Mozilla developers Kershaw Chang and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 109 and Firefox ESR 102.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. External Reference: https://www.mozilla.org/en-US/security/advisories/mfsa2023-06/#CVE-2023-25744
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions Via RHSA-2023:0806 https://access.redhat.com/errata/RHSA-2023:0806
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2023:0805 https://access.redhat.com/errata/RHSA-2023:0805
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2023:0809 https://access.redhat.com/errata/RHSA-2023:0809
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:0810 https://access.redhat.com/errata/RHSA-2023:0810
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2023:0807 https://access.redhat.com/errata/RHSA-2023:0807
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions Red Hat Enterprise Linux 8.2 Telecommunications Update Service Via RHSA-2023:0811 https://access.redhat.com/errata/RHSA-2023:0811
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:0808 https://access.redhat.com/errata/RHSA-2023:0808
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2023:0812 https://access.redhat.com/errata/RHSA-2023:0812
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions Via RHSA-2023:0818 https://access.redhat.com/errata/RHSA-2023:0818
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions Red Hat Enterprise Linux 8.2 Telecommunications Update Service Via RHSA-2023:0819 https://access.redhat.com/errata/RHSA-2023:0819
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2023:0822 https://access.redhat.com/errata/RHSA-2023:0822
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2023:0817 https://access.redhat.com/errata/RHSA-2023:0817
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:0824 https://access.redhat.com/errata/RHSA-2023:0824
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2023:0820 https://access.redhat.com/errata/RHSA-2023:0820
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:0821 https://access.redhat.com/errata/RHSA-2023:0821
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2023:0823 https://access.redhat.com/errata/RHSA-2023:0823
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2023-25744