From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id A10CB158451 for ; Sun, 7 Jan 2024 09:40:40 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id C849D2BC0E4; Sun, 7 Jan 2024 09:40:12 +0000 (UTC) Received: from smtp.gentoo.org (mail.gentoo.org [IPv6:2001:470:ea4a:1:5054:ff:fec7:86e4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 5C61A2BC015 for ; Sun, 7 Jan 2024 09:39:47 +0000 (UTC) Received: from glsamakerdev.dev.gentoo.org (unknown [140.211.166.165]) by smtp.gentoo.org (Postfix) with ESMTP id BC34E343276 for ; Sun, 7 Jan 2024 09:39:46 +0000 (UTC) Received: from [172.18.0.3] (unknown [172.18.0.3]) by glsamakerdev.dev.gentoo.org (Postfix) with ESMTP id A2D2D9F2A4 for ; Sun, 7 Jan 2024 09:39:46 +0000 (UTC) Subject: [gentoo-announce] [ GLSA 202401-10 ] Mozilla Firefox: Multiple Vulnerabilities Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-announce@lists.gentoo.org X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply MIME-Version: 1.0 Content-Type: multipart/signed; protocol="application/pgp-signature"; micalg="pgp-sha512"; boundary="===============3848594396510966732==" From: glsamaker@gentoo.org To: gentoo-announce@lists.gentoo.org Reply-To: security@gentoo.org Date: Sun, 07 Jan 2024 09:39:46 -0000 Message-ID: <170462038666.7.6131313590989757294@4a99fbfff9eb> X-Archives-Salt: a5d5756e-71fd-478a-85a6-7cbfcf0fed05 X-Archives-Hash: 22b9e799703f2c0809de68e2967226d8 --===============3848594396510966732== Content-Type: text/plain; charset="utf-8" - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202401-10 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: Mozilla Firefox: Multiple Vulnerabilities Date: January 07, 2024 Bugs: #908245, #914073, #918433, #920507 ID: 202401-10 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution. Background ========== Mozilla Firefox is a popular open-source web browser from the Mozilla project. Affected packages ================= Package Vulnerable Unaffected ---------------------- ------------- -------------- www-client/firefox < 115.6.0:esr >= 115.6.0:esr < 121.0:rapid >= 121.0:rapid www-client/firefox-bin < 115.6.0:esr >= 115.6.0:esr < 121.0:rapid >= 121.0:rapid Description =========== Multiple vulnerabilities have been discovered in Mozilla Firefox. Please review the CVE identifiers referenced below for details. Impact ====== Please review the referenced CVE identifiers for details. Workaround ========== There is no known workaround at this time. Resolution ========== All Mozilla Firefox ESR binary users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-115.6.0:esr" All Mozilla Firefox ESR users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-client/firefox-115.6.0:esr" All