ALT-BU-2019-4017-1
Branch p8 update bulletin.
Closed bugs
Сломалась сборка rust
Closed vulnerabilities
BDU:2019-00775
Уязвимость набора библиотек Network Security Services, связаная с возможностью понизить используемую версию протокола TLS, позволяющая нарушителю получить доступ к защищаемой информации
BDU:2019-01763
Уязвимость набора библиотек NSS (Network Security Services), связанная с ошибками криптографических преобразований, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2021-00100
Уязвимость набора криптографических библиотек NSS, связанная с неправильным подтверждением подлинности сертификата, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-12404
A cached side channel attack during handshakes using RSA encryption could allow for the decryption of encrypted content. This is a variant of the Adaptive Chosen Ciphertext attack (AKA Bleichenbacher attack) and affects all NSS versions prior to NSS 3.41.
- openSUSE-SU-2019:1758
- openSUSE-SU-2019:1758
- 107260
- 107260
- RHSA-2019:2237
- RHSA-2019:2237
- https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2018-12404
- https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2018-12404
- https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
- [debian-lts-announce] 20200929 [SECURITY] [DLA 2388-1] nss security update
- [debian-lts-announce] 20200929 [SECURITY] [DLA 2388-1] nss security update
- https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
- https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
Modified: 2024-11-21
CVE-2019-17007
In Network Security Services before 3.44, a malformed Netscape Certificate Sequence can cause NSS to crash, resulting in a denial of service.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1533216
- https://bugzilla.mozilla.org/show_bug.cgi?id=1533216
- https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.44_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.44_release_notes
- https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
- https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-1000667
NASM nasm-2.13.03 nasm- 2.14rc15 version 2.14rc15 and earlier contains a memory corruption (crashed) of nasm when handling a crafted file due to function assemble_file(inname, depend_ptr) at asm/nasm.c:482. vulnerability in function assemble_file(inname, depend_ptr) at asm/nasm.c:482. that can result in aborting/crash nasm program. This attack appear to be exploitable via a specially crafted asm file..
Modified: 2024-11-21
CVE-2018-16517
asm/labels.c in Netwide Assembler (NASM) is prone to NULL Pointer Dereference, which allows the attacker to cause a denial of service via a crafted file.
- openSUSE-SU-2020:0954
- openSUSE-SU-2020:0954
- openSUSE-SU-2020:0952
- openSUSE-SU-2020:0952
- http://packetstormsecurity.com/files/152566/Netwide-Assembler-NASM-2.14rc15-Null-Pointer-Dereference.html
- http://packetstormsecurity.com/files/152566/Netwide-Assembler-NASM-2.14rc15-Null-Pointer-Dereference.html
- https://bugzilla.nasm.us/show_bug.cgi?id=3392513
- https://bugzilla.nasm.us/show_bug.cgi?id=3392513
- https://fakhrizulkifli.github.io/CVE-2018-16517.html
- https://fakhrizulkifli.github.io/CVE-2018-16517.html
- 46726
- 46726
Modified: 2024-11-21
CVE-2018-19216
Netwide Assembler (NASM) before 2.13.02 has a use-after-free in detoken at asm/preproc.c.
- openSUSE-SU-2020:0954
- openSUSE-SU-2020:0954
- openSUSE-SU-2020:0952
- openSUSE-SU-2020:0952
- https://bugzilla.nasm.us/show_bug.cgi?id=3392424
- https://bugzilla.nasm.us/show_bug.cgi?id=3392424
- https://repo.or.cz/nasm.git/commitdiff/9b7ee09abfd426b99aa1ea81d19a3b2818eeabf9
- https://repo.or.cz/nasm.git/commitdiff/9b7ee09abfd426b99aa1ea81d19a3b2818eeabf9
Package firefox-esr updated to version 68.1.0-alt1.M80P.1 for branch p8 in task 236175.
Closed vulnerabilities
BDU:2018-01122
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, вызванная переполнением буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2018-01333
Уязвимость веб-браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, связанная с использованием памяти после её освобождения, позволяющая нарушителю выполнить произвольный код или вызвать аварийное завершение работы приложения
BDU:2018-01334
Уязвимость компонента IndexedDB веб-браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код или вызвать аварийное завершение работы приложения
BDU:2018-01368
Уязвимость браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, связанная с ситуацией гонки в обработчике сигнала, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2018-01442
Уязвимость обработчика JavaScript-сценариев веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2019-00508
Уязвимость механизма записи потока мультимедиа веб-браузеров Firefox, Firefox ESR и программы для работы с электронной почтой Thunderbird, связанная с некорректной проверкой типа источника данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-00678
Уязвимость браузера Firefox, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2019-00679
Уязвимость браузера Firefox, связанная с ошибками освобождения ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-00680
Уязвимость компонента Texture Client Handler браузера Firefox, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-00681
Уязвимость компонента Proxy Auto-Config браузера Firefox, позволяющая нарушителю обойти существующие ограничения безопасности и произвести атаки на службы и инструменты, привязанные к локальному хосту
BDU:2019-00819
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с ошибками реализации механизма аутентификации межпроцессного взаимодействия (IPC), позволяющая нарушителю повысить свои привилегии и выйти из изолированной программной среды
BDU:2019-00820
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2019-00821
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с использованием памяти после её освобождения, позволяющая нарушителю выполнить произвольный код
BDU:2019-00919
Уязвимость веб-браузеров Firefox, Firefox ESR и программы для работы с электронной почтой Thunderbird, связанная с переполнением буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2019-00920
Уязвимость веб-браузеров Firefox, Firefox ESR и программы для работы с электронной почтой Thunderbird, связанная с обращением к освобожденной ячейке памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01276
Уязвимость метода Array.prototype.slice JIT-компилятора IonMonkey браузера Firefox ESR, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2019-01277
Уязвимость функции of __proto__ mutations JIT-компилятора IonMonkey браузера Firefox ESR, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2019-01422
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2019-01423
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с целочисленным переполнением, позволяющая нарушителю осуществить запись за границами буфера в памяти
BDU:2019-01424
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с использованием памяти после освобождения, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2019-01425
Уязвимость графической библиотеки Skia веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2019-01426
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с недостатками механизмов ограничения домена (Same Origin Policy), позволяющая нарушителю перенаправить пользователя на вредоносный сайт
BDU:2019-01556
Уязвимость браузеров Firefox и Firefox ESR, связанная с использованием памяти после ее освобождения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01557
Уязвимость JIT-компилятора IonMonkey браузеров Firefox и Firefox ESR, связанная с ошибкой преобразования типов данных, позволяющая нарушителю оказать воздействие на целостность защищаемых данных
BDU:2019-01568
Уязвимость just-in-time (JIT) компилятора IonMonkey веб-браузеров Firefox, Firefox ESR и программы для работы с электронной почтой Thunderbird, связанная с записью данных за пределы границ буфера, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01569
Уязвимость веб-браузеров Firefox, Firefox ESR, Firefox и программы для работы с электронной почтой Thunderbird, связанная с чтением данных за границами буфера памяти, позволяющая нарушителю получить несанкционированный доступ к защищаемым данным
BDU:2019-01950
Уязвимость программного обеспечения Firefox, Firefox ESR и Thunderbird, связанная с копированием буфера без проверки размера входных данных, позволяющая нарушителю выполнить произвольный код
