ALT-BU-2025-3420-2
Branch c10f2 update bulletin.
Closed vulnerabilities
BDU:2015-01936
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-01937
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-01938
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-03440
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-03441
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-03442
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06549
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06550
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06551
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06552
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06553
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06554
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06555
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2022-01774
Уязвимость компонента nmakehlp.c языка программирования Tcl, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2007-2877
Buffer overflow in tcl/win/tclWinReg.c in Tcl (Tcl/Tk) before 8.5a6 allows local users to gain privileges via long registry key paths.
- 36528
- 36528
- 25401
- 25401
- http://sourceforge.net/project/shownotes.php?group_id=10894&release_id=503937
- http://sourceforge.net/project/shownotes.php?group_id=10894&release_id=503937
- http://sourceforge.net/tracker/index.php?func=detail&aid=1682211&group_id=10894&atid=110894
- http://sourceforge.net/tracker/index.php?func=detail&aid=1682211&group_id=10894&atid=110894
- tcl-tclwinreg-bo(34515)
- tcl-tclwinreg-bo(34515)
Modified: 2024-11-21
CVE-2007-4769
The regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows remote authenticated users to cause a denial of service (backend crash) via an out-of-bounds backref number.
- HPSBTU02325
- HPSBTU02325
- SSRT080006
- SSRT080006
- SUSE-SA:2008:005
- SUSE-SA:2008:005
- 28359
- 28359
- 28376
- 28376
- 28437
- 28437
- 28438
- 28438
- 28454
- 28454
- 28455
- 28455
- 28464
- 28464
- 28477
- 28477
- 28479
- 28479
- 28679
- 28679
- 28698
- 28698
- 29638
- 29638
- GLSA-200801-15
- GLSA-200801-15
- 1019157
- 1019157
- http://sourceforge.net/project/shownotes.php?release_id=565440&group_id=10894
- http://sourceforge.net/project/shownotes.php?release_id=565440&group_id=10894
- http://sourceforge.net/tracker/index.php?func=detail&aid=1810264&group_id=10894&atid=110894
- http://sourceforge.net/tracker/index.php?func=detail&aid=1810264&group_id=10894&atid=110894
- 103197
- 103197
- 200559
- 200559
- DSA-1460
- DSA-1460
- DSA-1463
- DSA-1463
- MDVSA-2008:004
- MDVSA-2008:004
- http://www.postgresql.org/about/news.905
- http://www.postgresql.org/about/news.905
- RHSA-2008:0038
- RHSA-2008:0038
- RHSA-2008:0040
- RHSA-2008:0040
- 20080107 PostgreSQL 2007-01-07 Cumulative Security Release
- 20080107 PostgreSQL 2007-01-07 Cumulative Security Release
- 20080115 rPSA-2008-0016-1 postgresql postgresql-server
- 20080115 rPSA-2008-0016-1 postgresql postgresql-server
- 27163
- 27163
- ADV-2008-0061
- ADV-2008-0061
- ADV-2008-0109
- ADV-2008-0109
- ADV-2008-1071
- ADV-2008-1071
- postgresql-backref-dos(39499)
- postgresql-backref-dos(39499)
- https://issues.rpath.com/browse/RPL-1768
- https://issues.rpath.com/browse/RPL-1768
- oval:org.mitre.oval:def:9804
- oval:org.mitre.oval:def:9804
- USN-568-1
- USN-568-1
- FEDORA-2008-0478
- FEDORA-2008-0478
- FEDORA-2008-0552
- FEDORA-2008-0552
Modified: 2024-11-21
CVE-2007-5137
Buffer overflow in the ReadImage function in generic/tkImgGIF.c in Tcl (Tcl/Tk) 8.4.13 through 8.4.15 allows remote attackers to execute arbitrary code via multi-frame interlaced GIF files in which later frames are smaller than the first. NOTE: this issue is due to an incorrect patch for CVE-2007-5378.
