drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in MozillaFirefox
Name: |
Mehrere Probleme in MozillaFirefox |
|
ID: |
SUSE-SU-2023:0728-1 |
|
Distribution: |
SUSE |
|
Plattformen: |
SUSE CaaS Platform 4.0, SUSE Linux Enterprise Server for SAP Applications 15 SP1, SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1, SUSE Linux Enterprise High Performance Computing 15 SP1, SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1, SUSE Linux Enterprise Server 15 SP1 |
|
Datum: |
Di, 14. März 2023, 21:58 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28163
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28161
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25748
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25749
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28159
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28162
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28160
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28176
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28177 |
|
Applikationen: |
Mozilla Firefox |
|
Originalnachricht |
--===============6380406339728696320== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit
# Security update for MozillaFirefox
Announcement ID: SUSE-SU-2023:0728-1 Rating: important References:
* #1209173
Cross-References:
* CVE-2023-25748 * CVE-2023-25749 * CVE-2023-25750 * CVE-2023-25751 * CVE-2023-25752 * CVE-2023-28159 * CVE-2023-28160 * CVE-2023-28161 * CVE-2023-28162 * CVE-2023-28163 * CVE-2023-28164 * CVE-2023-28176 * CVE-2023-28177
CVSS scores:
Affected Products:
* SUSE CaaS Platform 4.0 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1
An update that solves 13 vulnerabilities can now be installed.
## Description:
This update for MozillaFirefox fixes the following issues:
Update to version 102.9.0 ESR (bsc#1209173):
* CVE-2023-28159: Fullscreen Notification could have been hidden by download popups on Android * CVE-2023-25748: Fullscreen Notification could have been hidden by window prompts on Android * CVE-2023-25749: Firefox for Android may have opened third-party apps without a prompt * CVE-2023-25750: Potential ServiceWorker cache leak during private browsing mode * CVE-2023-25751: Incorrect code generation during JIT compilation * CVE-2023-28160: Redirect to Web Extension files may have leaked local path * CVE-2023-28164: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation * CVE-2023-28161: One-time permissions granted to a local file were extended to other local files loaded in the same tab * CVE-2023-28162: Invalid downcast in Worklets * CVE-2023-25752: Potential out-of-bounds when accessing throttled streams * CVE-2023-28163: Windows Save As dialog resolved environment variables * CVE-2023-28176: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9 * CVE-2023-28177: Memory safety bugs fixed in Firefox 111
## Patch Instructions:
To install this SUSE Important update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-728=1
* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-728=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2023-728=1
* SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way.
## Package List:
* SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64) * MozillaFirefox-translations-common-102.9.0-150000.150.79.1 * MozillaFirefox-devel-102.9.0-150000.150.79.1 * MozillaFirefox-102.9.0-150000.150.79.1 * MozillaFirefox-debuginfo-102.9.0-150000.150.79.1 * MozillaFirefox-translations-other-102.9.0-150000.150.79.1 * MozillaFirefox-debugsource-102.9.0-150000.150.79.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-translations-common-102.9.0-150000.150.79.1 * MozillaFirefox-devel-102.9.0-150000.150.79.1 * MozillaFirefox-102.9.0-150000.150.79.1 * MozillaFirefox-debuginfo-102.9.0-150000.150.79.1 * MozillaFirefox-translations-other-102.9.0-150000.150.79.1 * MozillaFirefox-debugsource-102.9.0-150000.150.79.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64) * MozillaFirefox-translations-common-102.9.0-150000.150.79.1 * MozillaFirefox-devel-102.9.0-150000.150.79.1 * MozillaFirefox-102.9.0-150000.150.79.1 * MozillaFirefox-debuginfo-102.9.0-150000.150.79.1 * MozillaFirefox-translations-other-102.9.0-150000.150.79.1 * MozillaFirefox-debugsource-102.9.0-150000.150.79.1 * SUSE CaaS Platform 4.0 (x86_64) * MozillaFirefox-translations-common-102.9.0-150000.150.79.1 * MozillaFirefox-devel-102.9.0-150000.150.79.1 * MozillaFirefox-102.9.0-150000.150.79.1 * MozillaFirefox-debuginfo-102.9.0-150000.150.79.1 * MozillaFirefox-translations-other-102.9.0-150000.150.79.1 * MozillaFirefox-debugsource-102.9.0-150000.150.79.1
