.cgi?id=2170376

https://bugzilla.redhat.com/show_bug.cgi?id=2170377

https://bugzilla.redhat.com/show_bug.cgi?id=2170378

https://bugzilla.redhat.com/show_bug.cgi?id=2170379

https://bugzilla.redhat.com/show_bug.cgi?id=2170381

https://bugzilla.redhat.com/show_bug.cgi?id=2170382

https://bugzilla.redhat.com/show_bug.cgi?id=2170383

https://bugzilla.redhat.com/show_bug.cgi?id=2170390

https://bugzilla.redhat.com/show_bug.cgi?id=2170391

https://bugzilla.redhat.com/show_bug.cgi?id=2170402