BDU:2019-02851
Уязвимость браузеров Firefox, Firefox ESR, почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2019-02932
Уязвимость реализации сетевого протокола HTTP/2 браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-02933
Уязвимость браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, связанная с недостатками разграничения доступа, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-02934
Уязвимость плагина NPAPI браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, позволяющая нарушителю осуществить межсайтовую подделку запросов
BDU:2019-02935
Уязвимость компонента document.domain браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, позволяющая нарушителю осуществить межсайтовую сценарную атаку
BDU:2019-02947
Уязвимость браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, существующая из-за недостаточной проверки параметров в сообщениях Prompt:Open IPC между дочерним и родительским процессами, позволяющая нарушителю выполнить произвольный код
BDU:2019-03329
Уязвимость браузера Firefox, связанная с выходом операции за границы буфера данных, позволяющая нарушителю выполнить произвольный код
BDU:2019-03411
Уязвимость кросс-браузерной системы для разработки дополнений WebExtensions веб-браузеров Firefox, Firefox ESR, позволяющая нарушителю повысить свои привилегии
BDU:2019-03412
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с хранением паролей в незашифрованном виде, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2019-03413
Уязвимость компонента TransportSecurityInfo веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-03414
Уязвимость веб-браузеров Firefox, Firefox ESR, связанная с ошибками преобразования типов данных, позволяющая нарушителю выполнить произвольный код
BDU:2019-03415
Уязвимость реализации метода Array.prototype.push JIT-компилятора веб-браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код
BDU:2019-03461
Уязвимость браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2019-03462
Уязвимость браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2019-03463
Уязвимость функции SwizzleData браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2019-03464
Уязвимость браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, вызванная целочисленным переполнением, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2019-03465
Уязвимость браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, связанная с использованием памяти после её освобождения, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2019-03466
Уязвимость плагина NPAPI браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2019-03467
Уязвимость браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, связанная с ошибками межпроцессного взаимодействия (IPC), позволяющая нарушителю раскрыть защищаемую информацию
BDU:2019-03468
Уязвимость браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, связанная с недопустимым размером сетки во время QCMS-преобразований, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2019-03469
Уязвимость компонента PerformanceNavigationTiming браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2019-03471
Уязвимость библиотеки Skia браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-03558
Уязвимость компонента API XMLHttpRequest браузеров Firefox, Firefox ESR, почтового клиента Thunderbird, связанная с использованием памяти после ее освобождения, позволяющая нарушителю оказать воздействие на целостность данных, получить несанкционированный доступ к защищаемой информации, а также вызвать отказ в обслуживании
BDU:2019-03559
Уязвимость браузеров Firefox, Firefox ESR, почтового клиента Thunderbird, связанная с использованием памяти после ее освобождения, позволяющая нарушителю оказать воздействие на целостность данных, получить несанкционированный доступ к защищаемой информации, а также вызвать отказ в обслуживании
BDU:2019-03561
Уязвимость браузеров Firefox, Firefox ESR, почтового клиента Thunderbird, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2019-03614
Уязвимость почтового клиента Thunderbird и браузеров Firefox и Firefox ESR, связанная с неправильным синтаксическим анализом содержимого страницы или интерпретацией введенных пользователем данных, позволяющая нарушителю выполнить произвольный код
BDU:2019-03615
Уязвимость почтового клиента Thunderbird и браузеров Firefox и Firefox ESR, связанная с ошибками экранирования символа каретки("^"), позволяющая нарушителю нарушить целостность данных
BDU:2019-03616
Уязвимость библиотеки служб сетевой безопасности (NSS) почтового клиента Thunderbird и браузеров Firefox и Firefox ESR, позволяющая нарушителю получить несанкционированный доступ к информации
BDU:2019-04024
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2019-04250
Уязвимость браузера Firefox, связанная с использованием открытой переадресации, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2019-04291
Уязвимость функции Reader View браузера Firefox, позволяющая нарушителю выполнить произвольный код
BDU:2019-04295
Уязвимость браузера Firefox, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2019-04296
Уязвимость браузеров Firefox, Firefox ESR, почтового клиента Thunderbird, связанная с записью за границы буфера памяти, позволяющая нарушителю выполнить произвольный код
BDU:2019-04297
Уязвимость браузера Firefox, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2019-04298
Уязвимость системы для разработки дополнений WebExtensions браузеров Firefox, Firefox ESR, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2019-04299
Уязвимость системы для разработки дополнений WebExtensions браузеров Firefox, Firefox ESR, позволяющая нарушителю повысить свои привилегии
BDU:2019-04300
Уязвимость системы для разработки дополнений WebExtensions браузеров Firefox, Firefox ESR, позволяющая нарушителю получить несанкционированный доступ к локальным файлам
BDU:2019-04301
Уязвимость браузера Firefox, связанная с отсутствием мер по очистке входных данных, позволяющая нарушителю обойти защитный механизм CSP
BDU:2019-04302
Уязвимость компонента API браузера Firefox, позволяющая нарушителю подменить пользовательский интерфейс
BDU:2019-04303
Уязвимость браузера Firefox, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04304
Уязвимость компонента WebBrowserPersist браузера Firefox, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2019-04305
Уязвимость браузера Firefox, вызванная отсутствием предупреждения о смешанном содержимом, когда компонент веб-страницы favicon загружается через HTTP, позволяющая нарушителю проводить спуфинг-атаки
BDU:2019-04569
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2019-04581
Уязвимость браузера Firefox, связанная с ошибками при обработке объектов в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2019-04582
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с ошибками при обработке объектов в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2019-04635
Уязвимость обработчика событий браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04637
Уязвимость объекта canvas браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2019-04638
Уязвимость функций работы с объектами JavaScript браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю получить доступ к конфиденциальной информации и вызвать отказ в обслуживании
BDU:2019-04639
Уязвимость функций соответствия отсеков JavaScript браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04640
Уязвимость безопасности памяти браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании и нарушить целостность данных
BDU:2019-04642
Уязвимость функции формирования открытых ключей p256-ECDH браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00585
Уязвимость функции AssertWorkerThread браузера Firefox, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-00586
Уязвимость браузера Firefox, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-00587
Уязвимость протокола передачи файлов FTP браузера Firefox, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00588
Уязвимость расширения WebRTC браузера Firefox, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2020-00589
Уязвимость протокола передачи файлов FTP браузера Firefox, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2020-00590
Уязвимость протокола передачи файлов FTP браузера Firefox, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00591
