[ALSA-2023:4952] Important: firefox security update
Release date:
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.15.0 ESR. Security Fix(es): * Mozilla: Memory corruption in IPC CanvasTranslator (CVE-2023-4573) * Mozilla: Memory corruption in IPC ColorPickerShownCallback (CVE-2023-4574) * Mozilla: Memory corruption in IPC FilePickerShownCallback (CVE-2023-4575) * Mozilla: Memory corruption in JIT UpdateRegExpStatics (CVE-2023-4577) * Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 102.15, Firefox ESR 115.2, Thunderbird 102.15, and Thunderbird 115.2 (CVE-2023-4584) * Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2 (CVE-2023-4585) * Mozilla: Full screen notification obscured by file open dialog (CVE-2023-4051) * Mozilla: Full screen notification obscured by external program (CVE-2023-4053) * Mozilla: Error reporting methods in SpiderMonkey could have triggered an Out of Memory Exception (CVE-2023-4578) * Mozilla: Push notifications saved to disk unencrypted (CVE-2023-4580) * Mozilla: XLL file extensions were downloadable without warnings (CVE-2023-4581) * Mozilla: Browsing Context potentially not cleared when closing Private Window (CVE-2023-4583) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 firefox-102.15.0-1.el8_8.alma.aarch64.rpm b4de1ff695bc915344573d9590f0261935e1a3046ec78ae896d515e6d2f3eb0f
ppc64le firefox-102.15.0-1.el8_8.alma.ppc64le.rpm 763596eb96165dffa26c9a55b59796c73f5c853429bf9ba8945e7a57a073386a
s390x firefox-102.15.0-1.el8_8.alma.s390x.rpm 78051e12a67d480d0367178cdc9dd3a92f5f030c4999c35b8686c7cbf59972ec
x86_64 firefox-102.15.0-1.el8_8.alma.x86_64.rpm 50a427a56c00794618800b448fab77cf817894226124f8ee162af2784b177df5
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.