ALT-BU-2014-3168-1
Branch t7 update bulletin.
Closed bugs
Обновить номер версии до 0.14
Package libopencv2.4 updated to version 2.4.9.1-alt0.M70P.3 for branch t7 in task 136639.
Closed bugs
Устарел
Closed vulnerabilities
Modified: 2024-11-21
CVE-2014-9276
Cross-site request forgery (CSRF) vulnerability in the Special:ExpandedTemplates page in MediaWiki before 1.19.22, 1.20.x through 1.22.x before 1.22.14, and 1.23.x before 1.23.7, when $wgRawHTML is set to true, allows remote attackers to hijack the authentication of users with edit permissions for requests that cross-site scripting (XSS) attacks via the wpInput parameter, which is not properly handled in the preview.
- 1031301
- 1031301
- [oss-security] 20141203 MediaWiki security release - 1.23.7
- [oss-security] 20141203 MediaWiki security release - 1.23.7
- [oss-security] 20141204 Re: MediaWiki security release - 1.23.7
- [oss-security] 20141204 Re: MediaWiki security release - 1.23.7
- [MediaWiki-announce] 20141127 MediaWiki Security and Maintenance Releases: 1.23.7, 1.22.14 and 1.19.22
- [MediaWiki-announce] 20141127 MediaWiki Security and Maintenance Releases: 1.23.7, 1.22.14 and 1.19.22
- https://phabricator.wikimedia.org/T73111
- https://phabricator.wikimedia.org/T73111
Modified: 2024-11-21
CVE-2014-9277
The wfMangleFlashPolicy function in OutputHandler.php in MediaWiki before 1.19.22, 1.20.x through 1.22.x before 1.22.14, and 1.23.x before 1.23.7 allows remote attackers to conduct PHP object injection attacks via a crafted string containing
- 1031301
- 1031301
- DSA-3100
- DSA-3100
- [oss-security] 20141203 MediaWiki security release - 1.23.7
- [oss-security] 20141203 MediaWiki security release - 1.23.7
- [oss-security] 20141204 Re: MediaWiki security release - 1.23.7
- [oss-security] 20141204 Re: MediaWiki security release - 1.23.7
- [MediaWiki-announce] 20141127 MediaWiki Security and Maintenance Releases: 1.23.7, 1.22.14 and 1.19.22
- [MediaWiki-announce] 20141127 MediaWiki Security and Maintenance Releases: 1.23.7, 1.22.14 and 1.19.22
- https://phabricator.wikimedia.org/T73478
- https://phabricator.wikimedia.org/T73478
Modified: 2024-11-21
CVE-2014-9507
MediaWiki 1.21.x, 1.22.x before 1.22.14, and 1.23.x before 1.23.7, when $wgContentHandlerUseDB is enabled, allows remote attackers to conduct cross-site scripting (XSS) attacks by setting the content model for a revision to JS.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2014-1587
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
- openSUSE-SU-2015:0138
- openSUSE-SU-2015:0138
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:1266
- DSA-3090
- DSA-3090
- DSA-3092
- DSA-3092
- http://www.mozilla.org/security/announce/2014/mfsa2014-83.html
- http://www.mozilla.org/security/announce/2014/mfsa2014-83.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 71391
- 71391
- https://bugzilla.mozilla.org/show_bug.cgi?id=1042567
- https://bugzilla.mozilla.org/show_bug.cgi?id=1042567
- https://bugzilla.mozilla.org/show_bug.cgi?id=1072847
- https://bugzilla.mozilla.org/show_bug.cgi?id=1072847
- https://bugzilla.mozilla.org/show_bug.cgi?id=1079729
- https://bugzilla.mozilla.org/show_bug.cgi?id=1079729
- https://bugzilla.mozilla.org/show_bug.cgi?id=1080312
- https://bugzilla.mozilla.org/show_bug.cgi?id=1080312
- https://bugzilla.mozilla.org/show_bug.cgi?id=1089207
- https://bugzilla.mozilla.org/show_bug.cgi?id=1089207
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-1588
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 34.0 and SeaMonkey before 2.31 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
- http://www.mozilla.org/security/announce/2014/mfsa2014-83.html
- http://www.mozilla.org/security/announce/2014/mfsa2014-83.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1013001
- https://bugzilla.mozilla.org/show_bug.cgi?id=1013001
- https://bugzilla.mozilla.org/show_bug.cgi?id=1023158
- https://bugzilla.mozilla.org/show_bug.cgi?id=1023158
- https://bugzilla.mozilla.org/show_bug.cgi?id=1026037
- https://bugzilla.mozilla.org/show_bug.cgi?id=1026037
- https://bugzilla.mozilla.org/show_bug.cgi?id=1037830
- https://bugzilla.mozilla.org/show_bug.cgi?id=1037830
- https://bugzilla.mozilla.org/show_bug.cgi?id=1048517
- https://bugzilla.mozilla.org/show_bug.cgi?id=1048517
- https://bugzilla.mozilla.org/show_bug.cgi?id=1064835
- https://bugzilla.mozilla.org/show_bug.cgi?id=1064835
- https://bugzilla.mozilla.org/show_bug.cgi?id=1073577
- https://bugzilla.mozilla.org/show_bug.cgi?id=1073577
- https://bugzilla.mozilla.org/show_bug.cgi?id=1075546
- https://bugzilla.mozilla.org/show_bug.cgi?id=1075546
- https://bugzilla.mozilla.org/show_bug.cgi?id=1077687
- https://bugzilla.mozilla.org/show_bug.cgi?id=1077687
- https://bugzilla.mozilla.org/show_bug.cgi?id=1086842
- https://bugzilla.mozilla.org/show_bug.cgi?id=1086842
- https://bugzilla.mozilla.org/show_bug.cgi?id=1096026
- https://bugzilla.mozilla.org/show_bug.cgi?id=1096026
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-1589
Mozilla Firefox before 34.0 and SeaMonkey before 2.31 provide stylesheets with an incorrect primary namespace, which allows remote attackers to bypass intended access restrictions via an XBL binding.