## References:
* https://www.suse.com/security/cve/CVE-2023-25748.html * https://www.suse.com/security/cve/CVE-2023-25749.html * https://www.suse.com/security/cve/CVE-2023-25750.html * https://www.suse.com/security/cve/CVE-2023-25751.html * https://www.suse.com/security/cve/CVE-2023-25752.html * https://www.suse.com/security/cve/CVE-2023-28159.html * https://www.suse.com/security/cve/CVE-2023-28160.html * https://www.suse.com/security/cve/CVE-2023-28161.html * https://www.suse.com/security/cve/CVE-2023-28162.html * https://www.suse.com/security/cve/CVE-2023-28163.html * https://www.suse.com/security/cve/CVE-2023-28164.html * https://www.suse.com/security/cve/CVE-2023-28176.html * https://www.suse.com/security/cve/CVE-2023-28177.html * https://bugzilla.suse.com/show_bug.cgi?id=1209173
--===============6380406339728696320== Content-Type: text/html; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit
<div class="container"> <h1>Security update for MozillaFirefox</h1>
<table class="table table-striped table-bordered"> <tbody> <tr> <th>Announcement ID:</th> <td>SUSE-SU-2023:0728-1</td> </tr> <tr> <th>Rating:</th> <td>important</td> </tr> <tr> <th>References:</th> <td> <ul> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209173">#1209173</a> </li> </ul> </td> </tr> <tr> <th> Cross-References: </th> <td> <ul> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-25748.html">CVE-2023-25748</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-25749.html">CVE-2023-25749</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-25750.html">CVE-2023-25750</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-25751.html">CVE-2023-25751</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-25752.html">CVE-2023-25752</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-28159.html">CVE-2023-28159</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-28160.html">CVE-2023-28160</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-28161.html">CVE-2023-28161</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-28162.html">CVE-2023-28162</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-28163.html">CVE-2023-28163</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-28164.html">CVE-2023-28164</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-28176.html">CVE-2023-28176</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-28177.html">CVE-2023-28177</a> </li> </ul> </td> </tr> <tr> <th>CVSS scores:</th> <td> <ul class="list-group"> </ul> </td> </tr> <tr> <th>Affected Products:</th> <td> <ul class="list-group"> <li class="list-group-item">SUSE CaaS Platform 4.0</li> <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP1</li> <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1</li> <li class="list-group-item">SUSE Linux Enterprise Server 15 SP1</li> <li class="list-group-item">SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1</li> <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP1</li> </ul> </td> </tr> </tbody> </table>
<p>An update that solves 13 vulnerabilities can now be installed.</p>
<h2>Description:</h2> <p>This update for MozillaFirefox fixes the following issues:</p> <p>Update to version 102.9.0 ESR (bsc#1209173):</p> <ul> <li>CVE-2023-28159: Fullscreen Notification could have been hidden by download popups on Android</li> <li>CVE-2023-25748: Fullscreen Notification could have been hidden by window prompts on Android</li> <li>CVE-2023-25749: Firefox for Android may have opened third-party apps without a prompt</li> <li>CVE-2023-25750: Potential ServiceWorker cache leak during private browsing mode</li> <li>CVE-2023-25751: Incorrect code generation during JIT compilation</li> <li>CVE-2023-28160: Redirect to Web Extension files may have leaked local path</li> <li>CVE-2023-28164: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation</li> <li>CVE-2023-28161: One-time permissions granted to a local file were extended to other local files loaded in the same tab</li> <li>CVE-2023-28162: Invalid downcast in Worklets</li> <li>CVE-2023-25752: Potential out-of-bounds when accessing throttled streams</li> <li>CVE-2023-28163: Windows Save As dialog resolved environment variables</li> <li>CVE-2023-28176: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9</li> <li>CVE-2023-28177: Memory safety bugs fixed in Firefox 111</li> </ul>
