ALT-BU-2019-3850-1
Branch c7 update bulletin.
Closed vulnerabilities
BDU:2017-01674
Уязвимость функции getNodeSize системы управления базами данных SQLite, позволяющая нарушителю оказать другое воздействие
Modified: 2024-11-21
CVE-2016-6153
os_unix.c in SQLite before 3.13.0 improperly implements the temporary directory search algorithm, which might allow local users to obtain sensitive information, cause a denial of service (application crash), or have unspecified other impact by leveraging use of the current working directory for temporary files.
- openSUSE-SU-2016:2041
- openSUSE-SU-2016:2041
- [oss-security] 20160701 SQLite Tempdir Selection Vulnerability
- [oss-security] 20160701 SQLite Tempdir Selection Vulnerability
- [oss-security] 20160701 Re: SQLite Tempdir Selection Vulnerability
- [oss-security] 20160701 Re: SQLite Tempdir Selection Vulnerability
- 91546
- 91546
- http://www.sqlite.org/cgi/src/info/67985761aa93fb61
- http://www.sqlite.org/cgi/src/info/67985761aa93fb61
- [debian-lts-announce] 20230522 [SECURITY] [DLA 3431-1] sqlite security update
- [debian-lts-announce] 20230522 [SECURITY] [DLA 3431-1] sqlite security update
- FEDORA-2016-0138339b54
- FEDORA-2016-0138339b54
- FEDORA-2019-49f80a78bc
- FEDORA-2019-49f80a78bc
- USN-4019-1
- USN-4019-1
- USN-4019-2
- USN-4019-2
- https://www.korelogic.com/Resources/Advisories/KL-001-2016-003.txt
- https://www.korelogic.com/Resources/Advisories/KL-001-2016-003.txt
- https://www.sqlite.org/releaselog/3_13_0.html
- https://www.sqlite.org/releaselog/3_13_0.html
- https://www.tenable.com/security/tns-2016-20
- https://www.tenable.com/security/tns-2016-20
Modified: 2024-11-21
CVE-2017-10989
The getNodeSize function in ext/rtree/rtree.c in SQLite through 3.19.3, as used in GDAL and other products, mishandles undersized RTree blobs in a crafted database, leading to a heap-based buffer over-read or possibly unspecified other impact.
- openSUSE-SU-2019:1426
- openSUSE-SU-2019:1426
- http://marc.info/?l=sqlite-users&m=149933696214713&w=2
- http://marc.info/?l=sqlite-users&m=149933696214713&w=2
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- 99502
- 99502
- 1039427
- 1039427
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=2405
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=2405
- https://bugs.launchpad.net/ubuntu/+source/sqlite3/+bug/1700937
- https://bugs.launchpad.net/ubuntu/+source/sqlite3/+bug/1700937
- [debian-lts-announce] 20190111 [SECURITY] [DLA 1633-1] sqlite3 security update
- [debian-lts-announce] 20190111 [SECURITY] [DLA 1633-1] sqlite3 security update
- https://sqlite.org/src/info/66de6f4a
- https://sqlite.org/src/info/66de6f4a
- https://sqlite.org/src/vpatch?from=0db20efe201736b3&to=66de6f4a9504ec26
- https://sqlite.org/src/vpatch?from=0db20efe201736b3&to=66de6f4a9504ec26
- https://support.apple.com/HT208112
- https://support.apple.com/HT208112
- https://support.apple.com/HT208113
- https://support.apple.com/HT208113
- https://support.apple.com/HT208115
- https://support.apple.com/HT208115
- https://support.apple.com/HT208144
- https://support.apple.com/HT208144
- USN-4019-1
- USN-4019-1
- USN-4019-2
- USN-4019-2
Modified: 2024-11-21
CVE-2017-15286
SQLite 3.20.1 has a NULL pointer dereference in tableColumnList in shell.c because it fails to consider certain cases where `sqlite3_step(pStmt)==SQLITE_ROW` is false and a data structure is never initialized.
Closed bugs
Обновить до 3.12
sqlite3: требуется пересобрать с --enable-fts5
Closed bugs
Обновить до >= 1.6
Package thunderbird updated to version 60.8.0-alt0.M70C.1 for branch c7 in task 234994.
Closed vulnerabilities
BDU:2017-01833
Уязвимость набора библиотек Network Security Services, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2018-00155
Уязвимость интерфейса Fetch API браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2018-00156
Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с использованием памяти после освобождения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2018-00157
Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с использованием памяти после освобождения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2018-00158
Уязвимость графической библиотеки ANGLE браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2018-00159
Уязвимость реализации протокола TLS 1.2 браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2018-00160
Уязвимость реализации функции защиты от вредоносных сайтов и фишинга Phishing and Malware Protection браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю проводить фишинг-атаки
BDU:2018-00161
Уязвимость реализации механизма CSP браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю осуществлять межсайтовые сценарные атаки
BDU:2018-00162
Уязвимость браузеров Mozilla Firefox и Firefox ESR, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2018-00164
Уязвимость реализации технологии WebSockets браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2018-00165
Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с использованием памяти после освобождения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2018-00166
Уязвимость функции nsImageLoadingContent::Notify браузера Mozilla Firefox ESR, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2018-00167
Уязвимость функции mozilla::dom::ImageDocument::UpdateSizeFromLayout браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2018-00168
Уязвимость функции mozilla::a11y::DocAccessible::PutChildrenBack браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2018-00169
Уязвимость функции mozilla::SVGGeometryFrame::GetCanvasTM() браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2018-00170
Уязвимость браузера Mozilla Firefox ESR, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2018-00171
Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с недостатками в реализации SOP (Same-origin policy), позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2018-00172
Уязвимость механизма AppCache браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю осуществить подмену домена
BDU:2018-00173
Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2018-00174
Уязвимость реализации протокола «data:» браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю оказать влияние на целостность защищаемой информации
BDU:2018-00175
Уязвимость реализации механизма CSP (Content Security Policy) браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2018-00176
Уязвимость браузера Mozilla Firefox ESR, связанная с ошибками при работе с памятью, позволяющая нарушителю выполнить произвольный код
BDU:2018-01122
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, вызванная переполнением буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2018-01333
Уязвимость веб-браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, связанная с использованием памяти после её освобождения, позволяющая нарушителю выполнить произвольный код или вызвать аварийное завершение работы приложения
BDU:2018-01334
Уязвимость компонента IndexedDB веб-браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код или вызвать аварийное завершение работы приложения
BDU:2018-01339
Уязвимость библиотеи angle веб-браузера Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2018-01368
Уязвимость браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, связанная с ситуацией гонки в обработчике сигнала, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2018-01426
Уязвимость браузера Firefox ESR, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2018-01442
Уязвимость обработчика JavaScript-сценариев веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2018-01443
Уязвимость веб-браузера Firefox ESR и почтового клиента Thunderbird, связанная с целочисленным переполнением, позволяющая нарушителю выполнить произвольный код
BDU:2018-01494
Уязвимость мультимедийной библиотеки libvorbis, связанная с выходом за границы при чтении буфера памяти, позволяющая нарушителю вызвать отказ в обслуживании или нарушить конфиденциальность и целостность данных
BDU:2018-01609
Уязвимость графической библиотеки Skia браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2019-00013
Уязвимость графической библиотеки Skia веб-браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2019-00230
Уязвимость функции lz4::decompress библиотеки Graphite 2 браузеров Mozilla Firefox и Mozilla Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2019-00508
Уязвимость механизма записи потока мультимедиа веб-браузеров Firefox, Firefox ESR и программы для работы с электронной почтой Thunderbird, связанная с некорректной проверкой типа источника данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-00681
Уязвимость компонента Proxy Auto-Config браузера Firefox, позволяющая нарушителю обойти существующие ограничения безопасности и произвести атаки на службы и инструменты, привязанные к локальному хосту
BDU:2019-00819
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с ошибками реализации механизма аутентификации межпроцессного взаимодействия (IPC), позволяющая нарушителю повысить свои привилегии и выйти из изолированной программной среды
BDU:2019-00820
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2019-00821
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с использованием памяти после её освобождения, позволяющая нарушителю выполнить произвольный код
BDU:2019-00919
Уязвимость веб-браузеров Firefox, Firefox ESR и программы для работы с электронной почтой Thunderbird, связанная с переполнением буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2019-00920
Уязвимость веб-браузеров Firefox, Firefox ESR и программы для работы с электронной почтой Thunderbird, связанная с обращением к освобожденной ячейке памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01276
Уязвимость метода Array.prototype.slice JIT-компилятора IonMonkey браузера Firefox ESR, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2019-01277
Уязвимость функции of __proto__ mutations JIT-компилятора IonMonkey браузера Firefox ESR, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2019-01422
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2019-01423
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с целочисленным переполнением, позволяющая нарушителю осуществить запись за границами буфера в памяти
BDU:2019-01424
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с использованием памяти после освобождения, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2019-01425
Уязвимость графической библиотеки Skia веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2019-01426
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с недостатками механизмов ограничения домена (Same Origin Policy), позволяющая нарушителю перенаправить пользователя на вредоносный сайт
BDU:2019-01556
Уязвимость браузеров Firefox и Firefox ESR, связанная с использованием памяти после ее освобождения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01557
Уязвимость JIT-компилятора IonMonkey браузеров Firefox и Firefox ESR, связанная с ошибкой преобразования типов данных, позволяющая нарушителю оказать воздействие на целостность защищаемых данных
BDU:2019-01568
Уязвимость just-in-time (JIT) компилятора IonMonkey веб-браузеров Firefox, Firefox ESR и программы для работы с электронной почтой Thunderbird, связанная с записью данных за пределы границ буфера, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01569
Уязвимость веб-браузеров Firefox, Firefox ESR, Firefox и программы для работы с электронной почтой Thunderbird, связанная с чтением данных за границами буфера памяти, позволяющая нарушителю получить несанкционированный доступ к защищаемым данным
BDU:2019-01570
Уязвимость механизма проверки сигнатур S/MIME программы для работы с электронной почтой Thunderbird, связанная с неполной проверкой метаданных цифровой подписи, позволяющая нарушителю повторно подписывать письма допустимой цифровой подписью
BDU:2019-01571
Уязвимость библиотеки Skia используемой веб-браузеров Firefox, Firefox ESR и программы для работы с электронной почтой Thunderbird, связанная с целочисленным переполнением, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01950
Уязвимость программного обеспечения Firefox, Firefox ESR и Thunderbird, связанная с копированием буфера без проверки размера входных данных, позволяющая нарушителю выполнить произвольный код
BDU:2019-02851
Уязвимость браузеров Firefox, Firefox ESR, почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2019-02932
Уязвимость реализации сетевого протокола HTTP/2 браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-02933
Уязвимость браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, связанная с недостатками разграничения доступа, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-02934
Уязвимость плагина NPAPI браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, позволяющая нарушителю осуществить межсайтовую подделку запросов
BDU:2019-02935
Уязвимость компонента document.domain браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, позволяющая нарушителю осуществить межсайтовую сценарную атаку
BDU:2019-02947
Уязвимость браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, существующая из-за недостаточной проверки параметров в сообщениях Prompt:Open IPC между дочерним и родительским процессами, позволяющая нарушителю выполнить произвольный код
BDU:2019-03308
Уязвимость механизма обработки SVG-объектов браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2019-03309
Уязвимость механизма обработки SVG-объектов браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2019-03312
Уязвимость библиотеки Skia браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код
BDU:2019-03330
Уязвимость функции png_image_free (png.c) библиотеки для работы с растровой графикой в формате PNG libpng, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-03412
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с хранением паролей в незашифрованном виде, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2019-03413
Уязвимость компонента TransportSecurityInfo веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-03416
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2019-03461
Уязвимость браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2019-03462
Уязвимость браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2019-03463
Уязвимость функции SwizzleData браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2019-03464
Уязвимость браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, вызванная целочисленным переполнением, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2019-03465
Уязвимость браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, связанная с использованием памяти после её освобождения, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2019-03466
Уязвимость плагина NPAPI браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2019-03467
Уязвимость браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, связанная с ошибками межпроцессного взаимодействия (IPC), позволяющая нарушителю раскрыть защищаемую информацию
BDU:2019-03468
Уязвимость браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, связанная с недопустимым размером сетки во время QCMS-преобразований, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2019-03469
Уязвимость компонента PerformanceNavigationTiming браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2019-03470
Уязвимость браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, связанная с ошибками в настройках безопасности, позволяющая нарушителю выполнить произвольный код
BDU:2019-03471
Уязвимость библиотеки Skia браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-03472
Уязвимость реализации протокола HTTP Live Streaming браузеров Firefox и Firefox ESR и почтового клиента Thunderbird для Android, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2019-03510
Уязвимость компонента baseURI браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, позволяющая нарушителю оказать влияние на целостность защищаемой информации
BDU:2019-03558
Уязвимость компонента API XMLHttpRequest браузеров Firefox, Firefox ESR, почтового клиента Thunderbird, связанная с использованием памяти после ее освобождения, позволяющая нарушителю оказать воздействие на целостность данных, получить несанкционированный доступ к защищаемой информации, а также вызвать отказ в обслуживании
BDU:2019-03559
Уязвимость браузеров Firefox, Firefox ESR, почтового клиента Thunderbird, связанная с использованием памяти после ее освобождения, позволяющая нарушителю оказать воздействие на целостность данных, получить несанкционированный доступ к защищаемой информации, а также вызвать отказ в обслуживании
BDU:2019-03560
Уязвимость буферных данных WebGL браузеров Firefox, Firefox ESR, почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю оказать воздействие на целостность данных, получить несанкционированный доступ к защищаемой информации, а также вызвать отказ в обслуживании
BDU:2019-03561
Уязвимость браузеров Firefox, Firefox ESR, почтового клиента Thunderbird, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2019-03564
Уязвимость функции parser_get_next_char календаря iCal программного обеспечения для работы с электронной почтой Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю оказать воздействие на целостность данных, получить несанкционированный доступ к защищаемой информации, а также вызвать отказ в обслуживании
BDU:2019-03565
Уязвимость функции icalmemory_strdup_and_dequote календаря iCal программного обеспечения для работы с электронной почтой Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю оказать воздействие на целостность данных, получить несанкционированный доступ к защищаемой информации, а также вызвать отказ в обслуживании
BDU:2019-03611
Уязвимость библиотеки libical почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-03612
Уязвимость библиотеки libical почтового клиента Thunderbird, связанная с отсутствием проверки типа передаваемого объекта (“type confusion”), позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-03613
Уязвимость метода Array.pop почтового клиента Thunderbird и браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-03614
Уязвимость почтового клиента Thunderbird и браузеров Firefox и Firefox ESR, связанная с неправильным синтаксическим анализом содержимого страницы или интерпретацией введенных пользователем данных, позволяющая нарушителю выполнить произвольный код
BDU:2019-03615
Уязвимость почтового клиента Thunderbird и браузеров Firefox и Firefox ESR, связанная с ошибками экранирования символа каретки("^"), позволяющая нарушителю нарушить целостность данных
BDU:2019-03616
Уязвимость библиотеки служб сетевой безопасности (NSS) почтового клиента Thunderbird и браузеров Firefox и Firefox ESR, позволяющая нарушителю получить несанкционированный доступ к информации
BDU:2019-04024
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2019-04292
Уязвимость функций шифрования Secure/Multipurpose Internet Mail Extentions (S/MIME) и PGP почтового клиента Thunderbird, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2019-04293
Уязвимость функции шифрования Secure/Multipurpose Internet Mail Extentions (S/MIME) почтового клиента Thunderbird, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2019-04294
Уязвимость почтового клиента Thunderbird, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2019-04296
Уязвимость браузеров Firefox, Firefox ESR, почтового клиента Thunderbird, связанная с записью за границы буфера памяти, позволяющая нарушителю выполнить произвольный код
BDU:2019-04569
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2019-04582
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с ошибками при обработке объектов в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2019-04635
Уязвимость обработчика событий браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04637
Уязвимость объекта canvas браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2019-04638
Уязвимость функций работы с объектами JavaScript браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю получить доступ к конфиденциальной информации и вызвать отказ в обслуживании
BDU:2019-04639
Уязвимость функций соответствия отсеков JavaScript браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04640
Уязвимость безопасности памяти браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании и нарушить целостность данных
BDU:2019-04642
Уязвимость функции формирования открытых ключей p256-ECDH браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00687
Уязвимость графической библиотеки Skia браузера Google Chrome, связанная с чтением за границами буфера данных, позволяющая нарушителю получить несанкционированный доступ к информации
BDU:2020-00723
Уязвимость веб-браузеров Firefox, Firefox ESR и программы для работы с электронной почтой Thunderbird, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным
BDU:2020-00726
Уязвимость почтового клиента Thunderbird, связаная с использованием памяти после освобождения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00727
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность
BDU:2020-00746
Уязвимость контроллера анимации SMIL почтового клиента Thunderbird и браузеров Firefox и Firefox ESR, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность
BDU:2020-00747
Уязвимость компилятора IonMonkey Just-in-Time почтового клиента Thunderbird и браузеров Firefox и Firefox ESR, связанная с неправильным преобразованием типов, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00759
Уязвимость метода TransferFromImageBitmap почтового клиента Thunderbird и браузеров Firefox и Firefox ESR, связанная с возможностью чтения элемента canvas, игнорируя политику безопасности, позволяющая нарушителю получить несанкционированный доступ к информации
BDU:2020-00771
Уязвимость функции createImageBitmap браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с ошибкой подтверждения источника данных, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2020-05740
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2020-05741
Уязвимость функций анимации SMIL браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05742
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c использованием памяти после освобождения при обработке транзакций в редакторе, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05743
Уязвимость функции FeatureRef::applyValToFeature библиотеки шрифтов Graphite 2 браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05744
Уязвимость функции nsAutoPtr браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05745
Уязвимость функции nsTArray Length() браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05746
Уязвимость функции txExecutionState браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05747
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c использованием памяти после освобождения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05748
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c использованием памяти после освобождения при манипулировании элементами DOM, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05793
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2020-05801
Уязвимость функции evutil_parse_sockaddr_port (evutil.c) библиотеки асинхронного уведомления событий Libevent, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05803
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c использованием памяти после освобождения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05804
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c использованием памяти после освобождения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05833
Уязвимость реализации метода ProcessNextState (netwerk\streamconv\converters\nsBinHexDecoder.cpp) браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05834
Уязвимость реализации метода nsDirIndexParser::ParseData (netwerk\streamconv\converters\nsDirIndexParser.cpp) браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю получить доступ к защищаемой информации
BDU:2020-05842
Уязвимость реализации метода nsDirIndexParser::ParseFormat (netwerk\streamconv\converters\nsDirIndexParser.cpp) браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c отсутствием проверки при индексировании по массиву, позволяющая нарушителю получить доступ к защищаемой информации
BDU:2020-05843
Уязвимость реализации технологии HTTP/2 браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05844
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c использованием памяти после освобождения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05845
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c недостаточной проверкой вводимых данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05846
Уязвимость механизма подмены адресной строки через взаимодействие пользователя с адресной строкой и событием «onblur» браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю проводить спуфинг-атаки
BDU:2020-05847
Уязвимость функции PFileSystemRequestConstructor браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c обходом защиты доступа к файловой системе в песочнице, позволяющая нарушителю получить доступ к защищаемой информации
BDU:2020-05848
Уязвимость компонента WebGL браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-00020
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c использованием памяти после освобождения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-00021
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c использованием памяти после освобождения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-00022
Уязвимость библиотеки Skia браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-00023
Уязвимость интерфейса Resource Timing API браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2021-00024
Уязвимость реализации объекта «PressShell» браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-00025
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c недостаточной проверкой вводимых данных, позволяющая нарушителю проводить спуфинг-атаки
BDU:2021-00026
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c использованием памяти после освобождения при манипулировании элементами DOM, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-00028
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная cо смешением символов из блока «Canadian Syllabics» с символами из других блоков, позволяющая нарушителю проводить спуфинг-атаки
BDU:2021-00029
Уязвимость аудиокодека Opus браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-00030
Уязвимость интерфейса прикладного программирования клиентского хранилища IndexedDB браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-00031
Уязвимость компонента XMLHttpRequest браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-00032
Уязвимость компонента WebGL (Web-based Graphics Library) браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2021-00033
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2021-00034
Уязвимость загрузчика фреймов браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-00035
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c использованием памяти после освобождения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-00036
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2021-00037
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c выход операции за границы буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность
BDU:2021-00038
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c непринятием мер по защите структуры веб-страницы, позволяющая нарушителю нарушителю проводить межсайтовые сценарные атаки
BDU:2021-00039
Уязвимость реализации функции ConvolvePixel() браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или вызвать отказ в обслуживании
BDU:2021-00041
Уязвимость редактора метода ввода Input Method Editor (IME) браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-00042
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c использованием памяти после освобождения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-00043
Уязвимость графической библиотеки Skia браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-00044
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c использованием после освобождения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-00047
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c выходом операции за границы буфера в памяти при манипуляции с деревом доступа DOM, позволяющая нарушителю выполнить произвольный код
BDU:2021-00048
Уязвимость службы сетевой безопасности NSS браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю оказать влияние на целостность данных
BDU:2021-00049
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c использованием памяти после освобождения при преобразований XSL, позволяющая нарушителю выполнить произвольный код
BDU:2021-00050
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2021-00051
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2021-00066
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c использованием после освобождениям при манипулировании медиа-элементами HTML, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность
BDU:2021-00067
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c использованием после освобождениям, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность
BDU:2021-00068
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c недостаточной проверкой вводимых данных, позволяющая нарушителю нарушить целостность информации
BDU:2021-00069
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c выходом операции за границы буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность
BDU:2021-00375
Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с отсутствием проверки параметров в IPC-сообщениях, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2021-00392
Уязвимость реализации свойства animatedPathSegList языка разметки SVG браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03830
Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, вызванная ошибками синхронизации при использовании общего ресурса, позволяющая нарушителю выйти из изолированной программной среды
BDU:2021-04136
Уязвимость реализации протокола S/MIME почтового клиента Thunderbird, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2021-04137
Уязвимость почтового клиента Thunderbird, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-04138
Уязвимость почтового клиента Thunderbird, связанная с раскрытием информации, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2021-04139
Уязвимость почтового клиента Thunderbird, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю отобразить произвольное имя вложения
BDU:2021-04140
Уязвимость браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти во время преобразования строки UTF-8 в Unicode, позволяющая нарушителю выполнить произвольный код
BDU:2021-04141
Уязвимость почтового клиента Thunderbird, связанная с непринятием мер по шифрованию защищаемых данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2023-01886
Уязвимость браузера Mozilla Firefox ESR и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2023-01948
Уязвимость automount-демона браузеров Tor, Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю обойти ограничения безопасности
Modified: 2024-11-21
CVE-2016-10196
Stack-based buffer overflow in the evutil_parse_sockaddr_port function in evutil.c in libevent before 2.1.6-beta allows attackers to cause a denial of service (segmentation fault) via vectors involving a long string in brackets in the ip_as_string argument.
- DSA-3789
- DSA-3789
- [oss-security] 20170131 Bugs fixed in libevent 2.1.6
- [oss-security] 20170131 Bugs fixed in libevent 2.1.6
- [oss-security] 20170202 Re: Bugs fixed in libevent 2.1.6
- [oss-security] 20170202 Re: Bugs fixed in libevent 2.1.6
- 96014
- 96014
- 1038320
- 1038320
- RHSA-2017:1104
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1343453
- https://bugzilla.mozilla.org/show_bug.cgi?id=1343453
- https://github.com/libevent/libevent/blob/release-2.1.6-beta/ChangeLog
- https://github.com/libevent/libevent/blob/release-2.1.6-beta/ChangeLog
- https://github.com/libevent/libevent/commit/329acc18a0768c21ba22522f01a5c7f46cacc4d5
- https://github.com/libevent/libevent/commit/329acc18a0768c21ba22522f01a5c7f46cacc4d5
- https://github.com/libevent/libevent/issues/318
- https://github.com/libevent/libevent/issues/318
- GLSA-201705-01
- GLSA-201705-01
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2016-5824
libical 1.0 allows remote attackers to cause a denial of service (use-after-free) via a crafted ics file.
- [oss-security] 20160625 Re: libical 0.47 SEGV on unknown address
- [oss-security] 20160625 Re: libical 0.47 SEGV on unknown address
- [oss-security] 20170120 Re: CVE-2016-9584: heap use-after-free on libical
- [oss-security] 20170120 Re: CVE-2016-9584: heap use-after-free on libical
- 91459
- 91459
- RHSA-2019:0269
- RHSA-2019:0269
- RHSA-2019:0270
- RHSA-2019:0270
- https://bugzilla.mozilla.org/show_bug.cgi?id=1275400
- https://bugzilla.mozilla.org/show_bug.cgi?id=1275400
- https://github.com/libical/libical/issues/235
- https://github.com/libical/libical/issues/235
- https://github.com/libical/libical/issues/251
- https://github.com/libical/libical/issues/251
- https://github.com/libical/libical/issues/286
- https://github.com/libical/libical/issues/286
- GLSA-201904-02
- GLSA-201904-02
- GLSA-201904-07
- GLSA-201904-07
- USN-3897-1
- USN-3897-1
Modified: 2024-11-21
CVE-2016-9899
Use-after-free while manipulating DOM events and removing audio elements due to errors in the handling of node adoption. This vulnerability affects Firefox < 50.1, Firefox ESR < 45.6, and Thunderbird < 45.6.
