|
|
Subscribe / Log in / New account

Red Hat alert RHSA-2024:0011-01 (firefox)

An update for firefox is now available for Red Hat Enterprise Linux 8.8
Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

Mozilla Firefox is an open-source web browser, designed for standards
compliance, performance, and portability.

This update upgrades Firefox to version 115.6.0 ESR.

Security Fix(es):

* Mozilla: Heap-buffer-overflow affecting WebGL
<code>DrawElementsInstanced</code> method with Mesa VM driver
(CVE-2023-6856)

* Mozilla: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and
Thunderbird 115.6 (CVE-2023-6864)

* Mozilla: Potential exposure of uninitialized data in
<code>EncryptingOutputStream</code> (CVE-2023-6865)

* Mozilla: Symlinks may resolve to smaller than expected buffers
(CVE-2023-6857)

* Mozilla: Heap buffer overflow in <code>nsTextFragment</code>
(CVE-2023-6858)

* Mozilla: Use-after-free in PR_GetIdentitiesLayer (CVE-2023-6859)

* Mozilla: Potential sandbox escape due to
<code>VideoBridge</code> lack of texture validation
(CVE-2023-6860)

* Mozilla: Heap buffer overflow affected
<code>nsWindow::PickerOpen(void)</code> in headless mode
(CVE-2023-6861)

* Mozilla: Use-after-free in <code>nsDNSService</code>
(CVE-2023-6862)

* Mozilla: Clickjacking permission prompts using the popup transition
(CVE-2023-6867)

* Mozilla: Undefined behavior in <code>ShutdownObserver()</code>
(CVE-2023-6863)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

This content is licensed under the Creative Commons Attribution 4.0
International License (https://creativecommons.org/licenses/by/4.0/). If you
distribute this content, or a modified version of it, you must provide
attribution to Red Hat Inc. and provide a link to the original.

Original: https://access.redhat.com/security/data/csaf/v2/advisories/2024/rhsa-2024_0011.json


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds