ALT-BU-2023-2782-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2023-01261
Уязвимость полноэкранного режима браузера Mozilla Firefox, позволяющая нарушителю выполнить спуффинг-атаку
BDU:2023-01262
Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR, связанная с копирование в буфер без проверки размера входных данных, позволяющая нарушителю выполнять произвольный код в целевой системе
BDU:2023-01263
Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR, почтового клиента Mozilla Thunderbird, связанная с ошибками при импорте открытого ключа SPKI RSA в качестве ECDSA P-256, позволяющая нарушителю привести к сбою вкладки
BDU:2023-01264
Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR, почтового клиента Mozilla Thunderbird, связанная с недопустимым понижение из nsTextNode в SVGElement, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2023-01265
Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR, почтового клиента Mozilla Thunderbird, связанная с неправильным ограничением отображаемых слоев или фреймов пользовательского интерфейса, позволяющая нарушителю получить доступ к конфиденциальной информации
BDU:2023-01266
Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR, почтового клиента Mozilla Thunderbird, связанная с использованием памяти после ее освобождения, позволяющая нарушителю хранить объекты из других разделов в основном разделе
BDU:2023-01267
Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR, почтового клиента Mozilla Thunderbird, связанная с тем, что при кодировании данных из "InputStream" в "xpcom" размер кодируемых входных данных будет неправильно рассчитан, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2023-01269
Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR, почтового клиента Mozilla Thunderbird, связанная с использованием памяти после освобождения, позволяющая нарушителю выполнить произвольный код
BDU:2023-01270
Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR, почтового клиента Mozilla Thunderbird, связанная с неправильным ограничением операций в пределах буфера памяти, позволяющая нарушителю запустить произвольную запись в память
BDU:2023-01271
Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR, почтового клиента Mozilla Thunderbird, связанная с неправильной нейтрализаций закодированных схем URI на веб-странице, позволяющая нарушителю загрузить файлы или взаимодействовать с программным обеспечением, уже установленным в системе
BDU:2023-01272
Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR, почтового клиента Mozilla Thunderbird, связанная с ошибками представления информации пользовательским интерфейсом, позволяющая нарушителю принудительно перевести браузер в полноэкранный режим
BDU:2023-01963
Уязвимость функций печати браузеров Firefox, Firefox ESR и почтового клиента Thunderbird операционных систем Windows, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2023-0767
An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes via PKCS 12 Safe Bag attributes being mishandled. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.
- https://alas.aws.amazon.com/AL2/ALAS-2023-1992.html
- https://alas.aws.amazon.com/AL2/ALAS-2023-1992.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1804640
- https://bugzilla.mozilla.org/show_bug.cgi?id=1804640
- https://security.netapp.com/advisory/ntap-20230324-0008/
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
Modified: 2025-01-10
CVE-2023-25728
The Content-Security-Policy-Report-Only
header could allow an attacker to leak a child iframe's unredacted URI when interaction with that iframe triggers a redirect. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1790345
- https://bugzilla.mozilla.org/show_bug.cgi?id=1790345
- https://bugzilla.mozilla.org/show_bug.cgi?id=1790345
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
Modified: 2025-01-10
CVE-2023-25729
Permission prompts for opening external schemes were only shown for ContentPrincipals
resulting in extensions being able to open them without user interaction via ExpandedPrincipals
. This could lead to further malicious actions such as downloading files or interacting with software already installed on the system. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1792138
- https://bugzilla.mozilla.org/show_bug.cgi?id=1792138
- https://bugzilla.mozilla.org/show_bug.cgi?id=1792138
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
Modified: 2025-01-10
CVE-2023-25730
A background script invoking requestFullscreen
and then blocking the main thread could force the browser into fullscreen mode indefinitely, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1794622
- https://bugzilla.mozilla.org/show_bug.cgi?id=1794622
- https://bugzilla.mozilla.org/show_bug.cgi?id=1794622
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
Modified: 2025-01-10
CVE-2023-25731
Due to URL previews in the network panel of developer tools improperly storing URLs, query parameters could potentially be used to overwrite global objects in privileged code. This vulnerability affects Firefox < 110.
Modified: 2025-01-10
CVE-2023-25732
When encoding data from an inputStream
in xpcom
the size of the input being encoded was not correctly calculated potentially leading to an out of bounds memory write. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1804564
- https://bugzilla.mozilla.org/show_bug.cgi?id=1804564
- https://bugzilla.mozilla.org/show_bug.cgi?id=1804564
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
Modified: 2024-12-11
CVE-2023-25733
The return value from `gfx::SourceSurfaceSkia::Map()` wasn't being verified which could have potentially lead to a null pointer dereference. This vulnerability affects Firefox < 110.
Modified: 2025-01-10
CVE-2023-25734
After downloading a Windows .url
shortcut from the local filesystem, an attacker could supply a remote path that would lead to unexpected network requests from the operating system. This also had the potential to leak NTLM credentials to the resource.
