ALT-BU-2023-3704-1
Branch p10 update bulletin.
Closed bugs
Не показывается splash, если включен вывод на serial console
Не работает plymouth на UEFI с ядром un-def
Closed vulnerabilities
Modified: 2024-11-21
CVE-2023-1350
A vulnerability was found in liferea. It has been rated as critical. Affected by this issue is the function update_job_run of the file src/update.c of the component Feed Enrichment. The manipulation of the argument source with the input |date >/tmp/bad-item-link.txt leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 8d8b5b963fa64c7a2122d1bbfbb0bed46e813e59. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-222848.
Closed vulnerabilities
BDU:2023-00296
Уязвимость функции convert_strings компонента tinfo/read_entry.c библиотеки управления вводом-выводом на терминал Ncurses, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2022-29458
ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- [debian-lts-announce] 20221029 [SECURITY] [DLA 3167-1] ncurses security update
- [debian-lts-announce] 20221029 [SECURITY] [DLA 3167-1] ncurses security update
- https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
- https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
- https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
- https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
Closed bugs
Move /usr/bin/infocmp to termutils
Closed bugs
Добавить поддержку %pretrans скриптов
Closed vulnerabilities
BDU:2015-00377
Уязвимость программного обеспечения PHP, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-00378
Уязвимость программного обеспечения PHP, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-00379
Уязвимость программного обеспечения PHP, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-01282
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-06092
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-06093
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-06094
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-06095
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-06096
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-09797
Уязвимость операционной системы Gentoo Linux, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-09882
Уязвимость интерпретатора PHP, позволяющая удалённому злоумышленнику получить доступ к области памяти за пределами границ приложения или вызвать аварийное завершение приложения
BDU:2015-10226
Уязвимость интерпретатора PHP, позволяющая удалённому нарушителю вызвать отказ в обслуживании или оказать иное воздействие на систему
BDU:2020-01768
Уязвимость функции cdf_read_property_info инструмента для классификации типов файлов file, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2014-2270
softmagic.c in file before 5.17 and libmagic allows context-dependent attackers to cause a denial of service (out-of-bounds memory access and crash) via crafted offsets in the softmagic of a PE executable.
- http://bugs.gw.com/view.php?id=313
- http://bugs.gw.com/view.php?id=313
- openSUSE-SU-2014:0364
- openSUSE-SU-2014:0364
- openSUSE-SU-2014:0367
- openSUSE-SU-2014:0367
- openSUSE-SU-2014:0435
- openSUSE-SU-2014:0435
- RHSA-2014:1765
- RHSA-2014:1765
- [oss-security] 20140303 CVE Request: file: crashes when checking softmagic for some corrupt PE executables
- [oss-security] 20140303 CVE Request: file: crashes when checking softmagic for some corrupt PE executables
- [oss-security] 20140305 Re: CVE Request: file: crashes when checking softmagic for some corrupt PE executables
- [oss-security] 20140305 Re: CVE Request: file: crashes when checking softmagic for some corrupt PE executables
- [oss-security] 20140305 Re: CVE Request: file: crashes when checking softmagic for some corrupt PE executables
- [oss-security] 20140305 Re: CVE Request: file: crashes when checking softmagic for some corrupt PE executables
- http://support.apple.com/kb/HT6443
- http://support.apple.com/kb/HT6443
- DSA-2873
- DSA-2873
- http://www.php.net/ChangeLog-5.php
- http://www.php.net/ChangeLog-5.php
- USN-2162-1
- USN-2162-1
- USN-2163-1
- USN-2163-1
- https://github.com/file/file/commit/447558595a3650db2886cd2f416ad0beba965801
- https://github.com/file/file/commit/447558595a3650db2886cd2f416ad0beba965801
- GLSA-201503-08
- GLSA-201503-08
Modified: 2024-11-21
CVE-2014-3479
The cdf_check_stream_offset function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, relies on incorrect sector-size data, which allows remote attackers to cause a denial of service (application crash) via a crafted stream offset in a CDF file.