Mozilla Firefox binary users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-121.0:rapid" All Mozilla Firefox users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-client/firefox-121.0:rapid" References ========== [ 1 ] CVE-2023-3482 https://nvd.nist.gov/vuln/detail/CVE-2023-3482 [ 2 ] CVE-2023-4058 https://nvd.nist.gov/vuln/detail/CVE-2023-4058 [ 3 ] CVE-2023-4579 https://nvd.nist.gov/vuln/detail/CVE-2023-4579 [ 4 ] CVE-2023-4863 https://nvd.nist.gov/vuln/detail/CVE-2023-4863 [ 5 ] CVE-2023-5129 https://nvd.nist.gov/vuln/detail/CVE-2023-5129 [ 6 ] CVE-2023-5170 https://nvd.nist.gov/vuln/detail/CVE-2023-5170 [ 7 ] CVE-2023-5172 https://nvd.nist.gov/vuln/detail/CVE-2023-5172 [ 8 ] CVE-2023-5173 https://nvd.nist.gov/vuln/detail/CVE-2023-5173 [ 9 ] CVE-2023-5175 https://nvd.nist.gov/vuln/detail/CVE-2023-5175 [ 10 ] CVE-2023-5722 https://nvd.nist.gov/vuln/detail/CVE-2023-5722 [ 11 ] CVE-2023-5723 https://nvd.nist.gov/vuln/detail/CVE-2023-5723 [ 12 ] CVE-2023-5729 https://nvd.nist.gov/vuln/detail/CVE-2023-5729 [ 13 ] CVE-2023-5731 https://nvd.nist.gov/vuln/detail/CVE-2023-5731 [ 14 ] CVE-2023-5758 https://nvd.nist.gov/vuln/detail/CVE-2023-5758 [ 15 ] CVE-2023-6135 https://nvd.nist.gov/vuln/detail/CVE-2023-6135 [ 16 ] CVE-2023-6210 https://nvd.nist.gov/vuln/detail/CVE-2023-6210 [ 17 ] CVE-2023-6211 https://nvd.nist.gov/vuln/detail/CVE-2023-6211 [ 18 ] CVE-2023-6213 https://nvd.nist.gov/vuln/detail/CVE-2023-6213 [ 19 ] CVE-2023-6856 https://nvd.nist.gov/vuln/detail/CVE-2023-6856 [ 20 ] CVE-2023-6857 https://nvd.nist.gov/vuln/detail/CVE-2023-6857 [ 21 ] CVE-2023-6858 https://nvd.nist.gov/vuln/detail/CVE-2023-6858 [ 22 ] CVE-2023-6859 https://nvd.nist.gov/vuln/detail/CVE-2023-6859 [ 23 ] CVE-2023-6860 https://nvd.nist.gov/vuln/detail/CVE-2023-6860 [ 24 ] CVE-2023-6861 https://nvd.nist.gov/vuln/detail/CVE-2023-6861 [ 25 ] CVE-2023-6862 https://nvd.nist.gov/vuln/detail/CVE-2023-6862 [ 26 ] CVE-2023-6863 https://nvd.nist.gov/vuln/detail/CVE-2023-6863 [ 27 ] CVE-2023-6864 https://nvd.nist.gov/vuln/detail/CVE-2023-6864 [ 28 ] CVE-2023-6865 https://nvd.nist.gov/vuln/detail/CVE-2023-6865 [ 29 ] CVE-2023-6866 https://nvd.nist.gov/vuln/detail/CVE-2023-6866 [ 30 ] CVE-2023-6867 https://nvd.nist.gov/vuln/detail/CVE-2023-6867 [ 31 ] CVE-2023-6868 https://nvd.nist.gov/vuln/detail/CVE-2023-6868 [ 32 ] CVE-2023-6869 https://nvd.nist.gov/vuln/detail/CVE-2023-6869 [ 33 ] CVE-2023-6870 https://nvd.nist.gov/vuln/detail/CVE-2023-6870 [ 34 ] CVE-2023-6871 https://nvd.nist.gov/vuln/detail/CVE-2023-6871 [ 35 ] CVE-2023-6872 https://nvd.nist.gov/vuln/detail/CVE-2023-6872 [ 36 ] CVE-2023-6873 https://nvd.nist.gov/vuln/detail/CVE-2023-6873 [ 37 ] CVE-2023-32205 