ALT-BU-2025-14279-1
Branch p11 update bulletin.
Package thunderbird updated to version 144.0.1-alt1 for branch p11 in task 398220.
Closed vulnerabilities
BDU:2025-13249
Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2025-13250
Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2025-13288
Уязвимость компонента WebGL Texture Handler браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код
BDU:2025-13289
Уязвимость функции MediaTrackGraphImpl::GetInstance браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код
BDU:2025-13290
Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с раскрытием информации, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2025-13291
Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с использованием небезопасных механизмов обработки аутентификационных данных в памяти операционной системы, позволяющая нарушителю выполнить произвольный код
BDU:2025-13292
Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с некорректным кодированием или сокрытием выходных данных, позволяющая нарушителю проводить межсайтовые сценарные атаки (XSS)
BDU:2025-13293
Уязвимость функции Copy as cURL браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код
BDU:2025-13294
Уязвимость браузеров Mozilla Firefox и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
Modified: 2025-11-03
CVE-2025-11708
Use-after-free in MediaTrackGraphImpl::GetInstance() This vulnerability affects Firefox < 144, Firefox ESR < 140.4, Thunderbird < 144, and Thunderbird < 140.4.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1988931
- https://www.mozilla.org/security/advisories/mfsa2025-81/
- https://www.mozilla.org/security/advisories/mfsa2025-83/
- https://www.mozilla.org/security/advisories/mfsa2025-84/
- https://www.mozilla.org/security/advisories/mfsa2025-85/
- https://lists.debian.org/debian-lts-announce/2025/10/msg00015.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00031.html
Modified: 2025-11-03
CVE-2025-11709
A compromised web process was able to trigger out of bounds reads and writes in a more privileged process using manipulated WebGL textures. This vulnerability affects Firefox < 144, Firefox ESR < 115.29, Firefox ESR < 140.4, Thunderbird < 144, and Thunderbird < 140.4.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1989127
- https://www.mozilla.org/security/advisories/mfsa2025-81/
- https://www.mozilla.org/security/advisories/mfsa2025-82/
- https://www.mozilla.org/security/advisories/mfsa2025-83/
- https://www.mozilla.org/security/advisories/mfsa2025-84/
- https://www.mozilla.org/security/advisories/mfsa2025-85/
- https://lists.debian.org/debian-lts-announce/2025/10/msg00015.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00031.html
Modified: 2025-11-03
CVE-2025-11710
A compromised web process using malicious IPC messages could have caused the privileged browser process to reveal blocks of its memory to the compromised process. This vulnerability affects Firefox < 144, Firefox ESR < 115.29, Firefox ESR < 140.4, Thunderbird < 144, and Thunderbird < 140.4.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1989899
- https://www.mozilla.org/security/advisories/mfsa2025-81/
- https://www.mozilla.org/security/advisories/mfsa2025-82/
- https://www.mozilla.org/security/advisories/mfsa2025-83/
- https://www.mozilla.org/security/advisories/mfsa2025-84/
- https://www.mozilla.org/security/advisories/mfsa2025-85/
- https://lists.debian.org/debian-lts-announce/2025/10/msg00015.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00031.html
Modified: 2025-11-03
CVE-2025-11711
There was a way to change the value of JavaScript Object properties that were supposed to be non-writeable. This vulnerability affects Firefox < 144, Firefox ESR < 115.29, Firefox ESR < 140.4, Thunderbird < 144, and Thunderbird < 140.4.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1989978
- https://www.mozilla.org/security/advisories/mfsa2025-81/
- https://www.mozilla.org/security/advisories/mfsa2025-82/
- https://www.mozilla.org/security/advisories/mfsa2025-83/
- https://www.mozilla.org/security/advisories/mfsa2025-84/
- https://www.mozilla.org/security/advisories/mfsa2025-85/
- https://lists.debian.org/debian-lts-announce/2025/10/msg00015.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00031.html
Modified: 2025-11-03
CVE-2025-11712
A malicious page could have used the type attribute of an OBJECT tag to override the default browser behavior when encountering a web resource served without a content-type. This could have contributed to an XSS on a site that unsafely serves files without a content-type header. This vulnerability affects Firefox < 144, Firefox ESR < 140.4, Thunderbird < 144, and Thunderbird < 140.4.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1979536
- https://www.mozilla.org/security/advisories/mfsa2025-81/
- https://www.mozilla.org/security/advisories/mfsa2025-83/
- https://www.mozilla.org/security/advisories/mfsa2025-84/
- https://www.mozilla.org/security/advisories/mfsa2025-85/
- https://lists.debian.org/debian-lts-announce/2025/10/msg00015.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00031.html
Modified: 2025-11-14
CVE-2025-11713
Insufficient escaping in the “Copy as cURL” feature could have been used to trick a user into executing unexpected code on Windows. This did not affect the application when running on other operating systems. This vulnerability affects Firefox < 144, Firefox ESR < 140.4, Thunderbird < 144, and Thunderbird < 140.4.
