Pop-Up Thingie

>>> Magnum BBS <<<
  • Home
  • Forum
  • Files
  • Log in

  1. Forum
  2. Usenet
  3. LINUX.GENTOO.ANNOUNCE
  • [gentoo-announce] [ GLSA 202401-10 ] Mozilla Firefox: Multiple Vulnerab

    From glsamaker@gentoo.org@21:1/5 to All on Sun Jan 7 10:50:01 2024
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Gentoo Linux Security Advisory GLSA 202401-10
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    https://security.gentoo.org/
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Severity: High
    Title: Mozilla Firefox: Multiple Vulnerabilities
    Date: January 07, 2024
    Bugs: #908245, #914073, #918433, #920507
    ID: 202401-10

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Synopsis
    ========

    Multiple vulnerabilities have been found in Mozilla Firefox, the worst
    of which could lead to remote code execution.

    Background
    ==========

    Mozilla Firefox is a popular open-source web browser from the Mozilla
    project.

    Affected packages
    =================

    Package Vulnerable Unaffected
    ---------------------- ------------- --------------
    www-client/firefox < 115.6.0:esr >= 115.6.0:esr
    < 121.0:rapid >= 121.0:rapid
    www-client/firefox-bin < 115.6.0:esr >= 115.6.0:esr
    < 121.0:rapid >= 121.0:rapid

    Description
    ===========

    Multiple vulnerabilities have been discovered in Mozilla Firefox. Please
    review the CVE identifiers referenced below for details.

    Impact
    ======

    Please review the referenced CVE identifiers for details.

    Workaround
    ==========

    There is no known workaround at this time.

    Resolution
    ==========

    All Mozilla Firefox ESR binary users should upgrade to the latest
    version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-115.6.0:esr"

    All Mozilla Firefox ESR users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=www-client/firefox-115.6.0:esr"

    All Mozilla Firefox binary users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-121.0:rapid"

    All Mozilla Firefox users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=www-client/firefox-121.0:rapid"

