Show plain JSON{"acknowledgement": "Red Hat would like to thank the Mozilla project for reporting this issue. Upstream acknowledges Thejaka Maldeniya as the original reporter.", "affected_release": [{"advisory": "RHSA-2023:4945", "cpe": "cpe:/o:redhat:enterprise_linux:7", "package": "thunderbird-0:102.15.0-1.el7_9", "product_name": "Red Hat Enterprise Linux 7", "release_date": "2023-09-04T00:00:00Z"}, {"advisory": "RHSA-2023:5019", "cpe": "cpe:/o:redhat:enterprise_linux:7", "package": "firefox-0:102.15.0-1.el7_9", "product_name": "Red Hat Enterprise Linux 7", "release_date": "2023-09-07T00:00:00Z"}, {"advisory": "RHSA-2023:4952", "cpe": "cpe:/a:redhat:enterprise_linux:8", "package": "firefox-0:102.15.0-1.el8_8", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2023-09-04T00:00:00Z"}, {"advisory": "RHSA-2023:4954", "cpe": "cpe:/a:redhat:enterprise_linux:8", "package": "thunderbird-0:102.15.0-1.el8_8", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2023-09-04T00:00:00Z"}, {"advisory": "RHSA-2023:4948", "cpe": "cpe:/a:redhat:rhel_e4s:8.1", "package": "thunderbird-0:102.15.0-1.el8_1", "product_name": "Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions", "release_date": "2023-09-04T00:00:00Z"}, {"advisory": "RHSA-2023:4949", "cpe": "cpe:/a:redhat:rhel_e4s:8.1", "package": "firefox-0:102.15.0-1.el8_1", "product_name": "Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions", "release_date": "2023-09-04T00:00:00Z"}, {"advisory": "RHSA-2023:4946", "cpe": "cpe:/a:redhat:rhel_aus:8.2", "package": "thunderbird-0:102.15.0-1.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Advanced Update Support", "release_date": "2023-09-04T00:00:00Z"}, {"advisory": "RHSA-2023:4951", "cpe": "cpe:/a:redhat:rhel_aus:8.2", "package": "firefox-0:102.15.0-1.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Advanced Update Support", "release_date": "2023-09-04T00:00:00Z"}, {"advisory": "RHSA-2023:4946", "cpe": "cpe:/a:redhat:rhel_tus:8.2", "package": "thunderbird-0:102.15.0-1.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Telecommunications Update Service", "release_date": "2023-09-04T00:00:00Z"}, {"advisory": "RHSA-2023:4951", "cpe": "cpe:/a:redhat:rhel_tus:8.2", "package": "firefox-0:102.15.0-1.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Telecommunications Update Service", "release_date": "2023-09-04T00:00:00Z"}, {"advisory": "RHSA-2023:4946", "cpe": "cpe:/a:redhat:rhel_e4s:8.2", "package": "thunderbird-0:102.15.0-1.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions", "release_date": "2023-09-04T00:00:00Z"}, {"advisory": "RHSA-2023:4951", "cpe": "cpe:/a:redhat:rhel_e4s:8.2", "package": "firefox-0:102.15.0-1.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions", "release_date": "2023-09-04T00:00:00Z"}, {"advisory": "RHSA-2023:4956", "cpe": "cpe:/a:redhat:rhel_aus:8.4", "package": "thunderbird-0:102.15.0-1.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support", "release_date": "2023-09-04T00:00:00Z"}, {"advisory": "RHSA-2023:4957", "cpe": "cpe:/a:redhat:rhel_aus:8.4", "package": "firefox-0:102.15.0-1.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support", "release_date": "2023-09-04T00:00:00Z"}, {"advisory": "RHSA-2023:4956", "cpe": "cpe:/a:redhat:rhel_tus:8.4", "package": "thunderbird-0:102.15.0-1.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Telecommunications Update Service", "release_date": "2023-09-04T00:00:00Z"}, {"advisory": "RHSA-2023:4957", "cpe": "cpe:/a:redhat:rhel_tus:8.4", "package": "firefox-0:102.15.0-1.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Telecommunications Update Service", "release_date": "2023-09-04T00:00:00Z"}, {"advisory": "RHSA-2023:4956", "cpe": "cpe:/a:redhat:rhel_e4s:8.4", "package": "thunderbird-0:102.15.0-1.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions", "release_date": "2023-09-04T00:00:00Z"}, {"advisory": "RHSA-2023:4957", "cpe": "cpe:/a:redhat:rhel_e4s:8.4", "package": "firefox-0:102.15.0-1.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions", "release_date": "2023-09-04T00:00:00Z"}, {"advisory": "RHSA-2023:4959", "cpe": "cpe:/a:redhat:rhel_eus:8.6", "package": "firefox-0:102.15.0-1.el8_6", "product_name": "Red Hat Enterprise Linux 8.6 Extended Update Support", "release_date": "2023-09-04T00:00:00Z"}, {"advisory": "RHSA-2023:4955", "cpe": "cpe:/a:redhat:enterprise_linux:9", "package": "thunderbird-0:102.15.0-1.el9_2", "product_name": "Red Hat Enterprise Linux 9", "release_date": "2023-09-04T00:00:00Z"}, {"advisory": "RHSA-2023:4958", "cpe": "cpe:/a:redhat:enterprise_linux:9", "package": "firefox-0:102.15.0-1.el9_2", "product_name": "Red Hat Enterprise Linux 9", "release_date": "2023-09-04T00:00:00Z"}, {"advisory": "RHSA-2023:4947", "cpe": "cpe:/a:redhat:rhel_eus:9.0", "package": "thunderbird-0:102.15.0-1.el9_0", "product_name": "Red Hat Enterprise Linux 9.0 Extended Update Support", "release_date": "2023-09-04T00:00:00Z"}, {"advisory": "RHSA-2023:4950", "cpe": "cpe:/a:redhat:rhel_eus:9.0", "package": "firefox-0:102.15.0-1.el9_0", "product_name": "Red Hat Enterprise Linux 9.0 Extended Update Support", "release_date": "2023-09-04T00:00:00Z"}], "bugzilla": {"description": "Mozilla: Browsing Context potentially not cleared when closing Private Window", "id": "2236082", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236082"}, "csaw": false, "cvss3": {"cvss3_base_score": "7.5", "cvss3_scoring_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "status": "verified"}, "cwe": "CWE-179", "details": ["When checking if the Browsing Context had been discarded in `HttpBaseChannel`, if the load group was not available then it was assumed to have already been discarded which was not always the case for private channels after the private session had ended. This vulnerability affects Firefox < 117, Firefox ESR < 115.2, and Thunderbird < 115.2.", "The Mozilla Foundation Security Advisory describes this flaw as:\nWhen checking if the Browsing Context had been discarded in `HttpBaseChannel`, if the load group was not available then it was assumed to have already been discarded which was not always the case for private channels after the private session had ended."], "name": "CVE-2023-4583", "package_state": [{"cpe": "cpe:/o:redhat:enterprise_linux:6", "fix_state": "Out of support scope", "package_name": "firefox", "product_name": "Red Hat Enterprise Linux 6"}, {"cpe": "cpe:/o:redhat:enterprise_linux:6", "fix_state": "Out of support scope", "package_name": "thunderbird", "product_name": "Red Hat Enterprise Linux 6"}], "public_date": "2023-08-29T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2023-4583\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-4583\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2023-36/#CVE-2023-4583"], "statement": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.", "threat_severity": "Low"}