RLSA-2023:3220

Source
https://errata.rockylinux.org/RLSA-2023:3220
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2023:3220.json
JSON Data
https://api.osv.dev/v1/vulns/RLSA-2023:3220
Related
Published
2023-05-18T19:52:18.288616Z
Modified
2023-05-18T19:53:57.454316Z
Summary
Important: firefox security update
Details

Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 102.11.0 ESR.

Security Fix(es):

  • Mozilla: Browser prompts could have been obscured by popups (CVE-2023-32205)

  • Mozilla: Crash in RLBox Expat driver (CVE-2023-32206)

  • Mozilla: Potential permissions request bypass via clickjacking (CVE-2023-32207)

  • Mozilla: Memory safety bugs fixed in Firefox 113 and Firefox ESR 102.11 (CVE-2023-32215)

  • Mozilla: Content process crash due to invalid wasm code (CVE-2023-32211)

  • Mozilla: Potential spoof due to obscured address bar (CVE-2023-32212)

  • Mozilla: Potential memory corruption in FileReader::DoReadData() (CVE-2023-32213)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:8 / firefox

Package

Name
firefox
Purl
pkg:rpm/rocky-linux/firefox?distro=rocky-linux-8&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:102.11.0-2.el8_7