ALT-BU-2013-1341-1
Branch sisyphus update bulletin.
Package kernel-image-un-def updated to version 3.11.7-alt1 for branch sisyphus in task 107830.
Closed vulnerabilities
BDU:2014-00091
Уязвимость операционной системы Linux, позволяющая злоумышленнику получить доступ к конфиденциальной информации из памяти ядра
BDU:2015-04307
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
- CVE-2012-2372
- CVE-2013-2929
- CVE-2013-4299
- CVE-2013-4579
- CVE-2013-6382
- CVE-2013-7339
- CVE-2014-0055
- CVE-2014-0077
- CVE-2014-0101
- CVE-2014-0131
- CVE-2014-0155
- CVE-2014-1444
- CVE-2014-1445
- CVE-2014-1446
- CVE-2014-1874
- CVE-2014-2309
- CVE-2014-2523
- CVE-2014-2678
- CVE-2014-2851
- CVE-2014-3122
- CVE-2014-3144
- CVE-2014-3145
- CVE-2014-3917
- CVE-2014-4652
- CVE-2014-4653
- CVE-2014-4654
- CVE-2014-4655
- CVE-2014-4656
- CVE-2014-4699
BDU:2015-04308
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
- CVE-2012-2372
- CVE-2013-2929
- CVE-2013-4299
- CVE-2013-4579
- CVE-2013-6382
- CVE-2013-7339
- CVE-2014-0055
- CVE-2014-0077
- CVE-2014-0101
- CVE-2014-0131
- CVE-2014-0155
- CVE-2014-1444
- CVE-2014-1445
- CVE-2014-1446
- CVE-2014-1874
- CVE-2014-2309
- CVE-2014-2523
- CVE-2014-2678
- CVE-2014-2851
- CVE-2014-3122
- CVE-2014-3144
- CVE-2014-3145
- CVE-2014-3917
- CVE-2014-4652
- CVE-2014-4653
- CVE-2014-4654
- CVE-2014-4655
- CVE-2014-4656
- CVE-2014-4699
BDU:2015-04309
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
- CVE-2012-2372
- CVE-2013-2929
- CVE-2013-4299
- CVE-2013-4579
- CVE-2013-6382
- CVE-2013-7339
- CVE-2014-0055
- CVE-2014-0077
- CVE-2014-0101
- CVE-2014-0131
- CVE-2014-0155
- CVE-2014-1444
- CVE-2014-1445
- CVE-2014-1446
- CVE-2014-1874
- CVE-2014-2309
- CVE-2014-2523
- CVE-2014-2678
- CVE-2014-2851
- CVE-2014-3122
- CVE-2014-3144
- CVE-2014-3145
- CVE-2014-3917
- CVE-2014-4652
- CVE-2014-4653
- CVE-2014-4654
- CVE-2014-4655
- CVE-2014-4656
- CVE-2014-4699
BDU:2015-04310
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
- CVE-2012-2372
- CVE-2013-2929
- CVE-2013-4299
- CVE-2013-4579
- CVE-2013-6382
- CVE-2013-7339
- CVE-2014-0055
- CVE-2014-0077
- CVE-2014-0101
- CVE-2014-0131
- CVE-2014-0155
- CVE-2014-1444
- CVE-2014-1445
- CVE-2014-1446
- CVE-2014-1874
- CVE-2014-2309
- CVE-2014-2523
- CVE-2014-2678
- CVE-2014-2851
- CVE-2014-3122
- CVE-2014-3144
- CVE-2014-3145
- CVE-2014-3917
- CVE-2014-4652
- CVE-2014-4653
- CVE-2014-4654
- CVE-2014-4655
- CVE-2014-4656
- CVE-2014-4699
Modified: 2024-11-21
CVE-2013-2058
The host_start function in drivers/usb/chipidea/host.c in the Linux kernel before 3.7.4 does not properly support a certain non-streaming option, which allows local users to cause a denial of service (system crash) by sending a large amount of network traffic through a USB/Ethernet adapter.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=929473ea05db455ad88cdc081f2adc556b8dc48f
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=929473ea05db455ad88cdc081f2adc556b8dc48f
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.4
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.4
- [oss-security] 20130505 Re: CVE request: Linux kernel: chipidea: allow disabling streaming in host mode
- [oss-security] 20130505 Re: CVE request: Linux kernel: chipidea: allow disabling streaming in host mode
- https://bugzilla.redhat.com/show_bug.cgi?id=959210
- https://bugzilla.redhat.com/show_bug.cgi?id=959210
- https://github.com/torvalds/linux/commit/929473ea05db455ad88cdc081f2adc556b8dc48f
- https://github.com/torvalds/linux/commit/929473ea05db455ad88cdc081f2adc556b8dc48f
Modified: 2024-11-21
CVE-2013-4299
Interpretation conflict in drivers/md/dm-snap-persistent.c in the Linux kernel through 3.11.6 allows remote authenticated users to obtain sensitive information or modify data via a crafted mapping to a snapshot block device.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e9c6a182649f4259db704ae15a91ac820e63b0ca
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e9c6a182649f4259db704ae15a91ac820e63b0ca
- SUSE-SU-2015:0652
- SUSE-SU-2015:0652
- SUSE-SU-2015:0812
- SUSE-SU-2015:0812
- RHSA-2013:1436
- RHSA-2013:1436
- RHSA-2013:1449
- RHSA-2013:1449
- RHSA-2013:1450
- RHSA-2013:1450
- RHSA-2013:1460
- RHSA-2013:1460
- RHSA-2013:1490
- RHSA-2013:1490
- RHSA-2013:1519
- RHSA-2013:1519
- RHSA-2013:1520
- RHSA-2013:1520
- RHSA-2013:1783
- RHSA-2013:1783
- RHSA-2013:1860
- RHSA-2013:1860
- USN-2015-1
- USN-2015-1
- USN-2016-1
- USN-2016-1
- USN-2040-1
- USN-2040-1
- USN-2041-1
- USN-2041-1
- USN-2042-1
- USN-2042-1
- USN-2043-1
- USN-2043-1
- USN-2044-1
- USN-2044-1
- USN-2045-1
- USN-2045-1
- USN-2046-1
- USN-2046-1
- USN-2049-1
- USN-2049-1
- USN-2050-1
- USN-2050-1
- USN-2066-1
- USN-2066-1
- USN-2067-1
- USN-2067-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1004233
- https://bugzilla.redhat.com/show_bug.cgi?id=1004233
- https://github.com/torvalds/linux/commit/e9c6a182649f4259db704ae15a91ac820e63b0ca
- https://github.com/torvalds/linux/commit/e9c6a182649f4259db704ae15a91ac820e63b0ca
Modified: 2024-11-21
CVE-2013-7027
The ieee80211_radiotap_iterator_init function in net/wireless/radiotap.c in the Linux kernel before 3.11.7 does not check whether a frame contains any data outside of the header, which might allow attackers to cause a denial of service (buffer over-read) via a crafted header.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f5563318ff1bde15b10e736e97ffce13be08bc1a
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f5563318ff1bde15b10e736e97ffce13be08bc1a
- openSUSE-SU-2014:0204
- openSUSE-SU-2014:0204
- openSUSE-SU-2014:0247
- openSUSE-SU-2014:0247
- 55606
- 55606
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.11.7
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.11.7
- 64013
- 64013
- 1029413
- 1029413
- USN-2066-1
- USN-2066-1
- USN-2067-1
- USN-2067-1
- USN-2068-1
- USN-2068-1
- USN-2069-1
- USN-2069-1
- USN-2071-1
- USN-2071-1
- USN-2072-1
- USN-2072-1
- USN-2073-1
- USN-2073-1
- USN-2074-1
- USN-2074-1
- USN-2076-1
- USN-2076-1
- USN-2128-1
- USN-2128-1
- USN-2129-1
- USN-2129-1
- https://github.com/torvalds/linux/commit/f5563318ff1bde15b10e736e97ffce13be08bc1a
- https://github.com/torvalds/linux/commit/f5563318ff1bde15b10e736e97ffce13be08bc1a
Modified: 2024-11-21
CVE-2013-7470
cipso_v4_validate in include/net/cipso_ipv4.h in the Linux kernel before 3.11.7, when CONFIG_NETLABEL is disabled, allows attackers to cause a denial of service (infinite loop and crash), as demonstrated by icmpsic, a different vulnerability than CVE-2013-0310.
