Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2023:5434: Red Hat Security Advisory: firefox security update

An update for firefox is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2023-3600: The Mozilla Foundation Security Advisory describes this flaw as: During the worker lifecycle, a use-after-free condition could have occured, which could have led to a potentially exploitable crash.
  • CVE-2023-5169: A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes this flaw as: A compromised content process could have provided malicious data in a PathRecording, resulting in an out-of-bounds write, leading to a potentially exploitable crash in a privileged process.
  • CVE-2023-5171: A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes this flaw as: During Ion compilation, a Garbage Collection could have resulted in a use-after-free condition, allowing an attacker to write two NULL bytes and cause a potentially exploitable crash.
  • CVE-2023-5176: A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes this flaw as: Memory safety bugs are present in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2. Some of these bugs showed evidence of memory corruption, and we presume that with enough effort, some of these could have been exploited to run arbitrary code.
  • CVE-2023-5217: A heap-based buffer overflow flaw was found in the way libvpx, a library used to process VP8 and VP9 video codecs data, processes certain specially formatted video data via a crafted HTML page. This flaw allows an attacker to crash or remotely execute arbitrary code in an application, such as a web browser that is compiled with this library.
Red Hat Security Data
#vulnerability#web#linux#red_hat#buffer_overflow#ibm#firefox#sap

Synopsis

Important: firefox security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for firefox is now available for Red Hat Enterprise Linux 9.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 115.3.1 ESR.

Security Fix(es):

  • firefox: use-after-free in workers (CVE-2023-3600)
  • Mozilla: Out-of-bounds write in PathOps (CVE-2023-5169)
  • Mozilla: Use-after-free in Ion Compiler (CVE-2023-5171)
  • Mozilla: Memory safety bugs fixed in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3 (CVE-2023-5176)
  • libvpx: Heap buffer overflow in vp8 encoding in libvpx (CVE-2023-5217)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing the update, Firefox must be restarted for the changes to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 9 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.2 x86_64
  • Red Hat Enterprise Linux Server - AUS 9.2 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 9 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.2 s390x
  • Red Hat Enterprise Linux for Power, little endian 9 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.2 ppc64le
  • Red Hat Enterprise Linux for ARM 64 9 aarch64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.2 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64
  • Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.2 aarch64
  • Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.2 s390x

Fixes

  • BZ - 2222652 - CVE-2023-3600 firefox: use-after-free in workers
  • BZ - 2240893 - CVE-2023-5169 Mozilla: Out-of-bounds write in PathOps
  • BZ - 2240894 - CVE-2023-5171 Mozilla: Use-after-free in Ion Compiler
  • BZ - 2240896 - CVE-2023-5176 Mozilla: Memory safety bugs fixed in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3
  • BZ - 2241191 - CVE-2023-5217 libvpx: Heap buffer overflow in vp8 encoding in libvpx