- http://bugs.gentoo.org/show_bug.cgi?id=192539
- http://bugs.gentoo.org/show_bug.cgi?id=192539
- 26942
- 26942
- 27086
- 27086
- 27182
- 27182
- 27207
- 27207
- 27229
- 27229
- 27295
- 27295
- 29069
- 29069
- 34297
- 34297
- GLSA-200710-07
- GLSA-200710-07
- http://sourceforge.net/project/shownotes.php?release_id=541207
- http://sourceforge.net/project/shownotes.php?release_id=541207
- 20071012 clarification on multiple Tk overflow issues
- 20071012 clarification on multiple Tk overflow issues
- DSA-1743
- DSA-1743
- MDKSA-2007:200
- MDKSA-2007:200
- SUSE-SR:2007:020
- SUSE-SR:2007:020
- RHSA-2008:0136
- RHSA-2008:0136
- 25826
- 25826
- USN-529-1
- USN-529-1
- oval:org.mitre.oval:def:9540
- oval:org.mitre.oval:def:9540
- FEDORA-2007-2564
- FEDORA-2007-2564
Modified: 2024-11-21
CVE-2007-6067
Algorithmic complexity vulnerability in the regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows remote authenticated users to cause a denial of service (memory consumption) via a crafted "complex" regular expression with doubly-nested states.
- HPSBTU02325
- HPSBTU02325
- SSRT080006
- SSRT080006
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- SUSE-SA:2008:005
- SUSE-SA:2008:005
- RHSA-2013:0122
- RHSA-2013:0122
- 28359
- 28359
- 28376
- 28376
- 28437
- 28437
- 28438
- 28438
- 28454
- 28454
- 28455
- 28455
- 28464
- 28464
- 28477
- 28477
- 28479
- 28479
- 28679
- 28679
- 28698
- 28698
- 29638
- 29638
- GLSA-200801-15
- GLSA-200801-15
- 1019157
- 1019157
- http://sourceforge.net/project/shownotes.php?release_id=565440&group_id=10894
- http://sourceforge.net/project/shownotes.php?release_id=565440&group_id=10894
- http://sourceforge.net/tracker/index.php?func=detail&aid=1810264&group_id=10894&atid=110894
- http://sourceforge.net/tracker/index.php?func=detail&aid=1810264&group_id=10894&atid=110894
- 103197
- 103197
- 200559
- 200559
- DSA-1460
- DSA-1460
- DSA-1463
- DSA-1463
- MDVSA-2008:004
- MDVSA-2008:004
- http://www.postgresql.org/about/news.905
- http://www.postgresql.org/about/news.905
- RHSA-2008:0038
- RHSA-2008:0038
- RHSA-2008:0040
- RHSA-2008:0040
- 20080107 PostgreSQL 2007-01-07 Cumulative Security Release
- 20080107 PostgreSQL 2007-01-07 Cumulative Security Release
- 20080115 rPSA-2008-0016-1 postgresql postgresql-server
- 20080115 rPSA-2008-0016-1 postgresql postgresql-server
- 27163
- 27163
- ADV-2008-0061
- ADV-2008-0061
- ADV-2008-0109
- ADV-2008-0109
- ADV-2008-1071
- ADV-2008-1071
- postgresql-complex-expression-dos(39498)
- postgresql-complex-expression-dos(39498)
- https://issues.rpath.com/browse/RPL-1768
- https://issues.rpath.com/browse/RPL-1768
- oval:org.mitre.oval:def:10235
- oval:org.mitre.oval:def:10235
- USN-568-1
- USN-568-1
- FEDORA-2008-0478
- FEDORA-2008-0478
- FEDORA-2008-0552
- FEDORA-2008-0552
Modified: 2024-11-21
CVE-2008-0553
Stack-based buffer overflow in the ReadImage function in tkImgGIF.c in Tk (Tcl/Tk) before 8.5.1 allows remote attackers to execute arbitrary code via a crafted GIF image, a similar issue to CVE-2006-4484.
- SUSE-SR:2008:008
- SUSE-SR:2008:008
- 28784
- 28784
- 28807
- 28807
- 28848
- 28848
- 28857
- 28857
- 28867
- 28867
- 28954
- 28954
- 29069
- 29069
- 29070
- 29070
- 29622
- 29622
- 30129
- 30129
- 30188
- 30188
- 30535
- 30535
- 30717
- 30717
- 30783
- 30783
- 32608
- 32608
- 1019309
- 1019309
- http://sourceforge.net/project/shownotes.php?release_id=573933&group_id=10894
- http://sourceforge.net/project/shownotes.php?release_id=573933&group_id=10894
- 237465
- 237465
- USN-664-1
- USN-664-1
- http://wiki.rpath.com/Advisories:rPSA-2008-0054
- http://wiki.rpath.com/Advisories:rPSA-2008-0054
- DSA-1490
- DSA-1490
- DSA-1491
- DSA-1491
- DSA-1598
- DSA-1598
- MDVSA-2008:041
- MDVSA-2008:041
- SUSE-SR:2008:013
- SUSE-SR:2008:013
- RHSA-2008:0134
- RHSA-2008:0134
- RHSA-2008:0135
- RHSA-2008:0135
- RHSA-2008:0136
- RHSA-2008:0136
- 20080212 rPSA-2008-0054-1 tk
- 20080212 rPSA-2008-0054-1 tk
- 20080604 VMSA-2008-0009 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion, VMware Server, VMware VIX API, VMware ESX, VMware ESXi resolve critical security issues
- 20080604 VMSA-2008-0009 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion, VMware Server, VMware VIX API, VMware ESX, VMware ESXi resolve critical security issues
- 27655
- 27655
- http://www.vmware.com/security/advisories/VMSA-2008-0009.html
- http://www.vmware.com/security/advisories/VMSA-2008-0009.html
- ADV-2008-0430
- ADV-2008-0430
- ADV-2008-1456
- ADV-2008-1456
- ADV-2008-1744
- ADV-2008-1744
- https://bugzilla.redhat.com/show_bug.cgi?id=431518
- https://bugzilla.redhat.com/show_bug.cgi?id=431518
- https://issues.rpath.com/browse/RPL-2215
- https://issues.rpath.com/browse/RPL-2215
- oval:org.mitre.oval:def:10098
- oval:org.mitre.oval:def:10098
- FEDORA-2008-1323
- FEDORA-2008-1323
- FEDORA-2008-1131
- FEDORA-2008-1131
- FEDORA-2008-1122
- FEDORA-2008-1122
- FEDORA-2008-1384
- FEDORA-2008-1384
- FEDORA-2008-3545
- FEDORA-2008-3545
Modified: 2024-11-21
CVE-2021-35331
In Tcl 8.6.11, a format string vulnerability in nmakehlp.c might allow code execution via a crafted file. NOTE: multiple third parties dispute the significance of this finding
- https://core.tcl-lang.org/tcl/info/28ef6c0c741408a2
- https://core.tcl-lang.org/tcl/info/28ef6c0c741408a2
- https://core.tcl-lang.org/tcl/info/bad6cc213dfe8280
- https://core.tcl-lang.org/tcl/info/bad6cc213dfe8280
- https://github.com/tcltk/tcl/commit/4705dbdde2f32ff90420765cd93e7ac71d81a222
- https://github.com/tcltk/tcl/commit/4705dbdde2f32ff90420765cd93e7ac71d81a222
- https://sqlite.org/forum/info/7dcd751996c93ec9
- https://sqlite.org/forum/info/7dcd751996c93ec9
Package thunderbird updated to version 128.6.0-alt0.p10.1 for branch c10f2 in task 375167.
