ALT-BU-2025-13498-1
Branch sisyphus_riscv64 update bulletin.
Package thunderbird updated to version 144.0-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2025-11332
Уязвимость компонента Site Permissions браузера Mozilla Firefox и почтового клиента Thunderbird, позволяющая нарушителю проводить межсайтовые сценарные атаки (XSS)
BDU:2025-11334
Уязвимость компонента Web Compatibility: Tooling браузера Mozilla Firefox и почтового клиента Thunderbird, позволяющая нарушителю обойти существующие ограничения безопасности
BDU:2025-11377
Уязвимость компонента WebAuthn браузера Mozilla Firefox и почтового клиента Thunderbird, позволяющая нарушителю проводить спуфинг-атаки
Modified: 2025-10-24
BDU:2025-11378
Уязвимость компонента SVG браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код
Modified: 2025-10-24
BDU:2025-11379
Уязвимость компонента JavaScript: GC браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации
Modified: 2025-10-24
BDU:2025-11380
Уязвимость компонента Graphics: Canvas2D браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код
Modified: 2025-10-24
BDU:2025-11381
Уязвимость компонента Networking: Cache браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2025-10-24
BDU:2025-11382
Уязвимость компонента Layout браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код
Modified: 2025-10-24
BDU:2025-11383
Уязвимость компонента Graphics: Canvas2D браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю повысить свои привилегии
Modified: 2025-10-24
BDU:2025-11384
Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код и вызвать отказ в обслуживании
BDU:2025-13249
Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2025-13250
Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2025-13288
Уязвимость компонента WebGL Texture Handler браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код
BDU:2025-13289
Уязвимость функции MediaTrackGraphImpl::GetInstance браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код
BDU:2025-13290
Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с раскрытием информации, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2025-13291
Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с использованием небезопасных механизмов обработки аутентификационных данных в памяти операционной системы, позволяющая нарушителю выполнить произвольный код
BDU:2025-13292
Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с некорректным кодированием или сокрытием выходных данных, позволяющая нарушителю проводить межсайтовые сценарные атаки (XSS)
BDU:2025-13293
Уязвимость функции Copy as cURL браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код
BDU:2025-13294
Уязвимость браузеров Mozilla Firefox и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
Modified: 2025-11-03
CVE-2025-10527
Sandbox escape due to use-after-free in the Graphics: Canvas2D component. This vulnerability affects Firefox < 143, Firefox ESR < 140.3, Thunderbird < 143, and Thunderbird < 140.3.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1984825
- https://www.mozilla.org/security/advisories/mfsa2025-73/
- https://www.mozilla.org/security/advisories/mfsa2025-75/
- https://www.mozilla.org/security/advisories/mfsa2025-77/
- https://www.mozilla.org/security/advisories/mfsa2025-78/
- https://lists.debian.org/debian-lts-announce/2025/09/msg00020.html
- https://lists.debian.org/debian-lts-announce/2025/09/msg00026.html
Modified: 2025-11-03
CVE-2025-10528
Sandbox escape due to undefined behavior, invalid pointer in the Graphics: Canvas2D component. This vulnerability affects Firefox < 143, Firefox ESR < 140.3, Thunderbird < 143, and Thunderbird < 140.3.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1986185
- https://www.mozilla.org/security/advisories/mfsa2025-73/
- https://www.mozilla.org/security/advisories/mfsa2025-75/
- https://www.mozilla.org/security/advisories/mfsa2025-77/
- https://www.mozilla.org/security/advisories/mfsa2025-78/
- https://lists.debian.org/debian-lts-announce/2025/09/msg00020.html
- https://lists.debian.org/debian-lts-announce/2025/09/msg00026.html
Modified: 2025-11-03
CVE-2025-10529
Same-origin policy bypass in the Layout component. This vulnerability affects Firefox < 143, Firefox ESR < 140.3, Thunderbird < 143, and Thunderbird < 140.3.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1970490
- https://www.mozilla.org/security/advisories/mfsa2025-73/
- https://www.mozilla.org/security/advisories/mfsa2025-75/
- https://www.mozilla.org/security/advisories/mfsa2025-77/
- https://www.mozilla.org/security/advisories/mfsa2025-78/
- https://lists.debian.org/debian-lts-announce/2025/09/msg00020.html
- https://lists.debian.org/debian-lts-announce/2025/09/msg00026.html
Modified: 2025-10-30
CVE-2025-10530
Spoofing issue in the WebAuthn component in Firefox for Android. This vulnerability affects Firefox < 143 and Thunderbird < 143.