CVEs

  • CVE-2023-3600
  • CVE-2023-5169
  • CVE-2023-5171
  • CVE-2023-5176
  • CVE-2023-5217

Red Hat Enterprise Linux for x86_64 9

SRPM

firefox-115.3.1-1.el9_2.src.rpm

SHA-256: 9476a080d7ede056e73a0da0dae0d4e69d1aa08b7698c068f74344f5a07fb118

x86_64

firefox-115.3.1-1.el9_2.x86_64.rpm

SHA-256: 928147d7559c3c18f813cd1ec1ecb8e418d5afd0f3435dbf0e0db9d363c135ac

firefox-debuginfo-115.3.1-1.el9_2.x86_64.rpm

SHA-256: cc4b17fc4ddd2ad4ace1368da801973f8ecc02cfa556b3409cf868b75d0f7c4e

firefox-debugsource-115.3.1-1.el9_2.x86_64.rpm

SHA-256: b91d1185de0b3a04c7feb5d3599d99f2758c50a09f0d4c7fd5d1d394be36e621

firefox-x11-115.3.1-1.el9_2.x86_64.rpm

SHA-256: 282bd48d9ae410e6f19b7655e76bdc9f637c0355a934f90482b73b860290517c

Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.2

SRPM

firefox-115.3.1-1.el9_2.src.rpm

SHA-256: 9476a080d7ede056e73a0da0dae0d4e69d1aa08b7698c068f74344f5a07fb118

x86_64

firefox-115.3.1-1.el9_2.x86_64.rpm

SHA-256: 928147d7559c3c18f813cd1ec1ecb8e418d5afd0f3435dbf0e0db9d363c135ac

firefox-debuginfo-115.3.1-1.el9_2.x86_64.rpm

SHA-256: cc4b17fc4ddd2ad4ace1368da801973f8ecc02cfa556b3409cf868b75d0f7c4e

firefox-debugsource-115.3.1-1.el9_2.x86_64.rpm

SHA-256: b91d1185de0b3a04c7feb5d3599d99f2758c50a09f0d4c7fd5d1d394be36e621

firefox-x11-115.3.1-1.el9_2.x86_64.rpm

SHA-256: 282bd48d9ae410e6f19b7655e76bdc9f637c0355a934f90482b73b860290517c

Red Hat Enterprise Linux Server - AUS 9.2

SRPM

firefox-115.3.1-1.el9_2.src.rpm

SHA-256: 9476a080d7ede056e73a0da0dae0d4e69d1aa08b7698c068f74344f5a07fb118

x86_64

firefox-115.3.1-1.el9_2.x86_64.rpm

SHA-256: 928147d7559c3c18f813cd1ec1ecb8e418d5afd0f3435dbf0e0db9d363c135ac

firefox-debuginfo-115.3.1-1.el9_2.x86_64.rpm

SHA-256: cc4b17fc4ddd2ad4ace1368da801973f8ecc02cfa556b3409cf868b75d0f7c4e

firefox-debugsource-115.3.1-1.el9_2.x86_64.rpm

SHA-256: b91d1185de0b3a04c7feb5d3599d99f2758c50a09f0d4c7fd5d1d394be36e621

firefox-x11-115.3.1-1.el9_2.x86_64.rpm

SHA-256: 282bd48d9ae410e6f19b7655e76bdc9f637c0355a934f90482b73b860290517c

Red Hat Enterprise Linux for IBM z Systems 9

SRPM

firefox-115.3.1-1.el9_2.src.rpm

SHA-256: 9476a080d7ede056e73a0da0dae0d4e69d1aa08b7698c068f74344f5a07fb118

s390x

firefox-115.3.1-1.el9_2.s390x.rpm

SHA-256: 5d1011e5038e0e3a03980872f4a87d77b50b5e7b3ff8d53423bb9c47c23f9b5e

firefox-debuginfo-115.3.1-1.el9_2.s390x.rpm

SHA-256: 9f5abb4f2ca118111c93e3e19d25f88031e98da7ca5ded4af3526b81185d5480

firefox-debugsource-115.3.1-1.el9_2.s390x.rpm

SHA-256: 008dbd94feb17c2b13ac0a21efe515be1ae2a65aa949c7596acf747d926e6f52

firefox-x11-115.3.1-1.el9_2.s390x.rpm

SHA-256: c3e5f92b6bfd214d6475078ac451637ebd39d8ef5ce1774095278c319013d138

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.2

SRPM

firefox-115.3.1-1.el9_2.src.rpm

SHA-256: 9476a080d7ede056e73a0da0dae0d4e69d1aa08b7698c068f74344f5a07fb118

s390x

firefox-115.3.1-1.el9_2.s390x.rpm

SHA-256: 5d1011e5038e0e3a03980872f4a87d77b50b5e7b3ff8d53423bb9c47c23f9b5e