- RHSA-2016:2946
- RHSA-2016:2946
- RHSA-2016:2973
- RHSA-2016:2973
- 94885
- 94885
- 1037461
- 1037461
- https://bugzilla.mozilla.org/show_bug.cgi?id=1317409
- https://bugzilla.mozilla.org/show_bug.cgi?id=1317409
- GLSA-201701-15
- GLSA-201701-15
- DSA-3757
- DSA-3757
- 41042
- 41042
- https://www.mozilla.org/security/advisories/mfsa2016-94/
- https://www.mozilla.org/security/advisories/mfsa2016-94/
- https://www.mozilla.org/security/advisories/mfsa2016-95/
- https://www.mozilla.org/security/advisories/mfsa2016-95/
- https://www.mozilla.org/security/advisories/mfsa2016-96/
- https://www.mozilla.org/security/advisories/mfsa2016-96/
Modified: 2024-11-21
CVE-2017-16541
Tor Browser before 7.0.9 on macOS and Linux allows remote attackers to bypass the intended anonymity feature and discover a client IP address via vectors involving a crafted web site that leverages file:// mishandling in Firefox, aka TorMoil. NOTE: Tails is unaffected.
- 101665
- 101665
- 1041610
- 1041610
- RHSA-2018:2692
- RHSA-2018:2692
- RHSA-2018:2693
- RHSA-2018:2693
- RHSA-2018:3403
- RHSA-2018:3403
- RHSA-2018:3458
- RHSA-2018:3458
- https://blog.torproject.org/tor-browser-709-released
- https://blog.torproject.org/tor-browser-709-released
- https://bugzilla.mozilla.org/show_bug.cgi?id=1412081
- https://bugzilla.mozilla.org/show_bug.cgi?id=1412081
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- https://trac.torproject.org/projects/tor/ticket/24052
- https://trac.torproject.org/projects/tor/ticket/24052
- https://www.bleepingcomputer.com/news/security/tormoil-vulnerability-leaks-real-ip-address-from-tor-browser-users/
- https://www.bleepingcomputer.com/news/security/tormoil-vulnerability-leaks-real-ip-address-from-tor-browser-users/
- DSA-4327
- DSA-4327
- https://www.wearesegment.com/research/tormoil-torbrowser-unspecified-critical-security-vulnerability/
- https://www.wearesegment.com/research/tormoil-torbrowser-unspecified-critical-security-vulnerability/
Modified: 2024-11-21
CVE-2017-5398
Memory safety bugs were reported in Thunderbird 45.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8.
- RHSA-2017:0459
- RHSA-2017:0459
- RHSA-2017:0461
- RHSA-2017:0461
- RHSA-2017:0498
- RHSA-2017:0498
- 96651
- 96651
- 1037966
- 1037966
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1332550%2C1332597%2C1338383%2C1321612%2C1322971%2C1333568%2C1333887%2C1335450%2C1325052%2C1324379%2C1336510
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1332550%2C1332597%2C1338383%2C1321612%2C1322971%2C1333568%2C1333887%2C1335450%2C1325052%2C1324379%2C1336510
- GLSA-201705-06
- GLSA-201705-06
- GLSA-201705-07
- GLSA-201705-07
- DSA-3805
- DSA-3805
- DSA-3832
- DSA-3832
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
Modified: 2024-11-21
CVE-2017-5399
Memory safety bugs were reported in Firefox 51. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 52 and Thunderbird < 52.
- 96692
- 96692
- 1037966
- 1037966
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1332569%2C1315248%2C1261335%2C1321038%2C1331771%2C1339566%2C1339591%2C1240893%2C1341905%2C1323241%2C1336467%2C1270288%2C1295299%2C1296024%2C1304201%2C1306142%2C1307557%2C1308036%2C1334246%2C1334290%2C1317085%2C1339116%2C1324000%2C1323150%2C1332501%2C1320894%2C1333752%2C1303713%2C1321566%2C1264053%2C1343513
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1332569%2C1315248%2C1261335%2C1321038%2C1331771%2C1339566%2C1339591%2C1240893%2C1341905%2C1323241%2C1336467%2C1270288%2C1295299%2C1296024%2C1304201%2C1306142%2C1307557%2C1308036%2C1334246%2C1334290%2C1317085%2C1339116%2C1324000%2C1323150%2C1332501%2C1320894%2C1333752%2C1303713%2C1321566%2C1264053%2C1343513
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
Modified: 2024-11-21
CVE-2017-5400
JIT-spray targeting asm.js combined with a heap spray allows for a bypass of ASLR and DEP protections leading to potential memory corruption attacks. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8.
- RHSA-2017:0459
- RHSA-2017:0459
- RHSA-2017:0461
- RHSA-2017:0461
- RHSA-2017:0498
- RHSA-2017:0498
- 96654
- 96654
- 1037966
- 1037966
- https://bugzilla.mozilla.org/show_bug.cgi?id=1334933
- https://bugzilla.mozilla.org/show_bug.cgi?id=1334933
- GLSA-201705-06
- GLSA-201705-06
- GLSA-201705-07
- GLSA-201705-07
- DSA-3805
- DSA-3805
- DSA-3832
- DSA-3832
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
Modified: 2024-11-21
CVE-2017-5401
A crash triggerable by web content in which an "ErrorResult" references unassigned memory due to a logic error. The resulting crash may be exploitable. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8.
- RHSA-2017:0459
- RHSA-2017:0459
- RHSA-2017:0461
- RHSA-2017:0461
- RHSA-2017:0498
- RHSA-2017:0498
- 96677
- 96677
- 1037966
- 1037966
- https://bugzilla.mozilla.org/show_bug.cgi?id=1328861
- https://bugzilla.mozilla.org/show_bug.cgi?id=1328861
- GLSA-201705-06
- GLSA-201705-06
- GLSA-201705-07
- GLSA-201705-07
- DSA-3805
- DSA-3805
- DSA-3832
- DSA-3832
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
Modified: 2024-11-21
CVE-2017-5402
A use-after-free can occur when events are fired for a "FontFace" object after the object has been already been destroyed while working with fonts. This results in a potentially exploitable crash. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8.
- RHSA-2017:0459
- RHSA-2017:0459
- RHSA-2017:0461
- RHSA-2017:0461
- RHSA-2017:0498
- RHSA-2017:0498
- 96664
- 96664
- 1037966
- 1037966
- https://bugzilla.mozilla.org/show_bug.cgi?id=1334876
- https://bugzilla.mozilla.org/show_bug.cgi?id=1334876
- GLSA-201705-06
- GLSA-201705-06
- GLSA-201705-07
- GLSA-201705-07
- DSA-3805
- DSA-3805
- DSA-3832
- DSA-3832
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
Modified: 2024-11-21
CVE-2017-5403
When adding a range to an object in the DOM, it is possible to use "addRange" to add the range to an incorrect root object. This triggers a use-after-free, resulting in a potentially exploitable crash. This vulnerability affects Firefox < 52 and Thunderbird < 52.
- 96691
- 96691
- 1037966
- 1037966
- https://bugzilla.mozilla.org/show_bug.cgi?id=1340186
- https://bugzilla.mozilla.org/show_bug.cgi?id=1340186
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
Modified: 2024-11-21
CVE-2017-5404
A use-after-free error can occur when manipulating ranges in selections with one node inside a native anonymous tree and one node outside of it. This results in a potentially exploitable crash. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8.
- RHSA-2017:0459
- RHSA-2017:0459
- RHSA-2017:0461
- RHSA-2017:0461
- RHSA-2017:0498
- RHSA-2017:0498
- 96664
- 96664
- 1037966
- 1037966
- https://bugzilla.mozilla.org/show_bug.cgi?id=1340138
- https://bugzilla.mozilla.org/show_bug.cgi?id=1340138
- GLSA-201705-06
- GLSA-201705-06
- GLSA-201705-07
- GLSA-201705-07
- DSA-3805
- DSA-3805
- DSA-3832
- DSA-3832
- 41660
- 41660
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
Modified: 2024-11-21
CVE-2017-5405
Certain response codes in FTP connections can result in the use of uninitialized values for ports in FTP operations. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8.
- RHSA-2017:0459
- RHSA-2017:0459
- RHSA-2017:0461
- RHSA-2017:0461
- RHSA-2017:0498
- RHSA-2017:0498
- 96693
- 96693
- 1037966
- 1037966
- https://bugzilla.mozilla.org/show_bug.cgi?id=1336699
- https://bugzilla.mozilla.org/show_bug.cgi?id=1336699
- GLSA-201705-06
- GLSA-201705-06
- GLSA-201705-07
- GLSA-201705-07
- DSA-3805
- DSA-3805
- DSA-3832
- DSA-3832
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
Modified: 2024-11-21
CVE-2017-5406
A segmentation fault can occur in the Skia graphics library during some canvas operations due to issues with mask/clip intersection and empty masks. This vulnerability affects Firefox < 52 and Thunderbird < 52.
- 96692
- 96692
- 1037966
- 1037966
- https://bugzilla.mozilla.org/show_bug.cgi?id=1306890
- https://bugzilla.mozilla.org/show_bug.cgi?id=1306890
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
Modified: 2024-11-21
CVE-2017-5407
Using SVG filters that don't use the fixed point math implementation on a target iframe, a malicious page can extract pixel values from a targeted user. This can be used to extract history information and read text values across domains. This violates same-origin policy and leads to information disclosure. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8.
- RHSA-2017:0459
- RHSA-2017:0459
- RHSA-2017:0461
- RHSA-2017:0461
- RHSA-2017:0498
- RHSA-2017:0498
- 96693
- 96693
- 1037966
- 1037966
- https://bugzilla.mozilla.org/show_bug.cgi?id=1336622
- https://bugzilla.mozilla.org/show_bug.cgi?id=1336622
- GLSA-201705-06
- GLSA-201705-06
- GLSA-201705-07
- GLSA-201705-07
- DSA-3805
- DSA-3805
- DSA-3832
- DSA-3832
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
Modified: 2024-11-21
CVE-2017-5408
Video files loaded video captions cross-origin without checking for the presence of CORS headers permitting such cross-origin use, leading to potential information disclosure for video captions. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8.
- RHSA-2017:0459
- RHSA-2017:0459
- RHSA-2017:0461
- RHSA-2017:0461
- RHSA-2017:0498
- RHSA-2017:0498
- 96693
- 96693
- 1037966
- 1037966
- https://bugzilla.mozilla.org/show_bug.cgi?id=1313711
- https://bugzilla.mozilla.org/show_bug.cgi?id=1313711
- GLSA-201705-06
- GLSA-201705-06
- GLSA-201705-07
- GLSA-201705-07
- DSA-3805
- DSA-3805
- DSA-3832
- DSA-3832
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
Modified: 2024-11-21
CVE-2017-5410
Memory corruption resulting in a potentially exploitable crash during garbage collection of JavaScript due errors in how incremental sweeping is managed for memory cleanup. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8.
- RHSA-2017:0459
- RHSA-2017:0459
- RHSA-2017:0461
- RHSA-2017:0461
- RHSA-2017:0498
- RHSA-2017:0498
- 96693
- 96693
- 1037966
- 1037966
- https://bugzilla.mozilla.org/show_bug.cgi?id=1330687
- https://bugzilla.mozilla.org/show_bug.cgi?id=1330687
- GLSA-201705-06
- GLSA-201705-06
- GLSA-201705-07
- GLSA-201705-07
- DSA-3805
- DSA-3805
- DSA-3832
- DSA-3832
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
Modified: 2024-11-21
CVE-2017-5411
A use-after-free can occur during buffer storage operations within the ANGLE graphics library, used for WebGL content. The buffer storage can be freed while still in use in some circumstances, leading to a potentially exploitable crash. Note: This issue is in "libGLES", which is only in use on Windows. Other operating systems are not affected. This vulnerability affects Firefox < 52 and Thunderbird < 52.
- 96692
- 96692
- 1037966
- 1037966
- https://bugzilla.mozilla.org/show_bug.cgi?id=1325511
- https://bugzilla.mozilla.org/show_bug.cgi?id=1325511
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
Modified: 2024-11-21
CVE-2017-5412
A buffer overflow read during SVG filter color value operations, resulting in data exposure. This vulnerability affects Firefox < 52 and Thunderbird < 52.
- 96692
- 96692
- 1037966
- 1037966
- https://bugzilla.mozilla.org/show_bug.cgi?id=1328323
- https://bugzilla.mozilla.org/show_bug.cgi?id=1328323
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
Modified: 2024-11-21
CVE-2017-5413
A segmentation fault can occur during some bidirectional layout operations. This vulnerability affects Firefox < 52 and Thunderbird < 52.
- 96692
- 96692
- 1037966
- 1037966
- https://bugzilla.mozilla.org/show_bug.cgi?id=1337504
- https://bugzilla.mozilla.org/show_bug.cgi?id=1337504
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
Modified: 2024-11-21
CVE-2017-5414
The file picker dialog can choose and display the wrong local default directory when instantiated. On some operating systems, this can lead to information disclosure, such as the operating system or the local account name. This vulnerability affects Firefox < 52 and Thunderbird < 52.
- 96692
- 96692
- 1037966
- 1037966
- https://bugzilla.mozilla.org/show_bug.cgi?id=1319370
- https://bugzilla.mozilla.org/show_bug.cgi?id=1319370
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
Modified: 2024-11-21
CVE-2017-5416
In certain circumstances a networking event listener can be prematurely released. This appears to result in a null dereference in practice. This vulnerability affects Firefox < 52 and Thunderbird < 52.
- 96692
- 96692
- 1037966
- 1037966
- https://bugzilla.mozilla.org/show_bug.cgi?id=1328121
- https://bugzilla.mozilla.org/show_bug.cgi?id=1328121
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
Modified: 2024-11-21
CVE-2017-5418
An out of bounds read error occurs when parsing some HTTP digest authorization responses, resulting in information leakage through the reading of random memory containing matches to specifically set patterns. This vulnerability affects Firefox < 52 and Thunderbird < 52.
- 96692
- 96692
- 1037966
- 1037966
- https://bugzilla.mozilla.org/show_bug.cgi?id=1338876
- https://bugzilla.mozilla.org/show_bug.cgi?id=1338876
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
Modified: 2024-11-21
CVE-2017-5419
If a malicious site repeatedly triggers a modal authentication prompt, eventually the browser UI will become non-responsive, requiring shutdown through the operating system. This is a denial of service (DOS) attack. This vulnerability affects Firefox < 52 and Thunderbird < 52.
- 96692
- 96692
- 1037966
- 1037966
- https://bugzilla.mozilla.org/show_bug.cgi?id=1312243
- https://bugzilla.mozilla.org/show_bug.cgi?id=1312243
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
Modified: 2024-11-21
CVE-2017-5421
A malicious site could spoof the contents of the print preview window if popup windows are enabled, resulting in user confusion of what site is currently loaded. This vulnerability affects Firefox < 52 and Thunderbird < 52.
- 96692
- 96692
- 1037966
- 1037966
- https://bugzilla.mozilla.org/show_bug.cgi?id=1301876
- https://bugzilla.mozilla.org/show_bug.cgi?id=1301876
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
Modified: 2024-11-21
CVE-2017-5422
If a malicious site uses the "view-source:" protocol in a series within a single hyperlink, it can trigger a non-exploitable browser crash when the hyperlink is selected. This was fixed by no longer making "view-source:" linkable. This vulnerability affects Firefox < 52 and Thunderbird < 52.
- 96692
- 96692
- 1037966
- 1037966
- https://bugzilla.mozilla.org/show_bug.cgi?id=1295002
- https://bugzilla.mozilla.org/show_bug.cgi?id=1295002
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
Modified: 2024-11-21
CVE-2017-5425
The Gecko Media Plugin sandbox allows access to local files that match specific regular expressions. On OS OX, this matching allows access to some data in subdirectories of "/private/var" that could expose personal or temporary data. This has been updated to not allow access to "/private/var" and its subdirectories. Note: this issue only affects OS X. Other operating systems are not affected. This vulnerability affects Firefox < 52 and Thunderbird < 52.
- 96692
- 96692
- 1037966
- 1037966
- https://bugzilla.mozilla.org/show_bug.cgi?id=1322716
- https://bugzilla.mozilla.org/show_bug.cgi?id=1322716
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
Modified: 2024-11-21
CVE-2017-5426
On Linux, if the secure computing mode BPF (seccomp-bpf) filter is running when the Gecko Media Plugin sandbox is started, the sandbox fails to be applied and items that would run within the sandbox are run protected only by the running filter which is typically weak compared to the sandbox. Note: this issue only affects Linux. Other operating systems are not affected. This vulnerability affects Firefox < 52 and Thunderbird < 52.
- 96694
- 96694
- 1037966
- 1037966
- https://bugzilla.mozilla.org/show_bug.cgi?id=1257361
- https://bugzilla.mozilla.org/show_bug.cgi?id=1257361
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
Modified: 2024-11-21
CVE-2017-5429
Memory safety bugs were reported in Firefox 52, Firefox ESR 45.8, Firefox ESR 52, and Thunderbird 52. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1104
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1343261%2C1350844%2C1341096%2C1342823%2C1348894%2C1348941%2C1349340%2C1352926%2C1353088%2C
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1343261%2C1350844%2C1341096%2C1342823%2C1348894%2C1348941%2C1349340%2C1352926%2C1353088%2C
- DSA-3831
- DSA-3831
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5430
Memory safety bugs were reported in Firefox 52, Firefox ESR 52, and Thunderbird 52. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1106
- RHSA-2017:1106
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1342101%2C1340482%2C1344686%2C1329796%2C1346419%2C1349621%2C1344081%2C1344305%2C1348143%2C1349719%2C1353476%2C1337418%2C1346140%2C1339722
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1342101%2C1340482%2C1344686%2C1329796%2C1346419%2C1349621%2C1344081%2C1344305%2C1348143%2C1349719%2C1353476%2C1337418%2C1346140%2C1339722
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5432
A use-after-free vulnerability occurs during certain text input selection resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1104
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1346654
- https://bugzilla.mozilla.org/show_bug.cgi?id=1346654
- DSA-3831
- DSA-3831
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5433
A use-after-free vulnerability in SMIL animation functions occurs when pointers to animation elements in an array are dropped from the animation controller while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1104
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1347168
- https://bugzilla.mozilla.org/show_bug.cgi?id=1347168
- DSA-3831
- DSA-3831
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5434
A use-after-free vulnerability occurs when redirecting focus handling which results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1104
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1349946
- https://bugzilla.mozilla.org/show_bug.cgi?id=1349946
- DSA-3831
- DSA-3831
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5435
A use-after-free vulnerability occurs during transaction processing in the editor during design mode interactions. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1104
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1350683
- https://bugzilla.mozilla.org/show_bug.cgi?id=1350683
- DSA-3831
- DSA-3831
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5436
An out-of-bounds write in the Graphite 2 library triggered with a maliciously crafted Graphite font. This results in a potentially exploitable crash. This issue was fixed in the Graphite 2 library as well as Mozilla products. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1104
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1345461
- https://bugzilla.mozilla.org/show_bug.cgi?id=1345461
- GLSA-201706-25
- GLSA-201706-25
- DSA-3831
- DSA-3831
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5438
A use-after-free vulnerability during XSLT processing due to the result handler being held by a freed handler during handling. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1104
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1336828
- https://bugzilla.mozilla.org/show_bug.cgi?id=1336828
- DSA-3831
- DSA-3831
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5439
A use-after-free vulnerability during XSLT processing due to poor handling of template parameters. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
- 103053
- 103053
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1104
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1336830
- https://bugzilla.mozilla.org/show_bug.cgi?id=1336830
- DSA-3831
- DSA-3831
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5440
A use-after-free vulnerability during XSLT processing due to a failure to propagate error conditions during matching while evaluating context, leading to objects being used when they no longer exist. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1104
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1336832
- https://bugzilla.mozilla.org/show_bug.cgi?id=1336832
- DSA-3831
- DSA-3831
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5441
A use-after-free vulnerability when holding a selection during scroll events. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1104
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1343795
- https://bugzilla.mozilla.org/show_bug.cgi?id=1343795
- DSA-3831
- DSA-3831
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5442
A use-after-free vulnerability during changes in style when manipulating DOM elements. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1104
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1347979
- https://bugzilla.mozilla.org/show_bug.cgi?id=1347979
- DSA-3831
- DSA-3831
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5443
An out-of-bounds write vulnerability while decoding improperly formed BinHex format archives. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1104
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1342661
- https://bugzilla.mozilla.org/show_bug.cgi?id=1342661
- DSA-3831
- DSA-3831
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5444
A buffer overflow vulnerability while parsing "application/http-index-format" format content when the header contains improperly formatted data. This allows for an out-of-bounds read of data from memory. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1104
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1344461
- https://bugzilla.mozilla.org/show_bug.cgi?id=1344461
- DSA-3831
- DSA-3831
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5445
A vulnerability while parsing "application/http-index-format" format content where uninitialized values are used to create an array. This could allow the reading of uninitialized memory into the arrays affected. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1104
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1344467
- https://bugzilla.mozilla.org/show_bug.cgi?id=1344467
- DSA-3831
- DSA-3831
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5446
An out-of-bounds read when an HTTP/2 connection to a servers sends "DATA" frames with incorrect data content. This leads to a potentially exploitable crash. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1104
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1343505
- https://bugzilla.mozilla.org/show_bug.cgi?id=1343505
- DSA-3831
- DSA-3831
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5447
An out-of-bounds read during the processing of glyph widths during text layout. This results in a potentially exploitable crash and could allow an attacker to read otherwise inaccessible memory. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1104
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1343552
- https://bugzilla.mozilla.org/show_bug.cgi?id=1343552
- DSA-3831
- DSA-3831
- 42071
- 42071
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5449
A possibly exploitable crash triggered during layout and manipulation of bidirectional unicode text in concert with CSS animations. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1104
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1340127
- https://bugzilla.mozilla.org/show_bug.cgi?id=1340127
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5451
A mechanism to spoof the addressbar through the user interaction on the addressbar and the "onblur" event. The event could be used by script to affect text display to make the loaded site appear to be different from the one actually loaded within the addressbar. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1273537
- https://bugzilla.mozilla.org/show_bug.cgi?id=1273537
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5454
A mechanism to bypass file system access protections in the sandbox to use the file picker to access different files than those selected in the file picker through the use of relative paths. This allows for read only access to the local file system. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1349276
- https://bugzilla.mozilla.org/show_bug.cgi?id=1349276
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5459
A buffer overflow in WebGL triggerable by web content, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1104
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1333858
- https://bugzilla.mozilla.org/show_bug.cgi?id=1333858
- DSA-3831
- DSA-3831
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5460
A use-after-free vulnerability in frame selection triggered by a combination of malicious script content and key presses by a user. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1104
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1343642
- https://bugzilla.mozilla.org/show_bug.cgi?id=1343642
- DSA-3831
- DSA-3831
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5461
Mozilla Network Security Services (NSS) before 3.21.4, 3.22.x through 3.28.x before 3.28.4, 3.29.x before 3.29.5, and 3.30.x before 3.30.1 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact by leveraging incorrect base64 operations.