- APPLE-SA-2015-04-08-2
- APPLE-SA-2015-04-08-2
- openSUSE-SU-2014:1236
- openSUSE-SU-2014:1236
- HPSBUX03102
- HPSBUX03102
- SSRT101681
- SSRT101681
- [file] 20140612 file-5.19 is now available
- [file] 20140612 file-5.19 is now available
- RHSA-2014:1765
- RHSA-2014:1765
- RHSA-2014:1766
- RHSA-2014:1766
- 59794
- 59794
- 59831
- 59831
- http://support.apple.com/kb/HT6443
- http://support.apple.com/kb/HT6443
- DSA-2974
- DSA-2974
- DSA-3021
- DSA-3021
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.php.net/ChangeLog-5.php
- http://www.php.net/ChangeLog-5.php
- 68241
- 68241
- https://bugs.php.net/bug.php?id=67411
- https://bugs.php.net/bug.php?id=67411
- https://github.com/file/file/commit/36fadd29849b8087af9f4586f89dbf74ea45be67
- https://github.com/file/file/commit/36fadd29849b8087af9f4586f89dbf74ea45be67
- https://support.apple.com/HT204659
- https://support.apple.com/HT204659
Modified: 2024-11-21
CVE-2014-3480
The cdf_count_chain function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, does not properly validate sector-count data, which allows remote attackers to cause a denial of service (application crash) via a crafted CDF file.
- APPLE-SA-2015-04-08-2
- APPLE-SA-2015-04-08-2
- openSUSE-SU-2014:1236
- openSUSE-SU-2014:1236
- HPSBUX03102
- HPSBUX03102
- SSRT101681
- SSRT101681
- [file] 20140612 file-5.19 is now available
- [file] 20140612 file-5.19 is now available
- RHSA-2014:1765
- RHSA-2014:1765
- RHSA-2014:1766
- RHSA-2014:1766
- 59794
- 59794
- 59831
- 59831
- http://support.apple.com/kb/HT6443
- http://support.apple.com/kb/HT6443
- DSA-2974
- DSA-2974
- DSA-3021
- DSA-3021
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.php.net/ChangeLog-5.php
- http://www.php.net/ChangeLog-5.php
- 68238
- 68238
- https://bugs.php.net/bug.php?id=67412
- https://bugs.php.net/bug.php?id=67412
- https://github.com/file/file/commit/40bade80cbe2af1d0b2cd0420cebd5d5905a2382
- https://github.com/file/file/commit/40bade80cbe2af1d0b2cd0420cebd5d5905a2382
- https://support.apple.com/HT204659
- https://support.apple.com/HT204659
Modified: 2024-11-21
CVE-2014-3487
The cdf_read_property_info function in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, does not properly validate a stream offset, which allows remote attackers to cause a denial of service (application crash) via a crafted CDF file.
- APPLE-SA-2015-04-08-2
- APPLE-SA-2015-04-08-2
- openSUSE-SU-2014:1236
- openSUSE-SU-2014:1236
- HPSBUX03102
- HPSBUX03102
- SSRT101681
- SSRT101681
- [file] 20140612 file-5.19 is now available
- [file] 20140612 file-5.19 is now available
- RHSA-2014:1765
- RHSA-2014:1765
- RHSA-2014:1766
- RHSA-2014:1766
- 59794
- 59794
- 59831
- 59831
- http://support.apple.com/kb/HT6443
- http://support.apple.com/kb/HT6443
- DSA-2974
- DSA-2974
- DSA-3021
- DSA-3021
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.php.net/ChangeLog-5.php
- http://www.php.net/ChangeLog-5.php
- 68120
- 68120
- https://bugs.php.net/bug.php?id=67413
- https://bugs.php.net/bug.php?id=67413
- https://github.com/file/file/commit/93e063ee374b6a75729df9e7201fb511e47e259d
- https://github.com/file/file/commit/93e063ee374b6a75729df9e7201fb511e47e259d
- https://support.apple.com/HT204659
- https://support.apple.com/HT204659
Modified: 2024-11-21
CVE-2014-8117
softmagic.c in file before 5.21 does not properly limit recursion, which allows remote attackers to cause a denial of service (CPU consumption or crash) via unspecified vectors.
- http://advisories.mageia.org/MGASA-2015-0040.html
- http://advisories.mageia.org/MGASA-2015-0040.html
- RHSA-2016:0760
- RHSA-2016:0760
- [oss-security] 20141216 file(1): multiple denial of service issues (resource consumption), CVE-2014-8116 and CVE-2014-8117
- [oss-security] 20141216 file(1): multiple denial of service issues (resource consumption), CVE-2014-8116 and CVE-2014-8117
- 61944
- 61944
- 62081
- 62081
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 71692
- 71692
- 1031344
- 1031344
- USN-2494-1
- USN-2494-1
- USN-2535-1
- USN-2535-1
- https://github.com/file/file/blob/00cef282a902a4a6709bbbbb933ee397768caa38/ChangeLog
- https://github.com/file/file/blob/00cef282a902a4a6709bbbbb933ee397768caa38/ChangeLog
- https://github.com/file/file/commit/6f737ddfadb596d7d4a993f7ed2141ffd664a81c
- https://github.com/file/file/commit/6f737ddfadb596d7d4a993f7ed2141ffd664a81c
- FreeBSD-SA-14:28
- FreeBSD-SA-14:28
Modified: 2024-11-21
CVE-2014-9652
The mconvert function in softmagic.c in file before 5.21, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allow remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted file.
- http://bugs.gw.com/view.php?id=398
- http://bugs.gw.com/view.php?id=398
- APPLE-SA-2015-09-30-3
- APPLE-SA-2015-09-30-3
- SUSE-SU-2015:0424
- SUSE-SU-2015:0424
- SUSE-SU-2015:0436
- SUSE-SU-2015:0436
- openSUSE-SU-2015:0440
- openSUSE-SU-2015:0440
- HPSBMU03380
- HPSBMU03380
- HPSBMU03409
- HPSBMU03409
- [oss-security] 20150205 Re: CVE Request: PHP/file: out-of-bounds memory access in softmagic
- [oss-security] 20150205 Re: CVE Request: PHP/file: out-of-bounds memory access in softmagic
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- RHSA-2015:1053
- RHSA-2015:1053
- RHSA-2015:1066
- RHSA-2015:1066
- RHSA-2015:1135
- RHSA-2015:1135
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 72505
- 72505
- https://bugs.php.net/bug.php?id=68735
- https://bugs.php.net/bug.php?id=68735
- https://bugs.php.net/patch-display.php?bug=68735&patch=bug68735.patch&revision=1420309079
- https://bugs.php.net/patch-display.php?bug=68735&patch=bug68735.patch&revision=1420309079
- https://github.com/file/file/commit/59e63838913eee47f5c120a6c53d4565af638158
- https://github.com/file/file/commit/59e63838913eee47f5c120a6c53d4565af638158
- GLSA-201701-42
- GLSA-201701-42
- https://support.apple.com/HT205267
- https://support.apple.com/HT205267
Modified: 2024-11-21
CVE-2014-9653
readelf.c in file before 5.22, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory access) or possibly have unspecified other impact via a crafted ELF file.
- http://bugs.gw.com/view.php?id=409
- http://bugs.gw.com/view.php?id=409
- HPSBMU03380
- HPSBMU03380
- HPSBMU03409
- HPSBMU03409
- [file] 20141216 [PATCH] readelf.c: better checks for values returned by pread
- [file] 20141216 [PATCH] readelf.c: better checks for values returned by pread
- [oss-security] 20150205 Re: CVE Request: PHP/file: out-of-bounds memory access in softmagic
- [oss-security] 20150205 Re: CVE Request: PHP/file: out-of-bounds memory access in softmagic
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- RHSA-2016:0760
- RHSA-2016:0760
- DSA-3196
- DSA-3196
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 72516
- 72516
- https://github.com/file/file/commit/445c8fb0ebff85195be94cd9f7e1df89cade5c7f
- https://github.com/file/file/commit/445c8fb0ebff85195be94cd9f7e1df89cade5c7f
- GLSA-201701-42
- GLSA-201701-42
- USN-3686-1
- USN-3686-1
Modified: 2024-11-21
CVE-2019-18218
cdf_read_property_info in cdf.c in file through 5.37 does not restrict the number of CDF_VECTOR elements, which allows a heap-based buffer overflow (4-byte out-of-bounds write).