Уязвимость библиотеки Prio браузера Firefox, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-00592
Уязвимость спецификации Upgrade-Insecure-Requests браузера Firefox, связанная с ошибкой подтверждения источника данных, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность
BDU:2020-00593
Уязвимость браузера Firefox, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2020-00594
Уязвимость браузера Firefox, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2020-00595
Уязвимость браузера Firefox, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-00596
Уязвимость браузера Firefox, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2020-00597
Уязвимость браузера Firefox, связанная с ошибкой службы сетевой безопасности CertificateVerify, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2020-00598
Уязвимость браузера Firefox, связанная с ошибками в настройках разрешений, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность
BDU:2020-00599
Уязвимость браузера Firefox, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2020-00600
Уязвимость браузера Firefox, связанная с ошибкой кодировки латинского символа kra, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2020-00601
Уязвимость браузера Firefox, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2020-00602
Уязвимость реализации страницы Activity Stream браузера Firefox, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2020-00603
Уязвимость компонента window.globalThis браузера Firefox, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-00604
Уязвимость сетевой библиотеки Necko браузера Firefox, связанная с ошибкой доступа к дочернему элементу при неправильном потоке во время UDP-соединения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-00605
Уязвимость идентификатора ресурсов webcal браузера Firefox, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2020-00606
Уязвимость браузера Firefox, связанная с ошибкой отображения доменного имени в адресной строке, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2020-00607
Уязвимость браузера Firefox, связанная с некорректной установкой приложений при нажатых клавиш на клавиатуре (ALT + a), позволяющая нарушителю оказать воздействие на целостность данных
BDU:2020-00608
Уязвимость браузера Firefox, связанная с ошибками обработки исполняемого контента для приложений с расширением .JNLP, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-00609
Уязвимость браузера Firefox, связанная с ошибкой определения пользовательского курсора, который может находиться над адресной строкой, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2020-00610
Уязвимость компонента WebExtension браузера Firefox, связанная с некорректным ограничением URI, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2020-00723
Уязвимость веб-браузеров Firefox, Firefox ESR и программы для работы с электронной почтой Thunderbird, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным
BDU:2020-00746
Уязвимость контроллера анимации SMIL почтового клиента Thunderbird и браузеров Firefox и Firefox ESR, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность
BDU:2020-00747
Уязвимость компилятора IonMonkey Just-in-Time почтового клиента Thunderbird и браузеров Firefox и Firefox ESR, связанная с неправильным преобразованием типов, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00771
Уязвимость функции createImageBitmap браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с ошибкой подтверждения источника данных, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2020-00782
Уязвимость браузера Firefox, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-00783
Уязвимость модуля VertexBuffer11 браузера Firefox, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-00784
Уязвимость компонента WebExtension браузера Firefox, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2020-01394
Уязвимость компонента IndexedDB веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-01395
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с отсутствием мер по защите структуры веб-страницы, позволяющая нарушителю осуществлять межсайтовые сценарные атаки
BDU:2020-01396
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с включением функциональности из ненадежной управляющей сферы, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2020-01397
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с выходом операции за границы буфера памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-01398
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с ошибкой навигации событий, которые не соответствовали спецификации W3C, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2020-01399
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с использованием памяти после освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-01411
Уязвимость компонента account.firefox.com веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю нарушить целостность данных или вызвать отказ в обслуживании
BDU:2020-01668
Уязвимость компонента Spidermonkey веб-браузеров Firefox, Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-01820
Уязвимость браузера Firefox, связанная с копированием буфера без проверки размера входных данных, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность
BDU:2020-01822
Уязвимость браузера Firefox, связанная с неправильными стандартными правами доступа, позволяющая нарушителю выполнить произвольный код
BDU:2020-01825
Уязвимость браузера Firefox, связанная с неправильной инициализацией данных, позволяющая нарушителю нарушить целостность данных
BDU:2020-01826
Уязвимость браузера Firefox, связанная с неправильным назначением прав доступа для критического ресурса, позволяющая нарушителю получить несанкционированный доступ к информации
BDU:2020-01827
Уязвимость браузера Firefox, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить несанкционированный доступ к информации
BDU:2021-04379
Уязвимость службы Mozilla Maintenance Service браузеров Firefox ESR и Firefox, позволяющая нарушителю повысить свои привилегии
BDU:2022-05798
Уязвимость браузеров Mozilla Firefox и Mozilla Firefox ESR для Windows, связанная с непринятием мер по чистке данных на управляющем уровне, позволяющая нарушителю выполнить произвольные команды
BDU:2022-05799
Уязвимость службы Maintenance Service браузеров Mozilla Firefox и Mozilla Firefox ESR для Windows, позволяющая нарушителю повысить свои привилегии
Modified: 2024-11-21
CVE-2018-12358
Service workers can use redirection to avoid the tainting of cross-origin resources in some instances, allowing a malicious site to read responses which are supposed to be opaque. This vulnerability affects Firefox < 61.
Modified: 2024-11-21
CVE-2018-12359
A buffer overflow can occur when rendering canvas content while adjusting the height and width of the canvas element dynamically, causing data to be written outside of the currently computed boundaries. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
- 104555
- 104555
- 1041193
- 1041193
- RHSA-2018:2112
- RHSA-2018:2112
- RHSA-2018:2113
- RHSA-2018:2113
- RHSA-2018:2251
- RHSA-2018:2251
- RHSA-2018:2252
- RHSA-2018:2252
- https://bugzilla.mozilla.org/show_bug.cgi?id=1459162
- https://bugzilla.mozilla.org/show_bug.cgi?id=1459162
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3705-1
- USN-3705-1
- USN-3714-1
- USN-3714-1
- DSA-4235
- DSA-4235
- DSA-4244
- DSA-4244
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
Modified: 2024-11-21
CVE-2018-12360
A use-after-free vulnerability can occur when deleting an input element during a mutation event handler triggered by focusing that element. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
- 104555
- 104555
- 1041193
- 1041193
- RHSA-2018:2112
- RHSA-2018:2112
- RHSA-2018:2113
- RHSA-2018:2113
- RHSA-2018:2251
- RHSA-2018:2251
- RHSA-2018:2252
- RHSA-2018:2252
- https://bugzilla.mozilla.org/show_bug.cgi?id=1459693
- https://bugzilla.mozilla.org/show_bug.cgi?id=1459693
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3705-1
- USN-3705-1
- USN-3714-1
- USN-3714-1
- DSA-4235
- DSA-4235
- DSA-4244
- DSA-4244
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
Modified: 2024-11-21
CVE-2018-12361
An integer overflow can occur in the SwizzleData code while calculating buffer sizes. The overflowed value is used for subsequent graphics computations when their inputs are not sanitized which results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60, Firefox ESR < 60.1, and Firefox < 61.
