[RHSA-2023:0285] firefox security update
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 102.7.0 ESR.
Security Fix(es):
Mozilla: libusrsctp library out of date (CVE-2022-46871)
Mozilla: Arbitrary file read from GTK drag and drop on Linux (CVE-2023-23598)
Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 (CVE-2023-23605)
Mozilla: Malicious command could be hidden in devtools output (CVE-2023-23599)
Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation (CVE-2023-23601)
Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers (CVE-2023-23602)
Mozilla: Fullscreen notification bypass (CVE-2022-46877)
Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive (CVE-2023-23603)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Package | Affected Version |
---|---|
pkg:rpm/redhat/firefox?arch=x86_64&distro=redhat-9.1 | < 102.7.0-1.el9_1 |
pkg:rpm/redhat/firefox?arch=s390x&distro=redhat-9.1 | < 102.7.0-1.el9_1 |
pkg:rpm/redhat/firefox?arch=ppc64le&distro=redhat-9.1 | < 102.7.0-1.el9_1 |
pkg:rpm/redhat/firefox?arch=aarch64&distro=redhat-9.1 | < 102.7.0-1.el9_1 |
- ID
- RHSA-2023:0285
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2023:0285
- Published
-
2023-01-23T00:00:00
(20 months ago) - Modified
-
2023-01-23T00:00:00
(20 months ago) - Rights
- Copyright 2023 Red Hat, Inc.
- Other Advisories
-
- ALAS2-2023-1951
- ALPINE:CVE-2022-46871
- ALPINE:CVE-2022-46877
- ALPINE:CVE-2023-23598
- ALPINE:CVE-2023-23599
- ALPINE:CVE-2023-23601
- ALPINE:CVE-2023-23602
- ALPINE:CVE-2023-23603
- ALPINE:CVE-2023-23605
- ALSA-2023:0285
- ALSA-2023:0288
- ALSA-2023:0463
- ALSA-2023:0476
- DSA-5322-1
- DSA-5355-1
- ELSA-2023-0285
- ELSA-2023-0288
- ELSA-2023-0296
- ELSA-2023-0456
- ELSA-2023-0463
- ELSA-2023-0476
- GLSA-202305-06
- GLSA-202305-13
- MFSA-2022-51
- MFSA-2023-01
- MFSA-2023-02
- MFSA-2023-03
- RHSA-2023:0288
- RHSA-2023:0296
- RHSA-2023:0456
- RHSA-2023:0463
- RHSA-2023:0476
- RLSA-2023:0285
- RLSA-2023:0288
- RLSA-2023:0463
- RLSA-2023:0476
- SSA:2023-018-04
- SUSE-SU-2023:0111-1
- SUSE-SU-2023:0112-1
- SUSE-SU-2023:0113-1
- SUSE-SU-2023:0329-1
- USN-5782-1
- USN-5816-1
- USN-5824-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/firefox?arch=x86_64&distro=redhat-9.1 | redhat | firefox | < 102.7.0-1.el9_1 | redhat-9.1 | x86_64 | |
Affected | pkg:rpm/redhat/firefox?arch=s390x&distro=redhat-9.1 | redhat | firefox | < 102.7.0-1.el9_1 | redhat-9.1 | s390x | |
Affected | pkg:rpm/redhat/firefox?arch=ppc64le&distro=redhat-9.1 | redhat | firefox | < 102.7.0-1.el9_1 | redhat-9.1 | ppc64le | |
Affected | pkg:rpm/redhat/firefox?arch=aarch64&distro=redhat-9.1 | redhat | firefox | < 102.7.0-1.el9_1 | redhat-9.1 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |