8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.5 High
AI Score
Confidence
High
0.005 Low
EPSS
Percentile
77.4%
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 115.6.0 ESR.
Security Fix(es):
Mozilla: Heap-buffer-overflow affecting WebGL <code>DrawElementsInstanced</code> method with Mesa VM driver (CVE-2023-6856)
Mozilla: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6 (CVE-2023-6864)
Mozilla: Potential exposure of uninitialized data in <code>EncryptingOutputStream</code> (CVE-2023-6865)
Mozilla: Symlinks may resolve to smaller than expected buffers (CVE-2023-6857)
Mozilla: Heap buffer overflow in <code>nsTextFragment</code> (CVE-2023-6858)
Mozilla: Use-after-free in PR_GetIdentitiesLayer (CVE-2023-6859)
Mozilla: Potential sandbox escape due to <code>VideoBridge</code> lack of texture validation (CVE-2023-6860)
Mozilla: Heap buffer overflow affected <code>nsWindow::PickerOpen(void)</code> in headless mode (CVE-2023-6861)
Mozilla: Use-after-free in <code>nsDNSService</code> (CVE-2023-6862)
Mozilla: Clickjacking permission prompts using the popup transition (CVE-2023-6867)
Mozilla: Undefined behavior in <code>ShutdownObserver()</code> (CVE-2023-6863)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
bugzilla.redhat.com/show_bug.cgi?id=2255360
bugzilla.redhat.com/show_bug.cgi?id=2255361
bugzilla.redhat.com/show_bug.cgi?id=2255362
bugzilla.redhat.com/show_bug.cgi?id=2255363
bugzilla.redhat.com/show_bug.cgi?id=2255364
bugzilla.redhat.com/show_bug.cgi?id=2255365
bugzilla.redhat.com/show_bug.cgi?id=2255366
bugzilla.redhat.com/show_bug.cgi?id=2255367
bugzilla.redhat.com/show_bug.cgi?id=2255368
bugzilla.redhat.com/show_bug.cgi?id=2255369
bugzilla.redhat.com/show_bug.cgi?id=2255370
errata.rockylinux.org/RLSA-2024:0012
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.5 High
AI Score
Confidence
High
0.005 Low
EPSS
Percentile
77.4%