*This bug only affects Firefox on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1784451
- https://bugzilla.mozilla.org/show_bug.cgi?id=1784451
- https://bugzilla.mozilla.org/show_bug.cgi?id=1809923
- https://bugzilla.mozilla.org/show_bug.cgi?id=1809923
- https://bugzilla.mozilla.org/show_bug.cgi?id=1810143
- https://bugzilla.mozilla.org/show_bug.cgi?id=1810143
- https://bugzilla.mozilla.org/show_bug.cgi?id=1812338
- https://bugzilla.mozilla.org/show_bug.cgi?id=1812338
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
Modified: 2025-01-10
CVE-2023-25735
Cross-compartment wrappers wrapping a scripted proxy could have caused objects from other compartments to be stored in the main compartment resulting in a use-after-free after unwrapping the proxy. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1810711
- https://bugzilla.mozilla.org/show_bug.cgi?id=1810711
- https://bugzilla.mozilla.org/show_bug.cgi?id=1810711
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
Modified: 2024-12-11
CVE-2023-25736
An invalid downcast from `nsHTMLDocument` to `nsIContent` could have lead to undefined behavior. This vulnerability affects Firefox < 110.
Modified: 2025-01-09
CVE-2023-25737
An invalid downcast from nsTextNode
to SVGElement
could have lead to undefined behavior. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1811464
- https://bugzilla.mozilla.org/show_bug.cgi?id=1811464
- https://bugzilla.mozilla.org/show_bug.cgi?id=1811464
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
Modified: 2025-01-09
CVE-2023-25738
Members of the DEVMODEW
struct set by the printer device driver weren't being validated and could have resulted in invalid values which in turn would cause the browser to attempt out of bounds access to related variables.
*This bug only affects Firefox on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1811852
- https://bugzilla.mozilla.org/show_bug.cgi?id=1811852
- https://bugzilla.mozilla.org/show_bug.cgi?id=1811852
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
Modified: 2025-01-09
CVE-2023-25739
Module load requests that failed were not being checked as to whether or not they were cancelled causing a use-after-free in ScriptLoadContext
. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1811939
- https://bugzilla.mozilla.org/show_bug.cgi?id=1811939
- https://bugzilla.mozilla.org/show_bug.cgi?id=1811939
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
Modified: 2025-01-09
CVE-2023-25740
After downloading a Windows .scf
script from the local filesystem, an attacker could supply a remote path that would lead to unexpected network requests from the operating system. This also had the potential to leak NTLM credentials to the resource.
*This bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox < 110.
Modified: 2025-01-09
CVE-2023-25741
When dragging and dropping an image cross-origin, the image's size could potentially be leaked. This behavior was shipped in 109 and caused web compatibility problems as well as this security concern, so the behavior was disabled until further review. This vulnerability affects Firefox < 110.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1437126
- https://bugzilla.mozilla.org/show_bug.cgi?id=1437126
- https://bugzilla.mozilla.org/show_bug.cgi?id=1812611
- https://bugzilla.mozilla.org/show_bug.cgi?id=1812611
- https://bugzilla.mozilla.org/show_bug.cgi?id=1813376
- https://bugzilla.mozilla.org/show_bug.cgi?id=1813376
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-05/
Modified: 2024-11-21
CVE-2023-25742
When importing a SPKI RSA public key as ECDSA P-256, the key would be handled incorrectly causing the tab to crash. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1813424
- https://bugzilla.mozilla.org/show_bug.cgi?id=1813424
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
Modified: 2024-11-21
CVE-2023-25743
A lack of in app notification for entering fullscreen mode could have lead to a malicious website spoofing browser chrome.
*This bug only affects Firefox Focus. Other versions of Firefox are unaffected.*. This vulnerability affects Firefox < 110 and Firefox ESR < 102.8.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1800203
- https://bugzilla.mozilla.org/show_bug.cgi?id=1800203
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
Modified: 2024-11-21
CVE-2023-25744
Mmemory safety bugs present in Firefox 109 and Firefox ESR 102.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 110 and Firefox ESR < 102.8.
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1789449%2C1803628%2C1810536
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1789449%2C1803628%2C1810536
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
Modified: 2025-01-09
CVE-2023-25745
Memory safety bugs present in Firefox 109. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 110.
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1688592%2C1797186%2C1804998%2C1806521%2C1813284
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1688592%2C1797186%2C1804998%2C1806521%2C1813284
- https://bugzilla.mozilla.org/show_bug.cgi?id=1804998
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-05/
Package python3-module-pyscard updated to version 2.0.5-alt1 for branch sisyphus in task 316261.
Closed bugs
Просьба обновить до 2.0.5
Closed vulnerabilities
BDU:2023-01487
Уязвимость компилятора Emscripten библиотеки кодирования и декодирования файлов HEIF и AVIF Libheif, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-03-12
CVE-2023-0996
There is a vulnerability in the strided image data parsing code in the emscripten wrapper for libheif. An attacker could exploit this through a crafted image file to cause a buffer overflow in linear memory during a memcpy call.