    References
    ==========

    [ 1 ] CVE-2023-3482
    https://nvd.nist.gov/vuln/detail/CVE-2023-3482
    [ 2 ] CVE-2023-4058
    https://nvd.nist.gov/vuln/detail/CVE-2023-4058
    [ 3 ] CVE-2023-4579
    https://nvd.nist.gov/vuln/detail/CVE-2023-4579
    [ 4 ] CVE-2023-4863
    https://nvd.nist.gov/vuln/detail/CVE-2023-4863
    [ 5 ] CVE-2023-5129
    https://nvd.nist.gov/vuln/detail/CVE-2023-5129
    [ 6 ] CVE-2023-5170
    https://nvd.nist.gov/vuln/detail/CVE-2023-5170
    [ 7 ] CVE-2023-5172
    https://nvd.nist.gov/vuln/detail/CVE-2023-5172
    [ 8 ] CVE-2023-5173
    https://nvd.nist.gov/vuln/detail/CVE-2023-5173
    [ 9 ] CVE-2023-5175
    https://nvd.nist.gov/vuln/detail/CVE-2023-5175
    [ 10 ] CVE-2023-5722
    https://nvd.nist.gov/vuln/detail/CVE-2023-5722
    [ 11 ] CVE-2023-5723
    https://nvd.nist.gov/vuln/detail/CVE-2023-5723
    [ 12 ] CVE-2023-5729
    https://nvd.nist.gov/vuln/detail/CVE-2023-5729
    [ 13 ] CVE-2023-5731
    https://nvd.nist.gov/vuln/detail/CVE-2023-5731
    [ 14 ] CVE-2023-5758
    https://nvd.nist.gov/vuln/detail/CVE-2023-5758
    [ 15 ] CVE-2023-6135
    https://nvd.nist.gov/vuln/detail/CVE-2023-6135
    [ 16 ] CVE-2023-6210
    https://nvd.nist.gov/vuln/detail/CVE-2023-6210
    [ 17 ] CVE-2023-6211
    https://nvd.nist.gov/vuln/detail/CVE-2023-6211
    [ 18 ] CVE-2023-6213
    https://nvd.nist.gov/vuln/detail/CVE-2023-6213
    [ 19 ] CVE-2023-6856
    https://nvd.nist.gov/vuln/detail/CVE-2023-6856
    [ 20 ] CVE-2023-6857
    https://nvd.nist.gov/vuln/detail/CVE-2023-6857
    [ 21 ] CVE-2023-6858
    https://nvd.nist.gov/vuln/detail/CVE-2023-6858
    [ 22 ] CVE-2023-6859
    https://nvd.nist.gov/vuln/detail/CVE-2023-6859
    [ 23 ] CVE-2023-6860
    https://nvd.nist.gov/vuln/detail/CVE-2023-6860
    [ 24 ] CVE-2023-6861
    https://nvd.nist.gov/vuln/detail/CVE-2023-6861
    [ 25 ] CVE-2023-6862
    https://nvd.nist.gov/vuln/detail/CVE-2023-6862
    [ 26 ] CVE-2023-6863
    https://nvd.nist.gov/vuln/detail/CVE-2023-6863
    [ 27 ] CVE-2023-6864
    https://nvd.nist.gov/vuln/detail/CVE-2023-6864
    [ 28 ] CVE-2023-6865
    https://nvd.nist.gov/vuln/detail/CVE-2023-6865
    [ 29 ] CVE-2023-6866
    https://nvd.nist.gov/vuln/detail/CVE-2023-6866
    [ 30 ] CVE-2023-6867
    https://nvd.nist.gov/vuln/detail/CVE-2023-6867
    [ 31 ] CVE-2023-6868
    https://nvd.nist.gov/vuln/detail/CVE-2023-6868
    [ 32 ] CVE-2023-6869
    https://nvd.nist.gov/vuln/detail/CVE-2023-6869
    [ 33 ] CVE-2023-6870
    https://nvd.nist.gov/vuln/detail/CVE-2023-6870
    [ 34 ] CVE-2023-6871
    https://nvd.nist.gov/vuln/detail/CVE-2023-6871
    [ 35 ] CVE-2023-6872
    https://nvd.nist.gov/vuln/detail/CVE-2023-6872
    [ 36 ] CVE-2023-6873
    https://nvd.nist.gov/vuln/detail/CVE-2023-6873
    [ 37 ] CVE-2023-32205
    https://nvd.nist.gov/vuln/detail/CVE-2023-32205
    [ 38 ] CVE-2023-32206
    https://nvd.nist.gov/vuln/detail/CVE-2023-32206
    [ 39 ] CVE-2023-32207
    https://nvd.nist.gov/vuln/detail/CVE-2023-32207
    [ 40 ] CVE-2023-32208
    https://nvd.nist.gov/vuln/detail/CVE-2023-32208
    [ 41 ] CVE-2023-32209
    https://nvd.nist.gov/vuln/detail/CVE-2023-32209
    [ 42 ] CVE-2023-32210
    https://nvd.nist.gov/vuln/detail/CVE-2023-32210
    [ 43 ] CVE-2023-32211
    https://nvd.nist.gov/vuln/detail/CVE-2023-32211
    [ 44 ] CVE-2023-32212
    https://nvd.nist.gov/vuln/detail/CVE-2023-32212
    [ 45 ] CVE-2023-32213
    https://nvd.nist.gov/vuln/detail/CVE-2023-32213
    [ 46 ] CVE-2023-32214
    https://nvd.nist.gov/vuln/detail/CVE-2023-32214
    [ 47 ] CVE-2023-32215
    https://nvd.nist.gov/vuln/detail/CVE-2023-32215
    [ 48 ] CVE-2023-32216
    https://nvd.nist.gov/vuln/detail/CVE-2023-32216
    [ 49 ] CVE-2023-34414
    https://nvd.nist.gov/vuln/detail/CVE-2023-34414
    [ 50 ] CVE-2023-34415
    https://nvd.nist.gov/vuln/detail/CVE-2023-34415
    [ 51 ] CVE-2023-34416
    https://nvd.nist.gov/vuln/detail/CVE-2023-34416
    [ 52 ] CVE-2023-34417
    https://nvd.nist.gov/vuln/detail/CVE-2023-34417
    [ 53 ] CVE-2023-37203
    https://nvd.nist.gov/vuln/detail/CVE-2023-37203
    [ 54 ] CVE-2023-37204
    https://nvd.nist.gov/vuln/detail/CVE-2023-37204
    [ 55 ] CVE-2023-37205
    https://nvd.nist.gov/vuln/detail/CVE-2023-37205
    [ 56 ] CVE-2023-37206
    https://nvd.nist.gov/vuln/detail/CVE-2023-37206
    [ 57 ] CVE-2023-37209
    https://nvd.nist.gov/vuln/detail/CVE-2023-37209
    [ 58 ] CVE-2023-37210
    https://nvd.nist.gov/vuln/detail/CVE-2023-37210
    [ 59 ] CVE-2023-37212
    https://nvd.nist.gov/vuln/detail/CVE-2023-37212
    [ 60 ] MFSA-2023-40
    [ 61 ] MFSA-TMP-2023-0002