Closed vulnerabilities
BDU:2024-10431
Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю выполнить DOM Based XSS-атаку
BDU:2024-10450
Уязвимость окна подтверждения "Открыть исполняемый файл" браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код
BDU:2024-10453
Уязвимость компонента Apple GPU Driver браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код
BDU:2024-10454
Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с некорректным ограничением визуализированных слоев пользовательского интерфейса, позволяющая нарушителю проводить спуфинг-атаки
BDU:2024-10456
Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с некорректным ограничением визуализированных слоев пользовательского интерфейса, позволяющая нарушителю проводить спуфинг-атаки
BDU:2024-10457
Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с некорректным ограничением визуализированных слоев пользовательского интерфейса, позволяющая нарушителю проводить спуфинг-атаки
BDU:2024-10459
Уязвимость функции loadManifestFromFile браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю обойти ограничения безопасности
BDU:2025-00116
Уязвимость реализации стандарта шифрования электронной почты OpenPGP почтового клиента Mozilla Thunderbird, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2025-00154
Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с использованием памяти после ее освобождения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-00156
Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2025-00209
Уязвимость полноэкранного режима браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird операционных систем Mac OS, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-00212
Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с неверным управлением генерацией кода, позволяющая нарушителю выполнить произвольный код
Modified: 2024-12-06
CVE-2024-11159
Using remote content in OpenPGP encrypted messages can lead to the disclosure of plaintext. This vulnerability affects Thunderbird < 128.4.3 and Thunderbird < 132.0.1.
Modified: 2025-01-06
CVE-2024-11691
Certain WebGL operations on Apple silicon M series devices could have lead to an out-of-bounds write and memory corruption due to a flaw in Apple's GPU driver. *This bug only affected the application on Apple M series hardware. Other platforms were unaffected.* This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Firefox ESR < 115.18, Thunderbird < 133, Thunderbird < 128.5, and Thunderbird < 115.18.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1914707
- https://bugzilla.mozilla.org/show_bug.cgi?id=1924184
- https://www.mozilla.org/security/advisories/mfsa2024-63/
- https://www.mozilla.org/security/advisories/mfsa2024-64/
- https://www.mozilla.org/security/advisories/mfsa2024-65/
- https://www.mozilla.org/security/advisories/mfsa2024-67/
- https://www.mozilla.org/security/advisories/mfsa2024-68/
- https://www.mozilla.org/security/advisories/mfsa2024-70/
Modified: 2025-04-03
CVE-2024-11692
An attacker could cause a select dropdown to be shown over another tab; this could have led to user confusion and possible spoofing attacks. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5.
Modified: 2025-04-03
CVE-2024-11693
The executable file warning was not presented when downloading .library-ms files. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.* This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5.
Modified: 2024-12-13
CVE-2024-11694
Enhanced Tracking Protection's Strict mode may have inadvertently allowed a CSP `frame-src` bypass and DOM-based XSS through the Google SafeFrame shim in the Web Compatibility extension. This issue could have exposed users to malicious frames masquerading as legitimate content. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Firefox ESR < 115.18, Thunderbird < 133, Thunderbird < 128.5, and Thunderbird < 115.18.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1924167
- https://www.mozilla.org/security/advisories/mfsa2024-63/
- https://www.mozilla.org/security/advisories/mfsa2024-64/
- https://www.mozilla.org/security/advisories/mfsa2024-65/
- https://www.mozilla.org/security/advisories/mfsa2024-67/
- https://www.mozilla.org/security/advisories/mfsa2024-68/
- https://www.mozilla.org/security/advisories/mfsa2024-70/
Modified: 2025-04-03
CVE-2024-11695
A crafted URL containing Arabic script and whitespace characters could have hidden the true origin of the page, resulting in a potential spoofing attack. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5.
Modified: 2024-12-02
CVE-2024-11696
The application failed to account for exceptions thrown by the `loadManifestFromFile` method during add-on signature verification. This flaw, triggered by an invalid or unsupported extension manifest, could have caused runtime errors that disrupted the signature validation process. As a result, the enforcement of signature validation for unrelated add-ons may have been bypassed. Signature validation in this context is used to ensure that third-party applications on the user's computer have not tampered with the user's extensions, limiting the impact of this issue. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5.
Modified: 2025-04-03
CVE-2024-11697
When handling keypress events, an attacker may have been able to trick a user into bypassing the "Open Executable File?" confirmation dialog. This could have led to malicious code execution. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5.
