ALT-PU-2018-1508-1
Package firefox-esr updated to version 52.7.3-alt0.M80C.1 for branch c8 in task 203029.
Closed vulnerabilities
                                                                                    Published: 2018-06-11
                                                                                    
                                                                                
                                                                            BDU:2021-04143
Уязвимость браузеров Mozilla Firefox, Firefox ESR, связанная с использованием памяти после ее освобождения, позволяющая нарушителю выполнить произвольный код
                                                                                        
                                                                                        
                                                                                            Severity: CRITICAL (9.8)
                                                                                        
                                                                                        
                                                                                        
                                                                                        
                                                                                            Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
                                                                                        
                                                                                        
                                                                                    
                                                                                
                                                                                        
                                                                                        
                                                                                            Severity: CRITICAL (10.0)
                                                                                        
                                                                                        
                                                                                        
                                                                                        
                                                                                            Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
                                                                                        
                                                                                        
                                                                                    
                                                                                References:
                                                                        
                                                                        
                                                                    
                                                                                    Published: 2018-06-11
Modified: 2024-11-21
                                                                            Modified: 2024-11-21
CVE-2018-5148
A use-after-free vulnerability can occur in the compositor during certain graphics operations when a raw pointer is used instead of a reference counted one. This results in a potentially exploitable crash. This vulnerability affects Firefox ESR < 52.7.3 and Firefox < 59.0.2.
                                                                                        
                                                                                        
                                                                                            Severity: HIGH (7.5)
                                                                                        
                                                                                        
                                                                                        
                                                                                        
                                                                                            Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
                                                                                        
                                                                                        
                                                                                    
                                                                                
                                                                                        
                                                                                        
                                                                                            Severity: CRITICAL (9.8)
                                                                                        
                                                                                        
                                                                                        
                                                                                        
                                                                                            Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
                                                                                        
                                                                                        
                                                                                    
                                                                                References:
                                                                        - http://www.securityfocus.com/bid/103506
- http://www.securitytracker.com/id/1040574
- https://access.redhat.com/errata/RHSA-2018:1098
- https://access.redhat.com/errata/RHSA-2018:1099
- https://bugzilla.mozilla.org/show_bug.cgi?id=1440717
- https://lists.debian.org/debian-lts-announce/2018/03/msg00023.html
- https://usn.ubuntu.com/3609-1/
- https://www.debian.org/security/2018/dsa-4153
- https://www.mozilla.org/security/advisories/mfsa2018-10/
- http://www.securityfocus.com/bid/103506
- http://www.securitytracker.com/id/1040574
- https://access.redhat.com/errata/RHSA-2018:1098
- https://access.redhat.com/errata/RHSA-2018:1099
- https://bugzilla.mozilla.org/show_bug.cgi?id=1440717
- https://lists.debian.org/debian-lts-announce/2018/03/msg00023.html
- https://usn.ubuntu.com/3609-1/
- https://www.debian.org/security/2018/dsa-4153
- https://www.mozilla.org/security/advisories/mfsa2018-10/