    Availability
    ============

    This GLSA and any updates to it are available for viewing at
    the Gentoo Security Website:

    https://security.gentoo.org/glsa/202401-10

    Concerns?
    =========

    Security is a primary focus of Gentoo Linux and ensuring the
    confidentiality and security of our users' machines is of utmost
    importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

    License
    =======

    Copyright 2024 Gentoo Foundation, Inc; referenced text
    belongs to its owner(s).

    The contents of this document are licensed under the
    Creative Commons - Attribution / Share Alike license.

    https://creativecommons.org/licenses/by-sa/2.5
    -----BEGIN PGP SIGNATURE-----

    iQIzBAEBCgAdFiEEpqTA6ABLMxh/aChGFMQkOaVy+9kFAmWacWIACgkQFMQkOaVy +9n87w/+JQMZVge37PHdkr2K7xMRjPYAFF8DrI+ByaNsFu8wPAO8iIEp5fPe10hH xm5mpcEcwvj/e4wuTUlMjTB9NdskqyOEqXKS6gfhiftN9P0fOeUW3bhVeGq5AH4D VW4n3QW+4XUtMEYYCNRiJj/e46aaBNASKTUvTs90/6irpPGfaFvsAclhvgDieZzO LsgMi+wTIm9ygERz6R1mZi18Y5ywk3rtApaaZCQ1UAYjZXcB+Q/oMU+VQeeRLZL5 WP4bRKKVS3N1sUSwVW27Mx7n0LBTQCQpnJ6rT/4coOElQkL1LOWPllB1RvzMdyYI mQ0Bs3gUio0ai/WFBBvtNgVyblGOZwj0rYcZrazv4nfEtJRW88yg74eh+9ZS5TZ/ pcU0LBIH4m/gQ0Cuz9bBharQv5otglPXdbggScnkjVc5S0+kRtFztZsmeDBg6EK5 3CcE7YLxD5WbM4PWrhPCS6WNIObgW9DFHkqneZ1T3y2PR6ppEjUhMGJBxUo4kwHY R79bhlyUeE7NxqIrtxr1vj3JkFbYEox6lPvI0Mf7DYSjtOIQlh3RBwAzSK/PfhSJ lpXtqfHi0/vgkV1ifio17TYGSzhquhGwCBhEmlVqVUTV0rm/EzShOetwPM24TvWs 9wNwo4T68Nn0RdiROfPP2Uz7n5ae3eYlDCljqcLfaRVnoGoQ4mk=
    =KhFB
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • Who's Online

  • Recent Visitors

    • Gretchiie
      Sun Sep 14 06:07:30 2025
      from Derry, Nh via Telnet
    • Thlc
      Sat Sep 13 17:11:34 2025
      from Rognac, France via Telnet
    • Thlc
      Sat Sep 13 17:04:03 2025
      from Rognac, France via Telnet
    • Thlc
      Sat Sep 13 16:32:19 2025
      from Rognac, France via SSH
    • Thlc
      Sat Sep 13 15:41:11 2025
      from Rognac, France via SSH
    • Thlc
      Sat Sep 13 07:56:03 2025
      from Rognac, France via SSH
    • Gretchiie
      Sat Sep 13 07:22:10 2025
      from Derry, Nh via Telnet
    • Thlc
      Sat Sep 13 06:57:56 2025
      from Rognac, France via SSH
  • System Info

    Sysop: Keyop
    Location: Huddersfield, West Yorkshire, UK
    Users: 546
    Nodes: 16 (0 / 16)
    Uptime: 156:36:51
    Calls: 10,384
    Calls today: 1
    Files: 14,056
    Messages: 6,416,471

© >>> Magnum BBS <<<, 2025