- https://cdn.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.11.7
- https://cdn.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.11.7
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f2e5ddcc0d12f9c4c7b254358ad245c9dddce13b
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f2e5ddcc0d12f9c4c7b254358ad245c9dddce13b
- https://github.com/torvalds/linux/commit/f2e5ddcc0d12f9c4c7b254358ad245c9dddce13b
- https://github.com/torvalds/linux/commit/f2e5ddcc0d12f9c4c7b254358ad245c9dddce13b
- https://support.f5.com/csp/article/K21914362
- https://support.f5.com/csp/article/K21914362
- https://www.arista.com/en/support/advisories-notices/security-advisories/7098-security-advisory-40
- https://www.arista.com/en/support/advisories-notices/security-advisories/7098-security-advisory-40
Modified: 2024-11-21
CVE-2014-1444
The fst_get_iface function in drivers/net/wan/farsync.c in the Linux kernel before 3.11.7 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability for an SIOCWANDEV ioctl call.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=96b340406724d87e4621284ebac5e059d67b2194
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=96b340406724d87e4621284ebac5e059d67b2194
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.11.7
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.11.7
- [oss-security] 20140115 Re: CVE request: assorted kernel infoleak security fixes
- [oss-security] 20140115 Re: CVE request: assorted kernel infoleak security fixes
- 64952
- 64952
- USN-2128-1
- USN-2128-1
- USN-2129-1
- USN-2129-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1053610
- https://bugzilla.redhat.com/show_bug.cgi?id=1053610
- linux-kernel-cve20141444-info-disc(90443)
- linux-kernel-cve20141444-info-disc(90443)
- https://github.com/torvalds/linux/commit/96b340406724d87e4621284ebac5e059d67b2194
- https://github.com/torvalds/linux/commit/96b340406724d87e4621284ebac5e059d67b2194
Modified: 2024-11-21
CVE-2014-1445
The wanxl_ioctl function in drivers/net/wan/wanxl.c in the Linux kernel before 3.11.7 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory via an ioctl call.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2b13d06c9584b4eb773f1e80bbaedab9a1c344e1
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2b13d06c9584b4eb773f1e80bbaedab9a1c344e1
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.11.7
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.11.7
- [oss-security] 20140115 Re: CVE request: assorted kernel infoleak security fixes
- [oss-security] 20140115 Re: CVE request: assorted kernel infoleak security fixes
- 64953
- 64953
- USN-2128-1
- USN-2128-1
- USN-2129-1
- USN-2129-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1053613
- https://bugzilla.redhat.com/show_bug.cgi?id=1053613
- linux-kernel-cve20141445-info-disc(90444)
- linux-kernel-cve20141445-info-disc(90444)
- https://github.com/torvalds/linux/commit/2b13d06c9584b4eb773f1e80bbaedab9a1c344e1
- https://github.com/torvalds/linux/commit/2b13d06c9584b4eb773f1e80bbaedab9a1c344e1
Package ghostscript updated to version 9.10-alt1 for branch sisyphus in task 107865.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat Enterprise Linux 7.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=520bb0ea7519
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=520bb0ea7519
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=5516c614dc33
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=5516c614dc33
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=78911a01b67d
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=78911a01b67d
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=79cccf641486
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=79cccf641486
- RHSA-2018:3761
- RHSA-2018:3761
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16863
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16863
Closed vulnerabilities
No data currently available.
No data currently available.
No data currently available.
No data currently available.
No data currently available.
No data currently available.
No data currently available.
