Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2023:0806 - Security Advisory
Issued:
2023-02-20
Updated:
2023-03-09

RHSA-2023:0806 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: Mozilla Firefox security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for Mozilla Firefox is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

[Updated 09 March 2023]

The CVE-2023-0767 was previously incorrectly listed as fixed in this erratum. The CVE list was updated to remove the CVE. No changes have been made to the packages.

Description

Mozilla Firefox is an open source web browser designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 102.8.0 ESR.

Security Fix(es):

  • Mozilla: Content security policy leak in violation reports using iframes (CVE-2023-25728)
  • Mozilla: Screen hijack via browser full-screen mode (CVE-2023-25730)
  • Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-25735)
  • Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry (CVE-2023-25737)
  • Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext (CVE-2023-25739)
  • Mozilla: Full-screen notification not shown in Firefox Focus (CVE-2023-25743)
  • Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 (CVE-2023-25744)
  • Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 (CVE-2023-25746)
  • Mozilla: Extensions could have opened external schemes without user knowledge (CVE-2023-25729)
  • Mozilla: Out-of-bounds memory write from EncodeInputStream (CVE-2023-25732)
  • Mozilla: Web Crypto ImportKey crashes tab (CVE-2023-25742)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing the update, Firefox must be restarted for the changes to take effect.

Affected Products

  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.1 x86_64

Fixes

  • BZ - 2170374 - CVE-2023-25728 Mozilla: Content security policy leak in violation reports using iframes
  • BZ - 2170375 - CVE-2023-25730 Mozilla: Screen hijack via browser fullscreen mode
  • BZ - 2170376 - CVE-2023-25743 Mozilla: Fullscreen notification not shown in Firefox Focus
  • BZ - 2170378 - CVE-2023-25735 Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey
  • BZ - 2170379 - CVE-2023-25737 Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry
  • BZ - 2170381 - CVE-2023-25739 Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext
  • BZ - 2170382 - CVE-2023-25729 Mozilla: Extensions could have opened external schemes without user knowledge
  • BZ - 2170383 - CVE-2023-25732 Mozilla: Out of bounds memory write from EncodeInputStream
  • BZ - 2170390 - CVE-2023-25742 Mozilla: Web Crypto ImportKey crashes tab
  • BZ - 2170391 - CVE-2023-25744 Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8
  • BZ - 2170402 - CVE-2023-25746 Mozilla: Memory safety bugs fixed in Firefox ESR 102.8

CVEs

  • CVE-2023-25728
  • CVE-2023-25729
  • CVE-2023-25730
  • CVE-2023-25732
  • CVE-2023-25735
  • CVE-2023-25737
  • CVE-2023-25739
  • CVE-2023-25742
  • CVE-2023-25743
  • CVE-2023-25744
  • CVE-2023-25746

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1

SRPM
firefox-102.8.0-2.el8_1.src.rpm SHA-256: becf31c06de9e53c475acac72459a2c7b677acdef4c91751007b94c71b7e68fd
ppc64le
firefox-102.8.0-2.el8_1.ppc64le.rpm SHA-256: 1eb3e335c86e99c92fc459ea3acb5f157bd102742dd414451ab515a5f7018177
firefox-debuginfo-102.8.0-2.el8_1.ppc64le.rpm SHA-256: fbc01ccd21150cc10df1fd5f8015b76f362be06f7e014bd59549efc1bf52e50a
firefox-debugsource-102.8.0-2.el8_1.ppc64le.rpm SHA-256: 8b2b87ee0a62c932b2dbe8a2b118b37b55bb569d3ee18885771bfb651f6556d1

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.1

SRPM
firefox-102.8.0-2.el8_1.src.rpm SHA-256: becf31c06de9e53c475acac72459a2c7b677acdef4c91751007b94c71b7e68fd
x86_64
firefox-102.8.0-2.el8_1.x86_64.rpm SHA-256: faf1c92c131ef2a15ca421aec6b8c9665099ebec5789441880e4a4e2f1c96859
firefox-debuginfo-102.8.0-2.el8_1.x86_64.rpm SHA-256: f41dfd95789fdd54a9de7352a85cd754745734d7f473b85027ae5d158119548b
firefox-debugsource-102.8.0-2.el8_1.x86_64.rpm SHA-256: eb0d4f384c54d613309ecacdef8668c888a3d32526e3c47d2182b9619cdb2449

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility