[RLSA-2023:4468] firefox security update
An update is available for firefox. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
TODO: add package description
This update upgrades Firefox to version 102.14.0 ESR.
Security Fix(es):
Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions (CVE-2023-4045)
Mozilla: Incorrect value used during WASM compilation (CVE-2023-4046)
Mozilla: Potential permissions request bypass via clickjacking (CVE-2023-4047)
Mozilla: Crash in DOMParser due to out-of-memory conditions (CVE-2023-4048)
Mozilla: Fix potential race conditions when releasing platform objects (CVE-2023-4049)
Mozilla: Stack buffer overflow in StorageManager (CVE-2023-4050)
Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 (CVE-2023-4056)
Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, and Thunderbird 115.1 (CVE-2023-4057)
Mozilla: Cookie jar overflow caused unexpected cookie jar state (CVE-2023-4055)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Package | Affected Version |
---|---|
pkg:rpm/rockylinux/firefox?arch=x86_64&distro=rockylinux-8.8 | < 102.14.0-1.el8_8 |
pkg:rpm/rockylinux/firefox?arch=aarch64&distro=rockylinux-8.8 | < 102.14.0-1.el8_8 |
- ID
- RLSA-2023:4468
- Severity
- important
- URL
- https://errata.rockylinux.org/RLSA-2023:4468
- Published
-
2023-08-08T12:34:07
(13 months ago) - Modified
-
2023-08-08T12:36:07
(13 months ago) - Rights
- Copyright 2024 Rocky Enterprise Software Foundation
- Other Advisories
-
- ALAS2-2023-2248
- ALPINE:CVE-2023-4045
- ALPINE:CVE-2023-4046
- ALPINE:CVE-2023-4047
- ALPINE:CVE-2023-4048
- ALPINE:CVE-2023-4049
- ALPINE:CVE-2023-4050
- ALPINE:CVE-2023-4055
- ALPINE:CVE-2023-4056
- ALPINE:CVE-2023-4057
- ALSA-2023:4462
- ALSA-2023:4468
- ALSA-2023:4497
- ALSA-2023:4499
- DSA-5464-1
- DSA-5469-1
- ELSA-2023-4461
- ELSA-2023-4462
- ELSA-2023-4468
- ELSA-2023-4495
- ELSA-2023-4497
- ELSA-2023-4499
- GLSA-202402-25
- MFSA-2023-29
- MFSA-2023-30
- MFSA-2023-31
- MFSA-2023-32
- MFSA-2023-33
- RHSA-2023:4461
- RHSA-2023:4462
- RHSA-2023:4468
- RHSA-2023:4495
- RHSA-2023:4497
- RHSA-2023:4499
- RLSA-2023:4462
- RLSA-2023:4497
- RLSA-2023:4499
- SSA:2023-216-01
- SUSE-SU-2023:3161-1
- SUSE-SU-2023:3162-1
- SUSE-SU-2023:3163-1
- SUSE-SU-2023:3228-1
- USN-6267-1
- USN-6333-1
- USN-6405-1
- USN-6406-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/rockylinux/firefox?arch=x86_64&distro=rockylinux-8.8 | rockylinux | firefox | < 102.14.0-1.el8_8 | rockylinux-8.8 | x86_64 | |
Affected | pkg:rpm/rockylinux/firefox?arch=aarch64&distro=rockylinux-8.8 | rockylinux | firefox | < 102.14.0-1.el8_8 | rockylinux-8.8 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |