ALT-BU-2025-15133-1
Branch c10f2 update bulletin.
Closed vulnerabilities
Modified: 2025-10-17
CVE-2025-53644
OpenCV is an Open Source Computer Vision Library. Versions 4.10.0 and 4.11.0 have an uninitialized pointer variable on stack that may lead to arbitrary heap buffer write when reading crafted JPEG images. Version 4.12.0 fixes the vulnerability.
Closed bugs
libopencv собрана без gstreamer
Package firefox-esr updated to version 140.5.0-alt1 for branch c10f2 in task 400872.
Closed vulnerabilities
Modified: 2025-12-03
BDU:2025-14544
Уязвимость компонента WebRTC: Audio/Video браузеров Mozilla Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-12-03
BDU:2025-14545
Уязвимость компонента DOM: Workers браузеров Mozilla Firefox и Firefox ESR, позволяющая нарушителю обойти существующие ограничения безопасности
Modified: 2025-12-03
BDU:2025-14546
Уязвимость компонента DOM: Security браузеров Mozilla Firefox и Firefox ESR, позволяющая нарушителю обойти существующие ограничения безопасности
Modified: 2025-12-03
BDU:2025-14547
Уязвимость компонента DOM: Notifications браузеров Mozilla Firefox и Firefox ESR, позволяющая нарушителю обойти существующие ограничения безопасности
Modified: 2025-12-03
BDU:2025-14548
Уязвимость компонента JavaScript: WebAssembly браузеров Mozilla Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-12-26
BDU:2025-14549
Уязвимость браузеров Mozilla Firefox и Firefox ESR, связанная с ошибками представления информации пользовательским интерфейсом, позволяющая нарушителю проводить спуфинг-атаки
Modified: 2025-12-26
BDU:2025-14550
Уязвимость компонента Audio/Video браузеров Mozilla Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-12-26
BDU:2025-14551
Уязвимость компонента Graphics браузеров Mozilla Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код
Modified: 2025-12-26
BDU:2025-14552
Уязвимость компонента DOM: Core & HTML браузеров Mozilla Firefox и Firefox ESR, позволяющая нарушителю обойти существующие ограничения безопасности
Modified: 2025-11-19
CVE-2025-13012
Race condition in the Graphics component. This vulnerability affects Firefox < 145, Firefox ESR < 140.5, Firefox ESR < 115.30, Thunderbird < 145, and Thunderbird < 140.5.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1991458
- https://www.mozilla.org/security/advisories/mfsa2025-87/
- https://www.mozilla.org/security/advisories/mfsa2025-88/
- https://www.mozilla.org/security/advisories/mfsa2025-89/
- https://www.mozilla.org/security/advisories/mfsa2025-90/
- https://www.mozilla.org/security/advisories/mfsa2025-91/
Modified: 2025-11-19
CVE-2025-13013
Mitigation bypass in the DOM: Core & HTML component. This vulnerability affects Firefox < 145, Firefox ESR < 140.5, Firefox ESR < 115.30, Thunderbird < 145, and Thunderbird < 140.5.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1991945
- https://www.mozilla.org/security/advisories/mfsa2025-87/
- https://www.mozilla.org/security/advisories/mfsa2025-88/
- https://www.mozilla.org/security/advisories/mfsa2025-89/
- https://www.mozilla.org/security/advisories/mfsa2025-90/
- https://www.mozilla.org/security/advisories/mfsa2025-91/
Modified: 2025-11-19
CVE-2025-13014
Use-after-free in the Audio/Video component. This vulnerability affects Firefox < 145, Firefox ESR < 140.5, Firefox ESR < 115.30, Thunderbird < 145, and Thunderbird < 140.5.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1994241
- https://www.mozilla.org/security/advisories/mfsa2025-87/
- https://www.mozilla.org/security/advisories/mfsa2025-88/
- https://www.mozilla.org/security/advisories/mfsa2025-89/
- https://www.mozilla.org/security/advisories/mfsa2025-90/
- https://www.mozilla.org/security/advisories/mfsa2025-91/
Modified: 2025-11-19
CVE-2025-13015
Spoofing issue in Firefox. This vulnerability affects Firefox < 145, Firefox ESR < 140.5, Firefox ESR < 115.30, Thunderbird < 145, and Thunderbird < 140.5.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1994164
- https://www.mozilla.org/security/advisories/mfsa2025-87/
- https://www.mozilla.org/security/advisories/mfsa2025-88/
- https://www.mozilla.org/security/advisories/mfsa2025-89/
- https://www.mozilla.org/security/advisories/mfsa2025-90/
- https://www.mozilla.org/security/advisories/mfsa2025-91/
Modified: 2025-11-25
CVE-2025-13016
Incorrect boundary conditions in the JavaScript: WebAssembly component. This vulnerability affects Firefox < 145, Firefox ESR < 140.5, Thunderbird < 145, and Thunderbird < 140.5.
Modified: 2025-11-19
CVE-2025-13017
Same-origin policy bypass in the DOM: Notifications component. This vulnerability affects Firefox < 145, Firefox ESR < 140.5, Thunderbird < 145, and Thunderbird < 140.5.
Modified: 2025-11-19
CVE-2025-13018
Mitigation bypass in the DOM: Security component. This vulnerability affects Firefox < 145, Firefox ESR < 140.5, Thunderbird < 145, and Thunderbird < 140.5.
Modified: 2025-11-19
CVE-2025-13019
Same-origin policy bypass in the DOM: Workers component. This vulnerability affects Firefox < 145, Firefox ESR < 140.5, Thunderbird < 145, and Thunderbird < 140.5.
Modified: 2025-11-19
CVE-2025-13020
Use-after-free in the WebRTC: Audio/Video component. This vulnerability affects Firefox < 145, Firefox ESR < 140.5, Thunderbird < 145, and Thunderbird < 140.5.
Closed bugs
Не предоставляет x-www-browser
Closed vulnerabilities
Modified: 2025-12-03
BDU:2025-14613
Уязвимость функции png_image_finish_read() библиотеки для работы с растровой графикой в формате PNG libpng, позволяющая нарушителю выполнить произвольный код
Modified: 2025-11-26
CVE-2025-64505
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to version 1.6.51, a heap buffer over-read vulnerability exists in libpng's png_do_quantize function when processing PNG files with malformed palette indices. The vulnerability occurs when palette_lookup array bounds are not validated against externally-supplied image data, allowing an attacker to craft a PNG file with out-of-range palette indices that trigger out-of-bounds memory access. This issue has been patched in version 1.6.51.
Modified: 2025-11-26
CVE-2025-64506
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, a heap buffer over-read vulnerability exists in libpng's png_write_image_8bit function when processing 8-bit images through the simplified write API with convert_to_8bit enabled. The vulnerability affects 8-bit grayscale+alpha, RGB/RGBA, and images with incomplete row data. A conditional guard incorrectly allows 8-bit input to enter code expecting 16-bit input, causing reads up to 2 bytes beyond allocated buffer boundaries. This issue has been patched in version 1.6.51.
Modified: 2025-11-26
CVE-2025-64720
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, an out-of-bounds read vulnerability exists in png_image_read_composite when processing palette images with PNG_FLAG_OPTIMIZE_ALPHA enabled. The palette compositing code in png_init_read_transformations incorrectly applies background compositing during premultiplication, violating the invariant component ≤ alpha × 257 required by the simplified PNG API. This issue has been patched in version 1.6.51.
- https://github.com/pnggroup/libpng/commit/08da33b4c88cfcd36e5a706558a8d7e0e4773643
- https://github.com/pnggroup/libpng/issues/686
- https://github.com/pnggroup/libpng/pull/751
- https://github.com/pnggroup/libpng/security/advisories/GHSA-hfc7-ph9c-wcww
- https://github.com/pnggroup/libpng/security/advisories/GHSA-hfc7-ph9c-wcww
Modified: 2025-11-26
CVE-2025-65018
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, there is a heap buffer overflow vulnerability in the libpng simplified API function png_image_finish_read when processing 16-bit interlaced PNGs with 8-bit output format. Attacker-crafted interlaced PNG files cause heap writes beyond allocated buffer bounds. This issue has been patched in version 1.6.51.
- https://github.com/pnggroup/libpng/commit/16b5e3823918840aae65c0a6da57c78a5a496a4d
- https://github.com/pnggroup/libpng/commit/218612ddd6b17944e21eda56caf8b4bf7779d1ea
- https://github.com/pnggroup/libpng/issues/755
- https://github.com/pnggroup/libpng/pull/757
- https://github.com/pnggroup/libpng/security/advisories/GHSA-7wv6-48j4-hj3g
- https://github.com/pnggroup/libpng/issues/755
- https://github.com/pnggroup/libpng/security/advisories/GHSA-7wv6-48j4-hj3g
Closed vulnerabilities
Modified: 2025-03-05
BDU:2022-06588
Уязвимость реализации функции malloc() библиотеки shapelib, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-05-13
CVE-2022-0699
A double-free condition exists in contrib/shpsort.c of shapelib 1.5.0 and older releases. This issue may allow an attacker to cause a denial of service or have other unspecified impact via control over malloc.
Closed vulnerabilities
Modified: 2025-08-26
CVE-2025-2337
A vulnerability, which was classified as critical, has been found in tbeu matio 1.5.28. This issue affects the function Mat_VarPrint of the file src/mat.c. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Modified: 2025-08-27
CVE-2025-2338
A vulnerability, which was classified as critical, was found in tbeu matio 1.5.28. Affected is the function strdup_vprintf of the file src/io.c. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.