OESA-2023-1684

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1684
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2023-1684.json
JSON Data
https://api.osv.dev/v1/vulns/OESA-2023-1684
Upstream
Published
2023-09-28T11:06:01Z
Modified
2025-09-03T06:18:54.015390Z
Summary
firefox security update
Details

Mozilla Firefox is a standalone web browser, designed for standards compliance and performance. Its functionality can be enhanced via a plethora of extensions.

Security Fix(es):

There exists a use after free/double free in libwebp. An attacker can use the ApplyFiltersAndEncode() function and loop through to free best.bw and assign best = trial pointer. The second loop will then return 0 because of an Out of memory error in VP8 encoder, the pointer is still assigned to trial and the AddressSanitizer will attempt a double free.  (CVE-2023-1999)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:22.03-LTS / firefox

Package

Name
firefox
Purl
pkg:rpm/openEuler/firefox&distro=openEuler-22.03-LTS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
102.14.0-1.oe2203

Ecosystem specific

{
    "src": [
        "firefox-102.14.0-1.oe2203.src.rpm"
    ],
    "x86_64": [
        "firefox-102.14.0-1.oe2203.x86_64.rpm",
        "firefox-debuginfo-102.14.0-1.oe2203.x86_64.rpm",
        "firefox-debugsource-102.14.0-1.oe2203.x86_64.rpm"
    ],
    "aarch64": [
        "firefox-102.14.0-1.oe2203.aarch64.rpm",
        "firefox-debugsource-102.14.0-1.oe2203.aarch64.rpm",
        "firefox-debuginfo-102.14.0-1.oe2203.aarch64.rpm"
    ]
}