Content-Type: |
text/plain; charset="utf-8" |
Date: |
Mon, 23 Jan 2023 16:30:01 -0000 |
Reply-To: |
|
Subject: |
|
MIME-Version: |
1.0 |
Message-ID: |
<20230123163001.8832.64900@0acbe050e934> |
Content-Transfer-Encoding: |
7bit |
Sender: |
|
From: |
|
Parts/Attachments: |
|
|
Synopsis: Important: firefox security update
Advisory ID: SLSA-2023:0296-1
Issue Date: 2023-01-23
CVE Numbers: CVE-2022-46871
CVE-2023-23598
CVE-2023-23599
CVE-2023-23601
CVE-2023-23602
CVE-2022-46877
CVE-2023-23603
CVE-2023-23605
--
This update upgrades Firefox to version 102.7.0 ESR.
Security Fix(es):
* Mozilla: libusrsctp library out of date (CVE-2022-46871)
* Mozilla: Arbitrary file read from GTK drag and drop on Linux
(CVE-2023-23598)
* Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7
(CVE-2023-23605)
* Mozilla: Malicious command could be hidden in devtools output
(CVE-2023-23599)
* Mozilla: URL being dragged from cross-origin iframe into same tab
triggers navigation (CVE-2023-23601)
* Mozilla: Content Security Policy wasn't being correctly applied to
WebSockets in WebWorkers (CVE-2023-23602)
* Mozilla: Fullscreen notification bypass (CVE-2022-46877)
* Mozilla: Calls to <code>console.log</code> allowed bypasing Content
Security Policy via format directive (CVE-2023-23603)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
--
SL7
x86_64
firefox-102.7.0-1.el7_9.x86_64.rpm
firefox-debuginfo-102.7.0-1.el7_9.x86_64.rpm
firefox-102.7.0-1.el7_9.i686.rpm
firefox-debuginfo-102.7.0-1.el7_9.i686.rpm
- Scientific Linux Development Team
|
|
|