Modified: 2024-11-27
CVE-2024-11698
A flaw in handling fullscreen transitions may have inadvertently caused the application to become stuck in fullscreen mode when a modal dialog was opened during the transition. This issue left users unable to exit fullscreen mode using standard actions like pressing "Esc" or accessing right-click menus, resulting in a disrupted browsing experience until the browser is restarted. *This bug only affects the application when running on macOS. Other operating systems are unaffected.* This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5.
Modified: 2025-04-03
CVE-2024-11699
Memory safety bugs present in Firefox 132, Firefox ESR 128.4, and Thunderbird 128.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5.
- Memory safety bugs fixed in Firefox 133, Firefox ESR 128.5, and Thunderbird 128.5
- https://www.mozilla.org/security/advisories/mfsa2024-63/
- https://www.mozilla.org/security/advisories/mfsa2024-64/
- https://www.mozilla.org/security/advisories/mfsa2024-67/
- https://www.mozilla.org/security/advisories/mfsa2024-68/
Modified: 2024-11-13
CVE-2024-50336
matrix-js-sdk is a Matrix messaging protocol Client-Server SDK for JavaScript. matrix-js-sdk before 34.11.0 is vulnerable to client-side path traversal via crafted MXC URIs. A malicious room member can trigger clients based on the matrix-js-sdk to issue arbitrary authenticated GET requests to the client's homeserver. Fixed in matrix-js-sdk 34.11.1.
Modified: 2025-04-03
CVE-2025-0237
The WebChannel API, which is used to transport various information across processes, did not check the sending principal but rather accepted the principal being sent. This could have led to privilege escalation attacks. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird < 128.6.
Modified: 2025-04-03
CVE-2025-0238
Assuming a controlled failed memory allocation, an attacker could have caused a use-after-free, leading to a potentially exploitable crash. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Firefox ESR < 115.19, Thunderbird < 134, and Thunderbird < 128.6.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1915535
- https://www.mozilla.org/security/advisories/mfsa2025-01/
- https://www.mozilla.org/security/advisories/mfsa2025-02/
- https://www.mozilla.org/security/advisories/mfsa2025-03/
- https://www.mozilla.org/security/advisories/mfsa2025-04/
- https://www.mozilla.org/security/advisories/mfsa2025-05/
Modified: 2025-04-03
CVE-2025-0239
When using Alt-Svc, ALPN did not properly validate certificates when the original server is redirecting to an insecure site. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird < 128.6.
Modified: 2025-04-03
CVE-2025-0240
Parsing a JavaScript module as JSON could, under some circumstances, cause cross-compartment access, which may result in a use-after-free. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird < 128.6.
Modified: 2025-04-03
CVE-2025-0241
When segmenting specially crafted text, segmentation would corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird < 128.6.
Modified: 2025-04-03
CVE-2025-0242
Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ESR 115.18, Firefox ESR 128.5, Thunderbird 115.18, and Thunderbird 128.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Firefox ESR < 115.19, Thunderbird < 134, and Thunderbird < 128.6.
- Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19, and Thunderbird 128.6
- https://www.mozilla.org/security/advisories/mfsa2025-01/
- https://www.mozilla.org/security/advisories/mfsa2025-02/
- https://www.mozilla.org/security/advisories/mfsa2025-03/
- https://www.mozilla.org/security/advisories/mfsa2025-04/
- https://www.mozilla.org/security/advisories/mfsa2025-05/
Modified: 2025-04-03
CVE-2025-0243
Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird < 128.6.
- Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 128.6, and Thunderbird 128.6
- https://www.mozilla.org/security/advisories/mfsa2025-01/
- https://www.mozilla.org/security/advisories/mfsa2025-02/
- https://www.mozilla.org/security/advisories/mfsa2025-04/
- https://www.mozilla.org/security/advisories/mfsa2025-05/
Closed bugs
Дублируется строка в окне настройки имеющейся уч.записи