https://nvd.nist.gov/vuln/detail/CVE-2023-32205 [ 38 ] CVE-2023-32206 https://nvd.nist.gov/vuln/detail/CVE-2023-32206 [ 39 ] CVE-2023-32207 https://nvd.nist.gov/vuln/detail/CVE-2023-32207 [ 40 ] CVE-2023-32208 https://nvd.nist.gov/vuln/detail/CVE-2023-32208 [ 41 ] CVE-2023-32209 https://nvd.nist.gov/vuln/detail/CVE-2023-32209 [ 42 ] CVE-2023-32210 https://nvd.nist.gov/vuln/detail/CVE-2023-32210 [ 43 ] CVE-2023-32211 https://nvd.nist.gov/vuln/detail/CVE-2023-32211 [ 44 ] CVE-2023-32212 https://nvd.nist.gov/vuln/detail/CVE-2023-32212 [ 45 ] CVE-2023-32213 https://nvd.nist.gov/vuln/detail/CVE-2023-32213 [ 46 ] CVE-2023-32214 https://nvd.nist.gov/vuln/detail/CVE-2023-32214 [ 47 ] CVE-2023-32215 https://nvd.nist.gov/vuln/detail/CVE-2023-32215 [ 48 ] CVE-2023-32216 https://nvd.nist.gov/vuln/detail/CVE-2023-32216 [ 49 ] CVE-2023-34414 https://nvd.nist.gov/vuln/detail/CVE-2023-34414 [ 50 ] CVE-2023-34415 https://nvd.nist.gov/vuln/detail/CVE-2023-34415 [ 51 ] CVE-2023-34416 https://nvd.nist.gov/vuln/detail/CVE-2023-34416 [ 52 ] CVE-2023-34417 https://nvd.nist.gov/vuln/detail/CVE-2023-34417 [ 53 ] CVE-2023-37203 https://nvd.nist.gov/vuln/detail/CVE-2023-37203 [ 54 ] CVE-2023-37204 https://nvd.nist.gov/vuln/detail/CVE-2023-37204 [ 55 ] CVE-2023-37205 https://nvd.nist.gov/vuln/detail/CVE-2023-37205 [ 56 ] CVE-2023-37206 https://nvd.nist.gov/vuln/detail/CVE-2023-37206 [ 57 ] CVE-2023-37209 https://nvd.nist.gov/vuln/detail/CVE-2023-37209 [ 58 ] CVE-2023-37210 https://nvd.nist.gov/vuln/detail/CVE-2023-37210 [ 59 ] CVE-2023-37212 https://nvd.nist.gov/vuln/detail/CVE-2023-37212 [ 60 ] MFSA-2023-40 [ 61 ] MFSA-TMP-2023-0002 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202401-10 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2024 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5 --===============3848594396510966732== Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEpqTA6ABLMxh/aChGFMQkOaVy+9kFAmWacWIACgkQFMQkOaVy +9n87w/+JQMZVge37PHdkr2K7xMRjPYAFF8DrI+ByaNsFu8wPAO8iIEp5fPe10hH xm5mpcEcwvj/e4wuTUlMjTB9NdskqyOEqXKS6gfhiftN9P0fOeUW3bhVeGq5AH4D VW4n3QW+4XUtMEYYCNRiJj/e46aaBNASKTUvTs90/6irpPGfaFvsAclhvgDieZzO LsgMi+wTIm9ygERz6R1mZi18Y5ywk3rtApaaZCQ1UAYjZXcB+Q/oMU+VQeeRLZL5 WP4bRKKVS3N1sUSwVW27Mx7n0LBTQCQpnJ6rT/4coOElQkL1LOWPllB1RvzMdyYI mQ0Bs3gUio0ai/WFBBvtNgVyblGOZwj0rYcZrazv4nfEtJRW88yg74eh+9ZS5TZ/ pcU0LBIH4m/gQ0Cuz9bBharQv5otglPXdbggScnkjVc5S0+kRtFztZsmeDBg6EK5 3CcE7YLxD5WbM4PWrhPCS6WNIObgW9DFHkqneZ1T3y2PR6ppEjUhMGJBxUo4kwHY R79bhlyUeE7NxqIrtxr1vj3JkFbYEox6lPvI0Mf7DYSjtOIQlh3RBwAzSK/PfhSJ lpXtqfHi0/vgkV1ifio17TYGSzhquhGwCBhEmlVqVUTV0rm/EzShOetwPM24TvWs 9wNwo4T68Nn0RdiROfPP2Uz7n5ae3eYlDCljqcLfaRVnoGoQ4mk= =KhFB -----END PGP SIGNATURE----- --===============3848594396510966732==--