Summary: | <www-client/firefox{-bin,}-120.0:rapid <www-client/firefox{-bin,}-115.5.0:esr: multiple vulnerabilities | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Christopher Fore <csfore> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | mozilla |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | A2 [glsa+] | ||
Package list: | Runtime testing required: | --- |
Description
Christopher Fore
2023-11-24 21:19:38 UTC
(In reply to Christopher Fore from comment #0) > Note: I cannot access any of the bugs listed below, they are taken from > their advisory link. > > Advisory posts: > > FireFox Rapid: > https://www.mozilla.org/en-US/security/advisories/mfsa2023-49/ > > FireFox ESR: > https://www.mozilla.org/en-US/security/advisories/mfsa2023-50/ > > Thunderbird: > https://www.mozilla.org/en-US/security/advisories/mfsa2023-52/ > > CVE-2023-6304 (https://bugzilla.mozilla.org/show_bug.cgi?id=1841050): > > On some systems—depending on the graphics settings and drivers—it was > possible to force an out-of-bounds read and leak memory data into the images > created on the canvas element. This vulnerability affects Firefox < 120, > Firefox ESR < 115.5.0, and Thunderbird < 115.5. > > CVE-2023-6205 (https://bugzilla.mozilla.org/show_bug.cgi?id=1854076): > > It was possible to cause the use of a MessagePort after it had already been > freed, which could potentially have led to an exploitable crash. This > vulnerability affects Firefox < 120, Firefox ESR < 115.5.0, and Thunderbird > < 115.5. > > CVE-2023-6206 (https://bugzilla.mozilla.org/show_bug.cgi?id=1857430): > > The black fade animation when exiting fullscreen is roughly the length of > the anti-clickjacking delay on permission prompts. It was possible to use > this fact to surprise users by luring them to click where the permission > grant button would be about to appear. This vulnerability affects Firefox < > 120, Firefox ESR < 115.5.0, and Thunderbird < 115.5. > > CVE-2023-6207 (https://bugzilla.mozilla.org/show_bug.cgi?id=1861344): > > Ownership mismanagement led to a use-after-free in ReadableByteStreams This > vulnerability affects Firefox < 120, Firefox ESR < 115.5.0, and Thunderbird > < 115.5. > > CVE-2023-6208 (https://bugzilla.mozilla.org/show_bug.cgi?id=1855345): > > When using X11, text selected by the page using the Selection API was > erroneously copied into the primary selection, a temporary storage not > unlike the clipboard. *This bug only affects Firefox on X11. Other systems > are unaffected.* This vulnerability affects Firefox < 120, Firefox ESR < > 115.5.0, and Thunderbird < 115.5. > > CVE-2023-6209 (https://bugzilla.mozilla.org/show_bug.cgi?id=1858570): > > Relative URLs starting with three slashes were incorrectly parsed, and a > path-traversal "/../" part in the path could be used to override the > specified host. This could contribute to security problems in web sites. > This vulnerability affects Firefox < 120, Firefox ESR < 115.5.0, and > Thunderbird < 115.5. > > CVE-2023-6210 (https://bugzilla.mozilla.org/show_bug.cgi?id=1801501): > > When an https: web page created a pop-up from a "javascript:" URL, that > pop-up was incorrectly allowed to load blockable content such as iframes > from insecure http: URLs This vulnerability affects Firefox < 120. > > CVE-2023-6211 (https://bugzilla.mozilla.org/show_bug.cgi?id=1850200): > > If an attacker needed a user to load an insecure http: page and knew that > user had enabled HTTPS-only mode, the attacker could have tricked the user > into clicking to grant an HTTPS-only exception if they could get the user to > participate in a clicking game. This vulnerability affects Firefox < 120. > > CVE-2023-6212 > (https://bugzilla.mozilla.org/buglist. > cgi?bug_id=1658432%2C1820983%2C1829252%2C1856072%2C1856091%2C1859030%2C186094 > 3%2C1862782): > > Memory safety bugs present in Firefox 119, Firefox ESR 115.4, and > Thunderbird 115.4. Some of these bugs showed evidence of memory corruption > and we presume that with enough effort some of these could have been > exploited to run arbitrary code. This vulnerability affects Firefox < 120, > Firefox ESR < 115.5.0, and Thunderbird < 115.5. > > CVE-2023-6213 > (https://bugzilla.mozilla.org/buglist. > cgi?bug_id=1849265%2C1851118%2C1854911): > > Memory safety bugs present in Firefox 119. Some of these bugs showed > evidence of memory corruption and we presume that with enough effort some of > these could have been exploited to run arbitrary code. CVE-2023-6304 -> CVE-2023-6204 Thank you for filing! Popping out Thunderbird into its own bug since the vulnerabilities between Firefox and Thunderbird are sometimes unique (plus the tracker for the common vulnerabilites)... Got it! I'll remember that for next time! The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/data/glsa.git/commit/?id=22d7e8b6c0209c137d7f713d8d1e090906f7cf58 commit 22d7e8b6c0209c137d7f713d8d1e090906f7cf58 Author: GLSAMaker <glsamaker@gentoo.org> AuthorDate: 2024-01-07 09:38:31 +0000 Commit: Hans de Graaff <graaff@gentoo.org> CommitDate: 2024-01-07 09:39:06 +0000 [ GLSA 202401-10 ] Mozilla Firefox: Multiple Vulnerabilities Bug: https://bugs.gentoo.org/908245 Bug: https://bugs.gentoo.org/914073 Bug: https://bugs.gentoo.org/918433 Bug: https://bugs.gentoo.org/920507 Signed-off-by: GLSAMaker <glsamaker@gentoo.org> Signed-off-by: Hans de Graaff <graaff@gentoo.org> glsa-202401-10.xml | 134 +++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 134 insertions(+) |