ALT-BU-2018-3456-1
Branch sisyphus update bulletin.
Package LibreOffice-still updated to version 6.0.6.2-alt1 for branch sisyphus in task 212797.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-14939
The get_app_path function in desktop/unx/source/start.c in LibreOffice through 6.0.5 mishandles the realpath function in certain environments such as FreeBSD libc, which might allow attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact if LibreOffice is automatically launched during web browsing with pathnames controlled by a remote web site.
Closed bugs
update required for compatibility with glib2 >= 2.54
Package firefox-esr updated to version 60.2.0-alt1 for branch sisyphus in task 212803.
Closed vulnerabilities
BDU:2018-01122
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, вызванная переполнением буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2018-01333
Уязвимость веб-браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, связанная с использованием памяти после её освобождения, позволяющая нарушителю выполнить произвольный код или вызвать аварийное завершение работы приложения
BDU:2018-01334
Уязвимость компонента IndexedDB веб-браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код или вызвать аварийное завершение работы приложения
BDU:2019-04296
Уязвимость браузеров Firefox, Firefox ESR, почтового клиента Thunderbird, связанная с записью за границы буфера памяти, позволяющая нарушителю выполнить произвольный код
BDU:2023-01948
Уязвимость automount-демона браузеров Tor, Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю обойти ограничения безопасности
Modified: 2024-11-21
CVE-2017-16541
Tor Browser before 7.0.9 on macOS and Linux allows remote attackers to bypass the intended anonymity feature and discover a client IP address via vectors involving a crafted web site that leverages file:// mishandling in Firefox, aka TorMoil. NOTE: Tails is unaffected.
- 101665
- 101665
- 1041610
- 1041610
- RHSA-2018:2692
- RHSA-2018:2692
- RHSA-2018:2693
- RHSA-2018:2693
- RHSA-2018:3403
- RHSA-2018:3403
- RHSA-2018:3458
- RHSA-2018:3458
- https://blog.torproject.org/tor-browser-709-released
- https://blog.torproject.org/tor-browser-709-released
- https://bugzilla.mozilla.org/show_bug.cgi?id=1412081
- https://bugzilla.mozilla.org/show_bug.cgi?id=1412081
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- https://trac.torproject.org/projects/tor/ticket/24052
- https://trac.torproject.org/projects/tor/ticket/24052
- https://www.bleepingcomputer.com/news/security/tormoil-vulnerability-leaks-real-ip-address-from-tor-browser-users/
- https://www.bleepingcomputer.com/news/security/tormoil-vulnerability-leaks-real-ip-address-from-tor-browser-users/
- DSA-4327
- DSA-4327
- https://www.wearesegment.com/research/tormoil-torbrowser-unspecified-critical-security-vulnerability/
- https://www.wearesegment.com/research/tormoil-torbrowser-unspecified-critical-security-vulnerability/
Modified: 2024-11-21
CVE-2018-12376
Memory safety bugs present in Firefox 61 and Firefox ESR 60.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 62, Firefox ESR < 60.2, and Thunderbird < 60.2.1.
- 105280
- 105280
- 1041610
- 1041610
- RHSA-2018:2692
- RHSA-2018:2692
- RHSA-2018:2693
- RHSA-2018:2693
- RHSA-2018:3403
- RHSA-2018:3403
- RHSA-2018:3458
- RHSA-2018:3458
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1469309%2C1469914%2C1450989%2C1480092%2C1480517%2C1481093%2C1478575%2C1471953%2C1473161%2C1466991%2C1468738%2C1483120%2C1467363%2C1472925%2C1466577%2C1467889%2C1480521%2C1478849
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1469309%2C1469914%2C1450989%2C1480092%2C1480517%2C1481093%2C1478575%2C1471953%2C1473161%2C1466991%2C1468738%2C1483120%2C1467363%2C1472925%2C1466577%2C1467889%2C1480521%2C1478849
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3761-1
- USN-3761-1
- USN-3793-1
- USN-3793-1
- DSA-4287
- DSA-4287
- DSA-4327
- DSA-4327
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-21/
- https://www.mozilla.org/security/advisories/mfsa2018-21/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
Modified: 2024-11-21
CVE-2018-12377
A use-after-free vulnerability can occur when refresh driver timers are refreshed in some circumstances during shutdown when the timer is deleted while still in use. This results in a potentially exploitable crash. This vulnerability affects Firefox < 62, Firefox ESR < 60.2, and Thunderbird < 60.2.1.