Modified: 2025-11-03
CVE-2025-11714
Memory safety bugs present in Firefox ESR 115.28, Firefox ESR 140.3, Thunderbird ESR 140.3, Firefox 143 and Thunderbird 143. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 144, Firefox ESR < 115.29, Firefox ESR < 140.4, Thunderbird < 144, and Thunderbird < 140.4.
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1973699%2C1989945%2C1990970%2C1991040%2C1992113
- https://www.mozilla.org/security/advisories/mfsa2025-81/
- https://www.mozilla.org/security/advisories/mfsa2025-82/
- https://www.mozilla.org/security/advisories/mfsa2025-83/
- https://www.mozilla.org/security/advisories/mfsa2025-84/
- https://www.mozilla.org/security/advisories/mfsa2025-85/
- https://lists.debian.org/debian-lts-announce/2025/10/msg00015.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00031.html
Modified: 2025-11-03
CVE-2025-11715
Memory safety bugs present in Firefox ESR 140.3, Thunderbird ESR 140.3, Firefox 143 and Thunderbird 143. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 144, Firefox ESR < 140.4, Thunderbird < 144, and Thunderbird < 140.4.
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1983838%2C1987624%2C1988244%2C1988912%2C1989734%2C1990085%2C1991899
- https://www.mozilla.org/security/advisories/mfsa2025-81/
- https://www.mozilla.org/security/advisories/mfsa2025-83/
- https://www.mozilla.org/security/advisories/mfsa2025-84/
- https://www.mozilla.org/security/advisories/mfsa2025-85/
- https://lists.debian.org/debian-lts-announce/2025/10/msg00015.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00031.html
Modified: 2025-10-16
CVE-2025-11716
Links in a sandboxed iframe could open an external app on Android without the required "allow-" permission. This vulnerability affects Firefox < 144 and Thunderbird < 144.
Modified: 2025-11-14
CVE-2025-11719
Starting in Thunderbird 143, the use of the native messaging API by web extensions on Windows could lead to crashes caused by use-after-free memory corruption. This vulnerability affects Firefox < 144 and Thunderbird < 144.
Modified: 2025-10-15
CVE-2025-11721
Memory safety bug present in Firefox 143 and Thunderbird 143. This bug showed evidence of memory corruption and we presume that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Firefox < 144 and Thunderbird < 144.
Package installer-feature-kdesktop-tmpfs updated to version 2.7-alt1 for branch p11 in task 399281.
Closed bugs
После установки системы 11.1 в /tmp остаются логи
Closed vulnerabilities
Modified: 2025-11-04
CVE-2025-11232
To trigger the issue, three configuration parameters must have specific settings: "hostname-char-set" must be left at the default setting, which is "[^A-Za-z0-9.-]"; "hostname-char-replacement" must be empty (the default); and "ddns-qualifying-suffix" must *NOT* be empty (the default is empty). DDNS updates do not need to be enabled for this issue to manifest. A client that sends certain option content would then cause kea-dhcp4 to exit unexpectedly. This issue affects Kea versions 3.0.1 through 3.0.1 and 3.1.1 through 3.1.2.