Modified: 2025-10-30
CVE-2025-10531
Mitigation bypass in the Web Compatibility: Tooling component. This vulnerability affects Firefox < 143 and Thunderbird < 143.
Modified: 2025-11-03
CVE-2025-10532
Incorrect boundary conditions in the JavaScript: GC component. This vulnerability affects Firefox < 143, Firefox ESR < 140.3, Thunderbird < 143, and Thunderbird < 140.3.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1979502
- https://www.mozilla.org/security/advisories/mfsa2025-73/
- https://www.mozilla.org/security/advisories/mfsa2025-75/
- https://www.mozilla.org/security/advisories/mfsa2025-77/
- https://www.mozilla.org/security/advisories/mfsa2025-78/
- https://lists.debian.org/debian-lts-announce/2025/09/msg00020.html
- https://lists.debian.org/debian-lts-announce/2025/09/msg00026.html
Modified: 2025-11-03
CVE-2025-10533
Integer overflow in the SVG component. This vulnerability affects Firefox < 143, Firefox ESR < 115.28, Firefox ESR < 140.3, Thunderbird < 143, and Thunderbird < 140.3.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1980788
- https://www.mozilla.org/security/advisories/mfsa2025-73/
- https://www.mozilla.org/security/advisories/mfsa2025-74/
- https://www.mozilla.org/security/advisories/mfsa2025-75/
- https://www.mozilla.org/security/advisories/mfsa2025-77/
- https://www.mozilla.org/security/advisories/mfsa2025-78/
- https://lists.debian.org/debian-lts-announce/2025/09/msg00026.html
Modified: 2025-10-30
CVE-2025-10534
Spoofing issue in the Site Permissions component. This vulnerability affects Firefox < 143 and Thunderbird < 143.
Modified: 2025-11-03
CVE-2025-10536
Information disclosure in the Networking: Cache component. This vulnerability affects Firefox < 143, Firefox ESR < 140.3, Thunderbird < 143, and Thunderbird < 140.3.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1981502
- https://www.mozilla.org/security/advisories/mfsa2025-73/
- https://www.mozilla.org/security/advisories/mfsa2025-75/
- https://www.mozilla.org/security/advisories/mfsa2025-77/
- https://www.mozilla.org/security/advisories/mfsa2025-78/
- https://lists.debian.org/debian-lts-announce/2025/09/msg00020.html
- https://lists.debian.org/debian-lts-announce/2025/09/msg00026.html
Modified: 2025-11-03
CVE-2025-10537
Memory safety bugs present in Firefox ESR 140.2, Thunderbird ESR 140.2, Firefox 142 and Thunderbird 142. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 143, Firefox ESR < 140.3, Thunderbird < 143, and Thunderbird < 140.3.
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1938220%2C1980730%2C1981280%2C1981283%2C1984505%2C1985067
- https://www.mozilla.org/security/advisories/mfsa2025-73/
- https://www.mozilla.org/security/advisories/mfsa2025-75/
- https://www.mozilla.org/security/advisories/mfsa2025-77/
- https://www.mozilla.org/security/advisories/mfsa2025-78/
- https://lists.debian.org/debian-lts-announce/2025/09/msg00020.html
- https://lists.debian.org/debian-lts-announce/2025/09/msg00026.html
Modified: 2025-11-03
CVE-2025-11708
Use-after-free in MediaTrackGraphImpl::GetInstance() This vulnerability affects Firefox < 144, Firefox ESR < 140.4, Thunderbird < 144, and Thunderbird < 140.4.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1988931
- https://www.mozilla.org/security/advisories/mfsa2025-81/
- https://www.mozilla.org/security/advisories/mfsa2025-83/
- https://www.mozilla.org/security/advisories/mfsa2025-84/
- https://www.mozilla.org/security/advisories/mfsa2025-85/
- https://lists.debian.org/debian-lts-announce/2025/10/msg00015.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00031.html
Modified: 2025-11-03
CVE-2025-11709
A compromised web process was able to trigger out of bounds reads and writes in a more privileged process using manipulated WebGL textures. This vulnerability affects Firefox < 144, Firefox ESR < 115.29, Firefox ESR < 140.4, Thunderbird < 144, and Thunderbird < 140.4.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1989127
- https://www.mozilla.org/security/advisories/mfsa2025-81/
- https://www.mozilla.org/security/advisories/mfsa2025-82/
- https://www.mozilla.org/security/advisories/mfsa2025-83/
