ALT-BU-2018-3493-1
Branch sisyphus update bulletin.
Package firefox-esr updated to version 60.2.2-alt1 for branch sisyphus in task 213955.
Closed vulnerabilities
BDU:2019-03414
Уязвимость веб-браузеров Firefox, Firefox ESR, связанная с ошибками преобразования типов данных, позволяющая нарушителю выполнить произвольный код
BDU:2019-03415
Уязвимость реализации метода Array.prototype.push JIT-компилятора веб-браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2018-12386
A vulnerability in register allocation in JavaScript can lead to type confusion, allowing for an arbitrary read and write. This leads to remote code execution inside the sandboxed content process when triggered. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.
- 105460
- 105460
- 1041770
- 1041770
- RHSA-2018:2881
- RHSA-2018:2881
- RHSA-2018:2884
- RHSA-2018:2884
- https://bugzilla.mozilla.org/show_bug.cgi?id=1493900
- https://bugzilla.mozilla.org/show_bug.cgi?id=1493900
- GLSA-201810-01
- GLSA-201810-01
- USN-3778-1
- USN-3778-1
- DSA-4310
- DSA-4310
- https://www.mozilla.org/security/advisories/mfsa2018-24/
- https://www.mozilla.org/security/advisories/mfsa2018-24/
Modified: 2024-11-21
CVE-2018-12387
A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.
- 105460
- 105460
- 1041770
- 1041770
- RHSA-2018:2881
- RHSA-2018:2881
- RHSA-2018:2884
- RHSA-2018:2884
- https://bugzilla.mozilla.org/show_bug.cgi?id=1493903
- https://bugzilla.mozilla.org/show_bug.cgi?id=1493903
- GLSA-201810-01
- GLSA-201810-01
- USN-3778-1
- USN-3778-1
- DSA-4310
- DSA-4310
- https://www.mozilla.org/security/advisories/mfsa2018-24/
- https://www.mozilla.org/security/advisories/mfsa2018-24/
Closed vulnerabilities
BDU:2015-09715
Уязвимость операционной системы Gentoo Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2024-11-21
CVE-2012-3523
The STARTTLS implementation in nnrpd in INN before 2.5.3 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411.
Closed bugs
Обновить до современного
Closed bugs
Обновить до >= 1.6