Opened 3 years ago

Closed 3 years ago

#16185 closed enhancement (fixed)

seamonkey-2.53.11

Reported by: Bruce Dubbs Owned by: Douglas R. Reno
Priority: high Milestone: 11.2
Component: BOOK Version: git
Severity: normal Keywords:
Cc:

Description

New point version.

Change History (5)

comment:1 by Douglas R. Reno, 3 years ago

Owner: changed from blfs-book to Douglas R. Reno
Priority: normalhigh
Status: newassigned

Has the same 0day fix for Thunderbird that allows for system takeover via a crafted email

comment:2 by Douglas R. Reno, 3 years ago

SeaMonkey 2.53.11 contains (among other changes) the following major changes relative to SeaMonkey 2.53.10.2:

Remove obsolete MOZ_EXTENSIONS check in suite bug 1749146.

Add connect button to cZ Networks Editor bug 1736443.

Remove freenode remnants from ChatZilla in SeaMonkey bug 1741082.

Prefer secure over insecure protocol in network list in ChatZilla bug 1744440.

Composer - Change tag textbox is not removed after use bug 1755369.

Clean up repo links in debugQA bug 1746790.

Fix misspelled references to macOS in suite bug 1749144.

Remove obsolete references to Java and Flash bug 1749141.

Help button not working in delete cert dialog bug 1750386.

Rearrange Message Filter Dialog to make room for new features bug 1735053.

Use Insert key as shortcut to create new message filters bug 1735055.

Rename some variables used in SeaMonkey's FilterListDialog to match Thunderbird's bug 1735056.

Implement Copy to New message filter functionality bug 1735057.

Add move to top / bottom buttons to message filters bug 1735059.

Add preference to not prompt for message filter deletion bug 1735061.

Clean up folder handling in FilterListDialog bug 1736425.

Add refresh function to Filter list dialog so that it can be updated when already open and new filters are added externally bug 1737450.

Use listbox rather than tree in FilterListDialog bug 1746081.

MsgFilterList(args) should take targetFilter and pass it to FilterListDialog bug 1753891.

Mail&News' start.xhtml: "We" link broken bug 1748178.

Add search functionality to filter dialog bug 1749207.

Move the taskbar refresh timer in SeaMonkey to idle dispatch bug 1746788.

Prevent subresource loads from showing the progress indicator on the tab in SeaMonkey bug 1746787.

EDIT: Updated for formatting. I would prefer to use triple {} but it's too long.

Last edited 3 years ago by Douglas R. Reno (previous) (diff)

comment:3 by Douglas R. Reno, 3 years ago

"Additional important security fixes up to Current Firefox 91.6 ESR and a few enhancements have been backported. We will continue to enhance SeaMonkey security in subsequent 2.53.x beta and release versions as fast as we are able to."

Continuing down that road, I decided to check if the bugfix for 1753094 is present in Seamonkey... and it is: https://gitlab.com/seamonkey-project/seamonkey-2.53-comm/-/commit/a0b21d710e13b8541457f27159177ee6dc66403d

comment:4 by Douglas R. Reno, 3 years ago

This will include fixes from Firefox/Thunderbird 91.4 through 91.6 (91.6.1 in the case of Thunderbird). This includes:

Firefox 91.5.0

Security Vulnerabilities fixed in Firefox ESR 91.5

Announced
    January 11, 2022
Impact
    high
Products
    Firefox ESR
Fixed in

        Firefox ESR 91.5

#CVE-2022-22746: Calling into reportValidity could have lead to fullscreen window spoof

Reporter
    Irvan Kurniawan
Impact
    high

Description

A race condition could have allowed bypassing the fullscreen notification which could have lead to a fullscreen window spoof being unnoticed.
This bug only affects Thunderbird for Windows. Other operating systems are unaffected.
References

    Bug 1735071

#CVE-2022-22743: Browser window spoof using fullscreen mode

Reporter
    Irvan Kurniawan
Impact
    high

Description

When navigating from inside an iframe while requesting fullscreen access, an attacker-controlled tab could have made the browser unable to leave fullscreen mode.
References