- 104558
- 104558
- 1041193
- 1041193
- https://bugzilla.mozilla.org/show_bug.cgi?id=1463244
- https://bugzilla.mozilla.org/show_bug.cgi?id=1463244
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3705-1
- USN-3705-1
- DSA-4295
- DSA-4295
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
Modified: 2024-11-21
CVE-2018-12362
An integer overflow can occur during graphics operations done by the Supplemental Streaming SIMD Extensions 3 (SSSE3) scaler, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
- 104560
- 104560
- 1041193
- 1041193
- RHSA-2018:2112
- RHSA-2018:2112
- RHSA-2018:2113
- RHSA-2018:2113
- RHSA-2018:2251
- RHSA-2018:2251
- RHSA-2018:2252
- RHSA-2018:2252
- https://bugzilla.mozilla.org/show_bug.cgi?id=1452375
- https://bugzilla.mozilla.org/show_bug.cgi?id=1452375
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3705-1
- USN-3705-1
- USN-3714-1
- USN-3714-1
- DSA-4235
- DSA-4235
- DSA-4244
- DSA-4244
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
Modified: 2024-11-21
CVE-2018-12363
A use-after-free vulnerability can occur when script uses mutation events to move DOM nodes between documents, resulting in the old document that held the node being freed but the node still having a pointer referencing it. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
- 104560
- 104560
- 1041193
- 1041193
- RHSA-2018:2112
- RHSA-2018:2112
- RHSA-2018:2113
- RHSA-2018:2113
- RHSA-2018:2251
- RHSA-2018:2251
- RHSA-2018:2252
- RHSA-2018:2252
- https://bugzilla.mozilla.org/show_bug.cgi?id=1464784
- https://bugzilla.mozilla.org/show_bug.cgi?id=1464784
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3705-1
- USN-3705-1
- USN-3714-1
- USN-3714-1
- DSA-4235
- DSA-4235
- DSA-4244
- DSA-4244
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
Modified: 2024-11-21
CVE-2018-12364
NPAPI plugins, such as Adobe Flash, can send non-simple cross-origin requests, bypassing CORS by making a same-origin POST that does a 307 redirect to the target site. This allows for a malicious site to engage in cross-site request forgery (CSRF) attacks. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
- 104560
- 104560
- 1041193
- 1041193
- RHSA-2018:2112
- RHSA-2018:2112
- RHSA-2018:2113
- RHSA-2018:2113
- RHSA-2018:2251
- RHSA-2018:2251
- RHSA-2018:2252
- RHSA-2018:2252
- https://bugzilla.mozilla.org/show_bug.cgi?id=1436241
- https://bugzilla.mozilla.org/show_bug.cgi?id=1436241
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3705-1
- USN-3705-1
- USN-3714-1
- USN-3714-1
- DSA-4235
- DSA-4235
- DSA-4244
- DSA-4244
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
Modified: 2024-11-21
CVE-2018-12365
A compromised IPC child process can escape the content sandbox and list the names of arbitrary files on the file system without user consent or interaction. This could result in exposure of private local files. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
- 104560
- 104560
- 1041193
- 1041193
- RHSA-2018:2112
- RHSA-2018:2112
- RHSA-2018:2113
- RHSA-2018:2113
- RHSA-2018:2251
- RHSA-2018:2251
- RHSA-2018:2252
- RHSA-2018:2252
- https://bugzilla.mozilla.org/show_bug.cgi?id=1459206
- https://bugzilla.mozilla.org/show_bug.cgi?id=1459206
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3705-1
- USN-3705-1
- USN-3714-1
- USN-3714-1
- DSA-4235
- DSA-4235
- DSA-4244
- DSA-4244
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
Modified: 2024-11-21
CVE-2018-12366
An invalid grid size during QCMS (color profile) transformations can result in the out-of-bounds read interpreted as a float value. This could leak private data into the output. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
- 104560
- 104560
- 1041193
- 1041193
- RHSA-2018:2112
- RHSA-2018:2112
- RHSA-2018:2113
- RHSA-2018:2113
- RHSA-2018:2251
- RHSA-2018:2251
- RHSA-2018:2252
- RHSA-2018:2252
- https://bugzilla.mozilla.org/show_bug.cgi?id=1464039
- https://bugzilla.mozilla.org/show_bug.cgi?id=1464039
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3705-1
- USN-3705-1
- USN-3714-1
- USN-3714-1
- DSA-4235
- DSA-4235
- DSA-4244
- DSA-4244
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
Modified: 2024-11-21
CVE-2018-12367
In the previous mitigations for Spectre, the resolution or precision of various methods was reduced to counteract the ability to measure precise time intervals. In that work PerformanceNavigationTiming was not adjusted but it was found that it could be used as a precision timer. This vulnerability affects Thunderbird < 60, Firefox ESR < 60.1, and Firefox < 61.
- 104561
- 104561
- 1041193
- 1041193
- https://bugzilla.mozilla.org/show_bug.cgi?id=1462891
- https://bugzilla.mozilla.org/show_bug.cgi?id=1462891
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3705-1
- USN-3705-1
- DSA-4295
- DSA-4295
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
Modified: 2024-11-21
CVE-2018-12369
WebExtensions bundled with embedded experiments were not correctly checked for proper authorization. This allowed a malicious WebExtension to gain full browser permissions. This vulnerability affects Firefox ESR < 60.1 and Firefox < 61.
- 104561
- 104561
- 1041193
- 1041193
- https://bugzilla.mozilla.org/show_bug.cgi?id=1454909
- https://bugzilla.mozilla.org/show_bug.cgi?id=1454909
- GLSA-201810-01
- GLSA-201810-01
- USN-3705-1
- USN-3705-1
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
Modified: 2024-11-21
CVE-2018-12370
In Reader View SameSite cookie protections are not checked on exiting. This allows for a payload to be triggered when Reader View is exited if loaded by a malicious site while Reader mode is active, bypassing CSRF protections. This vulnerability affects Firefox < 61.
Modified: 2024-11-21
CVE-2018-12371
An integer overflow vulnerability in the Skia library when allocating memory for edge builders on some systems with at least 16 GB of RAM. This results in the use of uninitialized memory, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR < 60.1, Thunderbird < 60, and Firefox < 61.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1465686
- https://bugzilla.mozilla.org/show_bug.cgi?id=1465686
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
Modified: 2024-11-21
CVE-2018-12375
Memory safety bugs present in Firefox 61. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 62.
- 105276
- 105276
- 1041610
- 1041610
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1478849%2C1433502%2C1480965%2C894215%2C1462693%2C1475431%2C1461027
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1478849%2C1433502%2C1480965%2C894215%2C1462693%2C1475431%2C1461027
- USN-3761-1
- USN-3761-1
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-20/
Modified: 2024-11-21
CVE-2018-12376
Memory safety bugs present in Firefox 61 and Firefox ESR 60.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 62, Firefox ESR < 60.2, and Thunderbird < 60.2.1.
- 105280
- 105280
- 1041610
- 1041610
- RHSA-2018:2692
- RHSA-2018:2692
- RHSA-2018:2693
- RHSA-2018:2693
- RHSA-2018:3403
- RHSA-2018:3403
- RHSA-2018:3458
- RHSA-2018:3458
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1469309%2C1469914%2C1450989%2C1480092%2C1480517%2C1481093%2C1478575%2C1471953%2C1473161%2C1466991%2C1468738%2C1483120%2C1467363%2C1472925%2C1466577%2C1467889%2C1480521%2C1478849
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1469309%2C1469914%2C1450989%2C1480092%2C1480517%2C1481093%2C1478575%2C1471953%2C1473161%2C1466991%2C1468738%2C1483120%2C1467363%2C1472925%2C1466577%2C1467889%2C1480521%2C1478849
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3761-1
- USN-3761-1
- USN-3793-1
- USN-3793-1
- DSA-4287
- DSA-4287
- DSA-4327
- DSA-4327
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-21/
- https://www.mozilla.org/security/advisories/mfsa2018-21/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
Modified: 2024-11-21
CVE-2018-12377
A use-after-free vulnerability can occur when refresh driver timers are refreshed in some circumstances during shutdown when the timer is deleted while still in use. This results in a potentially exploitable crash. This vulnerability affects Firefox < 62, Firefox ESR < 60.2, and Thunderbird < 60.2.1.
