Security update for MozillaFirefox
Announcement ID: | SUSE-SU-2023:4929-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves 18 vulnerabilities can now be installed.
Description:
This update for MozillaFirefox fixes the following issues:
Firefox Extended Support Release 115.6.0 ESR changelog-entry (bsc#1217974) * CVE-2023-6856: Heap-buffer-overflow affecting WebGL DrawElementsInstanced method with Mesa VM driver (bmo#1843782). * CVE-2023-6857: Symlinks may resolve to smaller than expected buffers (bmo#1796023). * CVE-2023-6858: Heap buffer overflow in nsTextFragment (bmo#1826791). * CVE-2023-6859: Use-after-free in PR_GetIdentitiesLayer (bmo#1840144). * CVE-2023-6860: Potential sandbox escape due to VideoBridge lack of texture validation (bmo#1854669). * CVE-2023-6861: Heap buffer overflow affected nsWindow::PickerOpen(void) in headless mode (bmo#1864118). * CVE-2023-6862: Use-after-free in nsDNSService (bsc#1868042). * CVE-2023-6863: Undefined behavior in ShutdownObserver() (bmo#1868901). * CVE-2023-6864: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6. * CVE-2023-6865: Potential exposure of uninitialized data in EncryptingOutputStream (bmo#1864123). * CVE-2023-6867: Clickjacking permission prompts using the popup transition (bmo#1863863).
Fixed: Various security fixes and other quality improvements MFSA 2023-50 (bsc#1217230) * CVE-2023-6204 (bmo#1841050) Out-of-bound memory access in WebGL2 blitFramebuffer * CVE-2023-6205 (bmo#1854076) Use-after-free in MessagePort::Entangled * CVE-2023-6206 (bmo#1857430) Clickjacking permission prompts using the fullscreen transition * CVE-2023-6207 (bmo#1861344) Use-after-free in ReadableByteStreamQueueEntry::Buffer * CVE-2023-6208 (bmo#1855345) Using Selection API would copy contents into X11 primary selection. * CVE-2023-6209 (bmo#1858570) Incorrect parsing of relative URLs starting with "///" * CVE-2023-6212 (bmo#1658432, bmo#1820983, bmo#1829252, bmo#1856072, bmo#1856091, bmo#1859030, bmo#1860943, bmo#1862782) Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE CaaS Platform 4.0
To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. -
SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-4929=1
-
SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-4929=1
-
SUSE Linux Enterprise Server for SAP Applications 15 SP1
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2023-4929=1
Package List:
-
SUSE CaaS Platform 4.0 (x86_64)
- MozillaFirefox-translations-common-115.6.0-150000.150.119.1
- MozillaFirefox-debuginfo-115.6.0-150000.150.119.1
- MozillaFirefox-translations-other-115.6.0-150000.150.119.1
- MozillaFirefox-debugsource-115.6.0-150000.150.119.1
- MozillaFirefox-115.6.0-150000.150.119.1
-
SUSE CaaS Platform 4.0 (noarch)
- MozillaFirefox-devel-115.6.0-150000.150.119.1
-
SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64)
- MozillaFirefox-translations-common-115.6.0-150000.150.119.1
- MozillaFirefox-debuginfo-115.6.0-150000.150.119.1
- MozillaFirefox-translations-other-115.6.0-150000.150.119.1
- MozillaFirefox-debugsource-115.6.0-150000.150.119.1
- MozillaFirefox-115.6.0-150000.150.119.1
-
SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (noarch)
- MozillaFirefox-devel-115.6.0-150000.150.119.1
-
SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64)
- MozillaFirefox-translations-common-115.6.0-150000.150.119.1
- MozillaFirefox-debuginfo-115.6.0-150000.150.119.1
- MozillaFirefox-translations-other-115.6.0-150000.150.119.1
- MozillaFirefox-debugsource-115.6.0-150000.150.119.1
- MozillaFirefox-115.6.0-150000.150.119.1
-
SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (noarch)
- MozillaFirefox-devel-115.6.0-150000.150.119.1
-
SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64)
- MozillaFirefox-translations-common-115.6.0-150000.150.119.1
- MozillaFirefox-debuginfo-115.6.0-150000.150.119.1
- MozillaFirefox-translations-other-115.6.0-150000.150.119.1
- MozillaFirefox-debugsource-115.6.0-150000.150.119.1
- MozillaFirefox-115.6.0-150000.150.119.1
-
SUSE Linux Enterprise Server for SAP Applications 15 SP1 (noarch)
- MozillaFirefox-devel-115.6.0-150000.150.119.1
References:
- https://www.suse.com/security/cve/CVE-2023-6204.html
- https://www.suse.com/security/cve/CVE-2023-6205.html
- https://www.suse.com/security/cve/CVE-2023-6206.html
- https://www.suse.com/security/cve/CVE-2023-6207.html
- https://www.suse.com/security/cve/CVE-2023-6208.html
- https://www.suse.com/security/cve/CVE-2023-6209.html
- https://www.suse.com/security/cve/CVE-2023-6212.html
- https://www.suse.com/security/cve/CVE-2023-6856.html
- https://www.suse.com/security/cve/CVE-2023-6857.html
- https://www.suse.com/security/cve/CVE-2023-6858.html
- https://www.suse.com/security/cve/CVE-2023-6859.html
- https://www.suse.com/security/cve/CVE-2023-6860.html
- https://www.suse.com/security/cve/CVE-2023-6861.html
- https://www.suse.com/security/cve/CVE-2023-6862.html
- https://www.suse.com/security/cve/CVE-2023-6863.html
- https://www.suse.com/security/cve/CVE-2023-6864.html
- https://www.suse.com/security/cve/CVE-2023-6865.html
- https://www.suse.com/security/cve/CVE-2023-6867.html
- https://bugzilla.suse.com/show_bug.cgi?id=1217230
- https://bugzilla.suse.com/show_bug.cgi?id=1217974