- https://www.mozilla.org/security/advisories/mfsa2025-84/
- https://www.mozilla.org/security/advisories/mfsa2025-85/
- https://lists.debian.org/debian-lts-announce/2025/10/msg00015.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00031.html
Modified: 2025-11-03
CVE-2025-11710
A compromised web process using malicious IPC messages could have caused the privileged browser process to reveal blocks of its memory to the compromised process. This vulnerability affects Firefox < 144, Firefox ESR < 115.29, Firefox ESR < 140.4, Thunderbird < 144, and Thunderbird < 140.4.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1989899
- https://www.mozilla.org/security/advisories/mfsa2025-81/
- https://www.mozilla.org/security/advisories/mfsa2025-82/
- https://www.mozilla.org/security/advisories/mfsa2025-83/
- https://www.mozilla.org/security/advisories/mfsa2025-84/
- https://www.mozilla.org/security/advisories/mfsa2025-85/
- https://lists.debian.org/debian-lts-announce/2025/10/msg00015.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00031.html
Modified: 2025-11-03
CVE-2025-11711
There was a way to change the value of JavaScript Object properties that were supposed to be non-writeable. This vulnerability affects Firefox < 144, Firefox ESR < 115.29, Firefox ESR < 140.4, Thunderbird < 144, and Thunderbird < 140.4.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1989978
- https://www.mozilla.org/security/advisories/mfsa2025-81/
- https://www.mozilla.org/security/advisories/mfsa2025-82/
- https://www.mozilla.org/security/advisories/mfsa2025-83/
- https://www.mozilla.org/security/advisories/mfsa2025-84/
- https://www.mozilla.org/security/advisories/mfsa2025-85/
- https://lists.debian.org/debian-lts-announce/2025/10/msg00015.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00031.html
Modified: 2025-11-03
CVE-2025-11712
A malicious page could have used the type attribute of an OBJECT tag to override the default browser behavior when encountering a web resource served without a content-type. This could have contributed to an XSS on a site that unsafely serves files without a content-type header. This vulnerability affects Firefox < 144, Firefox ESR < 140.4, Thunderbird < 144, and Thunderbird < 140.4.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1979536
- https://www.mozilla.org/security/advisories/mfsa2025-81/
- https://www.mozilla.org/security/advisories/mfsa2025-83/
- https://www.mozilla.org/security/advisories/mfsa2025-84/
- https://www.mozilla.org/security/advisories/mfsa2025-85/
- https://lists.debian.org/debian-lts-announce/2025/10/msg00015.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00031.html
Modified: 2025-11-14
CVE-2025-11713
Insufficient escaping in the “Copy as cURL” feature could have been used to trick a user into executing unexpected code on Windows. This did not affect the application when running on other operating systems. This vulnerability affects Firefox < 144, Firefox ESR < 140.4, Thunderbird < 144, and Thunderbird < 140.4.
Modified: 2025-11-03
CVE-2025-11714
Memory safety bugs present in Firefox ESR 115.28, Firefox ESR 140.3, Thunderbird ESR 140.3, Firefox 143 and Thunderbird 143. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 144, Firefox ESR < 115.29, Firefox ESR < 140.4, Thunderbird < 144, and Thunderbird < 140.4.
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1973699%2C1989945%2C1990970%2C1991040%2C1992113
- https://www.mozilla.org/security/advisories/mfsa2025-81/
- https://www.mozilla.org/security/advisories/mfsa2025-82/
- https://www.mozilla.org/security/advisories/mfsa2025-83/
- https://www.mozilla.org/security/advisories/mfsa2025-84/
- https://www.mozilla.org/security/advisories/mfsa2025-85/
- https://lists.debian.org/debian-lts-announce/2025/10/msg00015.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00031.html
Modified: 2025-11-03
CVE-2025-11715
Memory safety bugs present in Firefox ESR 140.3, Thunderbird ESR 140.3, Firefox 143 and Thunderbird 143. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 144, Firefox ESR < 140.4, Thunderbird < 144, and Thunderbird < 140.4.