- DSA-3831
- DSA-3831
- DSA-3872
- DSA-3872
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- 98050
- 98050
- 1038320
- 1038320
- RHSA-2017:1100
- RHSA-2017:1100
- RHSA-2017:1101
- RHSA-2017:1101
- RHSA-2017:1102
- RHSA-2017:1102
- RHSA-2017:1103
- RHSA-2017:1103
- https://bugzilla.mozilla.org/show_bug.cgi?id=1344380
- https://bugzilla.mozilla.org/show_bug.cgi?id=1344380
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21.4_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21.4_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.28.4_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.28.4_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.29.5_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.29.5_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.30.1_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.30.1_release_notes
- GLSA-201705-04
- GLSA-201705-04
- https://www.mozilla.org/en-US/security/advisories/mfsa2017-10/#CVE-2017-5461
- https://www.mozilla.org/en-US/security/advisories/mfsa2017-10/#CVE-2017-5461
- https://www.mozilla.org/en-US/security/advisories/mfsa2017-11/#CVE-2017-5461
- https://www.mozilla.org/en-US/security/advisories/mfsa2017-11/#CVE-2017-5461
- https://www.mozilla.org/en-US/security/advisories/mfsa2017-12/#CVE-2017-5461
- https://www.mozilla.org/en-US/security/advisories/mfsa2017-12/#CVE-2017-5461
- https://www.mozilla.org/en-US/security/advisories/mfsa2017-13/#CVE-2017-5461
- https://www.mozilla.org/en-US/security/advisories/mfsa2017-13/#CVE-2017-5461
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com//security-alerts/cpujul2021.html
Modified: 2024-11-21
CVE-2017-5462
A flaw in DRBG number generation within the Network Security Services (NSS) library where the internal state V does not correctly carry bits over. The NSS library has been updated to fix this issue to address this issue and Firefox ESR 52.1 has been updated with NSS version 3.28.4. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- https://bugzilla.mozilla.org/show_bug.cgi?id=1345089
- https://bugzilla.mozilla.org/show_bug.cgi?id=1345089
- GLSA-201705-04
- GLSA-201705-04
- DSA-3831
- DSA-3831
- DSA-3872
- DSA-3872
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5464
During DOM manipulations of the accessibility tree through script, the DOM tree can become out of sync with the accessibility tree, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1104
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1347075
- https://bugzilla.mozilla.org/show_bug.cgi?id=1347075
- DSA-3831
- DSA-3831
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5465
An out-of-bounds read while processing SVG content in "ConvolvePixel". This results in a crash and also allows for otherwise inaccessible memory being copied into SVG graphic content, which could then displayed. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1104
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1347617
- https://bugzilla.mozilla.org/show_bug.cgi?id=1347617
- DSA-3831
- DSA-3831
- 42072
- 42072
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5466
If a page is loaded from an original site through a hyperlink and contains a redirect to a "data:text/html" URL, triggering a reload will run the reloaded "data:text/html" page with its origin set incorrectly. This allows for a cross-site scripting (XSS) attack. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1353975
- https://bugzilla.mozilla.org/show_bug.cgi?id=1353975
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5467
A potential memory corruption and crash when using Skia content when drawing content outside of the bounds of a clipping region. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1347262
- https://bugzilla.mozilla.org/show_bug.cgi?id=1347262
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5469
Fixed potential buffer overflows in generated Firefox code due to CVE-2016-6354 issue in Flex. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
- 97940
- 97940
- 1038320
- 1038320
- RHSA-2017:1104
- RHSA-2017:1104
- RHSA-2017:1106
- RHSA-2017:1106
- RHSA-2017:1201
- RHSA-2017:1201
- https://bugzilla.mozilla.org/show_bug.cgi?id=1292534
- https://bugzilla.mozilla.org/show_bug.cgi?id=1292534
- DSA-3831
- DSA-3831
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-13/
Modified: 2024-11-21
CVE-2017-5470
Memory safety bugs were reported in Firefox 53 and Firefox ESR 52.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 54, Firefox ESR < 52.2, and Thunderbird < 52.2.
- 99041
- 99041
- 1038689
- 1038689
- RHSA-2017:1440
- RHSA-2017:1440
- RHSA-2017:1561
- RHSA-2017:1561
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1359639%2C1349595%2C1352295%2C1352556%2C1342552%2C1342567%2C1346012%2C1366140%2C1368732%2C1297111%2C1362590%2C1357462%2C1363280%2C1349266%2C1352093%2C1348424%2C1347748%2C1356025%2C1325513%2C1367692
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1359639%2C1349595%2C1352295%2C1352556%2C1342552%2C1342567%2C1346012%2C1366140%2C1368732%2C1297111%2C1362590%2C1357462%2C1363280%2C1349266%2C1352093%2C1348424%2C1347748%2C1356025%2C1325513%2C1367692
- DSA-3881
- DSA-3881
- DSA-3918
- DSA-3918
- https://www.mozilla.org/security/advisories/mfsa2017-15/
- https://www.mozilla.org/security/advisories/mfsa2017-15/
- https://www.mozilla.org/security/advisories/mfsa2017-16/
- https://www.mozilla.org/security/advisories/mfsa2017-16/
- https://www.mozilla.org/security/advisories/mfsa2017-17/
- https://www.mozilla.org/security/advisories/mfsa2017-17/
Modified: 2024-11-21
CVE-2017-5472
A use-after-free vulnerability with the frameloader during tree reconstruction while regenerating CSS layout when attempting to use a node in the tree that no longer exists. This results in a potentially exploitable crash. This vulnerability affects Firefox < 54, Firefox ESR < 52.2, and Thunderbird < 52.2.
- 99040
- 99040
- 1038689
- 1038689
- RHSA-2017:1440
- RHSA-2017:1440
- RHSA-2017:1561
- RHSA-2017:1561
- https://bugzilla.mozilla.org/show_bug.cgi?id=1365602
- https://bugzilla.mozilla.org/show_bug.cgi?id=1365602
- DSA-3881
- DSA-3881
- DSA-3918
- DSA-3918
- https://www.mozilla.org/security/advisories/mfsa2017-15/
- https://www.mozilla.org/security/advisories/mfsa2017-15/
- https://www.mozilla.org/security/advisories/mfsa2017-16/
- https://www.mozilla.org/security/advisories/mfsa2017-16/
- https://www.mozilla.org/security/advisories/mfsa2017-17/
- https://www.mozilla.org/security/advisories/mfsa2017-17/
Modified: 2024-11-21
CVE-2017-7749
A use-after-free vulnerability when using an incorrect URL during the reloading of a docshell. This results in a potentially exploitable crash. This vulnerability affects Firefox < 54, Firefox ESR < 52.2, and Thunderbird < 52.2.
- 99057
- 99057
- 1038689
- 1038689
- RHSA-2017:1440
- RHSA-2017:1440
- RHSA-2017:1561
- RHSA-2017:1561
- https://bugzilla.mozilla.org/show_bug.cgi?id=1355039
- https://bugzilla.mozilla.org/show_bug.cgi?id=1355039
- DSA-3881
- DSA-3881
- DSA-3918
- DSA-3918
- https://www.mozilla.org/security/advisories/mfsa2017-15/
- https://www.mozilla.org/security/advisories/mfsa2017-15/
- https://www.mozilla.org/security/advisories/mfsa2017-16/
- https://www.mozilla.org/security/advisories/mfsa2017-16/
- https://www.mozilla.org/security/advisories/mfsa2017-17/
- https://www.mozilla.org/security/advisories/mfsa2017-17/
Modified: 2024-11-21
CVE-2017-7750
A use-after-free vulnerability during video control operations when a "
- 99057
- 99057
- 1038689
- 1038689
- RHSA-2017:1440
- RHSA-2017:1440
- RHSA-2017:1561
- RHSA-2017:1561
- https://bugzilla.mozilla.org/show_bug.cgi?id=1356558
- https://bugzilla.mozilla.org/show_bug.cgi?id=1356558
- DSA-3881
- DSA-3881
- DSA-3918
- DSA-3918
- https://www.mozilla.org/security/advisories/mfsa2017-15/
- https://www.mozilla.org/security/advisories/mfsa2017-15/
- https://www.mozilla.org/security/advisories/mfsa2017-16/
- https://www.mozilla.org/security/advisories/mfsa2017-16/
- https://www.mozilla.org/security/advisories/mfsa2017-17/
- https://www.mozilla.org/security/advisories/mfsa2017-17/
Modified: 2024-11-21
CVE-2017-7751
A use-after-free vulnerability with content viewer listeners that results in a potentially exploitable crash. This vulnerability affects Firefox < 54, Firefox ESR < 52.2, and Thunderbird < 52.2.
- 99057
- 99057
- 1038689
- 1038689
- RHSA-2017:1440
- RHSA-2017:1440
- RHSA-2017:1561
- RHSA-2017:1561
- https://bugzilla.mozilla.org/show_bug.cgi?id=1363396
- https://bugzilla.mozilla.org/show_bug.cgi?id=1363396
- DSA-3881
- DSA-3881
- DSA-3918
- DSA-3918
- https://www.mozilla.org/security/advisories/mfsa2017-15/
- https://www.mozilla.org/security/advisories/mfsa2017-15/
- https://www.mozilla.org/security/advisories/mfsa2017-16/
- https://www.mozilla.org/security/advisories/mfsa2017-16/
- https://www.mozilla.org/security/advisories/mfsa2017-17/
- https://www.mozilla.org/security/advisories/mfsa2017-17/
Modified: 2024-11-21
CVE-2017-7752
A use-after-free vulnerability during specific user interactions with the input method editor (IME) in some languages due to how events are handled. This results in a potentially exploitable crash but would require specific user interaction to trigger. This vulnerability affects Firefox < 54, Firefox ESR < 52.2, and Thunderbird < 52.2.
- 99057
- 99057
- 1038689
- 1038689
- RHSA-2017:1440
- RHSA-2017:1440
- RHSA-2017:1561
- RHSA-2017:1561
- https://bugzilla.mozilla.org/show_bug.cgi?id=1359547
- https://bugzilla.mozilla.org/show_bug.cgi?id=1359547
- DSA-3881
- DSA-3881
- DSA-3918
- DSA-3918
- https://www.mozilla.org/security/advisories/mfsa2017-15/
- https://www.mozilla.org/security/advisories/mfsa2017-15/
- https://www.mozilla.org/security/advisories/mfsa2017-16/
- https://www.mozilla.org/security/advisories/mfsa2017-16/
- https://www.mozilla.org/security/advisories/mfsa2017-17/
- https://www.mozilla.org/security/advisories/mfsa2017-17/
Modified: 2024-11-21
CVE-2017-7753
An out-of-bounds read occurs when applying style rules to pseudo-elements, such as ::first-line, using cached style data. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
- 100315
- 100315
- 1039124
- 1039124
- RHSA-2017:2456
- RHSA-2017:2456
- RHSA-2017:2534
- RHSA-2017:2534
- https://bugzilla.mozilla.org/show_bug.cgi?id=1353312
- https://bugzilla.mozilla.org/show_bug.cgi?id=1353312
- GLSA-201803-14
- GLSA-201803-14
- DSA-3928
- DSA-3928
- DSA-3968
- DSA-3968
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
Modified: 2024-11-21
CVE-2017-7754
An out-of-bounds read in WebGL with a maliciously crafted "ImageInfo" object during WebGL operations. This vulnerability affects Firefox < 54, Firefox ESR < 52.2, and Thunderbird < 52.2.
- 99057
- 99057
- 1038689
- 1038689
- RHSA-2017:1440
- RHSA-2017:1440
- RHSA-2017:1561
- RHSA-2017:1561
- https://bugzilla.mozilla.org/show_bug.cgi?id=1357090
- https://bugzilla.mozilla.org/show_bug.cgi?id=1357090
- DSA-3881
- DSA-3881
- DSA-3918
- DSA-3918
- https://www.mozilla.org/security/advisories/mfsa2017-15/
- https://www.mozilla.org/security/advisories/mfsa2017-15/
- https://www.mozilla.org/security/advisories/mfsa2017-16/
- https://www.mozilla.org/security/advisories/mfsa2017-16/
- https://www.mozilla.org/security/advisories/mfsa2017-17/
- https://www.mozilla.org/security/advisories/mfsa2017-17/
Modified: 2024-11-21
CVE-2017-7756
A use-after-free and use-after-scope vulnerability when logging errors from headers for XML HTTP Requests (XHR). This could result in a potentially exploitable crash. This vulnerability affects Firefox < 54, Firefox ESR < 52.2, and Thunderbird < 52.2.
- 99057
- 99057
- 1038689
- 1038689
- RHSA-2017:1440
- RHSA-2017:1440
- RHSA-2017:1561
- RHSA-2017:1561
- https://bugzilla.mozilla.org/show_bug.cgi?id=1366595
- https://bugzilla.mozilla.org/show_bug.cgi?id=1366595
- DSA-3881
- DSA-3881
- DSA-3918
- DSA-3918
- https://www.mozilla.org/security/advisories/mfsa2017-15/
- https://www.mozilla.org/security/advisories/mfsa2017-15/
- https://www.mozilla.org/security/advisories/mfsa2017-16/
- https://www.mozilla.org/security/advisories/mfsa2017-16/
- https://www.mozilla.org/security/advisories/mfsa2017-17/
- https://www.mozilla.org/security/advisories/mfsa2017-17/
Modified: 2024-11-21
CVE-2017-7757
A use-after-free vulnerability in IndexedDB when one of its objects is destroyed in memory while a method on it is still being executed. This results in a potentially exploitable crash. This vulnerability affects Firefox < 54, Firefox ESR < 52.2, and Thunderbird < 52.2.
- 99057
- 99057
- 1038689
- 1038689
- RHSA-2017:1440
- RHSA-2017:1440
- RHSA-2017:1561
- RHSA-2017:1561
- https://bugzilla.mozilla.org/show_bug.cgi?id=1356824
- https://bugzilla.mozilla.org/show_bug.cgi?id=1356824
- DSA-3881
- DSA-3881
- DSA-3918
- DSA-3918
- https://www.mozilla.org/security/advisories/mfsa2017-15/
- https://www.mozilla.org/security/advisories/mfsa2017-15/
- https://www.mozilla.org/security/advisories/mfsa2017-16/
- https://www.mozilla.org/security/advisories/mfsa2017-16/
- https://www.mozilla.org/security/advisories/mfsa2017-17/
- https://www.mozilla.org/security/advisories/mfsa2017-17/
Modified: 2024-11-21
CVE-2017-7758
An out-of-bounds read vulnerability with the Opus encoder when the number of channels in an audio stream changes while the encoder is in use. This vulnerability affects Firefox < 54, Firefox ESR < 52.2, and Thunderbird < 52.2.
- 99057
- 99057
- 1038689
- 1038689
- RHSA-2017:1440
- RHSA-2017:1440
- RHSA-2017:1561
- RHSA-2017:1561
- https://bugzilla.mozilla.org/show_bug.cgi?id=1368490
- https://bugzilla.mozilla.org/show_bug.cgi?id=1368490
- DSA-3881
- DSA-3881
- DSA-3918
- DSA-3918
- https://www.mozilla.org/security/advisories/mfsa2017-15/
- https://www.mozilla.org/security/advisories/mfsa2017-15/
- https://www.mozilla.org/security/advisories/mfsa2017-16/
- https://www.mozilla.org/security/advisories/mfsa2017-16/
- https://www.mozilla.org/security/advisories/mfsa2017-17/
- https://www.mozilla.org/security/advisories/mfsa2017-17/
Modified: 2024-11-21
CVE-2017-7763
Default fonts on OS X display some Tibetan characters as whitespace. When used in the addressbar as part of an IDN this can be used for domain name spoofing attacks. Note: This attack only affects OS X operating systems. Other operating systems are unaffected. This vulnerability affects Firefox < 54, Firefox ESR < 52.2, and Thunderbird < 52.2.
- 99057
- 99057
- 1038689
- 1038689
- https://bugzilla.mozilla.org/show_bug.cgi?id=1360309
- https://bugzilla.mozilla.org/show_bug.cgi?id=1360309
- https://www.mozilla.org/security/advisories/mfsa2017-15/
- https://www.mozilla.org/security/advisories/mfsa2017-15/
- https://www.mozilla.org/security/advisories/mfsa2017-16/
- https://www.mozilla.org/security/advisories/mfsa2017-16/
- https://www.mozilla.org/security/advisories/mfsa2017-17/
- https://www.mozilla.org/security/advisories/mfsa2017-17/
Modified: 2024-11-21
CVE-2017-7764
Characters from the "Canadian Syllabics" unicode block can be mixed with characters from other unicode blocks in the addressbar instead of being rendered as their raw "punycode" form, allowing for domain name spoofing attacks through character confusion. The current Unicode standard allows characters from "Aspirational Use Scripts" such as Canadian Syllabics to be mixed with Latin characters in the "moderately restrictive" IDN profile. We have changed Firefox behavior to match the upcoming Unicode version 10.0 which removes this category and treats them as "Limited Use Scripts.". This vulnerability affects Firefox < 54, Firefox ESR < 52.2, and Thunderbird < 52.2.
- 99057
- 99057
- 1038689
- 1038689
- http://www.unicode.org/reports/tr31/tr31-26.html#Aspirational_Use_Scripts
- http://www.unicode.org/reports/tr31/tr31-26.html#Aspirational_Use_Scripts
- RHSA-2017:1440
- RHSA-2017:1440
- RHSA-2017:1561
- RHSA-2017:1561
- https://bugzilla.mozilla.org/show_bug.cgi?id=1364283
- https://bugzilla.mozilla.org/show_bug.cgi?id=1364283
- DSA-3881
- DSA-3881
- DSA-3918
- DSA-3918
- https://www.mozilla.org/security/advisories/mfsa2017-15/
- https://www.mozilla.org/security/advisories/mfsa2017-15/
- https://www.mozilla.org/security/advisories/mfsa2017-16/
- https://www.mozilla.org/security/advisories/mfsa2017-16/
- https://www.mozilla.org/security/advisories/mfsa2017-17/
- https://www.mozilla.org/security/advisories/mfsa2017-17/
Modified: 2024-11-21
CVE-2017-7765
The "Mark of the Web" was not correctly saved on Windows when files with very long names were downloaded from the Internet. Without the Mark of the Web data, the security warning that Windows displays before running executables downloaded from the Internet is not shown. Note: This attack only affects Windows operating systems. Other operating systems are unaffected. This vulnerability affects Firefox < 54, Firefox ESR < 52.2, and Thunderbird < 52.2.
- 99057
- 99057
- 1038689
- 1038689
- https://bugzilla.mozilla.org/show_bug.cgi?id=1273265
- https://bugzilla.mozilla.org/show_bug.cgi?id=1273265
- https://www.mozilla.org/security/advisories/mfsa2017-15/
- https://www.mozilla.org/security/advisories/mfsa2017-15/
- https://www.mozilla.org/security/advisories/mfsa2017-16/
- https://www.mozilla.org/security/advisories/mfsa2017-16/
- https://www.mozilla.org/security/advisories/mfsa2017-17/
- https://www.mozilla.org/security/advisories/mfsa2017-17/
Modified: 2024-11-21
CVE-2017-7778
A number of security vulnerabilities in the Graphite 2 library including out-of-bounds reads, buffer overflow reads and writes, and the use of uninitialized memory. These issues were addressed in Graphite 2 version 1.3.10. This vulnerability affects Firefox < 54, Firefox ESR < 52.2, and Thunderbird < 52.2.
- 99057
- 99057
- 1038689
- 1038689
- RHSA-2017:1440
- RHSA-2017:1440
- RHSA-2017:1561
- RHSA-2017:1561
- RHSA-2017:1793
- RHSA-2017:1793
- https://bugzilla.mozilla.org/show_bug.cgi?id=1349310
- https://bugzilla.mozilla.org/show_bug.cgi?id=1349310
- https://bugzilla.mozilla.org/show_bug.cgi?id=1350047
- https://bugzilla.mozilla.org/show_bug.cgi?id=1350047
- https://bugzilla.mozilla.org/show_bug.cgi?id=1352745
- https://bugzilla.mozilla.org/show_bug.cgi?id=1352745
- https://bugzilla.mozilla.org/show_bug.cgi?id=1352747
- https://bugzilla.mozilla.org/show_bug.cgi?id=1352747
- https://bugzilla.mozilla.org/show_bug.cgi?id=1355174
- https://bugzilla.mozilla.org/show_bug.cgi?id=1355174
- https://bugzilla.mozilla.org/show_bug.cgi?id=1355182
- https://bugzilla.mozilla.org/show_bug.cgi?id=1355182
- https://bugzilla.mozilla.org/show_bug.cgi?id=1356607
- https://bugzilla.mozilla.org/show_bug.cgi?id=1356607
- https://bugzilla.mozilla.org/show_bug.cgi?id=1358551
- https://bugzilla.mozilla.org/show_bug.cgi?id=1358551
- GLSA-201710-13
- GLSA-201710-13
- DSA-3881
- DSA-3881
- DSA-3894
- DSA-3894
- DSA-3918
- DSA-3918
- https://www.mozilla.org/security/advisories/mfsa2017-15/
- https://www.mozilla.org/security/advisories/mfsa2017-15/
- https://www.mozilla.org/security/advisories/mfsa2017-16/
- https://www.mozilla.org/security/advisories/mfsa2017-16/
- https://www.mozilla.org/security/advisories/mfsa2017-17/
- https://www.mozilla.org/security/advisories/mfsa2017-17/
Modified: 2024-11-21
CVE-2017-7779
Memory safety bugs were reported in Firefox 54, Firefox ESR 52.2, and Thunderbird 52.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
- 100201
- 100201
- 1039124
- 1039124
- RHSA-2017:2456
- RHSA-2017:2456
- RHSA-2017:2534
- RHSA-2017:2534
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1354443%2C1368576%2C1366903%2C1369913%2C1371424%2C1346590%2C1371890%2C1372985%2C1362924%2C1368105%2C1369994%2C1371283%2C1368362%2C1378826%2C1380426%2C1368030%2C1373220%2C1321384%2C1383002
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1354443%2C1368576%2C1366903%2C1369913%2C1371424%2C1346590%2C1371890%2C1372985%2C1362924%2C1368105%2C1369994%2C1371283%2C1368362%2C1378826%2C1380426%2C1368030%2C1373220%2C1321384%2C1383002
- GLSA-201803-14
- GLSA-201803-14
- DSA-3928
- DSA-3928
- DSA-3968
- DSA-3968
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
Modified: 2024-11-21
CVE-2017-7784
A use-after-free vulnerability can occur when reading an image observer during frame reconstruction after the observer has been freed. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
- 100202
- 100202
- 1039124
- 1039124
- RHSA-2017:2456
- RHSA-2017:2456
- RHSA-2017:2534
- RHSA-2017:2534
- https://bugzilla.mozilla.org/show_bug.cgi?id=1376087
- https://bugzilla.mozilla.org/show_bug.cgi?id=1376087
- GLSA-201803-14
- GLSA-201803-14
- DSA-3928
- DSA-3928
- DSA-3968
- DSA-3968
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
Modified: 2024-11-21
CVE-2017-7785
A buffer overflow can occur when manipulating Accessible Rich Internet Applications (ARIA) attributes within the DOM. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
- 100206
- 100206
- 1039124
- 1039124
- RHSA-2017:2456
- RHSA-2017:2456
- RHSA-2017:2534
- RHSA-2017:2534
- https://bugzilla.mozilla.org/show_bug.cgi?id=1356985
- https://bugzilla.mozilla.org/show_bug.cgi?id=1356985
- GLSA-201803-14
- GLSA-201803-14
- DSA-3928
- DSA-3928
- DSA-3968
- DSA-3968
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
Modified: 2024-11-21
CVE-2017-7786
A buffer overflow can occur when the image renderer attempts to paint non-displayable SVG elements. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
- 100206
- 100206
- 1039124
- 1039124
- RHSA-2017:2456
- RHSA-2017:2456
- RHSA-2017:2534
- RHSA-2017:2534
- https://bugzilla.mozilla.org/show_bug.cgi?id=1365189
- https://bugzilla.mozilla.org/show_bug.cgi?id=1365189
- GLSA-201803-14
- GLSA-201803-14
- DSA-3928
- DSA-3928
- DSA-3968
- DSA-3968
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
Modified: 2024-11-21
CVE-2017-7787
Same-origin policy protections can be bypassed on pages with embedded iframes during page reloads, allowing the iframes to access content on the top level page, leading to information disclosure. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
- 100234
- 100234
- 1039124
- 1039124
- RHSA-2017:2456
- RHSA-2017:2456
- RHSA-2017:2534
- RHSA-2017:2534
- https://bugzilla.mozilla.org/show_bug.cgi?id=1322896
- https://bugzilla.mozilla.org/show_bug.cgi?id=1322896
- GLSA-201803-14
- GLSA-201803-14
- DSA-3928
- DSA-3928
- DSA-3968
- DSA-3968
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
Modified: 2024-11-21
CVE-2017-7791
On pages containing an iframe, the "data:" protocol can be used to create a modal alert that will render over arbitrary domains following page navigation, spoofing of the origin of the modal alert from the iframe content. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
- 100240
- 100240
- 1039124
- 1039124
- RHSA-2017:2456
- RHSA-2017:2456
- RHSA-2017:2534
- RHSA-2017:2534
- https://bugzilla.mozilla.org/show_bug.cgi?id=1365875
- https://bugzilla.mozilla.org/show_bug.cgi?id=1365875
- GLSA-201803-14
- GLSA-201803-14
- DSA-3928
- DSA-3928
- DSA-3968
- DSA-3968
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
Modified: 2024-11-21
CVE-2017-7792
A buffer overflow will occur when viewing a certificate in the certificate manager if the certificate has an extremely long object identifier (OID). This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
- 100206
- 100206
- 1039124
- 1039124
- RHSA-2017:2456
- RHSA-2017:2456
- RHSA-2017:2534
- RHSA-2017:2534
- https://bugzilla.mozilla.org/show_bug.cgi?id=1368652
- https://bugzilla.mozilla.org/show_bug.cgi?id=1368652
- GLSA-201803-14
- GLSA-201803-14
- DSA-3928
- DSA-3928
- DSA-3968
- DSA-3968
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
