Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2023:0461-1

Опубликовано: 20 фев. 2023
Источник: suse-cvrf

Описание

Security update for MozillaFirefox

This update for MozillaFirefox fixes the following issues:

Updated to version 102.8.0 ESR (bsc#1208144):

  • CVE-2023-25728: Fixed content security policy leak in violation reports using iframes.
  • CVE-2023-25730: Fixed screen hijack via browser fullscreen mode.
  • CVE-2023-25743: Fixed Fullscreen notification not being shown in Firefox Focus.
  • CVE-2023-0767: Fixed arbitrary memory write via PKCS 12 in NSS.
  • CVE-2023-25735: Fixed potential use-after-free from compartment mismatch in SpiderMonkey.
  • CVE-2023-25737: Fixed invalid downcast in SVGUtils::SetupStrokeGeometry.
  • CVE-2023-25738: Fixed printing on Windows which could potentially crash Firefox with some device drivers.
  • CVE-2023-25739: Fixed use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext.
  • CVE-2023-25729: Fixed extensions opening external schemes without user knowledge.
  • CVE-2023-25732: Fixed out of bounds memory write from EncodeInputStream.
  • CVE-2023-25734: Fixed opening local .url files that causes unexpected network loads.
  • CVE-2023-25742: Fixed tab crash by Web Crypto ImportKey.
  • CVE-2023-25744: Fixed Memory safety bugs.
  • CVE-2023-25746: Fixed Memory safety bugs.

Список пакетов

Image SLES15-SP2-SAP-Azure-LI-BYOS-Production
MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production
MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production
MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production
MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP4-SAP-Azure-LI-BYOS
MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP4-SAP-Azure-LI-BYOS-Production
MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP4-SAP-Azure-VLI-BYOS
MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production
MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP5-SAP-Azure-LI-BYOS
MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP5-SAP-Azure-LI-BYOS-Production
MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP5-SAP-Azure-VLI-BYOS
MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production
MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP6-SAP-Azure-LI-BYOS
MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP6-SAP-Azure-LI-BYOS-Production
MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP6-SAP-Azure-VLI-BYOS
MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production
MozillaFirefox-102.8.0-150200.152.78.1
SUSE Enterprise Storage 7
MozillaFirefox-102.8.0-150200.152.78.1
MozillaFirefox-devel-102.8.0-150200.152.78.1
MozillaFirefox-translations-common-102.8.0-150200.152.78.1
MozillaFirefox-translations-other-102.8.0-150200.152.78.1
SUSE Enterprise Storage 7.1
MozillaFirefox-102.8.0-150200.152.78.1
MozillaFirefox-devel-102.8.0-150200.152.78.1
MozillaFirefox-translations-common-102.8.0-150200.152.78.1
MozillaFirefox-translations-other-102.8.0-150200.152.78.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
MozillaFirefox-102.8.0-150200.152.78.1
MozillaFirefox-devel-102.8.0-150200.152.78.1
MozillaFirefox-translations-common-102.8.0-150200.152.78.1
MozillaFirefox-translations-other-102.8.0-150200.152.78.1
SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS
MozillaFirefox-102.8.0-150200.152.78.1
MozillaFirefox-devel-102.8.0-150200.152.78.1
MozillaFirefox-translations-common-102.8.0-150200.152.78.1
MozillaFirefox-translations-other-102.8.0-150200.152.78.1
SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
MozillaFirefox-102.8.0-150200.152.78.1
MozillaFirefox-devel-102.8.0-150200.152.78.1
MozillaFirefox-translations-common-102.8.0-150200.152.78.1
MozillaFirefox-translations-other-102.8.0-150200.152.78.1
SUSE Linux Enterprise Module for Desktop Applications 15 SP4
MozillaFirefox-102.8.0-150200.152.78.1
MozillaFirefox-devel-102.8.0-150200.152.78.1
MozillaFirefox-translations-common-102.8.0-150200.152.78.1
MozillaFirefox-translations-other-102.8.0-150200.152.78.1
SUSE Linux Enterprise Real Time 15 SP3
MozillaFirefox-102.8.0-150200.152.78.1
MozillaFirefox-devel-102.8.0-150200.152.78.1
MozillaFirefox-translations-common-102.8.0-150200.152.78.1
MozillaFirefox-translations-other-102.8.0-150200.152.78.1
SUSE Linux Enterprise Server 15 SP2-LTSS
MozillaFirefox-102.8.0-150200.152.78.1
MozillaFirefox-devel-102.8.0-150200.152.78.1
MozillaFirefox-translations-common-102.8.0-150200.152.78.1
MozillaFirefox-translations-other-102.8.0-150200.152.78.1
SUSE Linux Enterprise Server 15 SP3-LTSS
MozillaFirefox-102.8.0-150200.152.78.1
MozillaFirefox-devel-102.8.0-150200.152.78.1
MozillaFirefox-translations-common-102.8.0-150200.152.78.1
MozillaFirefox-translations-other-102.8.0-150200.152.78.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2
MozillaFirefox-102.8.0-150200.152.78.1
MozillaFirefox-devel-102.8.0-150200.152.78.1
MozillaFirefox-translations-common-102.8.0-150200.152.78.1
MozillaFirefox-translations-other-102.8.0-150200.152.78.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3
MozillaFirefox-102.8.0-150200.152.78.1
MozillaFirefox-devel-102.8.0-150200.152.78.1
MozillaFirefox-translations-common-102.8.0-150200.152.78.1
MozillaFirefox-translations-other-102.8.0-150200.152.78.1
openSUSE Leap 15.4
MozillaFirefox-102.8.0-150200.152.78.1
MozillaFirefox-branding-upstream-102.8.0-150200.152.78.1
MozillaFirefox-devel-102.8.0-150200.152.78.1
MozillaFirefox-translations-common-102.8.0-150200.152.78.1
MozillaFirefox-translations-other-102.8.0-150200.152.78.1