firefox-debuginfo-115.3.1-1.el9_2.s390x.rpm

SHA-256: 9f5abb4f2ca118111c93e3e19d25f88031e98da7ca5ded4af3526b81185d5480

firefox-debugsource-115.3.1-1.el9_2.s390x.rpm

SHA-256: 008dbd94feb17c2b13ac0a21efe515be1ae2a65aa949c7596acf747d926e6f52

firefox-x11-115.3.1-1.el9_2.s390x.rpm

SHA-256: c3e5f92b6bfd214d6475078ac451637ebd39d8ef5ce1774095278c319013d138

Red Hat Enterprise Linux for Power, little endian 9

SRPM

firefox-115.3.1-1.el9_2.src.rpm

SHA-256: 9476a080d7ede056e73a0da0dae0d4e69d1aa08b7698c068f74344f5a07fb118

ppc64le

firefox-115.3.1-1.el9_2.ppc64le.rpm

SHA-256: 9167f7e8d43676be62d7ce893f589c57b6b2a41a8d6476a78977c88dcc156293

firefox-debuginfo-115.3.1-1.el9_2.ppc64le.rpm

SHA-256: c051e7ed8ac9b2b595f6cd844fad166d3c08d0a7f250bc0fca0a8c4ad206163e

firefox-debugsource-115.3.1-1.el9_2.ppc64le.rpm

SHA-256: 111fab61dcd38ebc6c23b6d33b42592515c931ca7c3dc38f001719f66ae88b81

firefox-x11-115.3.1-1.el9_2.ppc64le.rpm

SHA-256: cd5e08a3d66f2fba04835875d784ddabd43f21fb77d6c48719c6bb39fe589c5f

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.2

SRPM

firefox-115.3.1-1.el9_2.src.rpm

SHA-256: 9476a080d7ede056e73a0da0dae0d4e69d1aa08b7698c068f74344f5a07fb118

ppc64le

firefox-115.3.1-1.el9_2.ppc64le.rpm

SHA-256: 9167f7e8d43676be62d7ce893f589c57b6b2a41a8d6476a78977c88dcc156293

firefox-debuginfo-115.3.1-1.el9_2.ppc64le.rpm

SHA-256: c051e7ed8ac9b2b595f6cd844fad166d3c08d0a7f250bc0fca0a8c4ad206163e

firefox-debugsource-115.3.1-1.el9_2.ppc64le.rpm

SHA-256: 111fab61dcd38ebc6c23b6d33b42592515c931ca7c3dc38f001719f66ae88b81

firefox-x11-115.3.1-1.el9_2.ppc64le.rpm

SHA-256: cd5e08a3d66f2fba04835875d784ddabd43f21fb77d6c48719c6bb39fe589c5f

Red Hat Enterprise Linux for ARM 64 9

SRPM

firefox-115.3.1-1.el9_2.src.rpm

SHA-256: 9476a080d7ede056e73a0da0dae0d4e69d1aa08b7698c068f74344f5a07fb118

aarch64

firefox-115.3.1-1.el9_2.aarch64.rpm

SHA-256: 26fab84ce6ee32db70cee0e8cd4f790c389b5592ccbad5f106744c5b79616a68

firefox-debuginfo-115.3.1-1.el9_2.aarch64.rpm

SHA-256: 207235b0414c1893a6d7afb2c066c2fd7f215816d6f495dcadd43a9122c4c5cb

firefox-debugsource-115.3.1-1.el9_2.aarch64.rpm

SHA-256: 30f72d8219b1a3a57ae2c7c34be209a26d2234e4b5f445b0a89a2f7d2fc11952

firefox-x11-115.3.1-1.el9_2.aarch64.rpm

SHA-256: ba5656af66caac6d22b5950f986ec19b7b98cd099d8da67af15acd6b43d88931

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.2

SRPM

firefox-115.3.1-1.el9_2.src.rpm

SHA-256: 9476a080d7ede056e73a0da0dae0d4e69d1aa08b7698c068f74344f5a07fb118

aarch64

firefox-115.3.1-1.el9_2.aarch64.rpm

SHA-256: 26fab84ce6ee32db70cee0e8cd4f790c389b5592ccbad5f106744c5b79616a68

firefox-debuginfo-115.3.1-1.el9_2.aarch64.rpm

SHA-256: 207235b0414c1893a6d7afb2c066c2fd7f215816d6f495dcadd43a9122c4c5cb

firefox-debugsource-115.3.1-1.el9_2.aarch64.rpm

SHA-256: 30f72d8219b1a3a57ae2c7c34be209a26d2234e4b5f445b0a89a2f7d2fc11952

firefox-x11-115.3.1-1.el9_2.aarch64.rpm

SHA-256: ba5656af66caac6d22b5950f986ec19b7b98cd099d8da67af15acd6b43d88931

