Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 918433 (CVE-2023-3482, CVE-2023-37203, CVE-2023-37204, CVE-2023-37205, CVE-2023-37206, CVE-2023-37209, CVE-2023-37210, CVE-2023-37212, CVE-2023-4058, CVE-2023-4579, CVE-2023-5170, CVE-2023-5172, CVE-2023-5173, CVE-2023-5175, CVE-2023-5722, CVE-2023-5723, CVE-2023-5729, CVE-2023-5731, CVE-2023-5758, CVE-2023-6210, CVE-2023-6211, CVE-2023-6213) - <www-client/firefox{-bin,}-120.0:rapid <www-client/firefox{-bin,}-115.5.0:esr: multiple vulnerabilities
Summary: <www-client/firefox{-bin,}-120.0:rapid <www-client/firefox{-bin,}-115.5.0:esr...
Status: RESOLVED FIXED
Alias: CVE-2023-3482, CVE-2023-37203, CVE-2023-37204, CVE-2023-37205, CVE-2023-37206, CVE-2023-37209, CVE-2023-37210, CVE-2023-37212, CVE-2023-4058, CVE-2023-4579, CVE-2023-5170, CVE-2023-5172, CVE-2023-5173, CVE-2023-5175, CVE-2023-5722, CVE-2023-5723, CVE-2023-5729, CVE-2023-5731, CVE-2023-5758, CVE-2023-6210, CVE-2023-6211, CVE-2023-6213
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal major (vote)
Assignee: Gentoo Security
URL:
Whiteboard: A2 [glsa+]
Keywords:
Depends on:
Blocks:
 
Reported: 2023-11-24 21:19 UTC by Christopher Fore
Modified: 2024-01-07 09:41 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Christopher Fore 2023-11-24 21:19:38 UTC
Note: I cannot access any of the bugs listed below, they are taken from their advisory link.

Advisory posts:

FireFox Rapid:
https://www.mozilla.org/en-US/security/advisories/mfsa2023-49/

FireFox ESR:
https://www.mozilla.org/en-US/security/advisories/mfsa2023-50/

Thunderbird:
https://www.mozilla.org/en-US/security/advisories/mfsa2023-52/

CVE-2023-6304 (https://bugzilla.mozilla.org/show_bug.cgi?id=1841050):

On some systems—depending on the graphics settings and drivers—it was possible to force an out-of-bounds read and leak memory data into the images created on the canvas element. This vulnerability affects Firefox < 120, Firefox ESR < 115.5.0, and Thunderbird < 115.5.

CVE-2023-6205 (https://bugzilla.mozilla.org/show_bug.cgi?id=1854076):

It was possible to cause the use of a MessagePort after it had already been freed, which could potentially have led to an exploitable crash. This vulnerability affects Firefox < 120, Firefox ESR < 115.5.0, and Thunderbird < 115.5.

CVE-2023-6206 (https://bugzilla.mozilla.org/show_bug.cgi?id=1857430):

The black fade animation when exiting fullscreen is roughly the length of the anti-clickjacking delay on permission prompts. It was possible to use this fact to surprise users by luring them to click where the permission grant button would be about to appear. This vulnerability affects Firefox < 120, Firefox ESR < 115.5.0, and Thunderbird < 115.5.

CVE-2023-6207 (https://bugzilla.mozilla.org/show_bug.cgi?id=1861344):

Ownership mismanagement led to a use-after-free in ReadableByteStreams This vulnerability affects Firefox < 120, Firefox ESR < 115.5.0, and Thunderbird < 115.5.

CVE-2023-6208 (https://bugzilla.mozilla.org/show_bug.cgi?id=1855345):

When using X11, text selected by the page using the Selection API was erroneously copied into the primary selection, a temporary storage not unlike the clipboard. *This bug only affects Firefox on X11. Other systems are unaffected.* This vulnerability affects Firefox < 120, Firefox ESR < 115.5.0, and Thunderbird < 115.5.