No data currently available.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2013-5590
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1634
- openSUSE-SU-2013:1634
- SUSE-SU-2013:1678
- SUSE-SU-2013:1678
- RHSA-2013:1476
- RHSA-2013:1476
- RHSA-2013:1480
- RHSA-2013:1480
- DSA-2788
- DSA-2788
- DSA-2797
- DSA-2797
- http://www.mozilla.org/security/announce/2013/mfsa2013-93.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-93.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=860123
- https://bugzilla.mozilla.org/show_bug.cgi?id=860123
- https://bugzilla.mozilla.org/show_bug.cgi?id=893572
- https://bugzilla.mozilla.org/show_bug.cgi?id=893572
- oval:org.mitre.oval:def:19001
- oval:org.mitre.oval:def:19001
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2013-5591
Unspecified vulnerability in the browser engine in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1634
- openSUSE-SU-2013:1634
- http://www.mozilla.org/security/announce/2013/mfsa2013-93.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-93.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=859892
- https://bugzilla.mozilla.org/show_bug.cgi?id=859892
- oval:org.mitre.oval:def:19015
- oval:org.mitre.oval:def:19015
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2013-5592
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 25.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1634
- openSUSE-SU-2013:1634
- http://www.mozilla.org/security/announce/2013/mfsa2013-93.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-93.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=880544
- https://bugzilla.mozilla.org/show_bug.cgi?id=880544
- https://bugzilla.mozilla.org/show_bug.cgi?id=886102
- https://bugzilla.mozilla.org/show_bug.cgi?id=886102
- https://bugzilla.mozilla.org/show_bug.cgi?id=887921
- https://bugzilla.mozilla.org/show_bug.cgi?id=887921
- https://bugzilla.mozilla.org/show_bug.cgi?id=912534
- https://bugzilla.mozilla.org/show_bug.cgi?id=912534
- oval:org.mitre.oval:def:19148
- oval:org.mitre.oval:def:19148
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2013-5593
The SELECT element implementation in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 does not properly restrict the nature or placement of HTML within a dropdown menu, which allows remote attackers to spoof the address bar or conduct clickjacking attacks via vectors that trigger navigation off of a page containing this element.
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1634
- openSUSE-SU-2013:1634
- http://www.mozilla.org/security/announce/2013/mfsa2013-94.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-94.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=868327
- https://bugzilla.mozilla.org/show_bug.cgi?id=868327
- oval:org.mitre.oval:def:19263
- oval:org.mitre.oval:def:19263
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2013-5594
Mozilla Firefox before 25 allows modification of anonymous content of pluginProblem.xml binding
- https://bugzilla.mozilla.org/show_bug.cgi?id=914618
- https://bugzilla.mozilla.org/show_bug.cgi?id=914618
- https://nki.gov.hu/en/figyelmeztetesek/serulekenysegek/mozilla-firefox-tobbszoros-serulekenysege-2/
- https://nki.gov.hu/en/figyelmeztetesek/serulekenysegek/mozilla-firefox-tobbszoros-serulekenysege-2/
Modified: 2024-11-21
CVE-2013-5595
The JavaScript engine in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 does not properly allocate memory for unspecified functions, which allows remote attackers to conduct buffer overflow attacks via a crafted web page.
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1634
- openSUSE-SU-2013:1634
- SUSE-SU-2013:1678
- SUSE-SU-2013:1678
- RHSA-2013:1476
- RHSA-2013:1476
- RHSA-2013:1480
- RHSA-2013:1480
- DSA-2788
- DSA-2788
- DSA-2797
- DSA-2797
- http://www.mozilla.org/security/announce/2013/mfsa2013-96.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-96.html
- 63421
- 63421
- https://bugzilla.mozilla.org/show_bug.cgi?id=916580
- https://bugzilla.mozilla.org/show_bug.cgi?id=916580
- oval:org.mitre.oval:def:18694
- oval:org.mitre.oval:def:18694
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2013-5596
The cycle collection (CC) implementation in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 does not properly determine the thread for release of an image object, which allows remote attackers to execute arbitrary code or cause a denial of service (race condition and application crash) via a large HTML document containing IMG elements, as demonstrated by the Never-Ending Reddit on reddit.com.
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1634
- openSUSE-SU-2013:1634
- http://www.mozilla.org/security/announce/2013/mfsa2013-97.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-97.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=910881
- https://bugzilla.mozilla.org/show_bug.cgi?id=910881
- oval:org.mitre.oval:def:19066
- oval:org.mitre.oval:def:19066
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2013-5597
Use-after-free vulnerability in the nsDocLoader::doStopDocumentLoad function in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving a state-change event during an update of the offline cache.