Modified: 2024-11-21
CVE-2017-7793
A use-after-free vulnerability can occur in the Fetch API when the worker or the associated window are freed when still in use, resulting in a potentially exploitable crash. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
- 101055
- 101055
- 1039465
- 1039465
- RHSA-2017:2831
- RHSA-2017:2831
- RHSA-2017:2885
- RHSA-2017:2885
- https://bugzilla.mozilla.org/show_bug.cgi?id=1371889
- https://bugzilla.mozilla.org/show_bug.cgi?id=1371889
- [debian-lts-announce] 20171101 [SECURITY] [DLA 1153-1] icedove/thunderbird security update
- [debian-lts-announce] 20171101 [SECURITY] [DLA 1153-1] icedove/thunderbird security update
- GLSA-201803-14
- GLSA-201803-14
- DSA-3987
- DSA-3987
- DSA-4014
- DSA-4014
- https://www.mozilla.org/security/advisories/mfsa2017-21/
- https://www.mozilla.org/security/advisories/mfsa2017-21/
- https://www.mozilla.org/security/advisories/mfsa2017-22/
- https://www.mozilla.org/security/advisories/mfsa2017-22/
- https://www.mozilla.org/security/advisories/mfsa2017-23/
- https://www.mozilla.org/security/advisories/mfsa2017-23/
Modified: 2024-11-21
CVE-2017-7800
A use-after-free vulnerability can occur in WebSockets when the object holding the connection is freed before the disconnection operation is finished. This results in an exploitable crash. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
- 100196
- 100196
- 1039124
- 1039124
- RHSA-2017:2456
- RHSA-2017:2456
- RHSA-2017:2534
- RHSA-2017:2534
- https://bugzilla.mozilla.org/show_bug.cgi?id=1374047
- https://bugzilla.mozilla.org/show_bug.cgi?id=1374047
- GLSA-201803-14
- GLSA-201803-14
- DSA-3928
- DSA-3928
- DSA-3968
- DSA-3968
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
Modified: 2024-11-21
CVE-2017-7801
A use-after-free vulnerability can occur while re-computing layout for a "marquee" element during window resizing where the updated style object is freed while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
- 100197
- 100197
- 1039124
- 1039124
- RHSA-2017:2456
- RHSA-2017:2456
- RHSA-2017:2534
- RHSA-2017:2534
- https://bugzilla.mozilla.org/show_bug.cgi?id=1371259
- https://bugzilla.mozilla.org/show_bug.cgi?id=1371259
- GLSA-201803-14
- GLSA-201803-14
- DSA-3928
- DSA-3928
- DSA-3968
- DSA-3968
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
Modified: 2024-11-21
CVE-2017-7802
A use-after-free vulnerability can occur when manipulating the DOM during the resize event of an image element. If these elements have been freed due to a lack of strong references, a potentially exploitable crash may occur when the freed elements are accessed. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
- 100202
- 100202
- 1039124
- 1039124
- RHSA-2017:2456
- RHSA-2017:2456
- RHSA-2017:2534
- RHSA-2017:2534
- https://bugzilla.mozilla.org/show_bug.cgi?id=1378147
- https://bugzilla.mozilla.org/show_bug.cgi?id=1378147
- GLSA-201803-14
- GLSA-201803-14
- DSA-3928
- DSA-3928
- DSA-3968
- DSA-3968
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
Modified: 2024-11-21
CVE-2017-7803
When a page's content security policy (CSP) header contains a "sandbox" directive, other directives are ignored. This results in the incorrect enforcement of CSP. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
- 100234
- 100234
- 1039124
- 1039124
- RHSA-2017:2456
- RHSA-2017:2456
- RHSA-2017:2534
- RHSA-2017:2534
- https://bugzilla.mozilla.org/show_bug.cgi?id=1377426
- https://bugzilla.mozilla.org/show_bug.cgi?id=1377426
- GLSA-201803-14
- GLSA-201803-14
- DSA-3928
- DSA-3928
- DSA-3968
- DSA-3968
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
Modified: 2024-11-21
CVE-2017-7805
During TLS 1.2 exchanges, handshake hashes are generated which point to a message buffer. This saved data is used for later messages but in some cases, the handshake transcript can exceed the space available in the current buffer, causing the allocation of a new buffer. This leaves a pointer pointing to the old, freed buffer, resulting in a use-after-free when handshake hashes are then calculated afterwards. This can result in a potentially exploitable crash. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- 101059
- 101059
- 1039465
- 1039465
- RHSA-2017:2832
- RHSA-2017:2832
- https://bugzilla.mozilla.org/show_bug.cgi?id=1377618
- https://bugzilla.mozilla.org/show_bug.cgi?id=1377618
- [debian-lts-announce] 20171101 [SECURITY] [DLA 1153-1] icedove/thunderbird security update
- [debian-lts-announce] 20171101 [SECURITY] [DLA 1153-1] icedove/thunderbird security update
- GLSA-201803-14
- GLSA-201803-14
- DSA-3987
- DSA-3987
- DSA-3998
- DSA-3998
- DSA-4014
- DSA-4014
- https://www.mozilla.org/security/advisories/mfsa2017-21/
- https://www.mozilla.org/security/advisories/mfsa2017-21/
- https://www.mozilla.org/security/advisories/mfsa2017-22/
- https://www.mozilla.org/security/advisories/mfsa2017-22/
- https://www.mozilla.org/security/advisories/mfsa2017-23/
- https://www.mozilla.org/security/advisories/mfsa2017-23/
Modified: 2024-11-21
CVE-2017-7807
A mechanism that uses AppCache to hijack a URL in a domain using fallback by serving the files from a sub-path on the domain. This has been addressed by requiring fallback files be inside the manifest directory. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
- 100242
- 100242
- 1039124
- 1039124
- RHSA-2017:2456
- RHSA-2017:2456
- RHSA-2017:2534
- RHSA-2017:2534
- https://bugzilla.mozilla.org/show_bug.cgi?id=1376459
- https://bugzilla.mozilla.org/show_bug.cgi?id=1376459
- GLSA-201803-14
- GLSA-201803-14
- DSA-3928
- DSA-3928
- DSA-3968
- DSA-3968
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
Modified: 2024-11-21
CVE-2017-7809
A use-after-free vulnerability can occur when an editor DOM node is deleted prematurely during tree traversal while still bound to the document. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
- 100203
- 100203
- 1039124
- 1039124
- RHSA-2017:2456
- RHSA-2017:2456
- RHSA-2017:2534
- RHSA-2017:2534
- https://bugzilla.mozilla.org/show_bug.cgi?id=1380284
- https://bugzilla.mozilla.org/show_bug.cgi?id=1380284
- GLSA-201803-14
- GLSA-201803-14
- DSA-3928
- DSA-3928
- DSA-3968
- DSA-3968
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
- https://www.mozilla.org/security/advisories/mfsa2017-20/
Modified: 2024-11-21
CVE-2017-7810
Memory safety bugs were reported in Firefox 55 and Firefox ESR 52.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
- 101054
- 101054
- 1039465
- 1039465
- RHSA-2017:2831
- RHSA-2017:2831
- RHSA-2017:2885
- RHSA-2017:2885
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1386787%2C1389974%2C1371657%2C1360334%2C1390550%2C1380824%2C1387918%2C1395598
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1386787%2C1389974%2C1371657%2C1360334%2C1390550%2C1380824%2C1387918%2C1395598
- [debian-lts-announce] 20171101 [SECURITY] [DLA 1153-1] icedove/thunderbird security update
- [debian-lts-announce] 20171101 [SECURITY] [DLA 1153-1] icedove/thunderbird security update
- GLSA-201803-14
- GLSA-201803-14
- USN-3688-1
- USN-3688-1
- DSA-3987
- DSA-3987
- DSA-4014
- DSA-4014
- https://www.mozilla.org/security/advisories/mfsa2017-21/
- https://www.mozilla.org/security/advisories/mfsa2017-21/
- https://www.mozilla.org/security/advisories/mfsa2017-22/
- https://www.mozilla.org/security/advisories/mfsa2017-22/
- https://www.mozilla.org/security/advisories/mfsa2017-23/
- https://www.mozilla.org/security/advisories/mfsa2017-23/
Modified: 2024-11-21
CVE-2017-7814
File downloads encoded with "blob:" and "data:" URL elements bypassed normal file download checks though the Phishing and Malware Protection feature and its block lists of suspicious sites and files. This would allow malicious sites to lure users into downloading executables that would otherwise be detected as suspicious. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
- 101059
- 101059
- 1039465
- 1039465
- RHSA-2017:2831
- RHSA-2017:2831
- RHSA-2017:2885
- RHSA-2017:2885
- https://bugzilla.mozilla.org/show_bug.cgi?id=1376036
- https://bugzilla.mozilla.org/show_bug.cgi?id=1376036
- [debian-lts-announce] 20171101 [SECURITY] [DLA 1153-1] icedove/thunderbird security update
- [debian-lts-announce] 20171101 [SECURITY] [DLA 1153-1] icedove/thunderbird security update
- GLSA-201803-14
- GLSA-201803-14
- DSA-3987
- DSA-3987
- DSA-4014
- DSA-4014
- https://www.mozilla.org/security/advisories/mfsa2017-21/
- https://www.mozilla.org/security/advisories/mfsa2017-21/
- https://www.mozilla.org/security/advisories/mfsa2017-22/
- https://www.mozilla.org/security/advisories/mfsa2017-22/
- https://www.mozilla.org/security/advisories/mfsa2017-23/
- https://www.mozilla.org/security/advisories/mfsa2017-23/
Modified: 2024-11-21
CVE-2017-7818
A use-after-free vulnerability can occur when manipulating arrays of Accessible Rich Internet Applications (ARIA) elements within containers through the DOM. This results in a potentially exploitable crash. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
- 101055
- 101055
- 1039465
- 1039465
- RHSA-2017:2831
- RHSA-2017:2831
- RHSA-2017:2885
- RHSA-2017:2885
- https://bugzilla.mozilla.org/show_bug.cgi?id=1363723
- https://bugzilla.mozilla.org/show_bug.cgi?id=1363723
- [debian-lts-announce] 20171101 [SECURITY] [DLA 1153-1] icedove/thunderbird security update
- [debian-lts-announce] 20171101 [SECURITY] [DLA 1153-1] icedove/thunderbird security update
- GLSA-201803-14
- GLSA-201803-14
- DSA-3987
- DSA-3987
- DSA-4014
- DSA-4014
- https://www.mozilla.org/security/advisories/mfsa2017-21/
- https://www.mozilla.org/security/advisories/mfsa2017-21/
- https://www.mozilla.org/security/advisories/mfsa2017-22/
- https://www.mozilla.org/security/advisories/mfsa2017-22/
- https://www.mozilla.org/security/advisories/mfsa2017-23/
- https://www.mozilla.org/security/advisories/mfsa2017-23/
Modified: 2024-11-21
CVE-2017-7819
A use-after-free vulnerability can occur in design mode when image objects are resized if objects referenced during the resizing have been freed from memory. This results in a potentially exploitable crash. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
- 101055
- 101055
- 1039465
- 1039465
- RHSA-2017:2831
- RHSA-2017:2831
- RHSA-2017:2885
- RHSA-2017:2885
- https://bugzilla.mozilla.org/show_bug.cgi?id=1380292
- https://bugzilla.mozilla.org/show_bug.cgi?id=1380292
- [debian-lts-announce] 20171101 [SECURITY] [DLA 1153-1] icedove/thunderbird security update
- [debian-lts-announce] 20171101 [SECURITY] [DLA 1153-1] icedove/thunderbird security update
- GLSA-201803-14
- GLSA-201803-14
- DSA-3987
- DSA-3987
- DSA-4014
- DSA-4014
- https://www.mozilla.org/security/advisories/mfsa2017-21/
- https://www.mozilla.org/security/advisories/mfsa2017-21/
- https://www.mozilla.org/security/advisories/mfsa2017-22/
- https://www.mozilla.org/security/advisories/mfsa2017-22/
- https://www.mozilla.org/security/advisories/mfsa2017-23/
- https://www.mozilla.org/security/advisories/mfsa2017-23/
Modified: 2024-11-21
CVE-2017-7823
The content security policy (CSP) "sandbox" directive did not create a unique origin for the document, causing it to behave as if the "allow-same-origin" keyword were always specified. This could allow a Cross-Site Scripting (XSS) attack to be launched from unsafe content. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
- 101059
- 101059
- 1039465
- 1039465
- RHSA-2017:2831
- RHSA-2017:2831
- RHSA-2017:2885
- RHSA-2017:2885
- https://bugzilla.mozilla.org/show_bug.cgi?id=1396320
- https://bugzilla.mozilla.org/show_bug.cgi?id=1396320
- [debian-lts-announce] 20171101 [SECURITY] [DLA 1153-1] icedove/thunderbird security update
- [debian-lts-announce] 20171101 [SECURITY] [DLA 1153-1] icedove/thunderbird security update
- GLSA-201803-14
- GLSA-201803-14
- DSA-3987
- DSA-3987
- DSA-4014
- DSA-4014
- https://www.mozilla.org/security/advisories/mfsa2017-21/
- https://www.mozilla.org/security/advisories/mfsa2017-21/
- https://www.mozilla.org/security/advisories/mfsa2017-22/
- https://www.mozilla.org/security/advisories/mfsa2017-22/
- https://www.mozilla.org/security/advisories/mfsa2017-23/
- https://www.mozilla.org/security/advisories/mfsa2017-23/
Modified: 2024-11-21
CVE-2017-7824
A buffer overflow occurs when drawing and validating elements with the ANGLE graphics library, used for WebGL content. This is due to an incorrect value being passed within the library during checks and results in a potentially exploitable crash. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
- 101053
- 101053
- 1039465
- 1039465
- RHSA-2017:2831
- RHSA-2017:2831
- RHSA-2017:2885
- RHSA-2017:2885
- https://bugzilla.mozilla.org/show_bug.cgi?id=1398381
- https://bugzilla.mozilla.org/show_bug.cgi?id=1398381
- [debian-lts-announce] 20171101 [SECURITY] [DLA 1153-1] icedove/thunderbird security update
- [debian-lts-announce] 20171101 [SECURITY] [DLA 1153-1] icedove/thunderbird security update
- GLSA-201803-14
- GLSA-201803-14
- DSA-3987
- DSA-3987
- DSA-4014
- DSA-4014
- https://www.mozilla.org/security/advisories/mfsa2017-21/
- https://www.mozilla.org/security/advisories/mfsa2017-21/
- https://www.mozilla.org/security/advisories/mfsa2017-22/
- https://www.mozilla.org/security/advisories/mfsa2017-22/
- https://www.mozilla.org/security/advisories/mfsa2017-23/
- https://www.mozilla.org/security/advisories/mfsa2017-23/
Modified: 2024-11-21
CVE-2017-7825
Several fonts on OS X display some Tibetan and Arabic characters as whitespace. When used in the addressbar as part of an IDN this can be used for domain name spoofing attacks. Note: This attack only affects OS X operating systems. Other operating systems are unaffected. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
- 101059
- 101059
- 1039465
- 1039465
- https://bugzilla.mozilla.org/show_bug.cgi?id=1390980
- https://bugzilla.mozilla.org/show_bug.cgi?id=1390980
- https://bugzilla.mozilla.org/show_bug.cgi?id=1393624
- https://bugzilla.mozilla.org/show_bug.cgi?id=1393624
- [debian-lts-announce] 20171101 [SECURITY] [DLA 1153-1] icedove/thunderbird security update
- [debian-lts-announce] 20171101 [SECURITY] [DLA 1153-1] icedove/thunderbird security update
- GLSA-201803-14
- GLSA-201803-14
- https://www.mozilla.org/security/advisories/mfsa2017-21/
- https://www.mozilla.org/security/advisories/mfsa2017-21/
- https://www.mozilla.org/security/advisories/mfsa2017-22/
- https://www.mozilla.org/security/advisories/mfsa2017-22/
- https://www.mozilla.org/security/advisories/mfsa2017-23/
- https://www.mozilla.org/security/advisories/mfsa2017-23/
Modified: 2024-11-21
CVE-2017-7826
Memory safety bugs were reported in Firefox 56 and Firefox ESR 52.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 57, Firefox ESR < 52.5, and Thunderbird < 52.5.
- 101832
- 101832
- 1039803
- 1039803
- RHSA-2017:3247
- RHSA-2017:3247
- RHSA-2017:3372
- RHSA-2017:3372
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1394530%2C1369561%2C1411458%2C1400003%2C1395138%2C1408412%2C1393840%2C1400763%2C1339259%2C1394265%2C1407740%2C1407751%2C1408005%2C1406398%2C1387799%2C1261175%2C1400554%2C1375146%2C1397811%2C1404636%2C1401804
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1394530%2C1369561%2C1411458%2C1400003%2C1395138%2C1408412%2C1393840%2C1400763%2C1339259%2C1394265%2C1407740%2C1407751%2C1408005%2C1406398%2C1387799%2C1261175%2C1400554%2C1375146%2C1397811%2C1404636%2C1401804
- [debian-lts-announce] 20171115 [SECURITY] [DLA 1172-1] firefox-esr security update
- [debian-lts-announce] 20171115 [SECURITY] [DLA 1172-1] firefox-esr security update
- [debian-lts-announce] 20171209 [SECURITY] [DLA 1199-1] thunderbird security update
- [debian-lts-announce] 20171209 [SECURITY] [DLA 1199-1] thunderbird security update
- USN-3688-1
- USN-3688-1
- DSA-4035
- DSA-4035
- DSA-4061
- DSA-4061
- DSA-4075
- DSA-4075
- https://www.mozilla.org/security/advisories/mfsa2017-24/
- https://www.mozilla.org/security/advisories/mfsa2017-24/
- https://www.mozilla.org/security/advisories/mfsa2017-25/
- https://www.mozilla.org/security/advisories/mfsa2017-25/
- https://www.mozilla.org/security/advisories/mfsa2017-26/
- https://www.mozilla.org/security/advisories/mfsa2017-26/
Modified: 2024-11-21
CVE-2017-7828
A use-after-free vulnerability can occur when flushing and resizing layout because the "PressShell" object has been freed while still in use. This results in a potentially exploitable crash during these operations. This vulnerability affects Firefox < 57, Firefox ESR < 52.5, and Thunderbird < 52.5.
- 101832
- 101832
- 1039803
- 1039803
- RHSA-2017:3247
- RHSA-2017:3247
- RHSA-2017:3372
- RHSA-2017:3372
- https://bugzilla.mozilla.org/show_bug.cgi?id=1406750
- https://bugzilla.mozilla.org/show_bug.cgi?id=1406750
- https://bugzilla.mozilla.org/show_bug.cgi?id=1412252
- https://bugzilla.mozilla.org/show_bug.cgi?id=1412252
- [debian-lts-announce] 20171115 [SECURITY] [DLA 1172-1] firefox-esr security update
- [debian-lts-announce] 20171115 [SECURITY] [DLA 1172-1] firefox-esr security update
- [debian-lts-announce] 20171209 [SECURITY] [DLA 1199-1] thunderbird security update
- [debian-lts-announce] 20171209 [SECURITY] [DLA 1199-1] thunderbird security update
- DSA-4035
- DSA-4035
- DSA-4061
- DSA-4061
- DSA-4075
- DSA-4075
- https://www.mozilla.org/security/advisories/mfsa2017-24/
- https://www.mozilla.org/security/advisories/mfsa2017-24/
- https://www.mozilla.org/security/advisories/mfsa2017-25/
- https://www.mozilla.org/security/advisories/mfsa2017-25/
- https://www.mozilla.org/security/advisories/mfsa2017-26/
- https://www.mozilla.org/security/advisories/mfsa2017-26/
Modified: 2024-11-21
CVE-2017-7829
It is possible to spoof the sender's email address and display an arbitrary sender address to the email recipient. The real sender's address is not displayed if preceded by a null character in the display string. This vulnerability affects Thunderbird < 52.5.2.
- 102258
- 102258
- 1040123
- 1040123
- RHSA-2018:0061
- RHSA-2018:0061
- https://bugzilla.mozilla.org/show_bug.cgi?id=1423432
- https://bugzilla.mozilla.org/show_bug.cgi?id=1423432
- [debian-lts-announce] 20171227 [SECURITY] [DLA 1223-1] thunderbird security update
- [debian-lts-announce] 20171227 [SECURITY] [DLA 1223-1] thunderbird security update
- USN-3529-1
- USN-3529-1
- DSA-4075
- DSA-4075
- https://www.mozilla.org/security/advisories/mfsa2017-30/
- https://www.mozilla.org/security/advisories/mfsa2017-30/
Modified: 2024-11-21
CVE-2017-7830
The Resource Timing API incorrectly revealed navigations in cross-origin iframes. This is a same-origin policy violation and could allow for data theft of URLs loaded by users. This vulnerability affects Firefox < 57, Firefox ESR < 52.5, and Thunderbird < 52.5.
- 101832
- 101832
- 1039803
- 1039803
- RHSA-2017:3247
- RHSA-2017:3247
- RHSA-2017:3372
- RHSA-2017:3372
- https://bugzilla.mozilla.org/show_bug.cgi?id=1408990
- https://bugzilla.mozilla.org/show_bug.cgi?id=1408990
- [debian-lts-announce] 20171115 [SECURITY] [DLA 1172-1] firefox-esr security update
- [debian-lts-announce] 20171115 [SECURITY] [DLA 1172-1] firefox-esr security update
- [debian-lts-announce] 20171209 [SECURITY] [DLA 1199-1] thunderbird security update
- [debian-lts-announce] 20171209 [SECURITY] [DLA 1199-1] thunderbird security update
- DSA-4035
- DSA-4035
- DSA-4061
- DSA-4061
- DSA-4075
- DSA-4075
- https://www.mozilla.org/security/advisories/mfsa2017-24/
- https://www.mozilla.org/security/advisories/mfsa2017-24/
- https://www.mozilla.org/security/advisories/mfsa2017-25/
- https://www.mozilla.org/security/advisories/mfsa2017-25/
- https://www.mozilla.org/security/advisories/mfsa2017-26/
- https://www.mozilla.org/security/advisories/mfsa2017-26/
Modified: 2024-11-21
CVE-2017-7846
It is possible to execute JavaScript in the parsed RSS feed when RSS feed is viewed as a website, e.g. via "View -> Feed article -> Website" or in the standard format of "View -> Feed article -> default format". This vulnerability affects Thunderbird < 52.5.2.
- 102258
- 102258
- 1040123
- 1040123
- RHSA-2018:0061
- RHSA-2018:0061
- https://bugzilla.mozilla.org/show_bug.cgi?id=1411716
- https://bugzilla.mozilla.org/show_bug.cgi?id=1411716
- [debian-lts-announce] 20171227 [SECURITY] [DLA 1223-1] thunderbird security update
- [debian-lts-announce] 20171227 [SECURITY] [DLA 1223-1] thunderbird security update
- DSA-4075
- DSA-4075
- https://www.mozilla.org/security/advisories/mfsa2017-30/
- https://www.mozilla.org/security/advisories/mfsa2017-30/
Modified: 2024-11-21
CVE-2017-7847
Crafted CSS in an RSS feed can leak and reveal local path strings, which may contain user name. This vulnerability affects Thunderbird < 52.5.2.
- 102258
- 102258
- 1040123
- 1040123
- RHSA-2018:0061
- RHSA-2018:0061
- https://bugzilla.mozilla.org/show_bug.cgi?id=1411708
- https://bugzilla.mozilla.org/show_bug.cgi?id=1411708
- [debian-lts-announce] 20171227 [SECURITY] [DLA 1223-1] thunderbird security update
- [debian-lts-announce] 20171227 [SECURITY] [DLA 1223-1] thunderbird security update
- DSA-4075
- DSA-4075
- https://www.mozilla.org/security/advisories/mfsa2017-30/
- https://www.mozilla.org/security/advisories/mfsa2017-30/
Modified: 2024-11-21
CVE-2017-7848
RSS fields can inject new lines into the created email structure, modifying the message body. This vulnerability affects Thunderbird < 52.5.2.
- 102258
- 102258
- 1040123
- 1040123
- RHSA-2018:0061
- RHSA-2018:0061
- https://bugzilla.mozilla.org/show_bug.cgi?id=1411699
- https://bugzilla.mozilla.org/show_bug.cgi?id=1411699
- [debian-lts-announce] 20171227 [SECURITY] [DLA 1223-1] thunderbird security update
- [debian-lts-announce] 20171227 [SECURITY] [DLA 1223-1] thunderbird security update
- DSA-4075
- DSA-4075
- https://www.mozilla.org/security/advisories/mfsa2017-30/
- https://www.mozilla.org/security/advisories/mfsa2017-30/
Modified: 2024-11-21
CVE-2018-12359
A buffer overflow can occur when rendering canvas content while adjusting the height and width of the canvas element dynamically, causing data to be written outside of the currently computed boundaries. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
- 104555
- 104555
- 1041193
- 1041193
- RHSA-2018:2112
- RHSA-2018:2112
- RHSA-2018:2113
- RHSA-2018:2113
- RHSA-2018:2251
- RHSA-2018:2251
- RHSA-2018:2252
- RHSA-2018:2252
- https://bugzilla.mozilla.org/show_bug.cgi?id=1459162
- https://bugzilla.mozilla.org/show_bug.cgi?id=1459162
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3705-1
- USN-3705-1
- USN-3714-1
- USN-3714-1
- DSA-4235
- DSA-4235
- DSA-4244
- DSA-4244
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
Modified: 2024-11-21
CVE-2018-12360
A use-after-free vulnerability can occur when deleting an input element during a mutation event handler triggered by focusing that element. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
- 104555
- 104555
- 1041193
- 1041193
- RHSA-2018:2112
- RHSA-2018:2112
- RHSA-2018:2113
- RHSA-2018:2113
- RHSA-2018:2251
- RHSA-2018:2251
- RHSA-2018:2252
- RHSA-2018:2252
- https://bugzilla.mozilla.org/show_bug.cgi?id=1459693
- https://bugzilla.mozilla.org/show_bug.cgi?id=1459693
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3705-1
- USN-3705-1
- USN-3714-1
- USN-3714-1
- DSA-4235
- DSA-4235
- DSA-4244
- DSA-4244
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
Modified: 2024-11-21
CVE-2018-12361
An integer overflow can occur in the SwizzleData code while calculating buffer sizes. The overflowed value is used for subsequent graphics computations when their inputs are not sanitized which results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60, Firefox ESR < 60.1, and Firefox < 61.