- http://www.mozilla.org/security/announce/2014/mfsa2014-84.html
- http://www.mozilla.org/security/announce/2014/mfsa2014-84.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1043787
- https://bugzilla.mozilla.org/show_bug.cgi?id=1043787
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-1590
The XMLHttpRequest.prototype.send method in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to cause a denial of service (application crash) via a crafted JavaScript object.
- openSUSE-SU-2015:0138
- openSUSE-SU-2015:0138
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:1266
- DSA-3090
- DSA-3090
- DSA-3092
- DSA-3092
- http://www.mozilla.org/security/announce/2014/mfsa2014-85.html
- http://www.mozilla.org/security/announce/2014/mfsa2014-85.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 71397
- 71397
- https://bugzilla.mozilla.org/show_bug.cgi?id=1087633
- https://bugzilla.mozilla.org/show_bug.cgi?id=1087633
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-1591
Mozilla Firefox 33.0 and SeaMonkey before 2.31 include path strings in CSP violation reports, which allows remote attackers to obtain sensitive information via a web site that receives a report after a redirect.
- http://www.mozilla.org/security/announce/2014/mfsa2014-86.html
- http://www.mozilla.org/security/announce/2014/mfsa2014-86.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1069762
- https://bugzilla.mozilla.org/show_bug.cgi?id=1069762
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-1592
Use-after-free vulnerability in the nsHtml5TreeOperation function in xul.dll in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code by adding a second root element to an HTML5 document during parsing.
- openSUSE-SU-2015:0138
- openSUSE-SU-2015:0138
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:1266
- DSA-3090
- DSA-3090
- DSA-3092
- DSA-3092
- http://www.mozilla.org/security/announce/2014/mfsa2014-87.html
- http://www.mozilla.org/security/announce/2014/mfsa2014-87.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 71398
- 71398
- https://bugzilla.mozilla.org/show_bug.cgi?id=1088635
- https://bugzilla.mozilla.org/show_bug.cgi?id=1088635
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-1593
Stack-based buffer overflow in the mozilla::FileBlockCache::Read function in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code via crafted media content.
- openSUSE-SU-2015:0138
- openSUSE-SU-2015:0138
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:1266
- DSA-3090
- DSA-3090
- DSA-3092
- DSA-3092
- http://www.mozilla.org/security/announce/2014/mfsa2014-88.html
- http://www.mozilla.org/security/announce/2014/mfsa2014-88.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 71395
- 71395
- https://bugzilla.mozilla.org/show_bug.cgi?id=1085175
- https://bugzilla.mozilla.org/show_bug.cgi?id=1085175
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-1594
Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 might allow remote attackers to execute arbitrary code by leveraging an incorrect cast from the BasicThebesLayer data type to the BasicContainerLayer data type.
- openSUSE-SU-2015:0138
- openSUSE-SU-2015:0138
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:1266
- DSA-3090
- DSA-3090
- DSA-3092
- DSA-3092
- http://www.mozilla.org/security/announce/2014/mfsa2014-89.html
- http://www.mozilla.org/security/announce/2014/mfsa2014-89.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 71396
- 71396
- https://bugzilla.mozilla.org/show_bug.cgi?id=1074280
- https://bugzilla.mozilla.org/show_bug.cgi?id=1074280
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-8631
The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 34.0 and SeaMonkey before 2.31 supports native-interface passing, which allows remote attackers to bypass intended DOM object restrictions via a call to an unspecified method.
- http://www.mozilla.org/security/announce/2014/mfsa2014-91.html
- http://www.mozilla.org/security/announce/2014/mfsa2014-91.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=821573
- https://bugzilla.mozilla.org/show_bug.cgi?id=821573
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-8632
The structured-clone implementation in Mozilla Firefox before 34.0 and SeaMonkey before 2.31 does not properly interact with XrayWrapper property filtering, which allows remote attackers to bypass intended DOM object restrictions by leveraging property availability after XrayWrapper removal.
- http://www.mozilla.org/security/announce/2014/mfsa2014-91.html
- http://www.mozilla.org/security/announce/2014/mfsa2014-91.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1050340
- https://bugzilla.mozilla.org/show_bug.cgi?id=1050340
- GLSA-201504-01
- GLSA-201504-01
Package thunderbird updated to version 31.3.0-alt0.M70P.1 for branch t7 in task 136639.
Closed vulnerabilities
No data currently available.
No data currently available.
No data currently available.
No data currently available.
No data currently available.
No data currently available.