- 105280
- 105280
- 1041610
- 1041610
- RHSA-2018:2692
- RHSA-2018:2692
- RHSA-2018:2693
- RHSA-2018:2693
- RHSA-2018:3403
- RHSA-2018:3403
- RHSA-2018:3458
- RHSA-2018:3458
- https://bugzilla.mozilla.org/show_bug.cgi?id=1470260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1470260
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3761-1
- USN-3761-1
- USN-3793-1
- USN-3793-1
- DSA-4287
- DSA-4287
- DSA-4327
- DSA-4327
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-21/
- https://www.mozilla.org/security/advisories/mfsa2018-21/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
Modified: 2024-11-21
CVE-2018-12378
A use-after-free vulnerability can occur when an IndexedDB index is deleted while still in use by JavaScript code that is providing payload values to be stored. This results in a potentially exploitable crash. This vulnerability affects Firefox < 62, Firefox ESR < 60.2, and Thunderbird < 60.2.1.
- 105280
- 105280
- 1041610
- 1041610
- RHSA-2018:2692
- RHSA-2018:2692
- RHSA-2018:2693
- RHSA-2018:2693
- RHSA-2018:3403
- RHSA-2018:3403
- RHSA-2018:3458
- RHSA-2018:3458
- https://bugzilla.mozilla.org/show_bug.cgi?id=1459383
- https://bugzilla.mozilla.org/show_bug.cgi?id=1459383
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3761-1
- USN-3761-1
- USN-3793-1
- USN-3793-1
- DSA-4287
- DSA-4287
- DSA-4327
- DSA-4327
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-21/
- https://www.mozilla.org/security/advisories/mfsa2018-21/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
Modified: 2024-11-21
CVE-2018-12379
When the Mozilla Updater opens a MAR format file which contains a very long item filename, an out-of-bounds write can be triggered, leading to a potentially exploitable crash. This requires running the Mozilla Updater manually on the local system with the malicious MAR file in order to occur. This vulnerability affects Firefox < 62, Firefox ESR < 60.2, and Thunderbird < 60.2.1.
- 105280
- 105280
- 1041610
- 1041610
- RHSA-2018:2692
- RHSA-2018:2692
- RHSA-2018:2693
- RHSA-2018:2693
- RHSA-2018:3403
- RHSA-2018:3403
- RHSA-2018:3458
- RHSA-2018:3458
- https://bugzilla.mozilla.org/show_bug.cgi?id=1473113
- https://bugzilla.mozilla.org/show_bug.cgi?id=1473113
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- DSA-4327
- DSA-4327
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-21/
- https://www.mozilla.org/security/advisories/mfsa2018-21/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
Modified: 2024-11-21
CVE-2018-12383
If a user saved passwords before Firefox 58 and then later set a master password, an unencrypted copy of these passwords is still accessible. This is because the older stored password file was not deleted when the data was copied to a new format starting in Firefox 58. The new master password is added only on the new file. This could allow the exposure of stored password data outside of user expectations. This vulnerability affects Firefox < 62, Firefox ESR < 60.2.1, and Thunderbird < 60.2.1.
- 105276
- 105276
- 1041610
- 1041610
- 1041701
- 1041701
- RHSA-2018:2834
- RHSA-2018:2834
- RHSA-2018:2835
- RHSA-2018:2835
- RHSA-2018:3403
- RHSA-2018:3403
- RHSA-2018:3458
- RHSA-2018:3458
- https://bugzilla.mozilla.org/show_bug.cgi?id=1475775
- https://bugzilla.mozilla.org/show_bug.cgi?id=1475775
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3761-1
- USN-3761-1
- USN-3793-1
- USN-3793-1
- DSA-4304
- DSA-4304
- DSA-4327
- DSA-4327
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-23/
- https://www.mozilla.org/security/advisories/mfsa2018-23/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
Modified: 2024-11-21
CVE-2018-12385
A potentially exploitable crash in TransportSecurityInfo used for SSL can be triggered by data stored in the local cache in the user profile directory. This issue is only exploitable in combination with another vulnerability allowing an attacker to write data into the local cache or from locally installed malware. This issue also triggers a non-exploitable startup crash for users switching between the Nightly and Release versions of Firefox if the same profile is used. This vulnerability affects Thunderbird < 60.2.1, Firefox ESR < 60.2.1, and Firefox < 62.0.2.
- 105380
- 105380
- 1041700
- 1041700
- 1041701
- 1041701
- RHSA-2018:2834
- RHSA-2018:2834
- RHSA-2018:2835
- RHSA-2018:2835
- RHSA-2018:3403
- RHSA-2018:3403
- RHSA-2018:3458
- RHSA-2018:3458
- https://bugzilla.mozilla.org/show_bug.cgi?id=1490585
- https://bugzilla.mozilla.org/show_bug.cgi?id=1490585
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3778-1
- USN-3778-1
- USN-3793-1
- USN-3793-1
- DSA-4304
- DSA-4304
- DSA-4327
- DSA-4327
- https://www.mozilla.org/security/advisories/mfsa2018-22/
- https://www.mozilla.org/security/advisories/mfsa2018-22/
- https://www.mozilla.org/security/advisories/mfsa2018-23/
- https://www.mozilla.org/security/advisories/mfsa2018-23/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
Modified: 2024-11-21
CVE-2018-12386
A vulnerability in register allocation in JavaScript can lead to type confusion, allowing for an arbitrary read and write. This leads to remote code execution inside the sandboxed content process when triggered. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.
- 105460
- 105460
- 1041770
- 1041770
- RHSA-2018:2881
- RHSA-2018:2881
- RHSA-2018:2884
- RHSA-2018:2884
- https://bugzilla.mozilla.org/show_bug.cgi?id=1493900
- https://bugzilla.mozilla.org/show_bug.cgi?id=1493900
- GLSA-201810-01
- GLSA-201810-01
- USN-3778-1
- USN-3778-1
- DSA-4310
- DSA-4310
- https://www.mozilla.org/security/advisories/mfsa2018-24/
- https://www.mozilla.org/security/advisories/mfsa2018-24/
Modified: 2024-11-21
CVE-2018-12387
A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.
- 105460
- 105460
- 1041770
- 1041770
- RHSA-2018:2881
- RHSA-2018:2881
- RHSA-2018:2884
- RHSA-2018:2884
- https://bugzilla.mozilla.org/show_bug.cgi?id=1493903
- https://bugzilla.mozilla.org/show_bug.cgi?id=1493903
- GLSA-201810-01
- GLSA-201810-01
- USN-3778-1
- USN-3778-1
- DSA-4310
- DSA-4310
- https://www.mozilla.org/security/advisories/mfsa2018-24/
- https://www.mozilla.org/security/advisories/mfsa2018-24/
Modified: 2024-11-21
CVE-2018-12388
Mozilla developers and community members reported memory safety bugs present in Firefox 62. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 63.
- 105721
- 105721
- 1041944
- 1041944
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1472639%2C1485698%2C1301547%2C1471427%2C1379411%2C1482122%2C1486314%2C1487167
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1472639%2C1485698%2C1301547%2C1471427%2C1379411%2C1482122%2C1486314%2C1487167
- USN-3801-1
- USN-3801-1
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-26/
Modified: 2024-11-21
CVE-2018-12390
Mozilla developers and community members reported memory safety bugs present in Firefox 62 and Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 63, Firefox ESR < 60.3, and Thunderbird < 60.3.
- 105718
- 105718
- 105769
- 105769
- 1041944
- 1041944
- RHSA-2018:3005
- RHSA-2018:3005
- RHSA-2018:3006
- RHSA-2018:3006
- RHSA-2018:3531
- RHSA-2018:3531
- RHSA-2018:3532
- RHSA-2018:3532
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1487098%2C1487660%2C1490234%2C1496159%2C1443748%2C1496340%2C1483905%2C1493347%2C1488803%2C1498701%2C1498482%2C1442010%2C1495245%2C1483699%2C1469486%2C1484905%2C1490561%2C1492524%2C1481844
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1487098%2C1487660%2C1490234%2C1496159%2C1443748%2C1496340%2C1483905%2C1493347%2C1488803%2C1498701%2C1498482%2C1442010%2C1495245%2C1483699%2C1469486%2C1484905%2C1490561%2C1492524%2C1481844
- [debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update
- [debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201811-04
- GLSA-201811-04
- GLSA-201811-13
- GLSA-201811-13
- USN-3801-1
- USN-3801-1
- USN-3868-1
- USN-3868-1
- DSA-4324
- DSA-4324
- DSA-4337
- DSA-4337
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-28/
- https://www.mozilla.org/security/advisories/mfsa2018-28/
Modified: 2024-11-21
CVE-2018-12392
When manipulating user events in nested loops while opening a document through script, it is possible to trigger a potentially exploitable crash due to poor event handling. This vulnerability affects Firefox < 63, Firefox ESR < 60.3, and Thunderbird < 60.3.
- 105718
- 105718
- 105769
- 105769
- 1041944
- 1041944
- RHSA-2018:3005
- RHSA-2018:3005
- RHSA-2018:3006
- RHSA-2018:3006
- RHSA-2018:3531
- RHSA-2018:3531
- RHSA-2018:3532
- RHSA-2018:3532
- https://bugzilla.mozilla.org/show_bug.cgi?id=1492823
- https://bugzilla.mozilla.org/show_bug.cgi?id=1492823
- [debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update
- [debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201811-04
- GLSA-201811-04
- GLSA-201811-13
- GLSA-201811-13
- USN-3801-1
- USN-3801-1
- USN-3868-1
- USN-3868-1
- DSA-4324
- DSA-4324
- DSA-4337
- DSA-4337
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-28/
- https://www.mozilla.org/security/advisories/mfsa2018-28/
Modified: 2024-11-21
CVE-2018-12393
A potential vulnerability was found in 32-bit builds where an integer overflow during the conversion of scripts to an internal UTF-16 representation could result in allocating a buffer too small for the conversion. This leads to a possible out-of-bounds write. *Note: 64-bit builds are not vulnerable to this issue.*. This vulnerability affects Firefox < 63, Firefox ESR < 60.3, and Thunderbird < 60.3.
- 105718
- 105718
- 105769
- 105769
- 1041944
- 1041944
- RHSA-2018:3005
- RHSA-2018:3005
- RHSA-2018:3006
- RHSA-2018:3006
- RHSA-2018:3531
- RHSA-2018:3531
- RHSA-2018:3532
- RHSA-2018:3532
- https://bugzilla.mozilla.org/show_bug.cgi?id=1495011
- https://bugzilla.mozilla.org/show_bug.cgi?id=1495011
- [debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update
- [debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201811-04
- GLSA-201811-04
- GLSA-201811-13
- GLSA-201811-13
- USN-3801-1
- USN-3801-1
- USN-3868-1
- USN-3868-1
- DSA-4324
- DSA-4324
- DSA-4337
- DSA-4337
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-28/
- https://www.mozilla.org/security/advisories/mfsa2018-28/
Modified: 2024-11-21
CVE-2018-12395
By rewriting the Host: request headers using the webRequest API, a WebExtension can bypass domain restrictions through domain fronting. This would allow access to domains that share a host that are otherwise restricted. This vulnerability affects Firefox ESR < 60.3 and Firefox < 63.
- 105718
- 105718
- 1041944
- 1041944
- RHSA-2018:3005
- RHSA-2018:3005
- RHSA-2018:3006
- RHSA-2018:3006
- https://bugzilla.mozilla.org/show_bug.cgi?id=1467523
- https://bugzilla.mozilla.org/show_bug.cgi?id=1467523
- [debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update
- [debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update
- GLSA-201811-04
- GLSA-201811-04
- USN-3801-1
- USN-3801-1
- DSA-4324
- DSA-4324
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
Modified: 2024-11-21
CVE-2018-12396
A vulnerability where a WebExtension can run content scripts in disallowed contexts following navigation or other events. This allows for potential privilege escalation by the WebExtension on sites where content scripts should not be run. This vulnerability affects Firefox ESR < 60.3 and Firefox < 63.
- 105718
- 105718
- 1041944
- 1041944
- RHSA-2018:3005
- RHSA-2018:3005
- RHSA-2018:3006
- RHSA-2018:3006
- https://bugzilla.mozilla.org/show_bug.cgi?id=1483602
- https://bugzilla.mozilla.org/show_bug.cgi?id=1483602
- [debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update
- [debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update
- GLSA-201811-04
- GLSA-201811-04
- USN-3801-1
- USN-3801-1
- DSA-4324
- DSA-4324
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
Modified: 2024-11-21
CVE-2018-12397
A WebExtension can request access to local files without the warning prompt stating that the extension will "Access your data for all websites" being displayed to the user. This allows extensions to run content scripts in local pages without permission warnings when a local file is opened. This vulnerability affects Firefox ESR < 60.3 and Firefox < 63.
- 105718
- 105718
- 1041944
- 1041944
- RHSA-2018:3005
- RHSA-2018:3005
- RHSA-2018:3006
- RHSA-2018:3006
- https://bugzilla.mozilla.org/show_bug.cgi?id=1487478
- https://bugzilla.mozilla.org/show_bug.cgi?id=1487478
- [debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update
- [debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update
- GLSA-201811-04
- GLSA-201811-04
- USN-3801-1
- USN-3801-1
- DSA-4324
- DSA-4324
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
Modified: 2024-11-21
CVE-2018-12398
By using the reflected URL in some special resource URIs, such as chrome:, it is possible to inject stylesheets and bypass Content Security Policy (CSP). This vulnerability affects Firefox < 63.
- 105721
- 105721
- 1041944
- 1041944
- https://bugzilla.mozilla.org/show_bug.cgi?id=1460538
- https://bugzilla.mozilla.org/show_bug.cgi?id=1460538
- https://bugzilla.mozilla.org/show_bug.cgi?id=1488061
- https://bugzilla.mozilla.org/show_bug.cgi?id=1488061
- USN-3801-1
- USN-3801-1
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-26/
Modified: 2024-11-21
CVE-2018-12399
When a new protocol handler is registered, the API accepts a title argument which can be used to mislead users about which domain is registering the new protocol. This may result in the user approving a protocol handler that they otherwise would not have. This vulnerability affects Firefox < 63.
Modified: 2024-11-21
CVE-2018-12401
Some special resource URIs will cause a non-exploitable crash if loaded with optional parameters following a '?' in the parsed string. This could lead to denial of service (DOS) attacks. This vulnerability affects Firefox < 63.
Modified: 2024-11-21
CVE-2018-12402
The internal WebBrowserPersist code does not use correct origin context for a resource being saved. This manifests when sub-resources are loaded as part of "Save Page As..." functionality. For example, a malicious page could recover a visitor's Windows username and NTLM hash by including resources otherwise unreachable to the malicious page, if they can convince the visitor to save the complete web page. Similarly, SameSite cookies are sent on cross-origin requests when the "Save Page As..." menu item is selected to save a page, which can result in saving the wrong version of resources based on those cookies. This vulnerability affects Firefox < 63.
- 105721
- 105721
- 1041944
- 1041944
- https://bugzilla.mozilla.org/show_bug.cgi?id=1447087
- https://bugzilla.mozilla.org/show_bug.cgi?id=1447087
- https://bugzilla.mozilla.org/show_bug.cgi?id=1469916
- https://bugzilla.mozilla.org/show_bug.cgi?id=1469916
- USN-3801-1
- USN-3801-1
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-26/
Modified: 2024-11-21
CVE-2018-12403
If a site is loaded over a HTTPS connection but loads a favicon resource over HTTP, the mixed content warning is not displayed to users. This vulnerability affects Firefox < 63.
Modified: 2024-11-21
CVE-2018-12405
Mozilla developers and community members reported memory safety bugs present in Firefox 63 and Firefox ESR 60.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 64.
- 106168
- 106168
- RHSA-2018:3831
- RHSA-2018:3831
- RHSA-2018:3833
- RHSA-2018:3833
- RHSA-2019:0159
- RHSA-2019:0159
- RHSA-2019:0160
- RHSA-2019:0160
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1494752%2C1498765%2C1503326%2C1505181%2C1500759%2C1504365%2C1506640%2C1503082%2C1502013%2C1510471
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1494752%2C1498765%2C1503326%2C1505181%2C1500759%2C1504365%2C1506640%2C1503082%2C1502013%2C1510471
- [debian-lts-announce] 20181213 [SECURITY] [DLA 1605-1] firefox-esr security update
- [debian-lts-announce] 20181213 [SECURITY] [DLA 1605-1] firefox-esr security update
- GLSA-201903-04
- GLSA-201903-04
- USN-3844-1
- USN-3844-1
- USN-3868-1
- USN-3868-1
- DSA-4354
- DSA-4354
- DSA-4362
- DSA-4362
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://www.mozilla.org/security/advisories/mfsa2018-30/
- https://www.mozilla.org/security/advisories/mfsa2018-30/
- https://www.mozilla.org/security/advisories/mfsa2018-31/
- https://www.mozilla.org/security/advisories/mfsa2018-31/
Modified: 2024-11-21
CVE-2018-12406
Mozilla developers and community members reported memory safety bugs present in Firefox 63. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 64.
- 106167
- 106167
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1456947%2C1475669%2C1504816%2C1502886%2C1500064%2C1500310%2C1500696%2C1499198%2C1434490%2C1481745%2C1458129
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1456947%2C1475669%2C1504816%2C1502886%2C1500064%2C1500310%2C1500696%2C1499198%2C1434490%2C1481745%2C1458129
- USN-3844-1
- USN-3844-1
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://www.mozilla.org/security/advisories/mfsa2018-29/
Modified: 2024-11-21
CVE-2018-12407
A buffer overflow occurs when drawing and validating elements with the ANGLE graphics library, used for WebGL content, when working with the VertexBuffer11 module. This results in a potentially exploitable crash. This vulnerability affects Firefox < 64.
Modified: 2024-11-21
CVE-2018-18492
A use-after-free vulnerability can occur after deleting a selection element due to a weak reference to the select element in the options collection. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 64.
- 106168
- 106168
- RHSA-2018:3831
- RHSA-2018:3831
- RHSA-2018:3833
- RHSA-2018:3833
- RHSA-2019:0159
- RHSA-2019:0159
- RHSA-2019:0160
- RHSA-2019:0160
- https://bugzilla.mozilla.org/show_bug.cgi?id=1499861
- https://bugzilla.mozilla.org/show_bug.cgi?id=1499861
- [debian-lts-announce] 20181213 [SECURITY] [DLA 1605-1] firefox-esr security update
- [debian-lts-announce] 20181213 [SECURITY] [DLA 1605-1] firefox-esr security update
- GLSA-201903-04
- GLSA-201903-04
- USN-3844-1
- USN-3844-1
- USN-3868-1
- USN-3868-1
- DSA-4354
- DSA-4354
- DSA-4362
- DSA-4362
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://www.mozilla.org/security/advisories/mfsa2018-30/
- https://www.mozilla.org/security/advisories/mfsa2018-30/
- https://www.mozilla.org/security/advisories/mfsa2018-31/
- https://www.mozilla.org/security/advisories/mfsa2018-31/
Modified: 2024-11-21
CVE-2018-18493
A buffer overflow can occur in the Skia library during buffer offset calculations with hardware accelerated canvas 2D actions due to the use of 32-bit calculations instead of 64-bit. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 64.
- 106168
- 106168
- RHSA-2018:3831
- RHSA-2018:3831
- RHSA-2018:3833
- RHSA-2018:3833
- RHSA-2019:0159
- RHSA-2019:0159
- RHSA-2019:0160
- RHSA-2019:0160
- https://bugzilla.mozilla.org/show_bug.cgi?id=1504452
- https://bugzilla.mozilla.org/show_bug.cgi?id=1504452
- [debian-lts-announce] 20181213 [SECURITY] [DLA 1605-1] firefox-esr security update
- [debian-lts-announce] 20181213 [SECURITY] [DLA 1605-1] firefox-esr security update
- GLSA-201903-04
- GLSA-201903-04
- USN-3844-1
- USN-3844-1
- USN-3868-1
- USN-3868-1
- DSA-4354
- DSA-4354
- DSA-4362
- DSA-4362
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://www.mozilla.org/security/advisories/mfsa2018-30/
- https://www.mozilla.org/security/advisories/mfsa2018-30/
- https://www.mozilla.org/security/advisories/mfsa2018-31/
- https://www.mozilla.org/security/advisories/mfsa2018-31/
Modified: 2024-11-21
CVE-2018-18494
A same-origin policy violation allowing the theft of cross-origin URL entries when using the Javascript location property to cause a redirection to another site using performance.getEntries(). This is a same-origin policy violation and could allow for data theft. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 64.
