{"id":"ALSA-2023:0808","summary":"Important: firefox security update","details":"Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.\n\nThis update upgrades Firefox to version 102.8.0 ESR.\n\nSecurity Fix(es):\n\n* Mozilla: Arbitrary memory write via PKCS 12 in NSS (CVE-2023-0767)\n* Mozilla: Content security policy leak in violation reports using iframes (CVE-2023-25728)\n* Mozilla: Screen hijack via browser fullscreen mode (CVE-2023-25730)\n* Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-25735)\n* Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry (CVE-2023-25737)\n* Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext (CVE-2023-25739)\n* Mozilla: Fullscreen notification not shown in Firefox Focus (CVE-2023-25743)\n* Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 (CVE-2023-25744)\n* Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 (CVE-2023-25746)\n* Mozilla: Extensions could have opened external schemes without user knowledge (CVE-2023-25729)\n* Mozilla: Out of bounds memory write from EncodeInputStream (CVE-2023-25732)\n* Mozilla: Web Crypto ImportKey crashes tab (CVE-2023-25742)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.","modified":"2026-01-30T00:44:19.169615Z","published":"2023-02-20T00:00:00Z","related":["CVE-2023-0767","CVE-2023-25728","CVE-2023-25729","CVE-2023-25730","CVE-2023-25732","CVE-2023-25735","CVE-2023-25737","CVE-2023-25739","CVE-2023-25742","CVE-2023-25743","CVE-2023-25744","CVE-2023-25746"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:0808"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-0767"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-25728"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-25729"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-25730"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-25732"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-25735"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-25737"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-25739"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-25742"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-25743"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-25744"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-25746"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2170374"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2170375"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2170376"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2170377"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2170378"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2170379"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2170381"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2170382"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2170383"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2170390"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2170391"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2170402"},{"type":"ADVISORY","url":"https://errata.almalinux.org/8/ALSA-2023-0808.html"}],"affected":[{"package":{"name":"firefox","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/firefox"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"102.8.0-2.el8_7.alma"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2023:0808.json"}}],"schema_version":"1.7.3"}