OESA-2023-1715

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1715
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2023-1715.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2023-1715
Upstream
Published
2023-10-13T11:06:04Z
Modified
2025-08-12T05:22:54.537698Z
Summary
firefox security update
Details

Mozilla Firefox is a standalone web browser, designed for standards compliance and performance. Its functionality can be enhanced via a plethora of extensions.

Security Fix(es):

When receiving rendering data over IPC mStream could have been destroyed when initialized, which could have led to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox < 117, Firefox ESR < 102.15, Firefox ESR < 115.2, Thunderbird < 102.15, and Thunderbird < 115.2.(CVE-2023-4573)

When creating a callback over IPC for showing the Color Picker window, multiple of the same callbacks could have been created at a time and eventually all simultaneously destroyed as soon as one of the callbacks finished. This could have led to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox < 117, Firefox ESR < 102.15, Firefox ESR < 115.2, Thunderbird < 102.15, and Thunderbird < 115.2.(CVE-2023-4574)

When creating a callback over IPC for showing the File Picker window, multiple of the same callbacks could have been created at a time and eventually all simultaneously destroyed as soon as one of the callbacks finished. This could have led to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox < 117, Firefox ESR < 102.15, Firefox ESR < 115.2, Thunderbird < 102.15, and Thunderbird < 115.2.(CVE-2023-4575)

Excel .xll add-in files did not have a blocklist entry in Firefox's executable blocklist which allowed them to be downloaded without any warning of their potential harm. This vulnerability affects Firefox < 117, Firefox ESR < 102.15, Firefox ESR < 115.2, Thunderbird < 102.15, and Thunderbird < 115.2.(CVE-2023-4581)

Memory safety bugs present in Firefox 116, Firefox ESR 102.14, Firefox ESR 115.1, Thunderbird 102.14, and Thunderbird 115.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 117, Firefox ESR < 102.15, Firefox ESR < 115.2, Thunderbird < 102.15, and Thunderbird < 115.2.(CVE-2023-4584)

Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)(CVE-2023-4863)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:22.03-LTS / firefox

Package

Name
firefox
Purl
pkg:rpm/openEuler/firefox&distro=openEuler-22.03-LTS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
102.15.0-2.oe2203

Ecosystem specific

{
    "src": [
        "firefox-102.15.0-2.oe2203.src.rpm"
    ],
    "aarch64": [
        "firefox-debuginfo-102.15.0-2.oe2203.aarch64.rpm",
        "firefox-102.15.0-2.oe2203.aarch64.rpm",
        "firefox-debugsource-102.15.0-2.oe2203.aarch64.rpm"
    ],
    "x86_64": [
        "firefox-102.15.0-2.oe2203.x86_64.rpm",
        "firefox-debugsource-102.15.0-2.oe2203.x86_64.rpm",
        "firefox-debuginfo-102.15.0-2.oe2203.x86_64.rpm"
    ]
}