    Bug 1739220

#CVE-2022-22742: Out-of-bounds memory access when inserting text in edit mode

Reporter
    Irvan Kurniawan
Impact
    high

Description

When inserting text while in edit mode, some characters might have lead to out-of-bounds memory access causing a potentially exploitable crash.
References

    Bug 1739923

#CVE-2022-22741: Browser window spoof using fullscreen mode

Reporter
    Irvan Kurniawan
Impact
    high

Description

When resizing a popup while requesting fullscreen access, the popup would have become unable to leave fullscreen mode.
References

    Bug 1740389

#CVE-2022-22740: Use-after-free of ChannelEventQueue::mOwner

Reporter
    bo13oy of Cyber Kunlun Lab
Impact
    high

Description

Certain network request objects were freed too early when releasing a network request handle. This could have lead to a use-after-free causing a potentially exploitable crash.
References

    Bug 1742334

#CVE-2022-22738: Heap-buffer-overflow in blendGaussianBlur

Reporter
    Atte Kettunen
Impact
    high

Description

Applying a CSS filter effect could have accessed out of bounds memory. This could have lead to a heap-buffer-overflow causing a potentially exploitable crash.
References

    Bug 1742382

#CVE-2022-22737: Race condition when playing audio files

Reporter
    bo13oy of Cyber Kunlun Lab
Impact
    high

Description

Constructing audio sinks could have lead to a race condition when playing audio files and closing windows. This could have lead to a use-after-free causing a potentially exploitable crash.
References

    Bug 1745874

#CVE-2021-4140: Iframe sandbox bypass with XSLT

Reporter
    Peter Van der Beken
Impact
    high

Description

It was possible to construct specific XSLT markup that would be able to bypass an iframe sandbox.
References

    Bug 1746720

#CVE-2022-22748: Spoofed origin on external protocol launch dialog

Reporter
    Alesandro Ortiz
Impact
    moderate

Description

Malicious websites could have confused Thunderbird into showing the wrong origin when asking to launch a program and handling an external URL protocol.
References

    Bug 1705211

#CVE-2022-22745: Leaking cross-origin URLs through securitypolicyviolation event

Reporter
    Jannis Rautenstrauch
Impact
    moderate

Description

Securitypolicyviolation events could have leaked cross-origin information for frame-ancestors violations
References

    Bug 1735856

#CVE-2022-22744: The 'Copy as curl' feature in DevTools did not fully escape website-controlled data, potentially leading to command injection

Reporter
    Mattias Jacobsson
Impact
    moderate

Description

The constructed curl command from the "Copy as curl" feature in DevTools was not properly escaped for PowerShell. This could have lead to command injection if pasted into a Powershell prompt.
This bug only affects Firefox for Windows. Other operating systems are unaffected.
References

    Bug 1737252

#CVE-2022-22747: Crash when handling empty pkcs7 sequence

Reporter
    Tavis Ormandy
Impact
    low

Description

After accepting an untrusted certificate, handling an empty pkcs7 sequence as part of the certificate data could have lead to a crash. This crash is believed to be unexploitable.
References

    Bug 1735028

#CVE-2022-22739: Missing throttling on external protocol launch dialog

Reporter
    Alesandro Ortiz
Impact
    low

Description

Malicious websites could have tricked users into accepting launching a program to handle an external URL protocol.
References

    Bug 1744158

#CVE-2022-22751: Memory safety bugs fixed in Firefox 96 and Firefox ESR 91.5

Reporter
    Mozilla developers and community
Impact
    high

Description

Mozilla developers Calixte Denizet, Kershaw Chang, Christian Holler, Jason Kratzer, Gabriele Svelto, Tyson Smith, Simon Giesecke, and Steve Fink reported memory safety bugs present in Firefox 95 and Firefox ESR 91.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
References

    Memory safety bugs fixed in Firefox 96 and Firefox ESR 91.5

Firefox 91.6.0

Security Vulnerabilities fixed in Firefox ESR 91.6

Announced
    February 8, 2022
Impact
    high
Products
    Firefox ESR
Fixed in

        Firefox ESR 91.6

#CVE-2022-22753: Privilege Escalation to SYSTEM on Windows via Maintenance Service