- 104558
- 104558
- 1041193
- 1041193
- https://bugzilla.mozilla.org/show_bug.cgi?id=1463244
- https://bugzilla.mozilla.org/show_bug.cgi?id=1463244
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3705-1
- USN-3705-1
- DSA-4295
- DSA-4295
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
Modified: 2024-11-21
CVE-2018-12362
An integer overflow can occur during graphics operations done by the Supplemental Streaming SIMD Extensions 3 (SSSE3) scaler, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
- 104560
- 104560
- 1041193
- 1041193
- RHSA-2018:2112
- RHSA-2018:2112
- RHSA-2018:2113
- RHSA-2018:2113
- RHSA-2018:2251
- RHSA-2018:2251
- RHSA-2018:2252
- RHSA-2018:2252
- https://bugzilla.mozilla.org/show_bug.cgi?id=1452375
- https://bugzilla.mozilla.org/show_bug.cgi?id=1452375
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3705-1
- USN-3705-1
- USN-3714-1
- USN-3714-1
- DSA-4235
- DSA-4235
- DSA-4244
- DSA-4244
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
Modified: 2024-11-21
CVE-2018-12363
A use-after-free vulnerability can occur when script uses mutation events to move DOM nodes between documents, resulting in the old document that held the node being freed but the node still having a pointer referencing it. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
- 104560
- 104560
- 1041193
- 1041193
- RHSA-2018:2112
- RHSA-2018:2112
- RHSA-2018:2113
- RHSA-2018:2113
- RHSA-2018:2251
- RHSA-2018:2251
- RHSA-2018:2252
- RHSA-2018:2252
- https://bugzilla.mozilla.org/show_bug.cgi?id=1464784
- https://bugzilla.mozilla.org/show_bug.cgi?id=1464784
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3705-1
- USN-3705-1
- USN-3714-1
- USN-3714-1
- DSA-4235
- DSA-4235
- DSA-4244
- DSA-4244
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
Modified: 2024-11-21
CVE-2018-12364
NPAPI plugins, such as Adobe Flash, can send non-simple cross-origin requests, bypassing CORS by making a same-origin POST that does a 307 redirect to the target site. This allows for a malicious site to engage in cross-site request forgery (CSRF) attacks. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
- 104560
- 104560
- 1041193
- 1041193
- RHSA-2018:2112
- RHSA-2018:2112
- RHSA-2018:2113
- RHSA-2018:2113
- RHSA-2018:2251
- RHSA-2018:2251
- RHSA-2018:2252
- RHSA-2018:2252
- https://bugzilla.mozilla.org/show_bug.cgi?id=1436241
- https://bugzilla.mozilla.org/show_bug.cgi?id=1436241
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3705-1
- USN-3705-1
- USN-3714-1
- USN-3714-1
- DSA-4235
- DSA-4235
- DSA-4244
- DSA-4244
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
Modified: 2024-11-21
CVE-2018-12365
A compromised IPC child process can escape the content sandbox and list the names of arbitrary files on the file system without user consent or interaction. This could result in exposure of private local files. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
- 104560
- 104560
- 1041193
- 1041193
- RHSA-2018:2112
- RHSA-2018:2112
- RHSA-2018:2113
- RHSA-2018:2113
- RHSA-2018:2251
- RHSA-2018:2251
- RHSA-2018:2252
- RHSA-2018:2252
- https://bugzilla.mozilla.org/show_bug.cgi?id=1459206
- https://bugzilla.mozilla.org/show_bug.cgi?id=1459206
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3705-1
- USN-3705-1
- USN-3714-1
- USN-3714-1
- DSA-4235
- DSA-4235
- DSA-4244
- DSA-4244
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
Modified: 2024-11-21
CVE-2018-12366
An invalid grid size during QCMS (color profile) transformations can result in the out-of-bounds read interpreted as a float value. This could leak private data into the output. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
- 104560
- 104560
- 1041193
- 1041193
- RHSA-2018:2112
- RHSA-2018:2112
- RHSA-2018:2113
- RHSA-2018:2113
- RHSA-2018:2251
- RHSA-2018:2251
- RHSA-2018:2252
- RHSA-2018:2252
- https://bugzilla.mozilla.org/show_bug.cgi?id=1464039
- https://bugzilla.mozilla.org/show_bug.cgi?id=1464039
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3705-1
- USN-3705-1
- USN-3714-1
- USN-3714-1
- DSA-4235
- DSA-4235
- DSA-4244
- DSA-4244
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
Modified: 2024-11-21
CVE-2018-12367
In the previous mitigations for Spectre, the resolution or precision of various methods was reduced to counteract the ability to measure precise time intervals. In that work PerformanceNavigationTiming was not adjusted but it was found that it could be used as a precision timer. This vulnerability affects Thunderbird < 60, Firefox ESR < 60.1, and Firefox < 61.
- 104561
- 104561
- 1041193
- 1041193
- https://bugzilla.mozilla.org/show_bug.cgi?id=1462891
- https://bugzilla.mozilla.org/show_bug.cgi?id=1462891
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3705-1
- USN-3705-1
- DSA-4295
- DSA-4295
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
Modified: 2024-11-21
CVE-2018-12368
Windows 10 does not warn users before opening executable files with the SettingContent-ms extension even when they have been downloaded from the internet and have the "Mark of the Web." Without the warning, unsuspecting users unfamiliar with this new file type might run an unwanted executable. This also allows a WebExtension with the limited downloads.open permission to execute arbitrary code without user interaction on Windows 10 systems. *Note: this issue only affects Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
- 104560
- 104560
- 1041193
- 1041193
- https://bugzilla.mozilla.org/show_bug.cgi?id=1468217
- https://bugzilla.mozilla.org/show_bug.cgi?id=1468217
- https://posts.specterops.io/the-tale-of-settingcontent-ms-files-f1ea253e4d39
- https://posts.specterops.io/the-tale-of-settingcontent-ms-files-f1ea253e4d39
- GLSA-201810-01
- GLSA-201810-01
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
Modified: 2024-11-21
CVE-2018-12371
An integer overflow vulnerability in the Skia library when allocating memory for edge builders on some systems with at least 16 GB of RAM. This results in the use of uninitialized memory, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR < 60.1, Thunderbird < 60, and Firefox < 61.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1465686
- https://bugzilla.mozilla.org/show_bug.cgi?id=1465686
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
Modified: 2024-11-21
CVE-2018-12372
Decrypted S/MIME parts, when included in HTML crafted for an attack, can leak plaintext when included in a a HTML reply/forward. This vulnerability affects Thunderbird < 52.9.
- 104613
- 104613
- RHSA-2018:2251
- RHSA-2018:2251
- RHSA-2018:2252
- RHSA-2018:2252
- https://bugzilla.mozilla.org/show_bug.cgi?id=1419417
- https://bugzilla.mozilla.org/show_bug.cgi?id=1419417
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- GLSA-201811-13
- GLSA-201811-13
- USN-3714-1
- USN-3714-1
- DSA-4244
- DSA-4244
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
Modified: 2024-11-21
CVE-2018-12373
dDecrypted S/MIME parts hidden with CSS or the plaintext HTML tag can leak plaintext when included in a HTML reply/forward. This vulnerability affects Thunderbird < 52.9.
- 104613
- 104613
- RHSA-2018:2251
- RHSA-2018:2251
- RHSA-2018:2252
- RHSA-2018:2252
- https://bugzilla.mozilla.org/show_bug.cgi?id=1464056
- https://bugzilla.mozilla.org/show_bug.cgi?id=1464056
- https://bugzilla.mozilla.org/show_bug.cgi?id=1464667
- https://bugzilla.mozilla.org/show_bug.cgi?id=1464667
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- GLSA-201811-13
- GLSA-201811-13
- USN-3714-1
- USN-3714-1
- DSA-4244
- DSA-4244
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
Modified: 2024-11-21
CVE-2018-12374
Plaintext of decrypted emails can leak through by user submitting an embedded form by pressing enter key within a text input field. This vulnerability affects Thunderbird < 52.9.
- 104613
- 104613
- RHSA-2018:2251
- RHSA-2018:2251
- RHSA-2018:2252
- RHSA-2018:2252
- https://bugzilla.mozilla.org/show_bug.cgi?id=1462910
- https://bugzilla.mozilla.org/show_bug.cgi?id=1462910
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- GLSA-201811-13
- GLSA-201811-13
- USN-3714-1
- USN-3714-1
- DSA-4244
- DSA-4244
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
Modified: 2024-11-21
CVE-2018-12376
Memory safety bugs present in Firefox 61 and Firefox ESR 60.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 62, Firefox ESR < 60.2, and Thunderbird < 60.2.1.
- 105280
- 105280
- 1041610
- 1041610
- RHSA-2018:2692
- RHSA-2018:2692
- RHSA-2018:2693
- RHSA-2018:2693
- RHSA-2018:3403
- RHSA-2018:3403
- RHSA-2018:3458
- RHSA-2018:3458
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1469309%2C1469914%2C1450989%2C1480092%2C1480517%2C1481093%2C1478575%2C1471953%2C1473161%2C1466991%2C1468738%2C1483120%2C1467363%2C1472925%2C1466577%2C1467889%2C1480521%2C1478849
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1469309%2C1469914%2C1450989%2C1480092%2C1480517%2C1481093%2C1478575%2C1471953%2C1473161%2C1466991%2C1468738%2C1483120%2C1467363%2C1472925%2C1466577%2C1467889%2C1480521%2C1478849
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3761-1
- USN-3761-1
- USN-3793-1
- USN-3793-1
- DSA-4287
- DSA-4287
- DSA-4327
- DSA-4327
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-21/
- https://www.mozilla.org/security/advisories/mfsa2018-21/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
Modified: 2024-11-21
CVE-2018-12377
A use-after-free vulnerability can occur when refresh driver timers are refreshed in some circumstances during shutdown when the timer is deleted while still in use. This results in a potentially exploitable crash. This vulnerability affects Firefox < 62, Firefox ESR < 60.2, and Thunderbird < 60.2.1.
- 105280
- 105280
- 1041610
- 1041610
- RHSA-2018:2692
- RHSA-2018:2692
- RHSA-2018:2693
- RHSA-2018:2693
- RHSA-2018:3403
- RHSA-2018:3403
- RHSA-2018:3458
- RHSA-2018:3458
- https://bugzilla.mozilla.org/show_bug.cgi?id=1470260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1470260
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3761-1
- USN-3761-1
- USN-3793-1
- USN-3793-1
- DSA-4287
- DSA-4287
- DSA-4327
- DSA-4327
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-21/
- https://www.mozilla.org/security/advisories/mfsa2018-21/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
Modified: 2024-11-21
CVE-2018-12378
A use-after-free vulnerability can occur when an IndexedDB index is deleted while still in use by JavaScript code that is providing payload values to be stored. This results in a potentially exploitable crash. This vulnerability affects Firefox < 62, Firefox ESR < 60.2, and Thunderbird < 60.2.1.
- 105280
- 105280
- 1041610
- 1041610
- RHSA-2018:2692
- RHSA-2018:2692
- RHSA-2018:2693
- RHSA-2018:2693
- RHSA-2018:3403
- RHSA-2018:3403
- RHSA-2018:3458
- RHSA-2018:3458
- https://bugzilla.mozilla.org/show_bug.cgi?id=1459383
- https://bugzilla.mozilla.org/show_bug.cgi?id=1459383
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3761-1
- USN-3761-1
- USN-3793-1
- USN-3793-1
- DSA-4287
- DSA-4287
- DSA-4327
- DSA-4327
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-21/
- https://www.mozilla.org/security/advisories/mfsa2018-21/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
Modified: 2024-11-21
CVE-2018-12379
When the Mozilla Updater opens a MAR format file which contains a very long item filename, an out-of-bounds write can be triggered, leading to a potentially exploitable crash. This requires running the Mozilla Updater manually on the local system with the malicious MAR file in order to occur. This vulnerability affects Firefox < 62, Firefox ESR < 60.2, and Thunderbird < 60.2.1.
- 105280
- 105280
- 1041610
- 1041610
- RHSA-2018:2692
- RHSA-2018:2692
- RHSA-2018:2693
- RHSA-2018:2693
- RHSA-2018:3403
- RHSA-2018:3403
- RHSA-2018:3458
- RHSA-2018:3458
- https://bugzilla.mozilla.org/show_bug.cgi?id=1473113
- https://bugzilla.mozilla.org/show_bug.cgi?id=1473113
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- DSA-4327
- DSA-4327
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-21/
- https://www.mozilla.org/security/advisories/mfsa2018-21/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
Modified: 2024-11-21
CVE-2018-12383
If a user saved passwords before Firefox 58 and then later set a master password, an unencrypted copy of these passwords is still accessible. This is because the older stored password file was not deleted when the data was copied to a new format starting in Firefox 58. The new master password is added only on the new file. This could allow the exposure of stored password data outside of user expectations. This vulnerability affects Firefox < 62, Firefox ESR < 60.2.1, and Thunderbird < 60.2.1.
- 105276
- 105276
- 1041610
- 1041610
- 1041701
- 1041701
- RHSA-2018:2834
- RHSA-2018:2834
- RHSA-2018:2835
- RHSA-2018:2835
- RHSA-2018:3403
- RHSA-2018:3403
- RHSA-2018:3458
- RHSA-2018:3458
- https://bugzilla.mozilla.org/show_bug.cgi?id=1475775
- https://bugzilla.mozilla.org/show_bug.cgi?id=1475775
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3761-1
- USN-3761-1
- USN-3793-1
- USN-3793-1
- DSA-4304
- DSA-4304
- DSA-4327
- DSA-4327
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-23/
- https://www.mozilla.org/security/advisories/mfsa2018-23/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
Modified: 2024-11-21
CVE-2018-12385
A potentially exploitable crash in TransportSecurityInfo used for SSL can be triggered by data stored in the local cache in the user profile directory. This issue is only exploitable in combination with another vulnerability allowing an attacker to write data into the local cache or from locally installed malware. This issue also triggers a non-exploitable startup crash for users switching between the Nightly and Release versions of Firefox if the same profile is used. This vulnerability affects Thunderbird < 60.2.1, Firefox ESR < 60.2.1, and Firefox < 62.0.2.
- 105380
- 105380
- 1041700
- 1041700
- 1041701
- 1041701
- RHSA-2018:2834
- RHSA-2018:2834
- RHSA-2018:2835
- RHSA-2018:2835
- RHSA-2018:3403
- RHSA-2018:3403
- RHSA-2018:3458
- RHSA-2018:3458
- https://bugzilla.mozilla.org/show_bug.cgi?id=1490585
- https://bugzilla.mozilla.org/show_bug.cgi?id=1490585
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3778-1
- USN-3778-1
- USN-3793-1
- USN-3793-1
- DSA-4304
- DSA-4304
- DSA-4327
- DSA-4327
- https://www.mozilla.org/security/advisories/mfsa2018-22/
- https://www.mozilla.org/security/advisories/mfsa2018-22/
- https://www.mozilla.org/security/advisories/mfsa2018-23/
- https://www.mozilla.org/security/advisories/mfsa2018-23/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
Modified: 2024-11-21
CVE-2018-12389
Mozilla developers and community members reported memory safety bugs present in Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR < 60.3 and Thunderbird < 60.3.
- 105723
- 105723
- 105769
- 105769
- 1041944
- 1041944
- RHSA-2018:3005
- RHSA-2018:3005
- RHSA-2018:3006
- RHSA-2018:3006
- RHSA-2018:3531
- RHSA-2018:3531
- RHSA-2018:3532
- RHSA-2018:3532
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1498460%2C1499198
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1498460%2C1499198
- [debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update
- [debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201811-04
- GLSA-201811-04
- GLSA-201811-13
- GLSA-201811-13
- USN-3868-1
- USN-3868-1
- DSA-4324
- DSA-4324
- DSA-4337
- DSA-4337
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-28/
- https://www.mozilla.org/security/advisories/mfsa2018-28/
Modified: 2024-11-21
CVE-2018-12390
Mozilla developers and community members reported memory safety bugs present in Firefox 62 and Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 63, Firefox ESR < 60.3, and Thunderbird < 60.3.
- 105718
- 105718
- 105769
- 105769
- 1041944
- 1041944
- RHSA-2018:3005
- RHSA-2018:3005
- RHSA-2018:3006
- RHSA-2018:3006
- RHSA-2018:3531
- RHSA-2018:3531
- RHSA-2018:3532
- RHSA-2018:3532
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1487098%2C1487660%2C1490234%2C1496159%2C1443748%2C1496340%2C1483905%2C1493347%2C1488803%2C1498701%2C1498482%2C1442010%2C1495245%2C1483699%2C1469486%2C1484905%2C1490561%2C1492524%2C1481844
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1487098%2C1487660%2C1490234%2C1496159%2C1443748%2C1496340%2C1483905%2C1493347%2C1488803%2C1498701%2C1498482%2C1442010%2C1495245%2C1483699%2C1469486%2C1484905%2C1490561%2C1492524%2C1481844
- [debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update
- [debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201811-04
- GLSA-201811-04
- GLSA-201811-13
- GLSA-201811-13
- USN-3801-1
- USN-3801-1
- USN-3868-1
- USN-3868-1
- DSA-4324
- DSA-4324
- DSA-4337
- DSA-4337
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-28/
- https://www.mozilla.org/security/advisories/mfsa2018-28/
Modified: 2024-11-21
CVE-2018-12391
During HTTP Live Stream playback on Firefox for Android, audio data can be accessed across origins in violation of security policies. Because the problem is in the underlying Android service, this issue is addressed by treating all HLS streams as cross-origin and opaque to access. *Note: this issue only affects Firefox for Android. Desktop versions of Firefox are unaffected.*. This vulnerability affects Firefox < 63, Firefox ESR < 60.3, and Thunderbird < 60.3.
- 105718
- 105718
- 105769
- 105769
- 1041944
- 1041944
- https://bugzilla.mozilla.org/show_bug.cgi?id=1478843
- https://bugzilla.mozilla.org/show_bug.cgi?id=1478843
- GLSA-201811-13
- GLSA-201811-13
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-28/
- https://www.mozilla.org/security/advisories/mfsa2018-28/
Modified: 2024-11-21
CVE-2018-12392
When manipulating user events in nested loops while opening a document through script, it is possible to trigger a potentially exploitable crash due to poor event handling. This vulnerability affects Firefox < 63, Firefox ESR < 60.3, and Thunderbird < 60.3.
- 105718
- 105718
- 105769
- 105769
- 1041944
- 1041944
- RHSA-2018:3005
- RHSA-2018:3005
- RHSA-2018:3006
- RHSA-2018:3006
- RHSA-2018:3531
- RHSA-2018:3531
- RHSA-2018:3532
- RHSA-2018:3532
- https://bugzilla.mozilla.org/show_bug.cgi?id=1492823
- https://bugzilla.mozilla.org/show_bug.cgi?id=1492823
- [debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update
- [debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201811-04
- GLSA-201811-04
- GLSA-201811-13
- GLSA-201811-13
- USN-3801-1
- USN-3801-1
- USN-3868-1
- USN-3868-1
- DSA-4324
- DSA-4324
- DSA-4337
- DSA-4337
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-28/
- https://www.mozilla.org/security/advisories/mfsa2018-28/
Modified: 2024-11-21
CVE-2018-12393
A potential vulnerability was found in 32-bit builds where an integer overflow during the conversion of scripts to an internal UTF-16 representation could result in allocating a buffer too small for the conversion. This leads to a possible out-of-bounds write. *Note: 64-bit builds are not vulnerable to this issue.*. This vulnerability affects Firefox < 63, Firefox ESR < 60.3, and Thunderbird < 60.3.
- 105718
- 105718
- 105769
- 105769
- 1041944
- 1041944
- RHSA-2018:3005
- RHSA-2018:3005
- RHSA-2018:3006
- RHSA-2018:3006
- RHSA-2018:3531
- RHSA-2018:3531
- RHSA-2018:3532
- RHSA-2018:3532
- https://bugzilla.mozilla.org/show_bug.cgi?id=1495011
- https://bugzilla.mozilla.org/show_bug.cgi?id=1495011
- [debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update
- [debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201811-04
- GLSA-201811-04
- GLSA-201811-13
- GLSA-201811-13
- USN-3801-1
- USN-3801-1
- USN-3868-1
- USN-3868-1
- DSA-4324
- DSA-4324
- DSA-4337
- DSA-4337
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-28/
- https://www.mozilla.org/security/advisories/mfsa2018-28/
Modified: 2024-11-21
CVE-2018-12405
Mozilla developers and community members reported memory safety bugs present in Firefox 63 and Firefox ESR 60.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 64.
- 106168
- 106168
- RHSA-2018:3831
- RHSA-2018:3831
- RHSA-2018:3833
- RHSA-2018:3833
- RHSA-2019:0159
- RHSA-2019:0159
- RHSA-2019:0160
- RHSA-2019:0160
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1494752%2C1498765%2C1503326%2C1505181%2C1500759%2C1504365%2C1506640%2C1503082%2C1502013%2C1510471
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1494752%2C1498765%2C1503326%2C1505181%2C1500759%2C1504365%2C1506640%2C1503082%2C1502013%2C1510471
- [debian-lts-announce] 20181213 [SECURITY] [DLA 1605-1] firefox-esr security update
- [debian-lts-announce] 20181213 [SECURITY] [DLA 1605-1] firefox-esr security update
- GLSA-201903-04
- GLSA-201903-04
- USN-3844-1
- USN-3844-1
- USN-3868-1
- USN-3868-1
- DSA-4354
- DSA-4354
- DSA-4362
- DSA-4362
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://www.mozilla.org/security/advisories/mfsa2018-30/
- https://www.mozilla.org/security/advisories/mfsa2018-30/
- https://www.mozilla.org/security/advisories/mfsa2018-31/
- https://www.mozilla.org/security/advisories/mfsa2018-31/
Modified: 2024-11-21
CVE-2018-17466
Incorrect texture handling in Angle in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
- 105666
- 105666
- 106168
- 106168
- RHSA-2018:3004
- RHSA-2018:3004
- RHSA-2018:3831
- RHSA-2018:3831
- RHSA-2018:3833
- RHSA-2018:3833
- RHSA-2019:0159
- RHSA-2019:0159
- RHSA-2019:0160
- RHSA-2019:0160
- https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html
- https://crbug.com/880906
- https://crbug.com/880906
- [debian-lts-announce] 20181213 [SECURITY] [DLA 1605-1] firefox-esr security update
- [debian-lts-announce] 20181213 [SECURITY] [DLA 1605-1] firefox-esr security update
- GLSA-201811-10
- GLSA-201811-10
- USN-3844-1
- USN-3844-1
- USN-3868-1
- USN-3868-1
- DSA-4330
- DSA-4330
- DSA-4354
- DSA-4354
- DSA-4362
- DSA-4362
Modified: 2024-11-21
CVE-2018-18335
Heap buffer overflow in Skia in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2019:1162
- openSUSE-SU-2019:1162
- 106084
- 106084
- RHSA-2018:3803
- RHSA-2018:3803
- https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html
- https://crbug.com/895362
- https://crbug.com/895362
- GLSA-201904-07
- GLSA-201904-07
- GLSA-201908-18
- GLSA-201908-18
- DSA-4352
- DSA-4352
Modified: 2024-11-21
CVE-2018-18356
An integer overflow in path handling lead to a use after free in Skia in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2019:1162
- openSUSE-SU-2019:1162
- 106084
- 106084
- RHSA-2018:3803
- RHSA-2018:3803
- RHSA-2019:0373
- RHSA-2019:0373
- RHSA-2019:0374
- RHSA-2019:0374
- RHSA-2019:1144
- RHSA-2019:1144
- https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html
- https://crbug.com/883666
- https://crbug.com/883666
- [debian-lts-announce] 20190215 [SECURITY] [DLA 1677-1] firefox-esr security update
- [debian-lts-announce] 20190215 [SECURITY] [DLA 1677-1] firefox-esr security update
- [debian-lts-announce] 20190216 [SECURITY] [DLA 1678-1] thunderbird security update
- [debian-lts-announce] 20190216 [SECURITY] [DLA 1678-1] thunderbird security update
- GLSA-201903-04
- GLSA-201903-04
- GLSA-201904-07
- GLSA-201904-07
- GLSA-201908-18
- GLSA-201908-18
- USN-3896-1
- USN-3896-1
- USN-3897-1
- USN-3897-1
- DSA-4352
- DSA-4352
- DSA-4391
- DSA-4391
- DSA-4392
- DSA-4392
Modified: 2024-11-21
CVE-2018-18492
A use-after-free vulnerability can occur after deleting a selection element due to a weak reference to the select element in the options collection. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 64.
- 106168
- 106168
- RHSA-2018:3831
- RHSA-2018:3831
- RHSA-2018:3833
- RHSA-2018:3833
- RHSA-2019:0159
- RHSA-2019:0159
- RHSA-2019:0160
- RHSA-2019:0160
- https://bugzilla.mozilla.org/show_bug.cgi?id=1499861
- https://bugzilla.mozilla.org/show_bug.cgi?id=1499861
- [debian-lts-announce] 20181213 [SECURITY] [DLA 1605-1] firefox-esr security update
- [debian-lts-announce] 20181213 [SECURITY] [DLA 1605-1] firefox-esr security update
- GLSA-201903-04
- GLSA-201903-04
- USN-3844-1
- USN-3844-1
- USN-3868-1
- USN-3868-1
- DSA-4354
- DSA-4354
- DSA-4362
- DSA-4362
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://www.mozilla.org/security/advisories/mfsa2018-30/
- https://www.mozilla.org/security/advisories/mfsa2018-30/
- https://www.mozilla.org/security/advisories/mfsa2018-31/
- https://www.mozilla.org/security/advisories/mfsa2018-31/
Modified: 2024-11-21
CVE-2018-18493
A buffer overflow can occur in the Skia library during buffer offset calculations with hardware accelerated canvas 2D actions due to the use of 32-bit calculations instead of 64-bit. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 64.
- 106168
- 106168
- RHSA-2018:3831
- RHSA-2018:3831
- RHSA-2018:3833
- RHSA-2018:3833
- RHSA-2019:0159
- RHSA-2019:0159
- RHSA-2019:0160
- RHSA-2019:0160
- https://bugzilla.mozilla.org/show_bug.cgi?id=1504452
- https://bugzilla.mozilla.org/show_bug.cgi?id=1504452
- [debian-lts-announce] 20181213 [SECURITY] [DLA 1605-1] firefox-esr security update
- [debian-lts-announce] 20181213 [SECURITY] [DLA 1605-1] firefox-esr security update
- GLSA-201903-04
- GLSA-201903-04
- USN-3844-1
- USN-3844-1
- USN-3868-1
- USN-3868-1
- DSA-4354
- DSA-4354
- DSA-4362
- DSA-4362
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://www.mozilla.org/security/advisories/mfsa2018-30/
- https://www.mozilla.org/security/advisories/mfsa2018-30/
- https://www.mozilla.org/security/advisories/mfsa2018-31/
- https://www.mozilla.org/security/advisories/mfsa2018-31/
Modified: 2024-11-21
CVE-2018-18494
A same-origin policy violation allowing the theft of cross-origin URL entries when using the Javascript location property to cause a redirection to another site using performance.getEntries(). This is a same-origin policy violation and could allow for data theft. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 64.
- 106168
- 106168
- RHSA-2018:3831
- RHSA-2018:3831
- RHSA-2018:3833
- RHSA-2018:3833
- RHSA-2019:0159
- RHSA-2019:0159
- RHSA-2019:0160
- RHSA-2019:0160
- https://bugzilla.mozilla.org/show_bug.cgi?id=1487964
- https://bugzilla.mozilla.org/show_bug.cgi?id=1487964
- [debian-lts-announce] 20181213 [SECURITY] [DLA 1605-1] firefox-esr security update
- [debian-lts-announce] 20181213 [SECURITY] [DLA 1605-1] firefox-esr security update
- GLSA-201903-04
- GLSA-201903-04
- USN-3844-1
- USN-3844-1
- USN-3868-1
- USN-3868-1
- DSA-4354
- DSA-4354
- DSA-4362
- DSA-4362
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://www.mozilla.org/security/advisories/mfsa2018-30/
- https://www.mozilla.org/security/advisories/mfsa2018-30/
- https://www.mozilla.org/security/advisories/mfsa2018-31/
- https://www.mozilla.org/security/advisories/mfsa2018-31/
Modified: 2024-11-21
CVE-2018-18498
A potential vulnerability leading to an integer overflow can occur during buffer size calculations for images when a raw value is used instead of the checked value. This leads to a possible out-of-bounds write. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 64.
- 106168
- 106168
- RHSA-2018:3831
- RHSA-2018:3831
- RHSA-2018:3833
- RHSA-2018:3833
- RHSA-2019:0159
- RHSA-2019:0159
- RHSA-2019:0160
- RHSA-2019:0160
- https://bugzilla.mozilla.org/show_bug.cgi?id=1500011
- https://bugzilla.mozilla.org/show_bug.cgi?id=1500011
- [debian-lts-announce] 20181213 [SECURITY] [DLA 1605-1] firefox-esr security update
- [debian-lts-announce] 20181213 [SECURITY] [DLA 1605-1] firefox-esr security update
- GLSA-201903-04
- GLSA-201903-04
- USN-3844-1
- USN-3844-1
- USN-3868-1
- USN-3868-1
- DSA-4354
- DSA-4354
- DSA-4362
- DSA-4362
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://www.mozilla.org/security/advisories/mfsa2018-30/
- https://www.mozilla.org/security/advisories/mfsa2018-30/
- https://www.mozilla.org/security/advisories/mfsa2018-31/
- https://www.mozilla.org/security/advisories/mfsa2018-31/
Modified: 2024-11-21
CVE-2018-18499
A same-origin policy violation allowing the theft of cross-origin URL entries when using a meta http-equiv="refresh" on a page to cause a redirection to another site using performance.getEntries(). This is a same-origin policy violation and could allow for data theft. This vulnerability affects Firefox < 62, Firefox ESR < 60.2, and Thunderbird < 60.2.1.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1468523
- https://bugzilla.mozilla.org/show_bug.cgi?id=1468523
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-21/
- https://www.mozilla.org/security/advisories/mfsa2018-21/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
Modified: 2024-11-21
CVE-2018-18500
A use-after-free vulnerability can occur while parsing an HTML5 stream in concert with custom HTML elements. This results in the stream parser object being freed while still in use, leading to a potentially exploitable crash. This vulnerability affects Thunderbird < 60.5, Firefox ESR < 60.5, and Firefox < 65.
- openSUSE-SU-2019:1758
- openSUSE-SU-2019:1758
- 106781
- 106781
- RHSA-2019:0218
- RHSA-2019:0218
- RHSA-2019:0219
- RHSA-2019:0219
- RHSA-2019:0269
- RHSA-2019:0269
- RHSA-2019:0270
- RHSA-2019:0270
- [debian-lts-announce] 20190130 [SECURITY] [DLA 1648-1] firefox-esr security update
- [debian-lts-announce] 20190130 [SECURITY] [DLA 1648-1] firefox-esr security update
- [debian-lts-announce] 20190216 [SECURITY] [DLA 1678-1] thunderbird security update
- [debian-lts-announce] 20190216 [SECURITY] [DLA 1678-1] thunderbird security update
- GLSA-201903-04
- GLSA-201903-04
- GLSA-201904-07
- GLSA-201904-07
- USN-3874-1
- USN-3874-1
- USN-3897-1
- USN-3897-1
- DSA-4376
- DSA-4376
- DSA-4392
- DSA-4392
- https://www.mozilla.org/security/advisories/mfsa2019-01/
- https://www.mozilla.org/security/advisories/mfsa2019-01/
- https://www.mozilla.org/security/advisories/mfsa2019-02/
- https://www.mozilla.org/security/advisories/mfsa2019-02/
- https://www.mozilla.org/security/advisories/mfsa2019-03/
- https://www.mozilla.org/security/advisories/mfsa2019-03/
Modified: 2024-11-21
CVE-2018-18501
Mozilla developers and community members reported memory safety bugs present in Firefox 64 and Firefox ESR 60.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 60.5, Firefox ESR < 60.5, and Firefox < 65.
- openSUSE-SU-2019:1758
- openSUSE-SU-2019:1758
- 106781
- 106781
- RHSA-2019:0218
- RHSA-2019:0218
- RHSA-2019:0219
- RHSA-2019:0219
- RHSA-2019:0269
- RHSA-2019:0269
- RHSA-2019:0270
- RHSA-2019:0270
- [debian-lts-announce] 20190130 [SECURITY] [DLA 1648-1] firefox-esr security update
- [debian-lts-announce] 20190130 [SECURITY] [DLA 1648-1] firefox-esr security update
- [debian-lts-announce] 20190216 [SECURITY] [DLA 1678-1] thunderbird security update
- [debian-lts-announce] 20190216 [SECURITY] [DLA 1678-1] thunderbird security update
- GLSA-201903-04
- GLSA-201903-04
- GLSA-201904-07
- GLSA-201904-07
- USN-3874-1
- USN-3874-1
- USN-3897-1
- USN-3897-1
- DSA-4376
- DSA-4376
- DSA-4392
- DSA-4392
- https://www.mozilla.org/security/advisories/mfsa2019-01/
- https://www.mozilla.org/security/advisories/mfsa2019-01/
- https://www.mozilla.org/security/advisories/mfsa2019-02/
- https://www.mozilla.org/security/advisories/mfsa2019-02/
- https://www.mozilla.org/security/advisories/mfsa2019-03/
- https://www.mozilla.org/security/advisories/mfsa2019-03/
Modified: 2024-11-21
CVE-2018-18505
An earlier fix for an Inter-process Communication (IPC) vulnerability, CVE-2011-3079, added authentication to communication between IPC endpoints and server parents during IPC process creation. This authentication is insufficient for channels created after the IPC process is started, leading to the authentication not being correctly applied to later channels. This could allow for a sandbox escape through IPC channels due to lack of message validation in the listener process. This vulnerability affects Thunderbird < 60.5, Firefox ESR < 60.5, and Firefox < 65.
- openSUSE-SU-2019:1758
- openSUSE-SU-2019:1758
- 106781
- 106781
- RHSA-2019:0218
- RHSA-2019:0218
- RHSA-2019:0219
- RHSA-2019:0219
- RHSA-2019:0269
- RHSA-2019:0269
- RHSA-2019:0270
- RHSA-2019:0270
- https://bugzilla.mozilla.org/show_bug.cgi?id=1087565
- https://bugzilla.mozilla.org/show_bug.cgi?id=1087565
- [debian-lts-announce] 20190130 [SECURITY] [DLA 1648-1] firefox-esr security update
- [debian-lts-announce] 20190130 [SECURITY] [DLA 1648-1] firefox-esr security update
- [debian-lts-announce] 20190216 [SECURITY] [DLA 1678-1] thunderbird security update
- [debian-lts-announce] 20190216 [SECURITY] [DLA 1678-1] thunderbird security update
- GLSA-201903-04
- GLSA-201903-04
- GLSA-201904-07
- GLSA-201904-07
- USN-3874-1
- USN-3874-1
- USN-3897-1
- USN-3897-1
- DSA-4376
- DSA-4376
- DSA-4392
- DSA-4392
- https://www.mozilla.org/security/advisories/mfsa2019-01/
- https://www.mozilla.org/security/advisories/mfsa2019-01/
- https://www.mozilla.org/security/advisories/mfsa2019-02/
- https://www.mozilla.org/security/advisories/mfsa2019-02/
- https://www.mozilla.org/security/advisories/mfsa2019-03/
- https://www.mozilla.org/security/advisories/mfsa2019-03/
Modified: 2024-11-21
CVE-2018-18506
When proxy auto-detection is enabled, if a web server serves a Proxy Auto-Configuration (PAC) file or if a PAC file is loaded locally, this PAC file can specify that requests to the localhost are to be sent through the proxy to another server. This behavior is disallowed by default when a proxy is manually configured, but when enabled could allow for attacks on services and tools that bind to the localhost for networked behavior if they are accessed through browsing. This vulnerability affects Firefox < 65.
- openSUSE-SU-2019:1056
- openSUSE-SU-2019:1056
- openSUSE-SU-2019:1077
- openSUSE-SU-2019:1077
- openSUSE-SU-2019:1126
- openSUSE-SU-2019:1126
- openSUSE-SU-2019:1162
- openSUSE-SU-2019:1162
- 106773
- 106773
- RHSA-2019:0622
- RHSA-2019:0622
- RHSA-2019:0623
- RHSA-2019:0623
- RHSA-2019:0680
- RHSA-2019:0680
- RHSA-2019:0681
- RHSA-2019:0681
- RHSA-2019:0966
- RHSA-2019:0966
- RHSA-2019:1144
- RHSA-2019:1144
- [debian-lts-announce] 20190321 [SECURITY] [DLA 1722-1] firefox-esr security update
- [debian-lts-announce] 20190321 [SECURITY] [DLA 1722-1] firefox-esr security update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1743-1] thunderbird security update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1743-1] thunderbird security update
- 20190401 [SECURITY] [DSA 4420-1] thunderbird security update
- 20190401 [SECURITY] [DSA 4420-1] thunderbird security update
- 20190320 [SECURITY] [DSA 4411-1] firefox-esr security update
- 20190320 [SECURITY] [DSA 4411-1] firefox-esr security update
- GLSA-201904-07
- GLSA-201904-07
- USN-3874-1
- USN-3874-1
- USN-3927-1
- USN-3927-1
- DSA-4411
- DSA-4411
- DSA-4420
- DSA-4420
- https://www.mozilla.org/security/advisories/mfsa2019-01/
- https://www.mozilla.org/security/advisories/mfsa2019-01/
Modified: 2024-11-21
CVE-2018-18509
A flaw during verification of certain S/MIME signatures causes emails to be shown in Thunderbird as having a valid digital signature, even if the shown message contents aren't covered by the signature. The flaw allows an attacker to reuse a valid S/MIME signature to craft an email message with arbitrary content. This vulnerability affects Thunderbird < 60.5.1.
- openSUSE-SU-2019:1162
- openSUSE-SU-2019:1162
- http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html
- http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html
- 20190430 OpenPGP and S/MIME signature forgery attacks in multiple email clients
- 20190430 OpenPGP and S/MIME signature forgery attacks in multiple email clients
- [oss-security] 20190430 Spoofing OpenPGP and S/MIME Signatures in Emails (multiple clients)
- [oss-security] 20190430 Spoofing OpenPGP and S/MIME Signatures in Emails (multiple clients)
- RHSA-2019:1144
- RHSA-2019:1144
- https://bugzilla.mozilla.org/show_bug.cgi?id=1507218
- https://bugzilla.mozilla.org/show_bug.cgi?id=1507218
- https://github.com/RUB-NDS/Johnny-You-Are-Fired
- https://github.com/RUB-NDS/Johnny-You-Are-Fired
- https://github.com/RUB-NDS/Johnny-You-Are-Fired/blob/master/paper/johnny-fired.pdf
- https://github.com/RUB-NDS/Johnny-You-Are-Fired/blob/master/paper/johnny-fired.pdf
- https://www.mozilla.org/security/advisories/mfsa2019-06/
- https://www.mozilla.org/security/advisories/mfsa2019-06/
Modified: 2024-11-21
CVE-2018-18511
Cross-origin images can be read from a canvas element in violation of the same-origin policy using the transferFromImageBitmap method. *Note: This only affects Firefox 65. Previous versions are unaffected.*. This vulnerability affects Firefox < 65.0.1.
- openSUSE-SU-2019:1484
- openSUSE-SU-2019:1484
- openSUSE-SU-2019:1534
- openSUSE-SU-2019:1534
- openSUSE-SU-2019:1664
- openSUSE-SU-2019:1664
- RHSA-2019:1265
- RHSA-2019:1265
- RHSA-2019:1267
- RHSA-2019:1267
- RHSA-2019:1269
- RHSA-2019:1269
- RHSA-2019:1308
- RHSA-2019:1308
- RHSA-2019:1309
- RHSA-2019:1309
- RHSA-2019:1310
- RHSA-2019:1310
- https://bugzilla.mozilla.org/show_bug.cgi?id=1526218
- https://bugzilla.mozilla.org/show_bug.cgi?id=1526218
- [debian-lts-announce] 20190523 [SECURITY] [DLA 1800-1] firefox-esr security update
- [debian-lts-announce] 20190523 [SECURITY] [DLA 1800-1] firefox-esr security update
- [debian-lts-announce] 20190527 [SECURITY] [DLA 1806-1] thunderbird security update
- [debian-lts-announce] 20190527 [SECURITY] [DLA 1806-1] thunderbird security update
- 20190522 [slackware-security] mozilla-firefox (SSA:2019-141-01)
- 20190522 [slackware-security] mozilla-firefox (SSA:2019-141-01)
- 20190523 [SECURITY] [DSA 4448-1] firefox-esr security update
- 20190523 [SECURITY] [DSA 4448-1] firefox-esr security update
- 20190527 [SECURITY] [DSA 4451-1] thunderbird security update
- 20190527 [SECURITY] [DSA 4451-1] thunderbird security update
- USN-3997-1
- USN-3997-1
- DSA-4448
- DSA-4448
- DSA-4451
- DSA-4451
- https://www.mozilla.org/security/advisories/mfsa2019-04/
- https://www.mozilla.org/security/advisories/mfsa2019-04/
Modified: 2024-11-21
CVE-2018-18513
A crash can occur when processing a crafted S/MIME message or an XPI package containing a crafted signature. This can be used as a denial-of-service (DOS) attack because Thunderbird reopens the last seen message on restart, triggering the crash again. This vulnerability affects Thunderbird < 60.5.
Modified: 2024-11-21
CVE-2018-5089
Memory safety bugs were reported in Firefox 57 and Firefox ESR 52.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58.
- 102783
- 102783
- 1040270
- 1040270
- RHSA-2018:0122
- RHSA-2018:0122
- RHSA-2018:0262
- RHSA-2018:0262
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1412420%2C1426783%2C1422389%2C1415598%2C1410134%2C1408017%2C1224396%2C1382366%2C1415582%2C1417797%2C1409951%2C1414452%2C1428589%2C1425780%2C1399520%2C1418854%2C1408276%2C1412145%2C1331209%2C1425612
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1412420%2C1426783%2C1422389%2C1415598%2C1410134%2C1408017%2C1224396%2C1382366%2C1415582%2C1417797%2C1409951%2C1414452%2C1428589%2C1425780%2C1399520%2C1418854%2C1408276%2C1412145%2C1331209%2C1425612
- [debian-lts-announce] 20180124 [SECURITY] [DLA 1256-1] firefox-esr security update
- [debian-lts-announce] 20180124 [SECURITY] [DLA 1256-1] firefox-esr security update
- [debian-lts-announce] 20180129 [SECURITY] [DLA 1262-1] thunderbird security update
- [debian-lts-announce] 20180129 [SECURITY] [DLA 1262-1] thunderbird security update
- USN-3544-1
- USN-3544-1
- USN-3688-1
- USN-3688-1
- DSA-4096
- DSA-4096
- DSA-4102
- DSA-4102
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-04/
- https://www.mozilla.org/security/advisories/mfsa2018-04/
Modified: 2024-11-21
CVE-2018-5095
An integer overflow vulnerability in the Skia library when allocating memory for edge builders on some systems with at least 8 GB of RAM. This results in the use of uninitialized memory, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58.
- 102783
- 102783
- 1040270
- 1040270
- RHSA-2018:0122
- RHSA-2018:0122
- RHSA-2018:0262
- RHSA-2018:0262
- https://bugzilla.mozilla.org/show_bug.cgi?id=1418447
- https://bugzilla.mozilla.org/show_bug.cgi?id=1418447
- [debian-lts-announce] 20180124 [SECURITY] [DLA 1256-1] firefox-esr security update
- [debian-lts-announce] 20180124 [SECURITY] [DLA 1256-1] firefox-esr security update
- [debian-lts-announce] 20180129 [SECURITY] [DLA 1262-1] thunderbird security update
- [debian-lts-announce] 20180129 [SECURITY] [DLA 1262-1] thunderbird security update
- USN-3544-1
- USN-3544-1
- DSA-4096
- DSA-4096
- DSA-4102
- DSA-4102
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-04/
- https://www.mozilla.org/security/advisories/mfsa2018-04/
Modified: 2024-11-21
CVE-2018-5096
A use-after-free vulnerability can occur while editing events in form elements on a page, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR < 52.6 and Thunderbird < 52.6.
- 102771
- 102771
- RHSA-2018:0122
- RHSA-2018:0122
- RHSA-2018:0262
- RHSA-2018:0262
- https://bugzilla.mozilla.org/show_bug.cgi?id=1418922
- https://bugzilla.mozilla.org/show_bug.cgi?id=1418922
- [debian-lts-announce] 20180124 [SECURITY] [DLA 1256-1] firefox-esr security update
- [debian-lts-announce] 20180124 [SECURITY] [DLA 1256-1] firefox-esr security update
- [debian-lts-announce] 20180129 [SECURITY] [DLA 1262-1] thunderbird security update
- [debian-lts-announce] 20180129 [SECURITY] [DLA 1262-1] thunderbird security update
- DSA-4096
- DSA-4096
- DSA-4102
- DSA-4102
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-04/
- https://www.mozilla.org/security/advisories/mfsa2018-04/
Modified: 2024-11-21
CVE-2018-5097
A use-after-free vulnerability can occur during XSL transformations when the source document for the transformation is manipulated by script content during the transformation. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58.
- 102783
- 102783
- 1040270
- 1040270
- RHSA-2018:0122
- RHSA-2018:0122
- RHSA-2018:0262
- RHSA-2018:0262
- https://bugzilla.mozilla.org/show_bug.cgi?id=1387427
- https://bugzilla.mozilla.org/show_bug.cgi?id=1387427
- [debian-lts-announce] 20180124 [SECURITY] [DLA 1256-1] firefox-esr security update
- [debian-lts-announce] 20180124 [SECURITY] [DLA 1256-1] firefox-esr security update
- [debian-lts-announce] 20180129 [SECURITY] [DLA 1262-1] thunderbird security update
- [debian-lts-announce] 20180129 [SECURITY] [DLA 1262-1] thunderbird security update
- USN-3544-1
- USN-3544-1
- DSA-4096
- DSA-4096
- DSA-4102
- DSA-4102
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-04/
- https://www.mozilla.org/security/advisories/mfsa2018-04/
Modified: 2024-11-21
CVE-2018-5098
A use-after-free vulnerability can occur when form input elements, focus, and selections are manipulated by script content. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58.
- 102783
- 102783
- 1040270
- 1040270
- RHSA-2018:0122
- RHSA-2018:0122
- RHSA-2018:0262
- RHSA-2018:0262
- https://bugzilla.mozilla.org/show_bug.cgi?id=1399400
- https://bugzilla.mozilla.org/show_bug.cgi?id=1399400
- [debian-lts-announce] 20180124 [SECURITY] [DLA 1256-1] firefox-esr security update
- [debian-lts-announce] 20180124 [SECURITY] [DLA 1256-1] firefox-esr security update
- [debian-lts-announce] 20180129 [SECURITY] [DLA 1262-1] thunderbird security update
- [debian-lts-announce] 20180129 [SECURITY] [DLA 1262-1] thunderbird security update
- USN-3544-1
- USN-3544-1
- DSA-4096
- DSA-4096
- DSA-4102
- DSA-4102
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-04/
- https://www.mozilla.org/security/advisories/mfsa2018-04/
Modified: 2024-11-21
CVE-2018-5099
A use-after-free vulnerability can occur when the widget listener is holding strong references to browser objects that have previously been freed, resulting in a potentially exploitable crash when these references are used. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58.
- 102783
- 102783
- 1040270
- 1040270
- RHSA-2018:0122
- RHSA-2018:0122
- RHSA-2018:0262
- RHSA-2018:0262
- https://bugzilla.mozilla.org/show_bug.cgi?id=1416878
- https://bugzilla.mozilla.org/show_bug.cgi?id=1416878
- [debian-lts-announce] 20180124 [SECURITY] [DLA 1256-1] firefox-esr security update
- [debian-lts-announce] 20180124 [SECURITY] [DLA 1256-1] firefox-esr security update
- [debian-lts-announce] 20180129 [SECURITY] [DLA 1262-1] thunderbird security update
- [debian-lts-announce] 20180129 [SECURITY] [DLA 1262-1] thunderbird security update
- USN-3544-1
- USN-3544-1
- DSA-4096
- DSA-4096
- DSA-4102
- DSA-4102
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-04/
- https://www.mozilla.org/security/advisories/mfsa2018-04/
Modified: 2024-11-21
CVE-2018-5102
A use-after-free vulnerability can occur when manipulating HTML media elements with media streams, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58.
- 102783
- 102783
- 1040270
- 1040270
- RHSA-2018:0122
- RHSA-2018:0122
- RHSA-2018:0262
- RHSA-2018:0262
- https://bugzilla.mozilla.org/show_bug.cgi?id=1419363
- https://bugzilla.mozilla.org/show_bug.cgi?id=1419363
- [debian-lts-announce] 20180124 [SECURITY] [DLA 1256-1] firefox-esr security update
- [debian-lts-announce] 20180124 [SECURITY] [DLA 1256-1] firefox-esr security update
- [debian-lts-announce] 20180129 [SECURITY] [DLA 1262-1] thunderbird security update
- [debian-lts-announce] 20180129 [SECURITY] [DLA 1262-1] thunderbird security update
- USN-3544-1
- USN-3544-1
- DSA-4096
- DSA-4096
- DSA-4102
- DSA-4102
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-04/
- https://www.mozilla.org/security/advisories/mfsa2018-04/
Modified: 2024-11-21
CVE-2018-5103
A use-after-free vulnerability can occur during mouse event handling due to issues with multiprocess support. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58.
