Bug 2228370 (CVE-2023-4056)
Summary: | CVE-2023-4056 Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Dhananjay Arunesh <darunesh> |
Component: | vulnerability | Assignee: | Nobody <nobody> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | abobrov, desktop-qa-list, elima, erack, jhorak, nobody, stransky, tpopela |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | firefox 102.14, firefox 115.1, thunderbird 102.14, thunderbird 115.1 | Doc Type: | --- |
Doc Text: |
The Mozilla Foundation Security Advisory describes this flaw as:
Memory safety bugs present in Firefox 115, Firefox ESR 115.0, Firefox ESR 102.13, Thunderbird 115.0, and Thunderbird 102.13. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2023-08-07 13:39:31 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2225291, 2225292, 2225293, 2225294, 2225295, 2225296, 2225297, 2225298, 2225299, 2225300, 2225303, 2225304, 2225305, 2225306, 2225307, 2225308, 2225309, 2225310, 2225311, 2225312, 2226760, 2226761 | ||
Bug Blocks: | 2225289 |
Description
Dhananjay Arunesh
2023-08-02 07:53:29 UTC
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions Red Hat Enterprise Linux 8.2 Telecommunications Update Service Via RHSA-2023:4460 https://access.redhat.com/errata/RHSA-2023:4460 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2023:4461 https://access.redhat.com/errata/RHSA-2023:4461 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:4462 https://access.redhat.com/errata/RHSA-2023:4462 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions Via RHSA-2023:4464 https://access.redhat.com/errata/RHSA-2023:4464 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2023:4463 https://access.redhat.com/errata/RHSA-2023:4463 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2023:4465 https://access.redhat.com/errata/RHSA-2023:4465 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions Red Hat Enterprise Linux 8.4 Telecommunications Update Service Via RHSA-2023:4469 https://access.redhat.com/errata/RHSA-2023:4469 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:4468 https://access.redhat.com/errata/RHSA-2023:4468 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions Via RHSA-2023:4492 https://access.redhat.com/errata/RHSA-2023:4492 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2023:4494 https://access.redhat.com/errata/RHSA-2023:4494 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2023:4493 https://access.redhat.com/errata/RHSA-2023:4493 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2023:4495 https://access.redhat.com/errata/RHSA-2023:4495 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions Red Hat Enterprise Linux 8.2 Telecommunications Update Service Via RHSA-2023:4496 https://access.redhat.com/errata/RHSA-2023:4496 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:4499 https://access.redhat.com/errata/RHSA-2023:4499 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:4497 https://access.redhat.com/errata/RHSA-2023:4497 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions Red Hat Enterprise Linux 8.4 Telecommunications Update Service Via RHSA-2023:4500 https://access.redhat.com/errata/RHSA-2023:4500 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2023-4056 |