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1634
- openSUSE-SU-2013:1634
- SUSE-SU-2013:1678
- SUSE-SU-2013:1678
- RHSA-2013:1476
- RHSA-2013:1476
- RHSA-2013:1480
- RHSA-2013:1480
- DSA-2788
- DSA-2788
- DSA-2797
- DSA-2797
- http://www.mozilla.org/security/announce/2013/mfsa2013-98.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-98.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=918864
- https://bugzilla.mozilla.org/show_bug.cgi?id=918864
- oval:org.mitre.oval:def:19277
- oval:org.mitre.oval:def:19277
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2013-5598
PDF.js in Mozilla Firefox before 25.0 and Firefox ESR 24.x before 24.1 does not properly handle the appending of an IFRAME element, which allows remote attackers to read arbitrary files or execute arbitrary JavaScript code with chrome privileges by using this element within an embedded PDF object.
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1634
- openSUSE-SU-2013:1634
- http://www.mozilla.org/security/announce/2013/mfsa2013-99.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-99.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=920515
- https://bugzilla.mozilla.org/show_bug.cgi?id=920515
- oval:org.mitre.oval:def:19133
- oval:org.mitre.oval:def:19133
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2013-5599
Use-after-free vulnerability in the nsIPresShell::GetPresContext function in the PresShell (aka presentation shell) implementation in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) via vectors involving a CANVAS element, a mozTextStyle attribute, and an onresize event.
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1634
- openSUSE-SU-2013:1634
- SUSE-SU-2013:1678
- SUSE-SU-2013:1678
- RHSA-2013:1476
- RHSA-2013:1476
- RHSA-2013:1480
- RHSA-2013:1480
- DSA-2788
- DSA-2788
- DSA-2797
- DSA-2797
- http://www.mozilla.org/security/announce/2013/mfsa2013-100.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-100.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=915210
- https://bugzilla.mozilla.org/show_bug.cgi?id=915210
- oval:org.mitre.oval:def:19315
- oval:org.mitre.oval:def:19315
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2013-5600
Use-after-free vulnerability in the nsIOService::NewChannelFromURIWithProxyFlags function in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code via vectors involving a blob: URL.
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1634
- openSUSE-SU-2013:1634
- SUSE-SU-2013:1678
- SUSE-SU-2013:1678
- RHSA-2013:1476
- RHSA-2013:1476
- RHSA-2013:1480
- RHSA-2013:1480
- DSA-2788
- DSA-2788
- DSA-2797
- DSA-2797
- http://www.mozilla.org/security/announce/2013/mfsa2013-100.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-100.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=916576
- https://bugzilla.mozilla.org/show_bug.cgi?id=916576
- oval:org.mitre.oval:def:19172
- oval:org.mitre.oval:def:19172
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2013-5601
Use-after-free vulnerability in the nsEventListenerManager::SetEventHandler function in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code via vectors related to a memory allocation through the garbage collection (GC) API.
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1634
- openSUSE-SU-2013:1634
- SUSE-SU-2013:1678
- SUSE-SU-2013:1678
- RHSA-2013:1476
- RHSA-2013:1476
- RHSA-2013:1480
- RHSA-2013:1480
- DSA-2788
- DSA-2788
- DSA-2797
- DSA-2797
- http://www.mozilla.org/security/announce/2013/mfsa2013-100.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-100.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=916685
- https://bugzilla.mozilla.org/show_bug.cgi?id=916685
- oval:org.mitre.oval:def:18495
- oval:org.mitre.oval:def:18495
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2013-5602
The Worker::SetEventListener function in the Web workers implementation in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to direct proxies.
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1634
- openSUSE-SU-2013:1634
- SUSE-SU-2013:1678
- SUSE-SU-2013:1678
- RHSA-2013:1476
- RHSA-2013:1476
- RHSA-2013:1480
- RHSA-2013:1480
- DSA-2788
- DSA-2788
- DSA-2797
- DSA-2797
- http://www.mozilla.org/security/announce/2013/mfsa2013-101.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-101.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=897678
- https://bugzilla.mozilla.org/show_bug.cgi?id=897678
- oval:org.mitre.oval:def:19293
- oval:org.mitre.oval:def:19293
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2013-5603
Use-after-free vulnerability in the nsContentUtils::ContentIsHostIncludingDescendantOf function in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving HTML document templates.
