Show plain JSON{"acknowledgement": "Red Hat would like to thank the Mozilla project for reporting this issue. Upstream acknowledges Mozilla developers and community as the original reporter.", "affected_release": [{"advisory": "RHSA-2023:0812", "cpe": "cpe:/o:redhat:enterprise_linux:7", "package": "firefox-0:102.8.0-2.el7_9", "product_name": "Red Hat Enterprise Linux 7", "release_date": "2023-02-20T00:00:00Z"}, {"advisory": "RHSA-2023:0817", "cpe": "cpe:/o:redhat:enterprise_linux:7", "package": "thunderbird-0:102.8.0-2.el7_9", "product_name": "Red Hat Enterprise Linux 7", "release_date": "2023-02-20T00:00:00Z"}, {"advisory": "RHSA-2023:0808", "cpe": "cpe:/a:redhat:enterprise_linux:8", "package": "firefox-0:102.8.0-2.el8_7", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2023-02-20T00:00:00Z"}, {"advisory": "RHSA-2023:0821", "cpe": "cpe:/a:redhat:enterprise_linux:8", "package": "thunderbird-0:102.8.0-2.el8_7", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2023-02-20T00:00:00Z"}, {"advisory": "RHSA-2023:0806", "cpe": "cpe:/a:redhat:rhel_e4s:8.1", "package": "firefox-0:102.8.0-2.el8_1", "product_name": "Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions", "release_date": "2023-02-20T00:00:00Z"}, {"advisory": "RHSA-2023:0818", "cpe": "cpe:/a:redhat:rhel_e4s:8.1", "package": "thunderbird-0:102.8.0-2.el8_1", "product_name": "Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions", "release_date": "2023-02-20T00:00:00Z"}, {"advisory": "RHSA-2023:0811", "cpe": "cpe:/a:redhat:rhel_aus:8.2", "package": "firefox-0:102.8.0-2.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Advanced Update Support", "release_date": "2023-02-20T00:00:00Z"}, {"advisory": "RHSA-2023:0819", "cpe": "cpe:/a:redhat:rhel_aus:8.2", "package": "thunderbird-0:102.8.0-2.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Advanced Update Support", "release_date": "2023-02-20T00:00:00Z"}, {"advisory": "RHSA-2023:0811", "cpe": "cpe:/a:redhat:rhel_tus:8.2", "package": "firefox-0:102.8.0-2.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Telecommunications Update Service", "release_date": "2023-02-20T00:00:00Z"}, {"advisory": "RHSA-2023:0819", "cpe": "cpe:/a:redhat:rhel_tus:8.2", "package": "thunderbird-0:102.8.0-2.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Telecommunications Update Service", "release_date": "2023-02-20T00:00:00Z"}, {"advisory": "RHSA-2023:0811", "cpe": "cpe:/a:redhat:rhel_e4s:8.2", "package": "firefox-0:102.8.0-2.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions", "release_date": "2023-02-20T00:00:00Z"}, {"advisory": "RHSA-2023:0819", "cpe": "cpe:/a:redhat:rhel_e4s:8.2", "package": "thunderbird-0:102.8.0-2.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions", "release_date": "2023-02-20T00:00:00Z"}, {"advisory": "RHSA-2023:0805", "cpe": "cpe:/a:redhat:rhel_eus:8.4", "package": "firefox-0:102.8.0-2.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Extended Update Support", "release_date": "2023-02-20T00:00:00Z"}, {"advisory": "RHSA-2023:0820", "cpe": "cpe:/a:redhat:rhel_eus:8.4", "package": "thunderbird-0:102.8.0-2.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Extended Update Support", "release_date": "2023-02-20T00:00:00Z"}, {"advisory": "RHSA-2023:0807", "cpe": "cpe:/a:redhat:rhel_eus:8.6", "package": "firefox-0:102.8.0-2.el8_6", "product_name": "Red Hat Enterprise Linux 8.6 Extended Update Support", "release_date": "2023-02-20T00:00:00Z"}, {"advisory": "RHSA-2023:0822", "cpe": "cpe:/a:redhat:rhel_eus:8.6", "package": "thunderbird-0:102.8.0-2.el8_6", "product_name": "Red Hat Enterprise Linux 8.6 Extended Update Support", "release_date": "2023-02-20T00:00:00Z"}, {"advisory": "RHSA-2023:0810", "cpe": "cpe:/a:redhat:enterprise_linux:9", "package": "firefox-0:102.8.0-2.el9_1", "product_name": "Red Hat Enterprise Linux 9", "release_date": "2023-02-20T00:00:00Z"}, {"advisory": "RHSA-2023:0824", "cpe": "cpe:/a:redhat:enterprise_linux:9", "package": "thunderbird-0:102.8.0-2.el9_1", "product_name": "Red Hat Enterprise Linux 9", "release_date": "2023-02-20T00:00:00Z"}, {"advisory": "RHSA-2023:0809", "cpe": "cpe:/a:redhat:rhel_eus:9.0", "package": "firefox-0:102.8.0-2.el9_0", "product_name": "Red Hat Enterprise Linux 9.0 Extended Update Support", "release_date": "2023-02-20T00:00:00Z"}, {"advisory": "RHSA-2023:0823", "cpe": "cpe:/a:redhat:rhel_eus:9.0", "package": "thunderbird-0:102.8.0-2.el9_0", "product_name": "Red Hat Enterprise Linux 9.0 Extended Update Support", "release_date": "2023-02-20T00:00:00Z"}], "bugzilla": {"description": "Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8", "id": "2170391", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2170391"}, "csaw": false, "cvss3": {"cvss3_base_score": "8.8", "cvss3_scoring_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "status": "verified"}, "cwe": "CWE-120", "details": ["Mmemory safety bugs present in Firefox 109 and Firefox ESR 102.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 110 and Firefox ESR < 102.8.", "The Mozilla Foundation Security Advisory describes this flaw as:\nMozilla developers Kershaw Chang and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 109 and Firefox ESR 102.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code."], "name": "CVE-2023-25744", "package_state": [{"cpe": "cpe:/o:redhat:enterprise_linux:6", "fix_state": "Out of support scope", "package_name": "firefox", "product_name": "Red Hat Enterprise Linux 6"}, {"cpe": "cpe:/o:redhat:enterprise_linux:6", "fix_state": "Out of support scope", "package_name": "thunderbird", "product_name": "Red Hat Enterprise Linux 6"}], "public_date": "2023-02-14T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2023-25744\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-25744\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2023-06/#CVE-2023-25744\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2023-07/#CVE-2023-25744"], "statement": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.", "threat_severity": "Important"}