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2

SRPM

firefox-115.3.1-1.el9_2.src.rpm

SHA-256: 9476a080d7ede056e73a0da0dae0d4e69d1aa08b7698c068f74344f5a07fb118

ppc64le

firefox-115.3.1-1.el9_2.ppc64le.rpm

SHA-256: 9167f7e8d43676be62d7ce893f589c57b6b2a41a8d6476a78977c88dcc156293

firefox-debuginfo-115.3.1-1.el9_2.ppc64le.rpm

SHA-256: c051e7ed8ac9b2b595f6cd844fad166d3c08d0a7f250bc0fca0a8c4ad206163e

firefox-debugsource-115.3.1-1.el9_2.ppc64le.rpm

SHA-256: 111fab61dcd38ebc6c23b6d33b42592515c931ca7c3dc38f001719f66ae88b81

firefox-x11-115.3.1-1.el9_2.ppc64le.rpm

SHA-256: cd5e08a3d66f2fba04835875d784ddabd43f21fb77d6c48719c6bb39fe589c5f

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2

SRPM

firefox-115.3.1-1.el9_2.src.rpm

SHA-256: 9476a080d7ede056e73a0da0dae0d4e69d1aa08b7698c068f74344f5a07fb118

x86_64

firefox-115.3.1-1.el9_2.x86_64.rpm

SHA-256: 928147d7559c3c18f813cd1ec1ecb8e418d5afd0f3435dbf0e0db9d363c135ac

firefox-debuginfo-115.3.1-1.el9_2.x86_64.rpm

SHA-256: cc4b17fc4ddd2ad4ace1368da801973f8ecc02cfa556b3409cf868b75d0f7c4e

firefox-debugsource-115.3.1-1.el9_2.x86_64.rpm

SHA-256: b91d1185de0b3a04c7feb5d3599d99f2758c50a09f0d4c7fd5d1d394be36e621

firefox-x11-115.3.1-1.el9_2.x86_64.rpm

SHA-256: 282bd48d9ae410e6f19b7655e76bdc9f637c0355a934f90482b73b860290517c

Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.2

SRPM

firefox-115.3.1-1.el9_2.src.rpm

SHA-256: 9476a080d7ede056e73a0da0dae0d4e69d1aa08b7698c068f74344f5a07fb118

aarch64

firefox-115.3.1-1.el9_2.aarch64.rpm

SHA-256: 26fab84ce6ee32db70cee0e8cd4f790c389b5592ccbad5f106744c5b79616a68

firefox-debuginfo-115.3.1-1.el9_2.aarch64.rpm

SHA-256: 207235b0414c1893a6d7afb2c066c2fd7f215816d6f495dcadd43a9122c4c5cb

firefox-debugsource-115.3.1-1.el9_2.aarch64.rpm

SHA-256: 30f72d8219b1a3a57ae2c7c34be209a26d2234e4b5f445b0a89a2f7d2fc11952

firefox-x11-115.3.1-1.el9_2.aarch64.rpm

SHA-256: ba5656af66caac6d22b5950f986ec19b7b98cd099d8da67af15acd6b43d88931

Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.2

SRPM

firefox-115.3.1-1.el9_2.src.rpm

SHA-256: 9476a080d7ede056e73a0da0dae0d4e69d1aa08b7698c068f74344f5a07fb118

s390x

firefox-115.3.1-1.el9_2.s390x.rpm

SHA-256: 5d1011e5038e0e3a03980872f4a87d77b50b5e7b3ff8d53423bb9c47c23f9b5e

firefox-debuginfo-115.3.1-1.el9_2.s390x.rpm

SHA-256: 9f5abb4f2ca118111c93e3e19d25f88031e98da7ca5ded4af3526b81185d5480

firefox-debugsource-115.3.1-1.el9_2.s390x.rpm

SHA-256: 008dbd94feb17c2b13ac0a21efe515be1ae2a65aa949c7596acf747d926e6f52

firefox-x11-115.3.1-1.el9_2.s390x.rpm

SHA-256: c3e5f92b6bfd214d6475078ac451637ebd39d8ef5ce1774095278c319013d138

Related news

Gentoo Linux Security Advisory 202402-25

Gentoo Linux Security Advisory 202402-25 - Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. Versions greater than or equal to 115.7.0 are affected.

Zero-Day Alert: Google Chrome Under Active Attack, Exploiting New Vulnerability

Google has rolled out security updates to fix seven security issues in its Chrome browser, including a zero-day that has come under active exploitation in the wild. Tracked as CVE-2023-6345, the high-severity vulnerability has been described as an integer overflow bug in Skia, an open source 2D graphics library. Benoît Sevens and Clément Lecigne of Google's Threat Analysis Group (TAG) have been

Red Hat Security Advisory 2023-5534-01

Red Hat Security Advisory 2023-5534-01 - The libvpx packages provide the VP8 SDK, which allows the encoding and decoding of the VP8 video codec, commonly used with the WebM multimedia container file format. Issues addressed include a buffer overflow vulnerability.

Red Hat Security Advisory 2023-5540-01

Red Hat Security Advisory 2023-5540-01 - The libvpx packages provide the VP8 SDK, which allows the encoding and decoding of the VP8 video codec, commonly used with the WebM multimedia container file format. Issues addressed include a buffer overflow vulnerability.

RHSA-2023:5536: Red Hat Security Advisory: libvpx security update

An update for libvpx is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-5217: A heap-based buffer overflow flaw was found in the way libvpx, a library used to process VP8 and VP9 video codecs data, processes certain specially formatted video data via a...

Red Hat Security Advisory 2023-5475-01

Red Hat Security Advisory 2023-5475-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 115.3.1. Issues addressed include buffer overflow, out of bounds write, and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-5438-01

Red Hat Security Advisory 2023-5438-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 115.3.1. Issues addressed include buffer overflow, out of bounds write, and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-5426-01

Red Hat Security Advisory 2023-5426-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 115.3.1 ESR. Issues addressed include buffer overflow, out of bounds write, and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-5432-01

Red Hat Security Advisory 2023-5432-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 115.3.1. Issues addressed include buffer overflow, out of bounds write, and use-after-free vulnerabilities.

RHSA-2023:5477: Red Hat Security Advisory: firefox security update

An update for firefox is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3600: The Mozilla Foundation Security Advisory describes this flaw as: During the worker lifecycle, a use-after-free condition could have occured, which could have led to a potentially exploitable crash. * CVE-2023-5169: A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes this flaw as: A compromised content process could hav...

Gentoo Linux Security Advisory 202310-04

Gentoo Linux Security Advisory 202310-4 - Multiple vulnerabilities have been discovered in libvpx, the worst of which could result in arbitrary code execution. Versions greater than or equal to 1.13.1 are affected.

