Mageia 2023-0342: firefox security update
Summary
The updated packages fix security vulnerabilities.
Out-of-bound memory access in WebGL2 blitFramebuffer. (CVE-2023-6204)
Use-after-free in MessagePort::Entangled. (CVE-2023-6205)
Clickjacking permission prompts using the fullscreen transition.
(CVE-2023-6206)
Use-after-free in ReadableByteStreamQueueEntry::Buffer. (CVE-2023-6207)
Using Selection API would copy contents into X11 primary selection.
(CVE-2023-6208)
Incorrect parsing of relative URLs starting with "///". (CVE-2023-6209)
Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and
Thunderbird 115.5. (CVE-2023-6212)
References
- https://bugs.mageia.org/show_bug.cgi?id=32551
- https://www.mozilla.org/en-US/firefox/115.5.0/releasenotes/
- https://www.mozilla.org/en-US/security/advisories/mfsa2023-50/
- https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_95.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212
Resolution
MGASA-2023-0342 - Updated firefox packages fix security vulnerabilities
SRPMS
- 9/core/rootcerts-20231116.00-1.mga9
- 9/core/nss-3.95.0-1.mga9
- 9/core/firefox-115.5.0-3.mga9
- 9/core/firefox-l10n-115.5.0-1.mga9