[ALSA-2023:7507] Important: firefox security update
Type:
security
Severity:
important
Release date:
2023-11-29
Description:
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 115.5.0 ESR. Security Fix(es): * Mozilla: Out-of-bound memory access in WebGL2 blitFramebuffer (CVE-2023-6204) * Mozilla: Use-after-free in MessagePort::Entangled (CVE-2023-6205) * Mozilla: Clickjacking permission prompts using the fullscreen transition (CVE-2023-6206) * Mozilla: Use-after-free in ReadableByteStreamQueueEntry::Buffer (CVE-2023-6207) * Mozilla: Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5 (CVE-2023-6212) * Mozilla: Using Selection API would copy contents into X11 primary selection. (CVE-2023-6208) * Mozilla: Incorrect parsing of relative URLs starting with "///" (CVE-2023-6209) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 firefox-115.5.0-1.el9_3.alma.1.aarch64.rpm 6766a878da4568ce3bb690963966f65c80431d83991ea1f3bccb17864ebb1037
aarch64 firefox-x11-115.5.0-1.el9_3.alma.1.aarch64.rpm 7ca6d09061158ba33f5a550b48708946ccb94d5aa1b3a62e1ae20a58720ce52f
ppc64le firefox-x11-115.5.0-1.el9_3.alma.1.ppc64le.rpm d7d423741e62aaa0b6ecbb5024eaafbdbb4ae37c2e9920b4d4dba1972701fb61
ppc64le firefox-115.5.0-1.el9_3.alma.1.ppc64le.rpm dab6756faa6f3560fa6530d5a490d42949df011b0fabd0eed006042d81ff0a1f
s390x firefox-115.5.0-1.el9_3.alma.1.s390x.rpm 8628f05509e05e3b500eb31236b6d410c9f5b98bcd62089b39fbc5befe2cd101
s390x firefox-x11-115.5.0-1.el9_3.alma.1.s390x.rpm a61e9b6d3d98056f863dab95e3bc72dfe2be6a05b50df5d1fbc90d3fc465789b
x86_64 firefox-115.5.0-1.el9_3.alma.1.x86_64.rpm 079a530d20dd141cdeccd9e63d27e425876673f6ca1cd6e37d64a49378e1c189
x86_64 firefox-x11-115.5.0-1.el9_3.alma.1.x86_64.rpm 6c63cd3ed3668149d84ab407906b785326b0e5ebeae64475a4b41483f6fe46e9
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.