Debian Security Advisory 5513-1

Debian Linux Security Advisory 5513-1 - Multiple security issues were discovered in Thunderbird, which could result in denial of service or the execution of arbitrary code.

Debian Security Advisory 5513-1

Debian Linux Security Advisory 5513-1 - Multiple security issues were discovered in Thunderbird, which could result in denial of service or the execution of arbitrary code.

Debian Security Advisory 5513-1

Debian Linux Security Advisory 5513-1 - Multiple security issues were discovered in Thunderbird, which could result in denial of service or the execution of arbitrary code.

RHSA-2023:5429: Red Hat Security Advisory: thunderbird security update

An update for thunderbird is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3600: The Mozilla Foundation Security Advisory describes this flaw as: During the worker lifecycle, a use-after-free condition could have occured, which could have led to a po...

RHSA-2023:5429: Red Hat Security Advisory: thunderbird security update

An update for thunderbird is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3600: The Mozilla Foundation Security Advisory describes this flaw as: During the worker lifecycle, a use-after-free condition could have occured, which could have led to a po...

RHSA-2023:5429: Red Hat Security Advisory: thunderbird security update

An update for thunderbird is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3600: The Mozilla Foundation Security Advisory describes this flaw as: During the worker lifecycle, a use-after-free condition could have occured, which could have led to a po...

RHSA-2023:5429: Red Hat Security Advisory: thunderbird security update

An update for thunderbird is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3600: The Mozilla Foundation Security Advisory describes this flaw as: During the worker lifecycle, a use-after-free condition could have occured, which could have led to a po...

RHSA-2023:5429: Red Hat Security Advisory: thunderbird security update

An update for thunderbird is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3600: The Mozilla Foundation Security Advisory describes this flaw as: During the worker lifecycle, a use-after-free condition could have occured, which could have led to a po...

RHSA-2023:5438: Red Hat Security Advisory: thunderbird security update

An update for thunderbird is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3600: The Mozilla Foundation Security Advisory describes this flaw as: During the worker lifecycle, a use-after-free condition could have occured, which could have led to a potentially exploitable crash. * CVE-2023-5169: A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes this flaw as:...

RHSA-2023:5432: Red Hat Security Advisory: thunderbird security update

An update for thunderbird is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3600: The Mozilla Foundation Security Advisory describes this flaw as: During the worker lifecycle, a use-after-free condition could have occured, which could have led to a potentially exploit...

RHSA-2023:5426: Red Hat Security Advisory: firefox security update

An update for firefox is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3600: The Mozilla Foundation Security Advisory describes this flaw as: During the worker lifecycle, a use-after-free condition could have occured, which could have led to a potentially exploitable...

RHSA-2023:5433: Red Hat Security Advisory: firefox security update

An update for firefox is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3600: The Mozilla Foundation Security Advisory describes this flaw as: During the worker lifecycle, a use-after-free condition could have occured, which could have led to a potentially exploitable crash. * CVE-2023-5169: A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes this flaw as: A compromised content process could hav...

RHSA-2023:5440: Red Hat Security Advisory: firefox security update

An update for firefox is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3600: The Mozilla Foundation Security Advisory describes this flaw as: During the worker lifecycle, a use-after-free condition could have occured, which could have led to a potentially exploitable crash. * CVE-2023-5169: A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes this flaw as: A c...

RHSA-2023:5437: Red Hat Security Advisory: firefox security update

An update for firefox is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3600: The Mozilla Foundation Security Advisory describes this flaw as: During the worker lifecycle, a use-after-free condition could have occured, which could have led to a potent...

RHSA-2023:5439: Red Hat Security Advisory: thunderbird security update

An update for thunderbird is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3600: The Mozilla Foundation Security Advisory describes this flaw as: During the worker lifecycle, a use-after-free condition could have occured, which could have led to a potentially exploitable crash. * CVE-2023-5169: A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes this flaw as: A comprom...

