{"id":"MGASA-2023-0342","summary":"Updated firefox packages fix security vulnerabilities","details":"The updated packages fix security vulnerabilities.\n\nOut-of-bound memory access in WebGL2 blitFramebuffer. (CVE-2023-6204)\n\nUse-after-free in MessagePort::Entangled. (CVE-2023-6205)\n\nClickjacking permission prompts using the fullscreen transition.\n(CVE-2023-6206)\n\nUse-after-free in ReadableByteStreamQueueEntry::Buffer. (CVE-2023-6207)\n\nUsing Selection API would copy contents into X11 primary selection.\n(CVE-2023-6208)\n\nIncorrect parsing of relative URLs starting with \"///\". (CVE-2023-6209)\n\nMemory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and\nThunderbird 115.5. (CVE-2023-6212)\n","modified":"2026-02-04T03:44:39.742289Z","published":"2023-12-08T10:55:49Z","related":["CVE-2023-6204","CVE-2023-6205","CVE-2023-6206","CVE-2023-6207","CVE-2023-6208","CVE-2023-6209","CVE-2023-6212"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2023-0342.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=32551"},{"type":"REPORT","url":"https://www.mozilla.org/en-US/firefox/115.5.0/releasenotes/"},{"type":"REPORT","url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-50/"},{"type":"REPORT","url":"https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_95.html"}],"affected":[{"package":{"name":"rootcerts","ecosystem":"Mageia:9","purl":"pkg:rpm/mageia/rootcerts?arch=source&distro=mageia-9"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"20231116.00-1.mga9"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2023-0342.json"}},{"package":{"name":"nss","ecosystem":"Mageia:9","purl":"pkg:rpm/mageia/nss?arch=source&distro=mageia-9"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.95.0-1.mga9"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2023-0342.json"}},{"package":{"name":"firefox","ecosystem":"Mageia:9","purl":"pkg:rpm/mageia/firefox?arch=source&distro=mageia-9"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"115.5.0-3.mga9"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2023-0342.json"}},{"package":{"name":"firefox-l10n","ecosystem":"Mageia:9","purl":"pkg:rpm/mageia/firefox-l10n?arch=source&distro=mageia-9"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"115.5.0-1.mga9"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2023-0342.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}