Bug 2170391 (CVE-2023-25744)
Summary: | CVE-2023-25744 Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Dhananjay Arunesh <darunesh> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | erack, jhorak, nobody, stransky, tpopela |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | firefox 102.8, thunderbird 102.8 | Doc Type: | If docs needed, set a value |
Doc Text: |
The Mozilla Foundation Security Advisory describes this flaw as:
Mozilla developers Kershaw Chang and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 109 and Firefox ESR 102.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2023-02-20 18:35:27 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2167578, 2167579, 2167580, 2167581, 2167582, 2167583, 2167584, 2167585, 2167586, 2167587, 2167588, 2167672, 2167673, 2167674, 2167675, 2167676, 2167677, 2167678, 2167679, 2167680, 2167681, 2167682 | ||
Bug Blocks: | 2167576 |
Description
Dhananjay Arunesh
2023-02-16 09:10:45 UTC
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions Via RHSA-2023:0806 https://access.redhat.com/errata/RHSA-2023:0806 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2023:0805 https://access.redhat.com/errata/RHSA-2023:0805 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2023:0809 https://access.redhat.com/errata/RHSA-2023:0809 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:0810 https://access.redhat.com/errata/RHSA-2023:0810 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2023:0807 https://access.redhat.com/errata/RHSA-2023:0807 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions Red Hat Enterprise Linux 8.2 Telecommunications Update Service Via RHSA-2023:0811 https://access.redhat.com/errata/RHSA-2023:0811 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:0808 https://access.redhat.com/errata/RHSA-2023:0808 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2023:0812 https://access.redhat.com/errata/RHSA-2023:0812 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions Via RHSA-2023:0818 https://access.redhat.com/errata/RHSA-2023:0818 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions Red Hat Enterprise Linux 8.2 Telecommunications Update Service Via RHSA-2023:0819 https://access.redhat.com/errata/RHSA-2023:0819 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2023:0822 https://access.redhat.com/errata/RHSA-2023:0822 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2023:0817 https://access.redhat.com/errata/RHSA-2023:0817 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:0824 https://access.redhat.com/errata/RHSA-2023:0824 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2023:0820 https://access.redhat.com/errata/RHSA-2023:0820 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:0821 https://access.redhat.com/errata/RHSA-2023:0821 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2023:0823 https://access.redhat.com/errata/RHSA-2023:0823 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2023-25744 |