Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.4.2023.4912.1
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory (SUSE-SU-2023:4912-1)
Summary:The remote host is missing an update for the 'MozillaFirefox' package(s) announced via the SUSE-SU-2023:4912-1 advisory.
Description:Summary:
The remote host is missing an update for the 'MozillaFirefox' package(s) announced via the SUSE-SU-2023:4912-1 advisory.

Vulnerability Insight:
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 115.6.0 ESR changelog-entry (bsc#1217974)
* CVE-2023-6856: Heap-buffer-overflow affecting WebGL DrawElementsInstanced method with Mesa VM driver (bmo#1843782).
* CVE-2023-6857: Symlinks may resolve to smaller than expected buffers (bmo#1796023).
* CVE-2023-6858: Heap buffer overflow in nsTextFragment (bmo#1826791).
* CVE-2023-6859: Use-after-free in PR_GetIdentitiesLayer (bmo#1840144).
* CVE-2023-6860: Potential sandbox escape due to VideoBridge lack of texture validation (bmo#1854669).
* CVE-2023-6861: Heap buffer overflow affected nsWindow::PickerOpen(void) in headless mode (bmo#1864118).
* CVE-2023-6862: Use-after-free in nsDNSService (bsc#1868042).
* CVE-2023-6863: Undefined behavior in ShutdownObserver() (bmo#1868901).
* CVE-2023-6864: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6.
* CVE-2023-6865: Potential exposure of uninitialized data in EncryptingOutputStream (bmo#1864123).
* CVE-2023-6867: Clickjacking permission prompts using the popup transition (bmo#1863863).

- Fixed: Various security fixes and other quality improvements MFSA 2023-50 (bsc#1217230)
* CVE-2023-6204 (bmo#1841050)
Out-of-bound memory access in WebGL2 blitFramebuffer
* CVE-2023-6205 (bmo#1854076)
Use-after-free in MessagePort::Entangled
* CVE-2023-6206 (bmo#1857430)
Clickjacking permission prompts using the fullscreen
transition
* CVE-2023-6207 (bmo#1861344)
Use-after-free in ReadableByteStreamQueueEntry::Buffer
* CVE-2023-6208 (bmo#1855345)
Using Selection API would copy contents into X11 primary
selection.
* CVE-2023-6209 (bmo#1858570)
Incorrect parsing of relative URLs starting with '///'
* CVE-2023-6212 (bmo#1658432, bmo#1820983, bmo#1829252,
bmo#1856072, bmo#1856091, bmo#1859030, bmo#1860943,
bmo#1862782)
Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5,
and Thunderbird 115.5

Affected Software/OS:
'MozillaFirefox' package(s) on SUSE Linux Enterprise Server 12-SP5, SUSE Linux Enterprise Server for SAP Applications 12-SP5.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2023-6204
Debian Security Information: DSA-5561 (Google Search)
https://www.debian.org/security/2023/dsa-5561
https://bugzilla.mozilla.org/show_bug.cgi?id=1841050
https://www.mozilla.org/security/advisories/mfsa2023-49/
https://www.mozilla.org/security/advisories/mfsa2023-50/
https://www.mozilla.org/security/advisories/mfsa2023-52/
https://lists.debian.org/debian-lts-announce/2023/11/msg00017.html
https://lists.debian.org/debian-lts-announce/2023/11/msg00030.html
Common Vulnerability Exposure (CVE) ID: CVE-2023-6205
https://bugzilla.mozilla.org/show_bug.cgi?id=1854076
Common Vulnerability Exposure (CVE) ID: CVE-2023-6206
https://bugzilla.mozilla.org/show_bug.cgi?id=1857430
Common Vulnerability Exposure (CVE) ID: CVE-2023-6207
https://bugzilla.mozilla.org/show_bug.cgi?id=1861344
Common Vulnerability Exposure (CVE) ID: CVE-2023-6208
https://bugzilla.mozilla.org/show_bug.cgi?id=1855345
Common Vulnerability Exposure (CVE) ID: CVE-2023-6209
https://bugzilla.mozilla.org/show_bug.cgi?id=1858570
Common Vulnerability Exposure (CVE) ID: CVE-2023-6212
Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1658432%2C1820983%2C1829252%2C1856072%2C1856091%2C1859030%2C1860943%2C1862782
Common Vulnerability Exposure (CVE) ID: CVE-2023-6856
Debian Security Information: DSA-5581 (Google Search)
https://www.debian.org/security/2023/dsa-5581
Debian Security Information: DSA-5582 (Google Search)
https://www.debian.org/security/2023/dsa-5582
https://security.gentoo.org/glsa/202401-10
https://bugzilla.mozilla.org/show_bug.cgi?id=1843782
https://www.mozilla.org/security/advisories/mfsa2023-54/
https://www.mozilla.org/security/advisories/mfsa2023-55/
https://www.mozilla.org/security/advisories/mfsa2023-56/
https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html
https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html
Common Vulnerability Exposure (CVE) ID: CVE-2023-6857
https://bugzilla.mozilla.org/show_bug.cgi?id=1796023
Common Vulnerability Exposure (CVE) ID: CVE-2023-6858
https://bugzilla.mozilla.org/show_bug.cgi?id=1826791
Common Vulnerability Exposure (CVE) ID: CVE-2023-6859
https://bugzilla.mozilla.org/show_bug.cgi?id=1840144
Common Vulnerability Exposure (CVE) ID: CVE-2023-6860
https://bugzilla.mozilla.org/show_bug.cgi?id=1854669
Common Vulnerability Exposure (CVE) ID: CVE-2023-6861
https://bugzilla.mozilla.org/show_bug.cgi?id=1864118
Common Vulnerability Exposure (CVE) ID: CVE-2023-6862
https://bugzilla.mozilla.org/show_bug.cgi?id=1868042
Common Vulnerability Exposure (CVE) ID: CVE-2023-6863
https://bugzilla.mozilla.org/show_bug.cgi?id=1868901
Common Vulnerability Exposure (CVE) ID: CVE-2023-6864
Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1736385%2C1810805%2C1846328%2C1856090%2C1858033%2C1858509%2C1862089%2C1862777%2C1864015
Common Vulnerability Exposure (CVE) ID: CVE-2023-6865
https://bugzilla.mozilla.org/show_bug.cgi?id=1864123
Common Vulnerability Exposure (CVE) ID: CVE-2023-6867
https://bugzilla.mozilla.org/show_bug.cgi?id=1863863
CopyrightCopyright (C) 2023 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.