{"affected":[{"ecosystem_specific":{"binaries":[{"MozillaFirefox-devel":"115.6.0-112.194.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP5","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"115.6.0-112.194.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"115.6.0-112.194.1","MozillaFirefox-devel":"115.6.0-112.194.1","MozillaFirefox-translations-common":"115.6.0-112.194.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"115.6.0-112.194.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"115.6.0-112.194.1","MozillaFirefox-devel":"115.6.0-112.194.1","MozillaFirefox-translations-common":"115.6.0-112.194.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"115.6.0-112.194.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for MozillaFirefox fixes the following issues:\n\n- Firefox Extended Support Release 115.6.0 ESR changelog-entry (bsc#1217974)\n  * CVE-2023-6856: Heap-buffer-overflow affecting WebGL  DrawElementsInstanced method with Mesa VM driver (bmo#1843782).\n  * CVE-2023-6857: Symlinks may resolve to smaller than expected buffers (bmo#1796023).\n  * CVE-2023-6858: Heap buffer overflow in nsTextFragment (bmo#1826791).\n  * CVE-2023-6859: Use-after-free in PR_GetIdentitiesLayer (bmo#1840144).\n  * CVE-2023-6860: Potential sandbox escape due to VideoBridge lack of texture validation (bmo#1854669).\n  * CVE-2023-6861: Heap buffer overflow affected nsWindow::PickerOpen(void) in headless mode (bmo#1864118).\n  * CVE-2023-6862: Use-after-free in nsDNSService (bsc#1868042).\n  * CVE-2023-6863: Undefined behavior in ShutdownObserver() (bmo#1868901).\n  * CVE-2023-6864: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6.\n  * CVE-2023-6865: Potential exposure of uninitialized data in EncryptingOutputStream (bmo#1864123).\n  * CVE-2023-6867: Clickjacking permission prompts using the popup transition (bmo#1863863).\n    \n- Fixed: Various security fixes and other quality improvements MFSA 2023-50 (bsc#1217230)\n  * CVE-2023-6204 (bmo#1841050)\n    Out-of-bound memory access in WebGL2 blitFramebuffer\n  * CVE-2023-6205 (bmo#1854076)\n    Use-after-free in MessagePort::Entangled\n  * CVE-2023-6206 (bmo#1857430)\n    Clickjacking permission prompts using the fullscreen\n    transition\n  * CVE-2023-6207 (bmo#1861344)\n    Use-after-free in ReadableByteStreamQueueEntry::Buffer\n  * CVE-2023-6208 (bmo#1855345)\n    Using Selection API would copy contents into X11 primary\n    selection.\n  * CVE-2023-6209 (bmo#1858570)\n    Incorrect parsing of relative URLs starting with '///'\n  * CVE-2023-6212 (bmo#1658432, bmo#1820983, bmo#1829252,\n    bmo#1856072, bmo#1856091, bmo#1859030, bmo#1860943,\n    bmo#1862782)\n    Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5,\n    and Thunderbird 115.5","id":"SUSE-SU-2023:4912-1","modified":"2023-12-19T15:48:50Z","published":"2023-12-19T15:48:50Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20234912-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1217230"},{"type":"REPORT","url":"https://bugzilla.suse.com/1217974"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-6204"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-6205"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-6206"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-6207"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-6208"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-6209"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-6212"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-6856"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-6857"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-6858"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-6859"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-6860"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-6861"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-6862"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-6863"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-6864"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-6865"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-6867"}],"related":["CVE-2023-6204","CVE-2023-6205","CVE-2023-6206","CVE-2023-6207","CVE-2023-6208","CVE-2023-6209","CVE-2023-6212","CVE-2023-6856","CVE-2023-6857","CVE-2023-6858","CVE-2023-6859","CVE-2023-6860","CVE-2023-6861","CVE-2023-6862","CVE-2023-6863","CVE-2023-6864","CVE-2023-6865","CVE-2023-6867"],"summary":"Security update for MozillaFirefox","upstream":["CVE-2023-6204","CVE-2023-6205","CVE-2023-6206","CVE-2023-6207","CVE-2023-6208","CVE-2023-6209","CVE-2023-6212","CVE-2023-6856","CVE-2023-6857","CVE-2023-6858","CVE-2023-6859","CVE-2023-6860","CVE-2023-6861","CVE-2023-6862","CVE-2023-6863","CVE-2023-6864","CVE-2023-6865","CVE-2023-6867"]}