Reporter
    Seb Patane
Impact
    high

Description

A Time-of-Check Time-of-Use bug existed in the Maintenance (Updater) Service that could be abused to grant Users write access to an arbitrary directory. This could have been used to escalate to SYSTEM access.
This bug only affects Firefox on Windows. Other operating systems are unaffected.
References

    Bug 1732435

#CVE-2022-22754: Extensions could have bypassed permission confirmation during update

Reporter
    Rob Wu
Impact
    high

Description

If a user installed an extension of a particular type, the extension could have auto-updated itself and while doing so, bypass the prompt which grants the new version the new requested permissions.
References

    Bug 1750565

#CVE-2022-22756: Drag and dropping an image could have resulted in the dropped object being an executable

Reporter
    Abdulrahman Alqabandi
Impact
    moderate

Description

If a user was convinced to drag and drop an image to their desktop or other folder, the resulting object could have been changed into an executable script which would have run arbitrary code after the user clicked on it.
References

    Bug 1317873

#CVE-2022-22759: Sandboxed iframes could have executed script if the parent appended elements

Reporter
    Johan Carlsson
Impact
    moderate

Description

If a document created a sandboxed iframe without allow-scripts, and subsequently appended an element to the iframe's document that e.g. had a JavaScript event handler - the event handler would have run despite the iframe's sandbox.
References

    Bug 1739957

#CVE-2022-22760: Cross-Origin responses could be distinguished between script and non-script content-types

Reporter
    Luan Herrera
Impact
    moderate

Description

When importing resources using Web Workers, error messages would distinguish the difference between application/javascript responses and non-script responses. This could have been abused to learn information cross-origin.
References

    Bug 1740985
    Bug 1748503

#CVE-2022-22761: frame-ancestors Content Security Policy directive was not enforced for framed extension pages

Reporter
    Mart Gil Robles (Mart at FlowCrypt)
Impact
    moderate

Description

Web-accessible extension pages (pages with a moz-extension:// scheme) were not correctly enforcing the frame-ancestors directive when it was used in the Web Extension's Content Security Policy.
References

    Bug 1745566

#CVE-2022-22763: Script Execution during invalid object state

Reporter
    Mozilla Fuzzing Team
Impact
    moderate

Description

When a worker is shutdown, it was possible to cause script to run late in the lifecycle, at a point after where it should not be possible.
References

    Bug 1740534

#CVE-2022-22764: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6

Reporter
    Mozilla developers and community
Impact
    high

Description

Mozilla developers and community members Paul Adenot and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 96 and Firefox ESR 91.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
References

    Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6

Note that Seamonkey is not vulnerable to the matrix/OpenPGP vulnerabilities in Thunderbird-91.4.1, but it is vulnerable to the bug fixed in Thunderbird-91.6.1 (aka bug 1753094):

Security Vulnerabilities fixed in Thunderbird 91.6.1

Announced
    February 15, 2022
Impact
    high
Products
    Thunderbird
Fixed in

        Thunderbird 91.6.1

#CVE-2022-0566: Crafted email could trigger an out-of-bounds write

Reporter
    Mozilla Fuzzing Team
Impact
    high

Description

It may be possible for an attacker to craft an email message that causes Thunderbird to perform an out-of-bounds write of one byte when processing the message.
References

    Bug 1753094

In total, that means that Seamonkey is affected by the following CVEs:

CVE-2022-22746
CVE-2022-22743
CVE-2022-22742
CVE-2022-22741
CVE-2022-22740
CVE-2022-22738
CVE-2022-22737
CVE-2021-4140
CVE-2022-22748
CVE-2022-22745
CVE-2022-22744
CVE-2022-22747
CVE-2022-22739
CVE-2022-22751
CVE-2022-22754
CVE-2022-22756
CVE-2022-22759
CVE-2022-22760
CVE-2022-22761
CVE-2022-22763
CVE-2022-22764
CVE-2022-0566

comment:5 by Douglas R. Reno, 3 years ago

Resolution: fixed
Status: assignedclosed
Note: See TracTickets for help on using tickets.