- 105280
- 105280
- 1041610
- 1041610
- RHSA-2018:2692
- RHSA-2018:2692
- RHSA-2018:2693
- RHSA-2018:2693
- RHSA-2018:3403
- RHSA-2018:3403
- RHSA-2018:3458
- RHSA-2018:3458
- https://bugzilla.mozilla.org/show_bug.cgi?id=1470260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1470260
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3761-1
- USN-3761-1
- USN-3793-1
- USN-3793-1
- DSA-4287
- DSA-4287
- DSA-4327
- DSA-4327
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-21/
- https://www.mozilla.org/security/advisories/mfsa2018-21/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
Modified: 2024-11-21
CVE-2018-12378
A use-after-free vulnerability can occur when an IndexedDB index is deleted while still in use by JavaScript code that is providing payload values to be stored. This results in a potentially exploitable crash. This vulnerability affects Firefox < 62, Firefox ESR < 60.2, and Thunderbird < 60.2.1.
- 105280
- 105280
- 1041610
- 1041610
- RHSA-2018:2692
- RHSA-2018:2692
- RHSA-2018:2693
- RHSA-2018:2693
- RHSA-2018:3403
- RHSA-2018:3403
- RHSA-2018:3458
- RHSA-2018:3458
- https://bugzilla.mozilla.org/show_bug.cgi?id=1459383
- https://bugzilla.mozilla.org/show_bug.cgi?id=1459383
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3761-1
- USN-3761-1
- USN-3793-1
- USN-3793-1
- DSA-4287
- DSA-4287
- DSA-4327
- DSA-4327
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-21/
- https://www.mozilla.org/security/advisories/mfsa2018-21/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
Modified: 2024-11-21
CVE-2018-12379
When the Mozilla Updater opens a MAR format file which contains a very long item filename, an out-of-bounds write can be triggered, leading to a potentially exploitable crash. This requires running the Mozilla Updater manually on the local system with the malicious MAR file in order to occur. This vulnerability affects Firefox < 62, Firefox ESR < 60.2, and Thunderbird < 60.2.1.
- 105280
- 105280
- 1041610
- 1041610
- RHSA-2018:2692
- RHSA-2018:2692
- RHSA-2018:2693
- RHSA-2018:2693
- RHSA-2018:3403
- RHSA-2018:3403
- RHSA-2018:3458
- RHSA-2018:3458
- https://bugzilla.mozilla.org/show_bug.cgi?id=1473113
- https://bugzilla.mozilla.org/show_bug.cgi?id=1473113
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- DSA-4327
- DSA-4327
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-21/
- https://www.mozilla.org/security/advisories/mfsa2018-21/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
Modified: 2024-11-21
CVE-2018-12381
Manually dragging and dropping an Outlook email message into the browser will trigger a page navigation when the message's mail columns are incorrectly interpreted as a URL. *Note: this issue only affects Windows operating systems with Outlook installed. Other operating systems are not affected.*. This vulnerability affects Firefox ESR < 60.2 and Firefox < 62.
- 105280
- 105280
- 1041610
- 1041610
- https://bugzilla.mozilla.org/show_bug.cgi?id=1435319
- https://bugzilla.mozilla.org/show_bug.cgi?id=1435319
- GLSA-201810-01
- GLSA-201810-01
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-21/
- https://www.mozilla.org/security/advisories/mfsa2018-21/