RHSA-2023:5436: Red Hat Security Advisory: firefox security update

An update for firefox is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3600: The Mozilla Foundation Security Advisory describes this flaw as: During the worker lifecycle, a use-after-free condition could have occured, which could have led to a potentially exploitable crash. * CVE-2023-5169: A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes this flaw as: A compromised...

RHSA-2023:5430: Red Hat Security Advisory: thunderbird security update

An update for thunderbird is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3600: The Mozilla Foundation Security Advisory describes this flaw as: During the worker lifecycle, a use-after-free condition could have occured, which could have led to a potentially exploitable crash. * CVE-2023-5169: A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes this flaw as: A comprom...

RHSA-2023:5428: Red Hat Security Advisory: thunderbird security update

An update for thunderbird is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3600: The Mozilla Foundation Security Advisory describes this flaw as: During the worker lifecycle, a use-after-free condition could have occured, which could have led to a potentially exploitable crash. * CVE-2023-5169: A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes this flaw as: A compromised content process could...

Ubuntu Security Notice USN-6405-1

Ubuntu Security Notice 6405-1 - Multiple security issues were discovered in Thunderbird. If a user were tricked into opening a specially crafted website in a browsing context, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information, bypass security restrictions, cross-site tracing, or execute arbitrary code. Andrew McCreight discovered that Thunderbird did not properly manage during the worker lifecycle. An attacker could potentially exploit this issue to cause a denial of service.

Ubuntu Security Notice USN-6405-1

Ubuntu Security Notice 6405-1 - Multiple security issues were discovered in Thunderbird. If a user were tricked into opening a specially crafted website in a browsing context, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information, bypass security restrictions, cross-site tracing, or execute arbitrary code. Andrew McCreight discovered that Thunderbird did not properly manage during the worker lifecycle. An attacker could potentially exploit this issue to cause a denial of service.

Ubuntu Security Notice USN-6405-1

Ubuntu Security Notice 6405-1 - Multiple security issues were discovered in Thunderbird. If a user were tricked into opening a specially crafted website in a browsing context, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information, bypass security restrictions, cross-site tracing, or execute arbitrary code. Andrew McCreight discovered that Thunderbird did not properly manage during the worker lifecycle. An attacker could potentially exploit this issue to cause a denial of service.

Ubuntu Security Notice USN-6405-1

Ubuntu Security Notice 6405-1 - Multiple security issues were discovered in Thunderbird. If a user were tricked into opening a specially crafted website in a browsing context, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information, bypass security restrictions, cross-site tracing, or execute arbitrary code. Andrew McCreight discovered that Thunderbird did not properly manage during the worker lifecycle. An attacker could potentially exploit this issue to cause a denial of service.

Ubuntu Security Notice USN-6404-1

Ubuntu Security Notice 6404-1 - Multiple security issues were discovered in Firefox. If a user were tricked into opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information across domains, or execute arbitrary code. Ronald Crane discovered that Firefox did not properly manage memory when non-HTTPS Alternate Services is enabled. An attacker could potentially exploit this issue to cause a denial of service.

Ubuntu Security Notice USN-6404-1

Ubuntu Security Notice 6404-1 - Multiple security issues were discovered in Firefox. If a user were tricked into opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information across domains, or execute arbitrary code. Ronald Crane discovered that Firefox did not properly manage memory when non-HTTPS Alternate Services is enabled. An attacker could potentially exploit this issue to cause a denial of service.

Ubuntu Security Notice USN-6404-1

Ubuntu Security Notice 6404-1 - Multiple security issues were discovered in Firefox. If a user were tricked into opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information across domains, or execute arbitrary code. Ronald Crane discovered that Firefox did not properly manage memory when non-HTTPS Alternate Services is enabled. An attacker could potentially exploit this issue to cause a denial of service.