- openSUSE-SU-2020:0677
- openSUSE-SU-2020:0677
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16780
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16780
- https://github.com/file/file/commit/46a8443f76cec4b41ec736eca396984c74664f84
- https://github.com/file/file/commit/46a8443f76cec4b41ec736eca396984c74664f84
- [debian-lts-announce] 20191023 [SECURITY] [DLA 1969-1] file security update
- [debian-lts-announce] 20191023 [SECURITY] [DLA 1969-1] file security update
- [debian-lts-announce] 20210715 [SECURITY] [DLA 2708-1] php7.0 security update
- [debian-lts-announce] 20210715 [SECURITY] [DLA 2708-1] php7.0 security update
- FEDORA-2019-97dcb2762a
- FEDORA-2019-97dcb2762a
- FEDORA-2019-18036b898e
- FEDORA-2019-18036b898e
- FEDORA-2019-554c3c691f
- FEDORA-2019-554c3c691f
- GLSA-202003-24
- GLSA-202003-24
- https://security.netapp.com/advisory/ntap-20200115-0001/
- https://security.netapp.com/advisory/ntap-20200115-0001/
- USN-4172-1
- USN-4172-1
- USN-4172-2
- USN-4172-2
- DSA-4550
- DSA-4550
Closed bugs
file из-под root не может открыть файл на чтение
Closed bugs
less-530-alt2 перестал показывать информацию о файлах rpm
Package alterator-sysconfig updated to version 1.3.10-alt1 for branch p10 in task 320111.
Closed bugs
Не умеет url-encoded переменную http_proxy
Package thunderbird updated to version 102.11.0-alt1 for branch p10 in task 321098.
Closed vulnerabilities
BDU:2023-02803
Уязвимость браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2023-02804
Уязвимость браузеров Firefox и Firefox ESR, связанная с ошибками представления информации пользовательским интерфейсом, позволяющая нарушителю выполнить спуфинговую атаку
BDU:2023-02805
Уязвимость функции FileReader::DoReadData() браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код в целевой системе
BDU:2023-02806
Уязвимость браузеров Firefox и Firefox ESR, связанная с ошибками смешения типов данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-02809
Уязвимость браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, связанная с ошибками представления информации пользовательским интерфейсом, позволяющая нарушителю выполнить спуфинговую атаку
BDU:2023-02810
Уязвимость браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, существующая из-за некорректной работы обработчиков ms-cxh и ms-cxh-ful, позволяющая нарушителю вызвать аварийное завершение работы приложения
BDU:2023-02813
Уязвимость драйвера RLBox Expat браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать аварийное завершение работы приложения
BDU:2023-02814
Уязвимость браузеров Firefox и Firefox ESR, существующая из-за отсутствия задержки всплывающих уведомлений, позволяющая нарушителю получить несанкционированный доступ к определенным функциям браузера
Modified: 2024-11-21
CVE-2023-32205
In multiple cases browser prompts could have been obscured by popups controlled by content. These could have led to potential user confusion and spoofing attacks. This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1753339
- https://bugzilla.mozilla.org/show_bug.cgi?id=1753341
- GLSA-202312-03
- GLSA-202401-10
- https://www.mozilla.org/security/advisories/mfsa2023-16/
- https://www.mozilla.org/security/advisories/mfsa2023-17/
- https://www.mozilla.org/security/advisories/mfsa2023-18/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1753339
- https://www.mozilla.org/security/advisories/mfsa2023-18/
- https://www.mozilla.org/security/advisories/mfsa2023-17/
- https://www.mozilla.org/security/advisories/mfsa2023-16/
- GLSA-202401-10
- GLSA-202312-03
- https://bugzilla.mozilla.org/show_bug.cgi?id=1753341
Modified: 2024-11-21
CVE-2023-32206
An out-of-bound read could have led to a crash in the RLBox Expat driver. This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1824892
- GLSA-202312-03
- GLSA-202401-10
- https://www.mozilla.org/security/advisories/mfsa2023-16/
- https://www.mozilla.org/security/advisories/mfsa2023-17/
- https://www.mozilla.org/security/advisories/mfsa2023-18/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1824892
- https://www.mozilla.org/security/advisories/mfsa2023-18/
- https://www.mozilla.org/security/advisories/mfsa2023-17/
- https://www.mozilla.org/security/advisories/mfsa2023-16/
- GLSA-202401-10
- GLSA-202312-03
Modified: 2025-01-31
CVE-2023-32207
