ALT-PU-2023-1386-1
Package firefox-esr updated to version 102.8.0-alt1 for branch sisyphus in task 316235.
Closed vulnerabilities
BDU:2023-01262
Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR, связанная с копирование в буфер без проверки размера входных данных, позволяющая нарушителю выполнять произвольный код в целевой системе
BDU:2023-01263
Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR, почтового клиента Mozilla Thunderbird, связанная с ошибками при импорте открытого ключа SPKI RSA в качестве ECDSA P-256, позволяющая нарушителю привести к сбою вкладки
BDU:2023-01264
Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR, почтового клиента Mozilla Thunderbird, связанная с недопустимым понижение из nsTextNode в SVGElement, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2023-01265
Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR, почтового клиента Mozilla Thunderbird, связанная с неправильным ограничением отображаемых слоев или фреймов пользовательского интерфейса, позволяющая нарушителю получить доступ к конфиденциальной информации
BDU:2023-01266
Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR, почтового клиента Mozilla Thunderbird, связанная с использованием памяти после ее освобождения, позволяющая нарушителю хранить объекты из других разделов в основном разделе
BDU:2023-01267
Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR, почтового клиента Mozilla Thunderbird, связанная с тем, что при кодировании данных из "InputStream" в "xpcom" размер кодируемых входных данных будет неправильно рассчитан, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2023-01268
Уязвимость браузеров Mozilla Firefox ESR, почтового клиента Mozilla Thunderbird, связанная с копирование в буфер без проверки размера входных данных, позволяющая нарушителю выполнять произвольный код в целевой системе
BDU:2023-01269
Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR, почтового клиента Mozilla Thunderbird, связанная с использованием памяти после освобождения, позволяющая нарушителю выполнить произвольный код
BDU:2023-01270
Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR, почтового клиента Mozilla Thunderbird, связанная с неправильным ограничением операций в пределах буфера памяти, позволяющая нарушителю запустить произвольную запись в память
BDU:2023-01271
Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR, почтового клиента Mozilla Thunderbird, связанная с неправильной нейтрализаций закодированных схем URI на веб-странице, позволяющая нарушителю загрузить файлы или взаимодействовать с программным обеспечением, уже установленным в системе
BDU:2023-01272
Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR, почтового клиента Mozilla Thunderbird, связанная с ошибками представления информации пользовательским интерфейсом, позволяющая нарушителю принудительно перевести браузер в полноэкранный режим
BDU:2023-01963
Уязвимость функций печати браузеров Firefox, Firefox ESR и почтового клиента Thunderbird операционных систем Windows, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2023-0767
An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes via PKCS 12 Safe Bag attributes being mishandled. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.
- https://alas.aws.amazon.com/AL2/ALAS-2023-1992.html
- https://alas.aws.amazon.com/AL2/ALAS-2023-1992.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1804640
- https://bugzilla.mozilla.org/show_bug.cgi?id=1804640
- https://security.netapp.com/advisory/ntap-20230324-0008/
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
Modified: 2025-01-10
CVE-2023-25728
The Content-Security-Policy-Report-Only
header could allow an attacker to leak a child iframe's unredacted URI when interaction with that iframe triggers a redirect. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1790345
- https://bugzilla.mozilla.org/show_bug.cgi?id=1790345
- https://bugzilla.mozilla.org/show_bug.cgi?id=1790345
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
Modified: 2025-01-10
CVE-2023-25729
Permission prompts for opening external schemes were only shown for ContentPrincipals
resulting in extensions being able to open them without user interaction via ExpandedPrincipals
. This could lead to further malicious actions such as downloading files or interacting with software already installed on the system. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1792138
- https://bugzilla.mozilla.org/show_bug.cgi?id=1792138
- https://bugzilla.mozilla.org/show_bug.cgi?id=1792138
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
Modified: 2025-01-10
CVE-2023-25730
A background script invoking requestFullscreen
and then blocking the main thread could force the browser into fullscreen mode indefinitely, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1794622
- https://bugzilla.mozilla.org/show_bug.cgi?id=1794622
- https://bugzilla.mozilla.org/show_bug.cgi?id=1794622
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
Modified: 2025-01-10
CVE-2023-25732
When encoding data from an inputStream
in xpcom
the size of the input being encoded was not correctly calculated potentially leading to an out of bounds memory write. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1804564
- https://bugzilla.mozilla.org/show_bug.cgi?id=1804564
- https://bugzilla.mozilla.org/show_bug.cgi?id=1804564
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
Modified: 2025-01-10
CVE-2023-25734
After downloading a Windows .url
shortcut from the local filesystem, an attacker could supply a remote path that would lead to unexpected network requests from the operating system. This also had the potential to leak NTLM credentials to the resource.
*This bug only affects Firefox on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1784451
- https://bugzilla.mozilla.org/show_bug.cgi?id=1784451
- https://bugzilla.mozilla.org/show_bug.cgi?id=1809923
- https://bugzilla.mozilla.org/show_bug.cgi?id=1809923
- https://bugzilla.mozilla.org/show_bug.cgi?id=1810143
- https://bugzilla.mozilla.org/show_bug.cgi?id=1810143
- https://bugzilla.mozilla.org/show_bug.cgi?id=1812338
- https://bugzilla.mozilla.org/show_bug.cgi?id=1812338
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
Modified: 2025-01-10
CVE-2023-25735
Cross-compartment wrappers wrapping a scripted proxy could have caused objects from other compartments to be stored in the main compartment resulting in a use-after-free after unwrapping the proxy. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1810711
- https://bugzilla.mozilla.org/show_bug.cgi?id=1810711
- https://bugzilla.mozilla.org/show_bug.cgi?id=1810711
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
Modified: 2025-01-09
CVE-2023-25737
An invalid downcast from nsTextNode
to SVGElement
could have lead to undefined behavior. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1811464
- https://bugzilla.mozilla.org/show_bug.cgi?id=1811464
- https://bugzilla.mozilla.org/show_bug.cgi?id=1811464
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
Modified: 2025-01-09
CVE-2023-25738
Members of the DEVMODEW
struct set by the printer device driver weren't being validated and could have resulted in invalid values which in turn would cause the browser to attempt out of bounds access to related variables.
*This bug only affects Firefox on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1811852
- https://bugzilla.mozilla.org/show_bug.cgi?id=1811852
- https://bugzilla.mozilla.org/show_bug.cgi?id=1811852
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
Modified: 2025-01-09
CVE-2023-25739
Module load requests that failed were not being checked as to whether or not they were cancelled causing a use-after-free in ScriptLoadContext
. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1811939
- https://bugzilla.mozilla.org/show_bug.cgi?id=1811939
- https://bugzilla.mozilla.org/show_bug.cgi?id=1811939
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
Modified: 2024-11-21
CVE-2023-25742
When importing a SPKI RSA public key as ECDSA P-256, the key would be handled incorrectly causing the tab to crash. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1813424
- https://bugzilla.mozilla.org/show_bug.cgi?id=1813424
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
Modified: 2024-11-21
CVE-2023-25744
Mmemory safety bugs present in Firefox 109 and Firefox ESR 102.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 110 and Firefox ESR < 102.8.
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1789449%2C1803628%2C1810536
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1789449%2C1803628%2C1810536
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
Modified: 2025-01-09
CVE-2023-25746
Memory safety bugs present in Firefox ESR 102.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 102.8 and Firefox ESR < 102.8.
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1544127%2C1762368
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1544127%2C1762368
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
- https://www.mozilla.org/security/advisories/mfsa2023-07/