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1634
- openSUSE-SU-2013:1634
- http://www.mozilla.org/security/announce/2013/mfsa2013-102.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-102.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=916404
- https://bugzilla.mozilla.org/show_bug.cgi?id=916404
- oval:org.mitre.oval:def:19302
- oval:org.mitre.oval:def:19302
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2013-5604
The txXPathNodeUtils::getBaseURI function in the XSLT processor in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 does not properly initialize data, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow and application crash) via crafted documents.
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1634
- openSUSE-SU-2013:1634
- SUSE-SU-2013:1678
- SUSE-SU-2013:1678
- RHSA-2013:1476
- RHSA-2013:1476
- RHSA-2013:1480
- RHSA-2013:1480
- DSA-2788
- DSA-2788
- DSA-2797
- DSA-2797
- http://www.mozilla.org/security/announce/2013/mfsa2013-95.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-95.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=914017
- https://bugzilla.mozilla.org/show_bug.cgi?id=914017
- oval:org.mitre.oval:def:19091
- oval:org.mitre.oval:def:19091
- GLSA-201504-01
- GLSA-201504-01
No data currently available.
No data currently available.
No data currently available.
No data currently available.
No data currently available.
No data currently available.
No data currently available.
No data currently available.
Package thunderbird updated to version 24.1.0-alt1 for branch sisyphus in task 107842.
Closed vulnerabilities
BDU:2015-00443
Уязвимость браузера Firefox, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-00447
Уязвимость браузера Firefox, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-00467
Уязвимость программного обеспечения Firefox ESR, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-00470
Уязвимость программного обеспечения Firefox ESR, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-00706
Уязвимость программного обеспечения Thunderbird, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-00714
Уязвимость программного обеспечения Thunderbird, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2024-11-21
CVE-2013-5590
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1634
- openSUSE-SU-2013:1634
- SUSE-SU-2013:1678
- SUSE-SU-2013:1678
- RHSA-2013:1476
- RHSA-2013:1476
- RHSA-2013:1480
- RHSA-2013:1480
- DSA-2788
- DSA-2788
- DSA-2797
- DSA-2797
- http://www.mozilla.org/security/announce/2013/mfsa2013-93.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-93.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=860123
- https://bugzilla.mozilla.org/show_bug.cgi?id=860123
- https://bugzilla.mozilla.org/show_bug.cgi?id=893572
- https://bugzilla.mozilla.org/show_bug.cgi?id=893572
- oval:org.mitre.oval:def:19001
- oval:org.mitre.oval:def:19001
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2013-5591
Unspecified vulnerability in the browser engine in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1634
- openSUSE-SU-2013:1634
- http://www.mozilla.org/security/announce/2013/mfsa2013-93.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-93.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=859892
- https://bugzilla.mozilla.org/show_bug.cgi?id=859892
- oval:org.mitre.oval:def:19015
- oval:org.mitre.oval:def:19015
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2013-5593
The SELECT element implementation in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 does not properly restrict the nature or placement of HTML within a dropdown menu, which allows remote attackers to spoof the address bar or conduct clickjacking attacks via vectors that trigger navigation off of a page containing this element.
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1634
- openSUSE-SU-2013:1634
- http://www.mozilla.org/security/announce/2013/mfsa2013-94.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-94.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=868327
- https://bugzilla.mozilla.org/show_bug.cgi?id=868327
- oval:org.mitre.oval:def:19263
- oval:org.mitre.oval:def:19263
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2013-5595
The JavaScript engine in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 does not properly allocate memory for unspecified functions, which allows remote attackers to conduct buffer overflow attacks via a crafted web page.
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1634
- openSUSE-SU-2013:1634
- SUSE-SU-2013:1678
- SUSE-SU-2013:1678
- RHSA-2013:1476
- RHSA-2013:1476
- RHSA-2013:1480
- RHSA-2013:1480
- DSA-2788
- DSA-2788
- DSA-2797
- DSA-2797
- http://www.mozilla.org/security/announce/2013/mfsa2013-96.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-96.html
- 63421
- 63421
- https://bugzilla.mozilla.org/show_bug.cgi?id=916580
- https://bugzilla.mozilla.org/show_bug.cgi?id=916580
- oval:org.mitre.oval:def:18694
- oval:org.mitre.oval:def:18694
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2013-5596
The cycle collection (CC) implementation in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 does not properly determine the thread for release of an image object, which allows remote attackers to execute arbitrary code or cause a denial of service (race condition and application crash) via a large HTML document containing IMG elements, as demonstrated by the Never-Ending Reddit on reddit.com.