Описание

An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes via PKCS 12 Safe Bag attributes being mishandled. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.


Затронутые продукты
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1

Ссылки

Описание

The <code>Content-Security-Policy-Report-Only</code> header could allow an attacker to leak a child iframe's unredacted URI when interaction with that iframe triggers a redirect. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.


Затронутые продукты
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1

Ссылки

Описание

Permission prompts for opening external schemes were only shown for <code>ContentPrincipals</code> resulting in extensions being able to open them without user interaction via <code>ExpandedPrincipals</code>. This could lead to further malicious actions such as downloading files or interacting with software already installed on the system. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.


Затронутые продукты
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1

Ссылки

Описание

A background script invoking <code>requestFullscreen</code> and then blocking the main thread could force the browser into fullscreen mode indefinitely, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.


Затронутые продукты
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1

Ссылки

Описание

When encoding data from an <code>inputStream</code> in <code>xpcom</code> the size of the input being encoded was not correctly calculated potentially leading to an out of bounds memory write. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.


Затронутые продукты
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1

Ссылки

Описание

After downloading a Windows <code>.url</code> shortcut from the local filesystem, an attacker could supply a remote path that would lead to unexpected network requests from the operating system. This also had the potential to leak NTLM credentials to the resource.<br>*This bug only affects Firefox on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.


Затронутые продукты
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1

Ссылки

Описание

Cross-compartment wrappers wrapping a scripted proxy could have caused objects from other compartments to be stored in the main compartment resulting in a use-after-free after unwrapping the proxy. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.


Затронутые продукты
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1

Ссылки

Описание

An invalid downcast from <code>nsTextNode</code> to <code>SVGElement</code> could have lead to undefined behavior. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.


Затронутые продукты
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1

Ссылки

Описание

Members of the <code>DEVMODEW</code> struct set by the printer device driver weren't being validated and could have resulted in invalid values which in turn would cause the browser to attempt out of bounds access to related variables.<br>*This bug only affects Firefox on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.


Затронутые продукты
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1

Ссылки

Описание

Module load requests that failed were not being checked as to whether or not they were cancelled causing a use-after-free in <code>ScriptLoadContext</code>. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.


Затронутые продукты
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1

Ссылки

Описание

When importing a SPKI RSA public key as ECDSA P-256, the key would be handled incorrectly causing the tab to crash. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.


Затронутые продукты
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1

Ссылки

Описание

A lack of in app notification for entering fullscreen mode could have lead to a malicious website spoofing browser chrome.<br>*This bug only affects Firefox Focus. Other versions of Firefox are unaffected.*. This vulnerability affects Firefox < 110 and Firefox ESR < 102.8.


Затронутые продукты
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1

Ссылки

Описание

Mozilla developers Kershaw Chang and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 109 and Firefox ESR 102.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 110 and Firefox ESR < 102.8.


Затронутые продукты
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1

Ссылки

Описание

Mozilla developers Philipp and Gabriele Svelto reported memory safety bugs present in Firefox ESR 102.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 102.8 and Firefox ESR < 102.8.


Затронутые продукты
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1
Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production:MozillaFirefox-102.8.0-150200.152.78.1

Ссылки
Уязвимость SUSE-SU-2023:0461-1