<h2>Patch Instructions:</h2> <p> To install this SUSE Important update use the SUSE recommended installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product: </p> <ul class="list-group"> <li class="list-group-item"> SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 <br/> <code>zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-728=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 <br/> <code>zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-728=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise Server for SAP Applications 15 SP1 <br/> <code>zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2023-728=1</code> </li> <li class="list-group-item"> SUSE CaaS Platform 4.0 <br/> <span> To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. </span> </li> </ul>
<h2>Package List:</h2> <ul> <li> SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64) <ul> <li>MozillaFirefox-translations-common-102.9.0-150000.150.79.1</li> <li>MozillaFirefox-devel-102.9.0-150000.150.79.1</li> <li>MozillaFirefox-102.9.0-150000.150.79.1</li> <li>MozillaFirefox-debuginfo-102.9.0-150000.150.79.1</li> <li>MozillaFirefox-translations-other-102.9.0-150000.150.79.1</li> <li>MozillaFirefox-debugsource-102.9.0-150000.150.79.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64) <ul> <li>MozillaFirefox-translations-common-102.9.0-150000.150.79.1</li> <li>MozillaFirefox-devel-102.9.0-150000.150.79.1</li> <li>MozillaFirefox-102.9.0-150000.150.79.1</li> <li>MozillaFirefox-debuginfo-102.9.0-150000.150.79.1</li> <li>MozillaFirefox-translations-other-102.9.0-150000.150.79.1</li> <li>MozillaFirefox-debugsource-102.9.0-150000.150.79.1</li> </ul> </li> <li> SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64) <ul> <li>MozillaFirefox-translations-common-102.9.0-150000.150.79.1</li> <li>MozillaFirefox-devel-102.9.0-150000.150.79.1</li> <li>MozillaFirefox-102.9.0-150000.150.79.1</li> <li>MozillaFirefox-debuginfo-102.9.0-150000.150.79.1</li> <li>MozillaFirefox-translations-other-102.9.0-150000.150.79.1</li> <li>MozillaFirefox-debugsource-102.9.0-150000.150.79.1</li> </ul> </li> <li> SUSE CaaS Platform 4.0 (x86_64) <ul> <li>MozillaFirefox-translations-common-102.9.0-150000.150.79.1</li> <li>MozillaFirefox-devel-102.9.0-150000.150.79.1</li> <li>MozillaFirefox-102.9.0-150000.150.79.1</li> <li>MozillaFirefox-debuginfo-102.9.0-150000.150.79.1</li> <li>MozillaFirefox-translations-other-102.9.0-150000.150.79.1</li> <li>MozillaFirefox-debugsource-102.9.0-150000.150.79.1</li> </ul> </li> </ul>
<h2>References:</h2> <ul> <li> <a href="https://www.suse.com/security/cve/CVE-2023-25748.html">https://www.suse.com/security/cve/CVE-2023-25748.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-25749.html">https://www.suse.com/security/cve/CVE-2023-25749.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-25750.html">https://www.suse.com/security/cve/CVE-2023-25750.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-25751.html">https://www.suse.com/security/cve/CVE-2023-25751.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-25752.html">https://www.suse.com/security/cve/CVE-2023-25752.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-28159.html">https://www.suse.com/security/cve/CVE-2023-28159.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-28160.html">https://www.suse.com/security/cve/CVE-2023-28160.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-28161.html">https://www.suse.com/security/cve/CVE-2023-28161.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-28162.html">https://www.suse.com/security/cve/CVE-2023-28162.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-28163.html">https://www.suse.com/security/cve/CVE-2023-28163.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-28164.html">https://www.suse.com/security/cve/CVE-2023-28164.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-28176.html">https://www.suse.com/security/cve/CVE-2023-28176.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-28177.html">https://www.suse.com/security/cve/CVE-2023-28177.html</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209173">https://bugzilla.suse.com/show_bug.cgi?id=1209173</a> </li> </ul> </div>
--===============6380406339728696320==--
|
|
|
|