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1983838%2C1987624%2C1988244%2C1988912%2C1989734%2C1990085%2C1991899
- https://www.mozilla.org/security/advisories/mfsa2025-81/
- https://www.mozilla.org/security/advisories/mfsa2025-83/
- https://www.mozilla.org/security/advisories/mfsa2025-84/
- https://www.mozilla.org/security/advisories/mfsa2025-85/
- https://lists.debian.org/debian-lts-announce/2025/10/msg00015.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00031.html
Modified: 2025-10-16
CVE-2025-11716
Links in a sandboxed iframe could open an external app on Android without the required "allow-" permission. This vulnerability affects Firefox < 144 and Thunderbird < 144.
Modified: 2025-11-14
CVE-2025-11719
Starting in Thunderbird 143, the use of the native messaging API by web extensions on Windows could lead to crashes caused by use-after-free memory corruption. This vulnerability affects Firefox < 144 and Thunderbird < 144.
Modified: 2025-10-15
CVE-2025-11721
Memory safety bug present in Firefox 143 and Thunderbird 143. This bug showed evidence of memory corruption and we presume that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Firefox < 144 and Thunderbird < 144.
Package python3-module-django updated to version 5.2.7-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
Modified: 2025-11-14
BDU:2025-12461
Уязвимость методов QuerySet.annotate(), QuerySet.alias(), QuerySet.aggregate(), and QuerySet.extra() программной платформы для веб-приложений Django, позволяющая нарушителю оказать влияние на конфиденциальность и целостность защищаемой информации
Modified: 2025-11-14
BDU:2025-12661
Уязвимость функции django.utils.archive.extract() программной платформы для веб-приложений Django, позволяющая нарушителю обойти ограничения безопасности
Modified: 2025-11-04
CVE-2025-59681
An issue was discovered in Django 4.2 before 4.2.25, 5.1 before 5.1.13, and 5.2 before 5.2.7. QuerySet.annotate(), QuerySet.alias(), QuerySet.aggregate(), and QuerySet.extra() are subject to SQL injection in column aliases, when using a suitably crafted dictionary, with dictionary expansion, as the **kwargs passed to these methods (on MySQL and MariaDB).
Modified: 2025-11-04
CVE-2025-59682
An issue was discovered in Django 4.2 before 4.2.25, 5.1 before 5.1.13, and 5.2 before 5.2.7. The django.utils.archive.extract() function, used by the "startapp --template" and "startproject --template" commands, allows partial directory traversal via an archive with file paths sharing a common prefix with the target directory.
Package golang updated to version 1.25.3-alt0.port for branch sisyphus_riscv64.
Closed vulnerabilities
Modified: 2025-11-04
CVE-2025-47912
The Parse function permits values other than IPv6 addresses to be included in square brackets within the host component of a URL. RFC 3986 permits IPv6 addresses to be included within the host component, enclosed within square brackets. For example: "http://[::1]/". IPv4 addresses and hostnames must not appear within square brackets. Parse did not enforce this requirement.
Modified: 2025-11-04
CVE-2025-58183
tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a small compressed input can result in large allocations.
Modified: 2025-11-04
CVE-2025-58185
Parsing a maliciously crafted DER payload could allocate large amounts of memory, causing memory exhaustion.
Modified: 2025-11-04
CVE-2025-58186
Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as "a=;", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.
Modified: 2025-11-04
CVE-2025-58187
Due to the design of the name constraint checking algorithm, the processing time of some inputs scals non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains.
Modified: 2025-11-04
CVE-2025-58188
Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method. This affects programs which validate arbitrary certificate chains.
Modified: 2025-11-04
CVE-2025-58189
When Conn.Handshake fails during ALPN negotiation the error contains attacker controlled information (the ALPN protocols sent by the client) which is not escaped.
Modified: 2025-11-04
CVE-2025-61723
The processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input. This affects programs which parse untrusted PEM inputs.
Modified: 2025-11-04
CVE-2025-61724
The Reader.ReadResponse function constructs a response string through repeated string concatenation of lines. When the number of lines in a response is large, this can cause excessive CPU consumption.
Modified: 2025-11-04
CVE-2025-61725
The ParseAddress function constructeds domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.
Package mbedtls updated to version 4.0.0-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
Modified: 2025-10-23
CVE-2025-59438
Mbed TLS through 3.6.4 has an Observable Timing Discrepancy.
Package plasma-workspace updated to version 6.4.5-alt4 for branch sisyphus_riscv64.
Closed bugs
надо добавить зависимость milou