- 102783
- 102783
- 1040270
- 1040270
- RHSA-2018:0122
- RHSA-2018:0122
- RHSA-2018:0262
- RHSA-2018:0262
- https://bugzilla.mozilla.org/show_bug.cgi?id=1423159
- https://bugzilla.mozilla.org/show_bug.cgi?id=1423159
- [debian-lts-announce] 20180124 [SECURITY] [DLA 1256-1] firefox-esr security update
- [debian-lts-announce] 20180124 [SECURITY] [DLA 1256-1] firefox-esr security update
- [debian-lts-announce] 20180129 [SECURITY] [DLA 1262-1] thunderbird security update
- [debian-lts-announce] 20180129 [SECURITY] [DLA 1262-1] thunderbird security update
- USN-3544-1
- USN-3544-1
- DSA-4096
- DSA-4096
- DSA-4102
- DSA-4102
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-04/
- https://www.mozilla.org/security/advisories/mfsa2018-04/
Modified: 2024-11-21
CVE-2018-5104
A use-after-free vulnerability can occur during font face manipulation when a font face is freed while still in use, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58.
- 102783
- 102783
- 1040270
- 1040270
- RHSA-2018:0122
- RHSA-2018:0122
- RHSA-2018:0262
- RHSA-2018:0262
- https://bugzilla.mozilla.org/show_bug.cgi?id=1425000
- https://bugzilla.mozilla.org/show_bug.cgi?id=1425000
- [debian-lts-announce] 20180124 [SECURITY] [DLA 1256-1] firefox-esr security update
- [debian-lts-announce] 20180124 [SECURITY] [DLA 1256-1] firefox-esr security update
- [debian-lts-announce] 20180129 [SECURITY] [DLA 1262-1] thunderbird security update
- [debian-lts-announce] 20180129 [SECURITY] [DLA 1262-1] thunderbird security update
- USN-3544-1
- USN-3544-1
- DSA-4096
- DSA-4096
- DSA-4102
- DSA-4102
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-04/
- https://www.mozilla.org/security/advisories/mfsa2018-04/
Modified: 2024-11-21
CVE-2018-5117
If right-to-left text is used in the addressbar with left-to-right alignment, it is possible in some circumstances to scroll this text to spoof the displayed URL. This issue could result in the wrong URL being displayed as a location, which can mislead users to believe they are on a different site than the one loaded. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58.
- 102783
- 102783
- 1040270
- 1040270
- RHSA-2018:0122
- RHSA-2018:0122
- RHSA-2018:0262
- RHSA-2018:0262
- https://bugzilla.mozilla.org/show_bug.cgi?id=1395508
- https://bugzilla.mozilla.org/show_bug.cgi?id=1395508
- [debian-lts-announce] 20180124 [SECURITY] [DLA 1256-1] firefox-esr security update
- [debian-lts-announce] 20180124 [SECURITY] [DLA 1256-1] firefox-esr security update
- [debian-lts-announce] 20180129 [SECURITY] [DLA 1262-1] thunderbird security update
- [debian-lts-announce] 20180129 [SECURITY] [DLA 1262-1] thunderbird security update
- USN-3544-1
- USN-3544-1
- DSA-4096
- DSA-4096
- DSA-4102
- DSA-4102
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-04/
- https://www.mozilla.org/security/advisories/mfsa2018-04/
Modified: 2024-11-21
CVE-2018-5125
Memory safety bugs were reported in Firefox 58 and Firefox ESR 52.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 52.7, Firefox ESR < 52.7, and Firefox < 59.
- 103388
- 103388
- 1040514
- 1040514
- RHSA-2018:0526
- RHSA-2018:0526
- RHSA-2018:0527
- RHSA-2018:0527
- RHSA-2018:0647
- RHSA-2018:0647
- RHSA-2018:0648
- RHSA-2018:0648
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1416529%2C1434580%2C1434384%2C1437450%2C1437507%2C1426988%2C1438425%2C1324042%2C1437087%2C1443865%2C1425520
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1416529%2C1434580%2C1434384%2C1437450%2C1437507%2C1426988%2C1438425%2C1324042%2C1437087%2C1443865%2C1425520
- [debian-lts-announce] 20180315 [SECURITY] [DLA 1308-1] firefox-esr security update
- [debian-lts-announce] 20180315 [SECURITY] [DLA 1308-1] firefox-esr security update
- [debian-lts-announce] 20180329 [SECURITY] [DLA 1327-1] thunderbird security update
- [debian-lts-announce] 20180329 [SECURITY] [DLA 1327-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3545-1
- USN-3545-1
- USN-3596-1
- USN-3596-1
- USN-3688-1
- USN-3688-1
- DSA-4139
- DSA-4139
- DSA-4155
- DSA-4155
- https://www.mozilla.org/security/advisories/mfsa2018-06/
- https://www.mozilla.org/security/advisories/mfsa2018-06/
- https://www.mozilla.org/security/advisories/mfsa2018-07/
- https://www.mozilla.org/security/advisories/mfsa2018-07/
- https://www.mozilla.org/security/advisories/mfsa2018-09/
- https://www.mozilla.org/security/advisories/mfsa2018-09/
Modified: 2024-11-21
CVE-2018-5127
A buffer overflow can occur when manipulating the SVG "animatedPathSegList" through script. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.7, Firefox ESR < 52.7, and Firefox < 59.
- 103388
- 103388
- 1040514
- 1040514
- RHSA-2018:0526
- RHSA-2018:0526
- RHSA-2018:0527
- RHSA-2018:0527
- RHSA-2018:0647
- RHSA-2018:0647
- RHSA-2018:0648
- RHSA-2018:0648
- https://bugzilla.mozilla.org/show_bug.cgi?id=1430557
- https://bugzilla.mozilla.org/show_bug.cgi?id=1430557
- [debian-lts-announce] 20180315 [SECURITY] [DLA 1308-1] firefox-esr security update
- [debian-lts-announce] 20180315 [SECURITY] [DLA 1308-1] firefox-esr security update
- [debian-lts-announce] 20180329 [SECURITY] [DLA 1327-1] thunderbird security update
- [debian-lts-announce] 20180329 [SECURITY] [DLA 1327-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3545-1
- USN-3545-1
- USN-3596-1
- USN-3596-1
- DSA-4139
- DSA-4139
- DSA-4155
- DSA-4155
- https://www.mozilla.org/security/advisories/mfsa2018-06/
- https://www.mozilla.org/security/advisories/mfsa2018-06/
- https://www.mozilla.org/security/advisories/mfsa2018-07/
- https://www.mozilla.org/security/advisories/mfsa2018-07/
- https://www.mozilla.org/security/advisories/mfsa2018-09/
- https://www.mozilla.org/security/advisories/mfsa2018-09/
Modified: 2024-11-21
CVE-2018-5129
A lack of parameter validation on IPC messages results in a potential out-of-bounds write through malformed IPC messages. This can potentially allow for sandbox escape through memory corruption in the parent process. This vulnerability affects Thunderbird < 52.7, Firefox ESR < 52.7, and Firefox < 59.
- 103388
- 103388
- 1040514
- 1040514
- RHSA-2018:0526
- RHSA-2018:0526
- RHSA-2018:0527
- RHSA-2018:0527
- RHSA-2018:0647
- RHSA-2018:0647
- RHSA-2018:0648
- RHSA-2018:0648
- https://bugzilla.mozilla.org/show_bug.cgi?id=1428947
- https://bugzilla.mozilla.org/show_bug.cgi?id=1428947
- [debian-lts-announce] 20180315 [SECURITY] [DLA 1308-1] firefox-esr security update
- [debian-lts-announce] 20180315 [SECURITY] [DLA 1308-1] firefox-esr security update
- [debian-lts-announce] 20180329 [SECURITY] [DLA 1327-1] thunderbird security update
- [debian-lts-announce] 20180329 [SECURITY] [DLA 1327-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3545-1
- USN-3545-1
- USN-3596-1
- USN-3596-1
- DSA-4139
- DSA-4139
- DSA-4155
- DSA-4155
- https://www.mozilla.org/security/advisories/mfsa2018-06/
- https://www.mozilla.org/security/advisories/mfsa2018-06/
- https://www.mozilla.org/security/advisories/mfsa2018-07/
- https://www.mozilla.org/security/advisories/mfsa2018-07/
- https://www.mozilla.org/security/advisories/mfsa2018-09/
- https://www.mozilla.org/security/advisories/mfsa2018-09/
Modified: 2024-11-21
CVE-2018-5144
An integer overflow can occur during conversion of text to some Unicode character sets due to an unchecked length parameter. This vulnerability affects Firefox ESR < 52.7 and Thunderbird < 52.7.
- 103384
- 103384
- 1040514
- 1040514
- RHSA-2018:0526
- RHSA-2018:0526
- RHSA-2018:0527
- RHSA-2018:0527
- RHSA-2018:0647
- RHSA-2018:0647
- RHSA-2018:0648
- RHSA-2018:0648
- https://bugzilla.mozilla.org/show_bug.cgi?id=1440926
- https://bugzilla.mozilla.org/show_bug.cgi?id=1440926
- [debian-lts-announce] 20180315 [SECURITY] [DLA 1308-1] firefox-esr security update
- [debian-lts-announce] 20180315 [SECURITY] [DLA 1308-1] firefox-esr security update
- [debian-lts-announce] 20180329 [SECURITY] [DLA 1327-1] thunderbird security update
- [debian-lts-announce] 20180329 [SECURITY] [DLA 1327-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3545-1
- USN-3545-1
- DSA-4139
- DSA-4139
- DSA-4155
- DSA-4155
- https://www.mozilla.org/security/advisories/mfsa2018-07/
- https://www.mozilla.org/security/advisories/mfsa2018-07/
- https://www.mozilla.org/security/advisories/mfsa2018-09/
- https://www.mozilla.org/security/advisories/mfsa2018-09/
Modified: 2024-11-21
CVE-2018-5145
Memory safety bugs were reported in Firefox ESR 52.6. These bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR < 52.7 and Thunderbird < 52.7.
- 103384
- 103384
- 1040514
- 1040514
- RHSA-2018:0526
- RHSA-2018:0526
- RHSA-2018:0527
- RHSA-2018:0527
- RHSA-2018:0647
- RHSA-2018:0647
- RHSA-2018:0648
- RHSA-2018:0648
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1261175%2C1348955
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1261175%2C1348955
- [debian-lts-announce] 20180315 [SECURITY] [DLA 1308-1] firefox-esr security update
- [debian-lts-announce] 20180315 [SECURITY] [DLA 1308-1] firefox-esr security update
- [debian-lts-announce] 20180329 [SECURITY] [DLA 1327-1] thunderbird security update
- [debian-lts-announce] 20180329 [SECURITY] [DLA 1327-1] thunderbird security update
- GLSA-201811-13
- GLSA-201811-13
- USN-3545-1
- USN-3545-1
- DSA-4139
- DSA-4139
- DSA-4155
- DSA-4155
- https://www.mozilla.org/security/advisories/mfsa2018-07/
- https://www.mozilla.org/security/advisories/mfsa2018-07/
- https://www.mozilla.org/security/advisories/mfsa2018-09/
- https://www.mozilla.org/security/advisories/mfsa2018-09/
Modified: 2024-11-21
CVE-2018-5146
An out of bounds memory write while processing Vorbis audio data was reported through the Pwn2Own contest. This vulnerability affects Firefox < 59.0.1, Firefox ESR < 52.7.2, and Thunderbird < 52.7.
- 103432
- 103432
- 1040544
- 1040544
- RHSA-2018:0549
- RHSA-2018:0549
- RHSA-2018:0647
- RHSA-2018:0647
- RHSA-2018:0648
- RHSA-2018:0648
- RHSA-2018:0649
- RHSA-2018:0649
- RHSA-2018:1058
- RHSA-2018:1058
- https://bugzilla.mozilla.org/show_bug.cgi?id=1446062
- https://bugzilla.mozilla.org/show_bug.cgi?id=1446062
- [debian-lts-announce] 20180326 [SECURITY] [DLA 1319-1] firefox-esr security update
- [debian-lts-announce] 20180326 [SECURITY] [DLA 1319-1] firefox-esr security update
- [debian-lts-announce] 20180329 [SECURITY] [DLA 1327-1] thunderbird security update
- [debian-lts-announce] 20180329 [SECURITY] [DLA 1327-1] thunderbird security update
- [debian-lts-announce] 20180430 [SECURITY] [DLA 1368-1] libvorbis security update
- [debian-lts-announce] 20180430 [SECURITY] [DLA 1368-1] libvorbis security update
- GLSA-201811-13
- GLSA-201811-13
- USN-3545-1
- USN-3545-1
- USN-3599-1
- USN-3599-1
- USN-3604-1
- USN-3604-1
- DSA-4140
- DSA-4140
- DSA-4143
- DSA-4143
- DSA-4155
- DSA-4155
- https://www.mozilla.org/security/advisories/mfsa2018-08/
- https://www.mozilla.org/security/advisories/mfsa2018-08/
- https://www.mozilla.org/security/advisories/mfsa2018-09/
- https://www.mozilla.org/security/advisories/mfsa2018-09/
Modified: 2024-11-21
CVE-2018-5150
Memory safety bugs were reported in Firefox 59, Firefox ESR 52.7, and Thunderbird 52.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 52.8, Thunderbird ESR < 52.8, Firefox < 60, and Firefox ESR < 52.8.
- 104136
- 104136
- 1040896
- 1040896
- RHSA-2018:1414
- RHSA-2018:1414
- RHSA-2018:1415
- RHSA-2018:1415
- RHSA-2018:1725
- RHSA-2018:1725
- RHSA-2018:1726
- RHSA-2018:1726
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1388020%2C1433609%2C1409440%2C1448705%2C1451376%2C1452202%2C1444668%2C1393367%2C1411415%2C1426129
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1388020%2C1433609%2C1409440%2C1448705%2C1451376%2C1452202%2C1444668%2C1393367%2C1411415%2C1426129
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3645-1
- USN-3645-1
- USN-3660-1
- USN-3660-1
- USN-3688-1
- USN-3688-1
- DSA-4199
- DSA-4199
- DSA-4209
- DSA-4209
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
Modified: 2024-11-21
CVE-2018-5154
A use-after-free vulnerability can occur while enumerating attributes during SVG animations with clip paths. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.8, Thunderbird ESR < 52.8, Firefox < 60, and Firefox ESR < 52.8.
- 104136
- 104136
- 1040896
- 1040896
- RHSA-2018:1414
- RHSA-2018:1414
- RHSA-2018:1415
- RHSA-2018:1415
- RHSA-2018:1725
- RHSA-2018:1725
- RHSA-2018:1726
- RHSA-2018:1726
- https://bugzilla.mozilla.org/show_bug.cgi?id=1443092
- https://bugzilla.mozilla.org/show_bug.cgi?id=1443092
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3645-1
- USN-3645-1
- USN-3660-1
- USN-3660-1
- DSA-4199
- DSA-4199
- DSA-4209
- DSA-4209
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
Modified: 2024-11-21
CVE-2018-5155
A use-after-free vulnerability can occur while adjusting layout during SVG animations with text paths. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.8, Thunderbird ESR < 52.8, Firefox < 60, and Firefox ESR < 52.8.
- 104136
- 104136
- 1040896
- 1040896
- RHSA-2018:1414
- RHSA-2018:1414
- RHSA-2018:1415
- RHSA-2018:1415
- RHSA-2018:1725
- RHSA-2018:1725
- RHSA-2018:1726
- RHSA-2018:1726
- https://bugzilla.mozilla.org/show_bug.cgi?id=1448774
- https://bugzilla.mozilla.org/show_bug.cgi?id=1448774
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3645-1
- USN-3645-1
- USN-3660-1
- USN-3660-1
- DSA-4199
- DSA-4199
- DSA-4209
- DSA-4209
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
Modified: 2024-11-21
CVE-2018-5156
A vulnerability can occur when capturing a media stream when the media source type is changed as the capture is occurring. This can result in stream data being cast to the wrong type causing a potentially exploitable crash. This vulnerability affects Thunderbird < 60, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
- 104560
- 104560
- 1041193
- 1041193
- RHSA-2018:2112
- RHSA-2018:2112
- RHSA-2018:2113
- RHSA-2018:2113
- https://bugzilla.mozilla.org/show_bug.cgi?id=1453127
- https://bugzilla.mozilla.org/show_bug.cgi?id=1453127
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3705-1
- USN-3705-1
- DSA-4235
- DSA-4235
- DSA-4295
- DSA-4295
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
Modified: 2024-11-21
CVE-2018-5159
An integer overflow can occur in the Skia library due to 32-bit integer use in an array without integer overflow checks, resulting in possible out-of-bounds writes. This could lead to a potentially exploitable crash triggerable by web content. This vulnerability affects Thunderbird < 52.8, Thunderbird ESR < 52.8, Firefox < 60, and Firefox ESR < 52.8.
- 104136
- 104136
- 1040896
- 1040896
- RHSA-2018:1414
- RHSA-2018:1414
- RHSA-2018:1415
- RHSA-2018:1415
- RHSA-2018:1725
- RHSA-2018:1725
- RHSA-2018:1726
- RHSA-2018:1726
- https://bugzilla.mozilla.org/show_bug.cgi?id=1441941
- https://bugzilla.mozilla.org/show_bug.cgi?id=1441941
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3645-1
- USN-3645-1
- USN-3660-1
- USN-3660-1
- DSA-4199
- DSA-4199
- DSA-4209
- DSA-4209
- 44759
- 44759
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
Modified: 2024-11-21
CVE-2018-5161
Crafted message headers can cause a Thunderbird process to hang on receiving the message. This vulnerability affects Thunderbird ESR < 52.8 and Thunderbird < 52.8.
- 1040946
- 1040946
- RHSA-2018:1725
- RHSA-2018:1725
- RHSA-2018:1726
- RHSA-2018:1726
- https://bugzilla.mozilla.org/show_bug.cgi?id=1411720
- https://bugzilla.mozilla.org/show_bug.cgi?id=1411720
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- GLSA-201811-13
- GLSA-201811-13
- USN-3660-1
- USN-3660-1
- DSA-4209
- DSA-4209
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
Modified: 2024-11-21
CVE-2018-5162
Plaintext of decrypted emails can leak through the src attribute of remote images, or links. This vulnerability affects Thunderbird ESR < 52.8 and Thunderbird < 52.8.
- 104240
- 104240
- 1040946
- 1040946
- RHSA-2018:1725
- RHSA-2018:1725
- RHSA-2018:1726
- RHSA-2018:1726
- https://bugzilla.mozilla.org/show_bug.cgi?id=1457721
- https://bugzilla.mozilla.org/show_bug.cgi?id=1457721
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- GLSA-201811-13
- GLSA-201811-13
- USN-3660-1
- USN-3660-1
- DSA-4209
- DSA-4209
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
Modified: 2024-11-21
CVE-2018-5168
Sites can bypass security checks on permissions to install lightweight themes by manipulating the "baseURI" property of the theme element. This could allow a malicious site to install a theme without user interaction which could contain offensive or embarrassing images. This vulnerability affects Thunderbird < 52.8, Thunderbird ESR < 52.8, Firefox < 60, and Firefox ESR < 52.8.
- 104136
- 104136
- 1040896
- 1040896
- RHSA-2018:1414
- RHSA-2018:1414
- RHSA-2018:1415
- RHSA-2018:1415
- RHSA-2018:1725
- RHSA-2018:1725
- RHSA-2018:1726
- RHSA-2018:1726
- https://bugzilla.mozilla.org/show_bug.cgi?id=1449548
- https://bugzilla.mozilla.org/show_bug.cgi?id=1449548
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3645-1
- USN-3645-1
- USN-3660-1
- USN-3660-1
- DSA-4199
- DSA-4199
- DSA-4209
- DSA-4209
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
Modified: 2024-11-21
CVE-2018-5170
It is possible to spoof the filename of an attachment and display an arbitrary attachment name. This could lead to a user opening a remote attachment which is a different file type than expected. This vulnerability affects Thunderbird ESR < 52.8 and Thunderbird < 52.8.
- 1040946
- 1040946
- RHSA-2018:1725
- RHSA-2018:1725
- RHSA-2018:1726
- RHSA-2018:1726
- https://bugzilla.mozilla.org/show_bug.cgi?id=1411732
- https://bugzilla.mozilla.org/show_bug.cgi?id=1411732
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- GLSA-201811-13
- GLSA-201811-13
- USN-3660-1
- USN-3660-1
- DSA-4209
- DSA-4209
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
Modified: 2024-11-21
CVE-2018-5178
A buffer overflow was found during UTF8 to Unicode string conversion within JavaScript with extremely large amounts of data. This vulnerability requires the use of a malicious or vulnerable legacy extension in order to occur. This vulnerability affects Thunderbird ESR < 52.8, Thunderbird < 52.8, and Firefox ESR < 52.8.
- 104138
- 104138
- 1040898
- 1040898
- RHSA-2018:1414
- RHSA-2018:1414
- RHSA-2018:1415
- RHSA-2018:1415
- RHSA-2018:1725
- RHSA-2018:1725
- RHSA-2018:1726
- RHSA-2018:1726
- https://bugzilla.mozilla.org/show_bug.cgi?id=1443891
- https://bugzilla.mozilla.org/show_bug.cgi?id=1443891
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3660-1
- USN-3660-1
- DSA-4199
- DSA-4199
- DSA-4209
- DSA-4209
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
Modified: 2024-11-21
CVE-2018-5183
Mozilla developers backported selected changes in the Skia library. These changes correct memory corruption issues including invalid buffer reads and writes during graphic operations. This vulnerability affects Thunderbird ESR < 52.8, Thunderbird < 52.8, and Firefox ESR < 52.8.
- 104138
- 104138
- 1040898
- 1040898
- RHSA-2018:1414
- RHSA-2018:1414
- RHSA-2018:1415
- RHSA-2018:1415
- RHSA-2018:1725
- RHSA-2018:1725
- RHSA-2018:1726
- RHSA-2018:1726
- https://bugzilla.mozilla.org/show_bug.cgi?id=1454692
- https://bugzilla.mozilla.org/show_bug.cgi?id=1454692
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3660-1
- USN-3660-1
- DSA-4199
- DSA-4199
- DSA-4209
- DSA-4209
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
Modified: 2024-11-21
CVE-2018-5184
Using remote content in encrypted messages can lead to the disclosure of plaintext. This vulnerability affects Thunderbird ESR < 52.8 and Thunderbird < 52.8.
- 104240
- 104240
- 1040946
- 1040946
- RHSA-2018:1725
- RHSA-2018:1725
- RHSA-2018:1726
- RHSA-2018:1726
- https://bugzilla.mozilla.org/show_bug.cgi?id=1411592
- https://bugzilla.mozilla.org/show_bug.cgi?id=1411592
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- GLSA-201811-13
- GLSA-201811-13
- USN-3660-1
- USN-3660-1
- DSA-4209
- DSA-4209
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
Modified: 2024-11-21
CVE-2018-5185
Plaintext of decrypted emails can leak through by user submitting an embedded form. This vulnerability affects Thunderbird ESR < 52.8 and Thunderbird < 52.8.
- 104240
- 104240
- 1040946
- 1040946
- RHSA-2018:1725
- RHSA-2018:1725
- RHSA-2018:1726
- RHSA-2018:1726
- https://bugzilla.mozilla.org/show_bug.cgi?id=1450345
- https://bugzilla.mozilla.org/show_bug.cgi?id=1450345
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- GLSA-201811-13
- GLSA-201811-13
- USN-3660-1
- USN-3660-1
- DSA-4209
- DSA-4209
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
Modified: 2024-11-21
CVE-2018-5187
Memory safety bugs present in Firefox 60 and Firefox ESR 60. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 60, Firefox ESR < 60.1, and Firefox < 61.
- 104556
- 104556
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1461324%2C1414829%2C1395246%2C1467938%2C1461619%2C1425930%2C1438556%2C1454285%2C1459568%2C1463884
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1461324%2C1414829%2C1395246%2C1467938%2C1461619%2C1425930%2C1438556%2C1454285%2C1459568%2C1463884
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3705-1
- USN-3705-1
- DSA-4295
- DSA-4295
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
Modified: 2024-11-21
CVE-2018-5188
Memory safety bugs present in Firefox 60, Firefox ESR 60, and Firefox ESR 52.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
- 104555
- 104555
- RHSA-2018:2112
- RHSA-2018:2112
- RHSA-2018:2113
- RHSA-2018:2113
- RHSA-2018:2251
- RHSA-2018:2251
- RHSA-2018:2252
- RHSA-2018:2252
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1456189%2C1456975%2C1465898%2C1392739%2C1451297%2C1464063%2C1437842%2C1442722%2C1452576%2C1450688%2C1458264%2C1458270%2C1465108%2C1464829%2C1464079%2C1463494%2C1458048
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1456189%2C1456975%2C1465898%2C1392739%2C1451297%2C1464063%2C1437842%2C1442722%2C1452576%2C1450688%2C1458264%2C1458270%2C1465108%2C1464829%2C1464079%2C1463494%2C1458048
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3705-1
- USN-3705-1
- USN-3714-1
- USN-3714-1
- USN-3749-1
- USN-3749-1
- DSA-4244
- DSA-4244
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
Modified: 2024-11-21
CVE-2019-11691
A use-after-free vulnerability can occur when working with XMLHttpRequest (XHR) in an event loop, causing the XHR main thread to be called after it has been freed. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1542465
- https://bugzilla.mozilla.org/show_bug.cgi?id=1542465
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
Modified: 2024-11-21
CVE-2019-11692
A use-after-free vulnerability can occur when listeners are removed from the event listener manager while still in use, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1544670
- https://bugzilla.mozilla.org/show_bug.cgi?id=1544670
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
Modified: 2024-11-21
CVE-2019-11693
The bufferdata function in WebGL is vulnerable to a buffer overflow with specific graphics drivers on Linux. This could result in malicious content freezing a tab or triggering a potentially exploitable crash. *Note: this issue only occurs on Linux. Other operating systems are unaffected.*. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1532525
- https://bugzilla.mozilla.org/show_bug.cgi?id=1532525
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
Modified: 2024-11-21
CVE-2019-11694
A vulnerability exists in the Windows sandbox where an uninitialized value in memory can be leaked to a renderer from a broker when making a call to access an otherwise unavailable file. This results in the potential leaking of information stored at that memory location. *Note: this issue only occurs on Windows. Other operating systems are unaffected.*. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1534196
- https://bugzilla.mozilla.org/show_bug.cgi?id=1534196
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
Modified: 2024-11-21
CVE-2019-11698
If a crafted hyperlink is dragged and dropped to the bookmark bar or sidebar and the resulting bookmark is subsequently dragged and dropped into the web content area, an arbitrary query of a user's browser history can be run and transmitted to the content page via drop event data. This allows for the theft of browser history by a malicious site. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1543191
- https://bugzilla.mozilla.org/show_bug.cgi?id=1543191
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
Modified: 2024-11-21
CVE-2019-11703
A flaw in Thunderbird's implementation of iCal causes a heap buffer overflow in parser_get_next_char when processing certain email messages, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.7.1.