CVE-2023-6209 (https://bugzilla.mozilla.org/show_bug.cgi?id=1858570):

Relative URLs starting with three slashes were incorrectly parsed, and a path-traversal "/../" part in the path could be used to override the specified host. This could contribute to security problems in web sites. This vulnerability affects Firefox < 120, Firefox ESR < 115.5.0, and Thunderbird < 115.5.

CVE-2023-6210 (https://bugzilla.mozilla.org/show_bug.cgi?id=1801501):

When an https: web page created a pop-up from a "javascript:" URL, that pop-up was incorrectly allowed to load blockable content such as iframes from insecure http: URLs This vulnerability affects Firefox < 120.

CVE-2023-6211 (https://bugzilla.mozilla.org/show_bug.cgi?id=1850200):

If an attacker needed a user to load an insecure http: page and knew that user had enabled HTTPS-only mode, the attacker could have tricked the user into clicking to grant an HTTPS-only exception if they could get the user to participate in a clicking game. This vulnerability affects Firefox < 120.

CVE-2023-6212 (https://bugzilla.mozilla.org/buglist.cgi?bug_id=1658432%2C1820983%2C1829252%2C1856072%2C1856091%2C1859030%2C1860943%2C1862782):

Memory safety bugs present in Firefox 119, Firefox ESR 115.4, and Thunderbird 115.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 120, Firefox ESR < 115.5.0, and Thunderbird < 115.5.

CVE-2023-6213 (https://bugzilla.mozilla.org/buglist.cgi?bug_id=1849265%2C1851118%2C1854911):

