Updated firefox packages fix security vulnerabilities
Publication date: 08 Dec 2023Modification date: 08 Dec 2023
Type: security
Affected Mageia releases : 9
CVE: CVE-2023-6204 , CVE-2023-6205 , CVE-2023-6206 , CVE-2023-6207 , CVE-2023-6208 , CVE-2023-6209 , CVE-2023-6212
Description
The updated packages fix security vulnerabilities. Out-of-bound memory access in WebGL2 blitFramebuffer. (CVE-2023-6204) Use-after-free in MessagePort::Entangled. (CVE-2023-6205) Clickjacking permission prompts using the fullscreen transition. (CVE-2023-6206) Use-after-free in ReadableByteStreamQueueEntry::Buffer. (CVE-2023-6207) Using Selection API would copy contents into X11 primary selection. (CVE-2023-6208) Incorrect parsing of relative URLs starting with "///". (CVE-2023-6209) Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5. (CVE-2023-6212)
References
- https://bugs.mageia.org/show_bug.cgi?id=32551
- https://www.mozilla.org/en-US/firefox/115.5.0/releasenotes/
- https://www.mozilla.org/en-US/security/advisories/mfsa2023-50/
- https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_95.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212
SRPMS
9/core
- rootcerts-20231116.00-1.mga9
- nss-3.95.0-1.mga9
- firefox-115.5.0-3.mga9
- firefox-l10n-115.5.0-1.mga9