Modified: 2024-11-21
CVE-2019-11704
A flaw in Thunderbird's implementation of iCal causes a heap buffer overflow in icalmemory_strdup_and_dequote when processing certain email messages, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.7.1.
Modified: 2024-11-21
CVE-2019-11705
A flaw in Thunderbird's implementation of iCal causes a stack buffer overflow in icalrecur_add_bydayrules when processing certain email messages, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.7.1.
Modified: 2024-11-21
CVE-2019-11706
A flaw in Thunderbird's implementation of iCal causes a type confusion in icaltimezone_get_vtimezone_properties when processing certain email messages, resulting in a crash. This vulnerability affects Thunderbird < 60.7.1.
Modified: 2024-11-21
CVE-2019-11707
A type confusion vulnerability can occur when manipulating JavaScript objects due to issues in Array.pop. This can allow for an exploitable crash. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Firefox ESR < 60.7.1, Firefox < 67.0.3, and Thunderbird < 60.7.2.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1544386
- https://bugzilla.mozilla.org/show_bug.cgi?id=1544386
- GLSA-201908-12
- GLSA-201908-12
- https://www.mozilla.org/security/advisories/mfsa2019-18/
- https://www.mozilla.org/security/advisories/mfsa2019-18/
- https://www.mozilla.org/security/advisories/mfsa2019-20/
- https://www.mozilla.org/security/advisories/mfsa2019-20/
Modified: 2024-11-21
CVE-2019-11708
Insufficient vetting of parameters passed with the Prompt:Open IPC message between child and parent processes can result in the non-sandboxed parent process opening web content chosen by a compromised child process. When combined with additional vulnerabilities this could result in executing arbitrary code on the user's computer. This vulnerability affects Firefox ESR < 60.7.2, Firefox < 67.0.4, and Thunderbird < 60.7.2.
- http://packetstormsecurity.com/files/155592/Mozilla-Firefox-Windows-64-Bit-Chain-Exploit.html
- http://packetstormsecurity.com/files/155592/Mozilla-Firefox-Windows-64-Bit-Chain-Exploit.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1559858
- https://bugzilla.mozilla.org/show_bug.cgi?id=1559858
- GLSA-201908-12
- GLSA-201908-12
- https://www.mozilla.org/security/advisories/mfsa2019-19/
- https://www.mozilla.org/security/advisories/mfsa2019-19/
- https://www.mozilla.org/security/advisories/mfsa2019-20/
- https://www.mozilla.org/security/advisories/mfsa2019-20/
Modified: 2024-11-21
CVE-2019-11709
Mozilla developers and community members reported memory safety bugs present in Firefox 67 and Firefox ESR 60.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1547266%2C1540759%2C1548822%2C1550498%2C1515052%2C1539219%2C1547757%2C1550498%2C1533522
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1547266%2C1540759%2C1548822%2C1550498%2C1515052%2C1539219%2C1547757%2C1550498%2C1533522
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- GLSA-201908-12
- GLSA-201908-12
- GLSA-201908-20
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
Modified: 2024-11-21
CVE-2019-11711
When an inner window is reused, it does not consider the use of document.domain for cross-origin protections. If pages on different subdomains ever cooperatively use document.domain, then either page can abuse this to inject script into arbitrary pages on the other subdomain, even those that did not use document.domain to relax their origin security. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- https://bugzilla.mozilla.org/show_bug.cgi?id=1552541
- https://bugzilla.mozilla.org/show_bug.cgi?id=1552541
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- GLSA-201908-12
- GLSA-201908-12
- GLSA-201908-20
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
Modified: 2024-11-21
CVE-2019-11712
POST requests made by NPAPI plugins, such as Flash, that receive a status 308 redirect response can bypass CORS requirements. This can allow an attacker to perform Cross-Site Request Forgery (CSRF) attacks. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- https://bugzilla.mozilla.org/show_bug.cgi?id=1543804
- https://bugzilla.mozilla.org/show_bug.cgi?id=1543804
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- GLSA-201908-12
- GLSA-201908-12
- GLSA-201908-20
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
Modified: 2024-11-21
CVE-2019-11713
A use-after-free vulnerability can occur in HTTP/2 when a cached HTTP/2 stream is closed while still in use, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- https://bugzilla.mozilla.org/show_bug.cgi?id=1528481
- https://bugzilla.mozilla.org/show_bug.cgi?id=1528481
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- GLSA-201908-12
- GLSA-201908-12
- GLSA-201908-20
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
Modified: 2024-11-21
CVE-2019-11715
Due to an error while parsing page content, it is possible for properly sanitized user input to be misinterpreted and lead to XSS hazards on web sites in certain circumstances. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- https://bugzilla.mozilla.org/show_bug.cgi?id=1555523
- https://bugzilla.mozilla.org/show_bug.cgi?id=1555523
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- GLSA-201908-12
- GLSA-201908-12
- GLSA-201908-20
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
Modified: 2024-11-21
CVE-2019-11717
A vulnerability exists where the caret ("^") character is improperly escaped constructing some URIs due to it being used as a separator, allowing for possible spoofing of origin attributes. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- https://bugzilla.mozilla.org/show_bug.cgi?id=1548306
- https://bugzilla.mozilla.org/show_bug.cgi?id=1548306
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- GLSA-201908-12
- GLSA-201908-12
- GLSA-201908-20
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
Modified: 2024-11-21
CVE-2019-11719
When importing a curve25519 private key in PKCS#8format with leading 0x00 bytes, it is possible to trigger an out-of-bounds read in the Network Security Services (NSS) library. This could lead to information disclosure. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- RHSA-2019:1951
- RHSA-2019:1951
- https://bugzilla.mozilla.org/show_bug.cgi?id=1540541
- https://bugzilla.mozilla.org/show_bug.cgi?id=1540541
- [debian-lts-announce] 20200929 [SECURITY] [DLA 2388-1] nss security update
- [debian-lts-announce] 20200929 [SECURITY] [DLA 2388-1] nss security update
- GLSA-201908-12
- GLSA-201908-12
- GLSA-201908-20
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
Modified: 2024-11-21
CVE-2019-11729
Empty or malformed p256-ECDH public keys may trigger a segmentation fault due values being improperly sanitized before being copied into memory and used. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- RHSA-2019:1951
- RHSA-2019:1951
- RHSA-2019:4190
- RHSA-2019:4190
- https://bugzilla.mozilla.org/show_bug.cgi?id=1515342
- https://bugzilla.mozilla.org/show_bug.cgi?id=1515342
- [debian-lts-announce] 20200929 [SECURITY] [DLA 2388-1] nss security update
- [debian-lts-announce] 20200929 [SECURITY] [DLA 2388-1] nss security update
- GLSA-201908-12
- GLSA-201908-12
- GLSA-201908-20
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
Modified: 2024-11-21
CVE-2019-11730
A vulnerability exists where if a user opens a locally saved HTML file, this file can use file: URIs to access other files in the same directory or sub-directories if the names are known or guessed. The Fetch API can then be used to read the contents of any files stored in these directories and they may uploaded to a server. It was demonstrated that in combination with a popular Android messaging app, if a malicious HTML attachment is sent to a user and they opened that attachment in Firefox, due to that app's predictable pattern for locally-saved file names, it is possible to read attachments the victim received from other correspondents. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- https://bugzilla.mozilla.org/show_bug.cgi?id=1558299
- https://bugzilla.mozilla.org/show_bug.cgi?id=1558299
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- GLSA-201908-12
- GLSA-201908-12
- GLSA-201908-20
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
Modified: 2024-11-21
CVE-2019-5785
Incorrect convexity calculations in Skia in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.
Modified: 2024-11-21
CVE-2019-5798
Lack of correct bounds checking in Skia in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
- openSUSE-SU-2019:1484
- openSUSE-SU-2019:1484
- openSUSE-SU-2019:1534
- openSUSE-SU-2019:1534
- openSUSE-SU-2019:1664
- openSUSE-SU-2019:1664
- openSUSE-SU-2019:1666
- openSUSE-SU-2019:1666
- RHSA-2019:1308
- RHSA-2019:1308
- RHSA-2019:1309
- RHSA-2019:1309
- RHSA-2019:1310
- RHSA-2019:1310
- https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop_12.html
- https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop_12.html
- https://crbug.com/883596
- https://crbug.com/883596
- [debian-lts-announce] 20190527 [SECURITY] [DLA 1806-1] thunderbird security update
- [debian-lts-announce] 20190527 [SECURITY] [DLA 1806-1] thunderbird security update
- 20190527 [SECURITY] [DSA 4451-1] thunderbird security update
- 20190527 [SECURITY] [DSA 4451-1] thunderbird security update
- USN-3997-1
- USN-3997-1
- DSA-4451
- DSA-4451
Modified: 2024-11-21
CVE-2019-7317
png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute.
- openSUSE-SU-2019:1484
- openSUSE-SU-2019:1534
- openSUSE-SU-2019:1664
- openSUSE-SU-2019:1916
- openSUSE-SU-2019:1912
- http://packetstormsecurity.com/files/152561/Slackware-Security-Advisory-libpng-Updates.html
- 108098
- RHSA-2019:1265
- RHSA-2019:1267
- RHSA-2019:1269
- RHSA-2019:1308
- RHSA-2019:1309
- RHSA-2019:1310
- RHSA-2019:2494
- RHSA-2019:2495
- RHSA-2019:2585
- RHSA-2019:2590
- RHSA-2019:2592
- RHSA-2019:2737
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12803
- https://github.com/glennrp/libpng/issues/275
- [debian-lts-announce] 20190523 [SECURITY] [DLA 1800-1] firefox-esr security update
- [debian-lts-announce] 20190527 [SECURITY] [DLA 1806-1] thunderbird security update
- 20190417 [slackware-security] libpng (SSA:2019-107-01)
- 20190429 [SECURITY] [DSA 4435-1] libpng1.6 security update
- 20190522 [slackware-security] mozilla-firefox (SSA:2019-141-01)
- 20190523 [SECURITY] [DSA 4448-1] firefox-esr security update
- 20190527 [SECURITY] [DSA 4451-1] thunderbird security update
- GLSA-201908-02
- https://security.netapp.com/advisory/ntap-20190719-0005/
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03977en_us
- USN-3962-1
- USN-3991-1
- USN-3997-1
- USN-4080-1
- USN-4083-1
- DSA-4435
- DSA-4448
- DSA-4451
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- openSUSE-SU-2019:1484
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- DSA-4451
- DSA-4448
- DSA-4435
- USN-4083-1
- USN-4080-1
- USN-3997-1
- USN-3991-1
- USN-3962-1
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03977en_us
- https://security.netapp.com/advisory/ntap-20190719-0005/
- GLSA-201908-02
- 20190527 [SECURITY] [DSA 4451-1] thunderbird security update
- 20190523 [SECURITY] [DSA 4448-1] firefox-esr security update
- 20190522 [slackware-security] mozilla-firefox (SSA:2019-141-01)
- 20190429 [SECURITY] [DSA 4435-1] libpng1.6 security update
- 20190417 [slackware-security] libpng (SSA:2019-107-01)
- [debian-lts-announce] 20190527 [SECURITY] [DLA 1806-1] thunderbird security update
- [debian-lts-announce] 20190523 [SECURITY] [DLA 1800-1] firefox-esr security update
- https://github.com/glennrp/libpng/issues/275
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12803
- RHSA-2019:2737
- RHSA-2019:2592
- RHSA-2019:2590
- RHSA-2019:2585
- RHSA-2019:2495
- RHSA-2019:2494
- RHSA-2019:1310
- RHSA-2019:1309
- RHSA-2019:1308
- RHSA-2019:1269
- RHSA-2019:1267
- RHSA-2019:1265
- 108098
- http://packetstormsecurity.com/files/152561/Slackware-Security-Advisory-libpng-Updates.html
- openSUSE-SU-2019:1912
- openSUSE-SU-2019:1916
- openSUSE-SU-2019:1664
- openSUSE-SU-2019:1534
Modified: 2024-11-21
CVE-2019-9788
Mozilla developers and community members reported memory safety bugs present in Firefox 65, Firefox ESR 60.5, and Thunderbird 60.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.
- RHSA-2019:0966
- RHSA-2019:1144
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1518001%2C1521304%2C1521214%2C1506665%2C1516834%2C1518774%2C1524755%2C1523362%2C1524214%2C1529203
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- RHSA-2019:0966
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1518001%2C1521304%2C1521214%2C1506665%2C1516834%2C1518774%2C1524755%2C1523362%2C1524214%2C1529203
- RHSA-2019:1144
Modified: 2024-11-21
CVE-2019-9790
A use-after-free vulnerability can occur when a raw pointer to a DOM element on a page is obtained using JavaScript and the element is then removed while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.
- RHSA-2019:0966
- RHSA-2019:1144
- https://bugzilla.mozilla.org/show_bug.cgi?id=1525145
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- RHSA-2019:0966
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1525145
- RHSA-2019:1144
Modified: 2024-11-21
CVE-2019-9791
The type inference system allows the compilation of functions that can cause type confusions between arbitrary objects when compiled through the IonMonkey just-in-time (JIT) compiler and when the constructor function is entered through on-stack replacement (OSR). This allows for possible arbitrary reading and writing of objects during an exploitable crash. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.
- RHSA-2019:0966
- RHSA-2019:1144
- https://bugzilla.mozilla.org/show_bug.cgi?id=1530958
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- RHSA-2019:0966
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1530958
- RHSA-2019:1144
Modified: 2024-11-21
CVE-2019-9792
The IonMonkey just-in-time (JIT) compiler can leak an internal JS_OPTIMIZED_OUT magic value to the running script during a bailout. This magic value can then be used by JavaScript to achieve memory corruption, which results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.
- http://packetstormsecurity.com/files/153106/Spidermonkey-IonMonkey-JS_OPTIMIZED_OUT-Value-Leak.html
- RHSA-2019:0966
- RHSA-2019:1144
- https://bugzilla.mozilla.org/show_bug.cgi?id=1532599
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- http://packetstormsecurity.com/files/153106/Spidermonkey-IonMonkey-JS_OPTIMIZED_OUT-Value-Leak.html
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1532599
- RHSA-2019:1144
- RHSA-2019:0966
Modified: 2024-11-21
CVE-2019-9793
A mechanism was discovered that removes some bounds checking for string, array, or typed array accesses if Spectre mitigations have been disabled. This vulnerability could allow an attacker to create an arbitrary value in compiled JavaScript, for which the range analysis will infer a fully controlled, incorrect range in circumstances where users have explicitly disabled Spectre mitigations. *Note: Spectre mitigations are currently enabled for all users by default settings.*. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.
- RHSA-2019:0966
- RHSA-2019:1144
- https://bugzilla.mozilla.org/show_bug.cgi?id=1528829
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- RHSA-2019:0966
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1528829
- RHSA-2019:1144
Modified: 2024-11-21
CVE-2019-9794
A vulnerability was discovered where specific command line arguments are not properly discarded during Firefox invocation as a shell handler for URLs. This could be used to retrieve and execute files whose location is supplied through these command line arguments if Firefox is configured as the default URI handler for a given URI scheme in third party applications and these applications insufficiently sanitize URL data. *Note: This issue only affects Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1530103
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1530103
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-07/
Modified: 2024-11-21
CVE-2019-9795
A vulnerability where type-confusion in the IonMonkey just-in-time (JIT) compiler could potentially be used by malicious JavaScript to trigger a potentially exploitable crash. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.
- RHSA-2019:0966
- RHSA-2019:1144
- https://bugzilla.mozilla.org/show_bug.cgi?id=1514682
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- RHSA-2019:0966
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1514682
- RHSA-2019:1144
Modified: 2024-11-21
CVE-2019-9796
A use-after-free vulnerability can occur when the SMIL animation controller incorrectly registers with the refresh driver twice when only a single registration is expected. When a registration is later freed with the removal of the animation controller element, the refresh driver incorrectly leaves a dangling pointer to the driver's observer array. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.
- RHSA-2019:0966
- RHSA-2019:1144
- https://bugzilla.mozilla.org/show_bug.cgi?id=1531277
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- RHSA-2019:0966
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1531277
- RHSA-2019:1144
Modified: 2024-11-21
CVE-2019-9797
Cross-origin images can be read in violation of the same-origin policy by exporting an image after using createImageBitmap to read the image and then rendering the resulting bitmap image within a canvas element. This vulnerability affects Firefox < 66.
- openSUSE-SU-2019:1484
- openSUSE-SU-2019:1534
- openSUSE-SU-2019:1664
- RHSA-2019:1265
- RHSA-2019:1267
- RHSA-2019:1269
- RHSA-2019:1308
- RHSA-2019:1309
- RHSA-2019:1310
- https://bugzilla.mozilla.org/show_bug.cgi?id=1528909
- [debian-lts-announce] 20190523 [SECURITY] [DLA 1800-1] firefox-esr security update
- [debian-lts-announce] 20190527 [SECURITY] [DLA 1806-1] thunderbird security update
- 20190522 [slackware-security] mozilla-firefox (SSA:2019-141-01)
- 20190523 [SECURITY] [DSA 4448-1] firefox-esr security update
- 20190527 [SECURITY] [DSA 4451-1] thunderbird security update
- USN-3997-1
- DSA-4448
- DSA-4451
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- openSUSE-SU-2019:1484
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- DSA-4451
- DSA-4448
- USN-3997-1
- 20190527 [SECURITY] [DSA 4451-1] thunderbird security update
- 20190523 [SECURITY] [DSA 4448-1] firefox-esr security update
- 20190522 [slackware-security] mozilla-firefox (SSA:2019-141-01)
- [debian-lts-announce] 20190527 [SECURITY] [DLA 1806-1] thunderbird security update
- [debian-lts-announce] 20190523 [SECURITY] [DLA 1800-1] firefox-esr security update
- https://bugzilla.mozilla.org/show_bug.cgi?id=1528909
- RHSA-2019:1310
- RHSA-2019:1309
- RHSA-2019:1308
- RHSA-2019:1269
- RHSA-2019:1267
- RHSA-2019:1265
- openSUSE-SU-2019:1664
- openSUSE-SU-2019:1534
Modified: 2024-11-21
CVE-2019-9800
Mozilla developers and community members reported memory safety bugs present in Firefox 66, Firefox ESR 60.6, and Thunderbird 60.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1540166%2C1534593%2C1546327%2C1540136%2C1538736%2C1538042%2C1535612%2C1499719%2C1499108%2C1538619%2C1535194%2C1516325%2C1542324%2C1542097%2C1532465%2C1533554%2C1541580
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1540166%2C1534593%2C1546327%2C1540136%2C1538736%2C1538042%2C1535612%2C1499719%2C1499108%2C1538619%2C1535194%2C1516325%2C1542324%2C1542097%2C1532465%2C1533554%2C1541580
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-13/
Modified: 2024-11-21
CVE-2019-9801
Firefox will accept any registered Program ID as an external protocol handler and offer to launch this local application when given a matching URL on Windows operating systems. This should only happen if the program has specifically registered itself as a "URL Handler" in the Windows registry. *Note: This issue only affects Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1527717
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1527717
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-07/
Modified: 2024-11-21
CVE-2019-9810
Incorrect alias information in IonMonkey JIT compiler for Array.prototype.slice method may lead to missing bounds check and a buffer overflow. This vulnerability affects Firefox < 66.0.1, Firefox ESR < 60.6.1, and Thunderbird < 60.6.1.
- http://packetstormsecurity.com/files/155592/Mozilla-Firefox-Windows-64-Bit-Chain-Exploit.html
- RHSA-2019:0966
- RHSA-2019:1144
- https://bugzilla.mozilla.org/show_bug.cgi?id=1537924
- https://www.mozilla.org/security/advisories/mfsa2019-09/
- https://www.mozilla.org/security/advisories/mfsa2019-10/
- https://www.mozilla.org/security/advisories/mfsa2019-12/
- http://packetstormsecurity.com/files/155592/Mozilla-Firefox-Windows-64-Bit-Chain-Exploit.html
- https://www.mozilla.org/security/advisories/mfsa2019-12/
- https://www.mozilla.org/security/advisories/mfsa2019-10/
- https://www.mozilla.org/security/advisories/mfsa2019-09/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1537924
- RHSA-2019:1144
- RHSA-2019:0966
Modified: 2024-11-21
CVE-2019-9811
As part of a winning Pwn2Own entry, a researcher demonstrated a sandbox escape by installing a malicious language pack and then opening a browser feature that used the compromised translation. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1538007
- https://bugzilla.mozilla.org/show_bug.cgi?id=1539598
- https://bugzilla.mozilla.org/show_bug.cgi?id=1563327
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- GLSA-201908-12
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- openSUSE-SU-2019:1811
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- GLSA-201908-20
- GLSA-201908-12
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- https://bugzilla.mozilla.org/show_bug.cgi?id=1563327
- https://bugzilla.mozilla.org/show_bug.cgi?id=1539598
- https://bugzilla.mozilla.org/show_bug.cgi?id=1538007
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1813
Modified: 2024-11-21
CVE-2019-9813
Incorrect handling of __proto__ mutations may lead to type confusion in IonMonkey JIT code and can be leveraged for arbitrary memory read and write. This vulnerability affects Firefox < 66.0.1, Firefox ESR < 60.6.1, and Thunderbird < 60.6.1.
- RHSA-2019:0966
- RHSA-2019:1144
- https://bugzilla.mozilla.org/show_bug.cgi?id=1538006
- https://www.mozilla.org/security/advisories/mfsa2019-09/
- https://www.mozilla.org/security/advisories/mfsa2019-10/
- https://www.mozilla.org/security/advisories/mfsa2019-12/
- RHSA-2019:0966
- https://www.mozilla.org/security/advisories/mfsa2019-12/
- https://www.mozilla.org/security/advisories/mfsa2019-10/
- https://www.mozilla.org/security/advisories/mfsa2019-09/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1538006
- RHSA-2019:1144
Modified: 2024-11-21
CVE-2019-9815
If hyperthreading is not disabled, a timing attack vulnerability exists, similar to previous Spectre attacks. Apple has shipped macOS 10.14.5 with an option to disable hyperthreading in applications running untrusted code in a thread through a new sysctl. Firefox now makes use of it on the main thread and any worker threads. *Note: users need to update to macOS 10.14.5 in order to take advantage of this change.*. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1546544
- https://mdsattacks.com/
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1546544
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://mdsattacks.com/
Modified: 2024-11-21
CVE-2019-9816
A possible vulnerability exists where type confusion can occur when manipulating JavaScript objects in object groups, allowing for the bypassing of security checks within these groups. *Note: this vulnerability has only been demonstrated with UnboxedObjects, which are disabled by default on all supported releases.*. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1536768
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1536768
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-13/
Modified: 2024-11-21
CVE-2019-9817
Images from a different domain can be read using a canvas object in some circumstances. This could be used to steal image data from a different site in violation of same-origin policy. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1540221
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1540221
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-13/
Modified: 2024-11-21
CVE-2019-9818
A race condition is present in the crash generation server used to generate data for the crash reporter. This issue can lead to a use-after-free in the main process, resulting in a potentially exploitable crash and a sandbox escape. *Note: this vulnerability only affects Windows. Other operating systems are unaffected.*. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1542581
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1542581
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-13/
Modified: 2024-11-21
CVE-2019-9819
A vulnerability where a JavaScript compartment mismatch can occur while working with the fetch API, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1532553
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1532553
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-13/
Modified: 2024-11-21
CVE-2019-9820
A use-after-free vulnerability can occur in the chrome event handler when it is freed while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1536405
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1536405
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-13/
Closed bugs
thunderbird-enigmail: отсутствует зависимость на pinentry
Не работает поиск по письмам
thunderbird-enigmail 60.6.1 перестал отправлять письма