Lucene search

K
mageiaGentoo FoundationMGASA-2023-0342
HistoryDec 08, 2023 - 1:55 p.m.

Updated firefox packages fix security vulnerabilities

2023-12-0813:55:49
Gentoo Foundation
advisories.mageia.org
9
firefox
security vulnerabilities
webgl2
messageport
clickjacking
x11
memory safety bugs
thunderbird
unix

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.1 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

38.3%

The updated packages fix security vulnerabilities. Out-of-bound memory access in WebGL2 blitFramebuffer. (CVE-2023-6204) Use-after-free in MessagePort::Entangled. (CVE-2023-6205) Clickjacking permission prompts using the fullscreen transition. (CVE-2023-6206) Use-after-free in ReadableByteStreamQueueEntry::Buffer. (CVE-2023-6207) Using Selection API would copy contents into X11 primary selection. (CVE-2023-6208) Incorrect parsing of relative URLs starting with “///”. (CVE-2023-6209) Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5. (CVE-2023-6212)

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.1 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

38.3%