Ubuntu Security Notice USN-6404-1

Ubuntu Security Notice 6404-1 - Multiple security issues were discovered in Firefox. If a user were tricked into opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information across domains, or execute arbitrary code. Ronald Crane discovered that Firefox did not properly manage memory when non-HTTPS Alternate Services is enabled. An attacker could potentially exploit this issue to cause a denial of service.

Ubuntu Security Notice USN-6403-1

Ubuntu Security Notice 6403-1 - It was discovered that libvpx did not properly handle certain malformed media files. If an application using libvpx opened a specially crafted file, a remote attacker could cause a denial of service, or possibly execute arbitrary code.

Debian Security Advisory 5510-1

Debian Linux Security Advisory 5510-1 - Clement Lecigne discovered a heap-based buffer overflow in libvpx, a multimedia library for the VP8 and VP9 video codecs, which may result in the execution of arbitrary code if a specially crafted VP8 media stream is processed.

Debian Security Advisory 5509-1

Debian Linux Security Advisory 5509-1 - A buffer overflow in VP8 media stream processing has been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code.

Debian Security Advisory 5508-1

Debian Linux Security Advisory 5508-1 - Multiple security issues were discovered in Chromium, which could result in the execution of arbitrary code, denial of service or information disclosure.

Apple, Microsoft, and Google Just Fixed Multiple Zero-Day Flaws

Plus: Mozilla patches 10 Firefox bugs, Cisco fixes a vulnerability with a rare maximum severity score, and SAP releases updates to stamp out three highly critical flaws.

Debian Security Advisory 5506-1

Debian Linux Security Advisory 5506-1 - Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code

Debian Security Advisory 5506-1

Debian Linux Security Advisory 5506-1 - Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code

Debian Security Advisory 5506-1

Debian Linux Security Advisory 5506-1 - Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code

CVE-2023-5217

Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Critical Chrome Update Counters Spyware Vendor’s Exploits

By Waqas Ensure Your Chrome Browser Is Up to Date and Secure: Enable Automatic Updates to Safeguard Against Cybersecurity Threats This is a post from HackRead.com Read the original post: Critical Chrome Update Counters Spyware Vendor’s Exploits

Update Chrome Now: Google Releases Patch for Actively Exploited Zero-Day Vulnerability

Google on Wednesday rolled out fixes to address a new actively exploited zero-day in the Chrome browser. Tracked as CVE-2023-5217, the high-severity vulnerability has been described as a heap-based buffer overflow in the VP8 compression format in libvpx, a free software video codec library from Google and the Alliance for Open Media (AOMedia). Exploitation of such buffer overflow flaws can

CVE-2023-5171: Invalid Bug ID

During Ion compilation, a Garbage Collection could have resulted in a use-after-free condition, allowing an attacker to write two NUL bytes, and cause a potentially exploitable crash. This vulnerability affects Firefox < 118, Firefox ESR < 115.3, and Thunderbird < 115.3.

CVE-2023-5176: Security Vulnerabilities fixed in Firefox 118

Memory safety bugs present in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 118, Firefox ESR < 115.3, and Thunderbird < 115.3.

CVE-2023-5176: Security Vulnerabilities fixed in Firefox 118

Memory safety bugs present in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 118, Firefox ESR < 115.3, and Thunderbird < 115.3.

CVE-2023-5176: Security Vulnerabilities fixed in Firefox 118

Memory safety bugs present in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 118, Firefox ESR < 115.3, and Thunderbird < 115.3.

Ubuntu Security Notice USN-6218-1

Ubuntu Security Notice 6218-1 - A use-after-free was discovered in Firefox when handling workers. An attacker could potentially exploit this to cause a denial of service, or execute arbitrary code.

CVE-2023-3600: Security Vulnerabilities fixed in Firefox 115.0.2 and Firefox ESR 115.0.2

During the worker lifecycle, a use-after-free condition could have occured, which could have led to a potentially exploitable crash. This vulnerability affects Firefox < 115.0.2 and Firefox ESR < 115.0.2.