Memory safety bugs present in Firefox 119. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
Comment 1 Christopher Fore 2023-11-25 00:16:34 UTC
(In reply to Christopher Fore from comment #0)
> Note: I cannot access any of the bugs listed below, they are taken from
> their advisory link.
> 
> Advisory posts:
> 
> FireFox Rapid:
> https://www.mozilla.org/en-US/security/advisories/mfsa2023-49/
> 
> FireFox ESR:
> https://www.mozilla.org/en-US/security/advisories/mfsa2023-50/
> 
> Thunderbird:
> https://www.mozilla.org/en-US/security/advisories/mfsa2023-52/
> 
> CVE-2023-6304 (https://bugzilla.mozilla.org/show_bug.cgi?id=1841050):
> 
> On some systems—depending on the graphics settings and drivers—it was
> possible to force an out-of-bounds read and leak memory data into the images
> created on the canvas element. This vulnerability affects Firefox < 120,
> Firefox ESR < 115.5.0, and Thunderbird < 115.5.
> 
> CVE-2023-6205 (https://bugzilla.mozilla.org/show_bug.cgi?id=1854076):
> 
> It was possible to cause the use of a MessagePort after it had already been
> freed, which could potentially have led to an exploitable crash. This
> vulnerability affects Firefox < 120, Firefox ESR < 115.5.0, and Thunderbird
> < 115.5.
> 
> CVE-2023-6206 (https://bugzilla.mozilla.org/show_bug.cgi?id=1857430):
> 
> The black fade animation when exiting fullscreen is roughly the length of
> the anti-clickjacking delay on permission prompts. It was possible to use
> this fact to surprise users by luring them to click where the permission
> grant button would be about to appear. This vulnerability affects Firefox <
> 120, Firefox ESR < 115.5.0, and Thunderbird < 115.5.
> 
> CVE-2023-6207 (https://bugzilla.mozilla.org/show_bug.cgi?id=1861344):
> 
> Ownership mismanagement led to a use-after-free in ReadableByteStreams This
> vulnerability affects Firefox < 120, Firefox ESR < 115.5.0, and Thunderbird
> < 115.5.
> 
> CVE-2023-6208 (https://bugzilla.mozilla.org/show_bug.cgi?id=1855345):
> 
> When using X11, text selected by the page using the Selection API was
> erroneously copied into the primary selection, a temporary storage not
> unlike the clipboard. *This bug only affects Firefox on X11. Other systems
> are unaffected.* This vulnerability affects Firefox < 120, Firefox ESR <
> 115.5.0, and Thunderbird < 115.5.
> 
> CVE-2023-6209 (https://bugzilla.mozilla.org/show_bug.cgi?id=1858570):
> 
> Relative URLs starting with three slashes were incorrectly parsed, and a
> path-traversal "/../" part in the path could be used to override the
> specified host. This could contribute to security problems in web sites.
> This vulnerability affects Firefox < 120, Firefox ESR < 115.5.0, and
> Thunderbird < 115.5.
> 
> CVE-2023-6210 (https://bugzilla.mozilla.org/show_bug.cgi?id=1801501):
> 
> When an https: web page created a pop-up from a "javascript:" URL, that
> pop-up was incorrectly allowed to load blockable content such as iframes
> from insecure http: URLs This vulnerability affects Firefox < 120.
> 
> CVE-2023-6211 (https://bugzilla.mozilla.org/show_bug.cgi?id=1850200):
> 
> If an attacker needed a user to load an insecure http: page and knew that
> user had enabled HTTPS-only mode, the attacker could have tricked the user
> into clicking to grant an HTTPS-only exception if they could get the user to
> participate in a clicking game. This vulnerability affects Firefox < 120.
> 
> CVE-2023-6212
> (https://bugzilla.mozilla.org/buglist.
> cgi?bug_id=1658432%2C1820983%2C1829252%2C1856072%2C1856091%2C1859030%2C186094
> 3%2C1862782):
> 
> Memory safety bugs present in Firefox 119, Firefox ESR 115.4, and
> Thunderbird 115.4. Some of these bugs showed evidence of memory corruption
> and we presume that with enough effort some of these could have been
> exploited to run arbitrary code. This vulnerability affects Firefox < 120,
> Firefox ESR < 115.5.0, and Thunderbird < 115.5.
> 
> CVE-2023-6213
> (https://bugzilla.mozilla.org/buglist.
> cgi?bug_id=1849265%2C1851118%2C1854911):
> 
> Memory safety bugs present in Firefox 119. Some of these bugs showed
> evidence of memory corruption and we presume that with enough effort some of
> these could have been exploited to run arbitrary code.

CVE-2023-6304 -> CVE-2023-6204
Comment 2 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2023-11-25 03:33:35 UTC
Thank you for filing! Popping out Thunderbird into its own bug since the vulnerabilities between Firefox and Thunderbird are sometimes unique (plus the tracker for the common vulnerabilites)...
Comment 3 Christopher Fore 2023-11-25 03:34:38 UTC
Got it! I'll remember that for next time!
Comment 4 Larry the Git Cow gentoo-dev 2024-01-07 09:39:21 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/data/glsa.git/commit/?id=22d7e8b6c0209c137d7f713d8d1e090906f7cf58

commit 22d7e8b6c0209c137d7f713d8d1e090906f7cf58
Author:     GLSAMaker <glsamaker@gentoo.org>
AuthorDate: 2024-01-07 09:38:31 +0000
Commit:     Hans de Graaff <graaff@gentoo.org>
CommitDate: 2024-01-07 09:39:06 +0000

    [ GLSA 202401-10 ] Mozilla Firefox: Multiple Vulnerabilities
    
    Bug: https://bugs.gentoo.org/908245
    Bug: https://bugs.gentoo.org/914073
    Bug: https://bugs.gentoo.org/918433
    Bug: https://bugs.gentoo.org/920507
    Signed-off-by: GLSAMaker <glsamaker@gentoo.org>
    Signed-off-by: Hans de Graaff <graaff@gentoo.org>

 glsa-202401-10.xml | 134 +++++++++++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 134 insertions(+)