A missing delay in popup notifications could have made it possible for an attacker to trick a user into granting permissions. This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1826116
- https://bugzilla.mozilla.org/show_bug.cgi?id=1826116
- GLSA-202312-03
- GLSA-202312-03
- GLSA-202401-10
- GLSA-202401-10
- https://www.mozilla.org/security/advisories/mfsa2023-16/
- https://www.mozilla.org/security/advisories/mfsa2023-16/
- https://www.mozilla.org/security/advisories/mfsa2023-17/
- https://www.mozilla.org/security/advisories/mfsa2023-17/
- https://www.mozilla.org/security/advisories/mfsa2023-18/
- https://www.mozilla.org/security/advisories/mfsa2023-18/
Modified: 2024-11-21
CVE-2023-32211
A type checking bug would have led to invalid code being compiled. This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1823379
- GLSA-202312-03
- GLSA-202401-10
- https://www.mozilla.org/security/advisories/mfsa2023-16/
- https://www.mozilla.org/security/advisories/mfsa2023-17/
- https://www.mozilla.org/security/advisories/mfsa2023-18/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1823379
- https://www.mozilla.org/security/advisories/mfsa2023-18/
- https://www.mozilla.org/security/advisories/mfsa2023-17/
- https://www.mozilla.org/security/advisories/mfsa2023-16/
- GLSA-202401-10
- GLSA-202312-03
Modified: 2024-11-21
CVE-2023-32212
An attacker could have positioned a datalist
element to obscure the address bar. This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1826622
- GLSA-202312-03
- GLSA-202401-10
- https://www.mozilla.org/security/advisories/mfsa2023-16/
- https://www.mozilla.org/security/advisories/mfsa2023-17/
- https://www.mozilla.org/security/advisories/mfsa2023-18/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1826622
- https://www.mozilla.org/security/advisories/mfsa2023-18/
- https://www.mozilla.org/security/advisories/mfsa2023-17/
- https://www.mozilla.org/security/advisories/mfsa2023-16/
- GLSA-202401-10
- GLSA-202312-03
Modified: 2024-11-21
CVE-2023-32213
When reading a file, an uninitialized value could have been used as read limit. This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1826666
- GLSA-202312-03
- GLSA-202401-10
- https://www.mozilla.org/security/advisories/mfsa2023-16/
- https://www.mozilla.org/security/advisories/mfsa2023-17/
- https://www.mozilla.org/security/advisories/mfsa2023-18/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1826666
- https://www.mozilla.org/security/advisories/mfsa2023-18/
- https://www.mozilla.org/security/advisories/mfsa2023-17/
- https://www.mozilla.org/security/advisories/mfsa2023-16/
- GLSA-202401-10
- GLSA-202312-03
Modified: 2024-11-21
CVE-2023-32214
Protocol handlers `ms-cxh` and `ms-cxh-full` could have been leveraged to trigger a denial of service. *Note: This attack only affects Windows. Other operating systems are not affected.* This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1828716
- https://security.gentoo.org/glsa/202312-03
- https://security.gentoo.org/glsa/202401-10
- https://www.mozilla.org/security/advisories/mfsa2023-16/
- https://www.mozilla.org/security/advisories/mfsa2023-17/
- https://www.mozilla.org/security/advisories/mfsa2023-18/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1828716
- https://www.mozilla.org/security/advisories/mfsa2023-18/
- https://www.mozilla.org/security/advisories/mfsa2023-17/
- https://www.mozilla.org/security/advisories/mfsa2023-16/
- https://security.gentoo.org/glsa/202401-10
- https://security.gentoo.org/glsa/202312-03
Modified: 2024-11-21
CVE-2023-32215
Memory safety bugs present in Firefox 112 and Firefox ESR 102.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11.
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1540883%2C1751943%2C1814856%2C1820210%2C1821480%2C1827019%2C1827024%2C1827144%2C1827359%2C1830186
- GLSA-202312-03
- GLSA-202401-10
- https://www.mozilla.org/security/advisories/mfsa2023-16/
- https://www.mozilla.org/security/advisories/mfsa2023-17/
- https://www.mozilla.org/security/advisories/mfsa2023-18/
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1540883%2C1751943%2C1814856%2C1820210%2C1821480%2C1827019%2C1827024%2C1827144%2C1827359%2C1830186
- https://www.mozilla.org/security/advisories/mfsa2023-18/
- https://www.mozilla.org/security/advisories/mfsa2023-17/
- https://www.mozilla.org/security/advisories/mfsa2023-16/
- GLSA-202401-10
- GLSA-202312-03