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1634
- openSUSE-SU-2013:1634
- http://www.mozilla.org/security/announce/2013/mfsa2013-97.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-97.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=910881
- https://bugzilla.mozilla.org/show_bug.cgi?id=910881
- oval:org.mitre.oval:def:19066
- oval:org.mitre.oval:def:19066
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2013-5597
Use-after-free vulnerability in the nsDocLoader::doStopDocumentLoad function in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving a state-change event during an update of the offline cache.
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1634
- openSUSE-SU-2013:1634
- SUSE-SU-2013:1678
- SUSE-SU-2013:1678
- RHSA-2013:1476
- RHSA-2013:1476
- RHSA-2013:1480
- RHSA-2013:1480
- DSA-2788
- DSA-2788
- DSA-2797
- DSA-2797
- http://www.mozilla.org/security/announce/2013/mfsa2013-98.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-98.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=918864
- https://bugzilla.mozilla.org/show_bug.cgi?id=918864
- oval:org.mitre.oval:def:19277
- oval:org.mitre.oval:def:19277
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2013-5599
Use-after-free vulnerability in the nsIPresShell::GetPresContext function in the PresShell (aka presentation shell) implementation in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) via vectors involving a CANVAS element, a mozTextStyle attribute, and an onresize event.
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1634
- openSUSE-SU-2013:1634
- SUSE-SU-2013:1678
- SUSE-SU-2013:1678
- RHSA-2013:1476
- RHSA-2013:1476
- RHSA-2013:1480
- RHSA-2013:1480
- DSA-2788
- DSA-2788
- DSA-2797
- DSA-2797
- http://www.mozilla.org/security/announce/2013/mfsa2013-100.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-100.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=915210
- https://bugzilla.mozilla.org/show_bug.cgi?id=915210
- oval:org.mitre.oval:def:19315
- oval:org.mitre.oval:def:19315
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2013-5600
Use-after-free vulnerability in the nsIOService::NewChannelFromURIWithProxyFlags function in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code via vectors involving a blob: URL.
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1634
- openSUSE-SU-2013:1634
- SUSE-SU-2013:1678
- SUSE-SU-2013:1678
- RHSA-2013:1476
- RHSA-2013:1476
- RHSA-2013:1480
- RHSA-2013:1480
- DSA-2788
- DSA-2788
- DSA-2797
- DSA-2797
- http://www.mozilla.org/security/announce/2013/mfsa2013-100.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-100.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=916576
- https://bugzilla.mozilla.org/show_bug.cgi?id=916576
- oval:org.mitre.oval:def:19172
- oval:org.mitre.oval:def:19172
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2013-5601
Use-after-free vulnerability in the nsEventListenerManager::SetEventHandler function in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code via vectors related to a memory allocation through the garbage collection (GC) API.
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1634
- openSUSE-SU-2013:1634
- SUSE-SU-2013:1678
- SUSE-SU-2013:1678
- RHSA-2013:1476
- RHSA-2013:1476
- RHSA-2013:1480
- RHSA-2013:1480
- DSA-2788
- DSA-2788
- DSA-2797
- DSA-2797
- http://www.mozilla.org/security/announce/2013/mfsa2013-100.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-100.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=916685
- https://bugzilla.mozilla.org/show_bug.cgi?id=916685
- oval:org.mitre.oval:def:18495
- oval:org.mitre.oval:def:18495
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2013-5602
The Worker::SetEventListener function in the Web workers implementation in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to direct proxies.
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1634
- openSUSE-SU-2013:1634
- SUSE-SU-2013:1678
- SUSE-SU-2013:1678
- RHSA-2013:1476
- RHSA-2013:1476
- RHSA-2013:1480
- RHSA-2013:1480
- DSA-2788
- DSA-2788
- DSA-2797
- DSA-2797
- http://www.mozilla.org/security/announce/2013/mfsa2013-101.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-101.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=897678
- https://bugzilla.mozilla.org/show_bug.cgi?id=897678
- oval:org.mitre.oval:def:19293
- oval:org.mitre.oval:def:19293
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2013-5603
Use-after-free vulnerability in the nsContentUtils::ContentIsHostIncludingDescendantOf function in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving HTML document templates.
