Show plain JSON{"acknowledgement": "Red Hat would like to thank the Mozilla project for reporting this issue. Upstream acknowledges Mozilla developers and community as the original reporter.", "affected_release": [{"advisory": "RHSA-2023:1333", "cpe": "cpe:/o:redhat:enterprise_linux:7", "package": "firefox-0:102.9.0-3.el7_9", "product_name": "Red Hat Enterprise Linux 7", "release_date": "2023-03-20T00:00:00Z"}, {"advisory": "RHSA-2023:1401", "cpe": "cpe:/o:redhat:enterprise_linux:7", "package": "thunderbird-0:102.9.0-1.el7_9", "product_name": "Red Hat Enterprise Linux 7", "release_date": "2023-03-22T00:00:00Z"}, {"advisory": "RHSA-2023:1336", "cpe": "cpe:/a:redhat:enterprise_linux:8", "package": "firefox-0:102.9.0-3.el8_7", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2023-03-20T00:00:00Z"}, {"advisory": "RHSA-2023:1403", "cpe": "cpe:/a:redhat:enterprise_linux:8", "package": "thunderbird-0:102.9.0-1.el8_7", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2023-03-22T00:00:00Z"}, {"advisory": "RHSA-2023:1442", "cpe": "cpe:/a:redhat:rhel_e4s:8.1", "package": "thunderbird-0:102.9.0-2.el8_1", "product_name": "Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions", "release_date": "2023-03-23T00:00:00Z"}, {"advisory": "RHSA-2023:1479", "cpe": "cpe:/a:redhat:rhel_e4s:8.1", "package": "firefox-0:102.9.0-4.el8_1", "product_name": "Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions", "release_date": "2023-03-27T00:00:00Z"}, {"advisory": "RHSA-2023:1443", "cpe": "cpe:/a:redhat:rhel_aus:8.2", "package": "thunderbird-0:102.9.0-2.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Advanced Update Support", "release_date": "2023-03-23T00:00:00Z"}, {"advisory": "RHSA-2023:1445", "cpe": "cpe:/a:redhat:rhel_aus:8.2", "package": "firefox-0:102.9.0-4.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Advanced Update Support", "release_date": "2023-03-23T00:00:00Z"}, {"advisory": "RHSA-2023:1443", "cpe": "cpe:/a:redhat:rhel_tus:8.2", "package": "thunderbird-0:102.9.0-2.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Telecommunications Update Service", "release_date": "2023-03-23T00:00:00Z"}, {"advisory": "RHSA-2023:1445", "cpe": "cpe:/a:redhat:rhel_tus:8.2", "package": "firefox-0:102.9.0-4.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Telecommunications Update Service", "release_date": "2023-03-23T00:00:00Z"}, {"advisory": "RHSA-2023:1443", "cpe": "cpe:/a:redhat:rhel_e4s:8.2", "package": "thunderbird-0:102.9.0-2.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions", "release_date": "2023-03-23T00:00:00Z"}, {"advisory": "RHSA-2023:1445", "cpe": "cpe:/a:redhat:rhel_e4s:8.2", "package": "firefox-0:102.9.0-4.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions", "release_date": "2023-03-23T00:00:00Z"}, {"advisory": "RHSA-2023:1444", "cpe": "cpe:/a:redhat:rhel_eus:8.4", "package": "firefox-0:102.9.0-4.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Extended Update Support", "release_date": "2023-03-23T00:00:00Z"}, {"advisory": "RHSA-2023:1472", "cpe": "cpe:/a:redhat:rhel_eus:8.4", "package": "thunderbird-0:102.9.0-2.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Extended Update Support", "release_date": "2023-03-27T00:00:00Z"}, {"advisory": "RHSA-2023:1367", "cpe": "cpe:/a:redhat:rhel_eus:8.6", "package": "firefox-0:102.9.0-3.el8_6", "product_name": "Red Hat Enterprise Linux 8.6 Extended Update Support", "release_date": "2023-03-21T00:00:00Z"}, {"advisory": "RHSA-2023:1404", "cpe": "cpe:/a:redhat:rhel_eus:8.6", "package": "thunderbird-0:102.9.0-1.el8_6", "product_name": "Red Hat Enterprise Linux 8.6 Extended Update Support", "release_date": "2023-03-22T00:00:00Z"}, {"advisory": "RHSA-2023:1337", "cpe": "cpe:/a:redhat:enterprise_linux:9", "package": "firefox-0:102.9.0-3.el9_1", "product_name": "Red Hat Enterprise Linux 9", "release_date": "2023-03-20T00:00:00Z"}, {"advisory": "RHSA-2023:1407", "cpe": "cpe:/a:redhat:enterprise_linux:9", "package": "thunderbird-0:102.9.0-1.el9_1", "product_name": "Red Hat Enterprise Linux 9", "release_date": "2023-03-22T00:00:00Z"}, {"advisory": "RHSA-2023:1364", "cpe": "cpe:/a:redhat:rhel_eus:9.0", "package": "firefox-0:102.9.0-3.el9_0", "product_name": "Red Hat Enterprise Linux 9.0 Extended Update Support", "release_date": "2023-03-21T00:00:00Z"}, {"advisory": "RHSA-2023:1402", "cpe": "cpe:/a:redhat:rhel_eus:9.0", "package": "thunderbird-0:102.9.0-1.el9_0", "product_name": "Red Hat Enterprise Linux 9.0 Extended Update Support", "release_date": "2023-03-22T00:00:00Z"}], "bugzilla": {"description": "Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9", "id": "2178472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178472"}, "csaw": false, "cvss3": {"cvss3_base_score": "8.8", "cvss3_scoring_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "status": "verified"}, "cwe": "CWE-120", "details": ["Memory safety bugs present in Firefox 110 and Firefox ESR 102.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 111, Firefox ESR < 102.9, and Thunderbird < 102.9.", "A flaw was found in Mozilla. The Mozilla Foundation Security Advisory described the issue in which Mozilla developers Timothy Nikkel, Andrew McCreight, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 110 and ESR 102.8. Some of these bugs showed evidence of memory corruption, and we presume that with enough effort, some of these could have been exploited to run arbitrary code."], "name": "CVE-2023-28176", "package_state": [{"cpe": "cpe:/o:redhat:enterprise_linux:6", "fix_state": "Out of support scope", "package_name": "firefox", "product_name": "Red Hat Enterprise Linux 6"}, {"cpe": "cpe:/o:redhat:enterprise_linux:6", "fix_state": "Out of support scope", "package_name": "thunderbird", "product_name": "Red Hat Enterprise Linux 6"}], "public_date": "2023-03-14T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2023-28176\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-28176\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2023-10/#CVE-2023-28176\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2023-11/#CVE-2023-28176"], "statement": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.", "threat_severity": "Important"}