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1634
- openSUSE-SU-2013:1634
- http://www.mozilla.org/security/announce/2013/mfsa2013-102.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-102.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=916404
- https://bugzilla.mozilla.org/show_bug.cgi?id=916404
- oval:org.mitre.oval:def:19302
- oval:org.mitre.oval:def:19302
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2013-5604
The txXPathNodeUtils::getBaseURI function in the XSLT processor in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 does not properly initialize data, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow and application crash) via crafted documents.
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1633
- openSUSE-SU-2013:1634
- openSUSE-SU-2013:1634
- SUSE-SU-2013:1678
- SUSE-SU-2013:1678
- RHSA-2013:1476
- RHSA-2013:1476
- RHSA-2013:1480
- RHSA-2013:1480
- DSA-2788
- DSA-2788
- DSA-2797
- DSA-2797
- http://www.mozilla.org/security/announce/2013/mfsa2013-95.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-95.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=914017
- https://bugzilla.mozilla.org/show_bug.cgi?id=914017
- oval:org.mitre.oval:def:19091
- oval:org.mitre.oval:def:19091
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-1562
Unspecified vulnerability in the browser engine in Mozilla Firefox before 32.0, Firefox ESR 24.x before 24.8 and 31.x before 31.1, and Thunderbird 24.x before 24.8 and 31.x before 31.1 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
- openSUSE-SU-2014:1098
- openSUSE-SU-2014:1098
- SUSE-SU-2014:1107
- SUSE-SU-2014:1107
- SUSE-SU-2014:1112
- SUSE-SU-2014:1112
- SUSE-SU-2014:1120
- SUSE-SU-2014:1120
- openSUSE-SU-2015:0138
- openSUSE-SU-2015:0138
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:1266
- openSUSE-SU-2014:1099
- openSUSE-SU-2014:1099
- 60148
- 60148
- 60186
- 60186
- 61114
- 61114
- 61390
- 61390
- DSA-3018
- DSA-3018
- DSA-3028
- DSA-3028
- http://www.mozilla.org/security/announce/2014/mfsa2014-67.html
- http://www.mozilla.org/security/announce/2014/mfsa2014-67.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 69519
- 69519
- 1030793
- 1030793
- 1030794
- 1030794
- https://bugzilla.mozilla.org/show_bug.cgi?id=1054359
- https://bugzilla.mozilla.org/show_bug.cgi?id=1054359
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-1567
Use-after-free vulnerability in DirectionalityUtils.cpp in Mozilla Firefox before 32.0, Firefox ESR 24.x before 24.8 and 31.x before 31.1, and Thunderbird 24.x before 24.8 and 31.x before 31.1 allows remote attackers to execute arbitrary code via text that is improperly handled during the interaction between directionality resolution and layout.
- openSUSE-SU-2014:1098
- openSUSE-SU-2014:1098
- SUSE-SU-2014:1107
- SUSE-SU-2014:1107
- SUSE-SU-2014:1112
- SUSE-SU-2014:1112
- SUSE-SU-2014:1120
- SUSE-SU-2014:1120
- openSUSE-SU-2015:0138
- openSUSE-SU-2015:0138
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:1266
- openSUSE-SU-2014:1099
- openSUSE-SU-2014:1099
- 60148
- 60148
- 60186
- 60186
- 61114
- 61114
- 61390
- 61390
- DSA-3018
- DSA-3018
- DSA-3028
- DSA-3028
- http://www.mozilla.org/security/announce/2014/mfsa2014-72.html
- http://www.mozilla.org/security/announce/2014/mfsa2014-72.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 69520
- 69520
- 1030793
- 1030793
- 1030794
- 1030794
- https://bugzilla.mozilla.org/show_bug.cgi?id=1037641
- https://bugzilla.mozilla.org/show_bug.cgi?id=1037641
- GLSA-201504-01
- GLSA-201504-01
No data currently available.
No data currently available.
No data currently available.
No data currently available.
No data currently available.
No data currently available.
No data currently available.