- 106168
- 106168
- RHSA-2018:3831
- RHSA-2018:3831
- RHSA-2018:3833
- RHSA-2018:3833
- RHSA-2019:0159
- RHSA-2019:0159
- RHSA-2019:0160
- RHSA-2019:0160
- https://bugzilla.mozilla.org/show_bug.cgi?id=1487964
- https://bugzilla.mozilla.org/show_bug.cgi?id=1487964
- [debian-lts-announce] 20181213 [SECURITY] [DLA 1605-1] firefox-esr security update
- [debian-lts-announce] 20181213 [SECURITY] [DLA 1605-1] firefox-esr security update
- GLSA-201903-04
- GLSA-201903-04
- USN-3844-1
- USN-3844-1
- USN-3868-1
- USN-3868-1
- DSA-4354
- DSA-4354
- DSA-4362
- DSA-4362
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://www.mozilla.org/security/advisories/mfsa2018-30/
- https://www.mozilla.org/security/advisories/mfsa2018-30/
- https://www.mozilla.org/security/advisories/mfsa2018-31/
- https://www.mozilla.org/security/advisories/mfsa2018-31/
Modified: 2024-11-21
CVE-2018-18495
WebExtension content scripts can be loaded into about: pages in some circumstances, in violation of the permissions granted to extensions. This could allow an extension to interfere with the loading and usage of these pages and use capabilities that were intended to be restricted from extensions. This vulnerability affects Firefox < 64.
Modified: 2024-11-21
CVE-2018-18497
Limitations on the URIs allowed to WebExtensions by the browser.windows.create API can be bypassed when a pipe in the URL field is used within the extension to load multiple pages as a single argument. This could allow a malicious WebExtension to open privileged about: or file: locations. This vulnerability affects Firefox < 64.
Modified: 2024-11-21
CVE-2018-18498
A potential vulnerability leading to an integer overflow can occur during buffer size calculations for images when a raw value is used instead of the checked value. This leads to a possible out-of-bounds write. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 64.
- 106168
- 106168
- RHSA-2018:3831
- RHSA-2018:3831
- RHSA-2018:3833
- RHSA-2018:3833
- RHSA-2019:0159
- RHSA-2019:0159
- RHSA-2019:0160
- RHSA-2019:0160
- https://bugzilla.mozilla.org/show_bug.cgi?id=1500011
- https://bugzilla.mozilla.org/show_bug.cgi?id=1500011
- [debian-lts-announce] 20181213 [SECURITY] [DLA 1605-1] firefox-esr security update
- [debian-lts-announce] 20181213 [SECURITY] [DLA 1605-1] firefox-esr security update
- GLSA-201903-04
- GLSA-201903-04
- USN-3844-1
- USN-3844-1
- USN-3868-1
- USN-3868-1
- DSA-4354
- DSA-4354
- DSA-4362
- DSA-4362
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://www.mozilla.org/security/advisories/mfsa2018-30/
- https://www.mozilla.org/security/advisories/mfsa2018-30/
- https://www.mozilla.org/security/advisories/mfsa2018-31/
- https://www.mozilla.org/security/advisories/mfsa2018-31/
Modified: 2024-11-21
CVE-2018-18499
A same-origin policy violation allowing the theft of cross-origin URL entries when using a meta http-equiv="refresh" on a page to cause a redirection to another site using performance.getEntries(). This is a same-origin policy violation and could allow for data theft. This vulnerability affects Firefox < 62, Firefox ESR < 60.2, and Thunderbird < 60.2.1.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1468523
- https://bugzilla.mozilla.org/show_bug.cgi?id=1468523
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-21/
- https://www.mozilla.org/security/advisories/mfsa2018-21/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
Modified: 2024-11-21
CVE-2018-18500
A use-after-free vulnerability can occur while parsing an HTML5 stream in concert with custom HTML elements. This results in the stream parser object being freed while still in use, leading to a potentially exploitable crash. This vulnerability affects Thunderbird < 60.5, Firefox ESR < 60.5, and Firefox < 65.
- openSUSE-SU-2019:1758
- openSUSE-SU-2019:1758
- 106781
- 106781
- RHSA-2019:0218
- RHSA-2019:0218
- RHSA-2019:0219
- RHSA-2019:0219
- RHSA-2019:0269
- RHSA-2019:0269
- RHSA-2019:0270
- RHSA-2019:0270
- [debian-lts-announce] 20190130 [SECURITY] [DLA 1648-1] firefox-esr security update
- [debian-lts-announce] 20190130 [SECURITY] [DLA 1648-1] firefox-esr security update
- [debian-lts-announce] 20190216 [SECURITY] [DLA 1678-1] thunderbird security update
- [debian-lts-announce] 20190216 [SECURITY] [DLA 1678-1] thunderbird security update
- GLSA-201903-04
- GLSA-201903-04
- GLSA-201904-07
- GLSA-201904-07
- USN-3874-1
- USN-3874-1
- USN-3897-1
- USN-3897-1
- DSA-4376
- DSA-4376
- DSA-4392
- DSA-4392
- https://www.mozilla.org/security/advisories/mfsa2019-01/
- https://www.mozilla.org/security/advisories/mfsa2019-01/
- https://www.mozilla.org/security/advisories/mfsa2019-02/
- https://www.mozilla.org/security/advisories/mfsa2019-02/
- https://www.mozilla.org/security/advisories/mfsa2019-03/
- https://www.mozilla.org/security/advisories/mfsa2019-03/
Modified: 2024-11-21
CVE-2018-18501
Mozilla developers and community members reported memory safety bugs present in Firefox 64 and Firefox ESR 60.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 60.5, Firefox ESR < 60.5, and Firefox < 65.
- openSUSE-SU-2019:1758
- openSUSE-SU-2019:1758
- 106781
- 106781
- RHSA-2019:0218
- RHSA-2019:0218
- RHSA-2019:0219
- RHSA-2019:0219
- RHSA-2019:0269
- RHSA-2019:0269
- RHSA-2019:0270
- RHSA-2019:0270
- [debian-lts-announce] 20190130 [SECURITY] [DLA 1648-1] firefox-esr security update
- [debian-lts-announce] 20190130 [SECURITY] [DLA 1648-1] firefox-esr security update
- [debian-lts-announce] 20190216 [SECURITY] [DLA 1678-1] thunderbird security update
- [debian-lts-announce] 20190216 [SECURITY] [DLA 1678-1] thunderbird security update
- GLSA-201903-04
- GLSA-201903-04
- GLSA-201904-07
- GLSA-201904-07
- USN-3874-1
- USN-3874-1
- USN-3897-1
- USN-3897-1
- DSA-4376
- DSA-4376
- DSA-4392
- DSA-4392
- https://www.mozilla.org/security/advisories/mfsa2019-01/
- https://www.mozilla.org/security/advisories/mfsa2019-01/
- https://www.mozilla.org/security/advisories/mfsa2019-02/
- https://www.mozilla.org/security/advisories/mfsa2019-02/
- https://www.mozilla.org/security/advisories/mfsa2019-03/
- https://www.mozilla.org/security/advisories/mfsa2019-03/
Modified: 2024-11-21
CVE-2018-18502
Mozilla developers and community members reported memory safety bugs present in Firefox 64. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 65.
Modified: 2024-11-21
CVE-2018-18503
When JavaScript is used to create and manipulate an audio buffer, a potentially exploitable crash may occur because of a compartment mismatch in some situations. This vulnerability affects Firefox < 65.
Modified: 2024-11-21
CVE-2018-18504
A crash and out-of-bounds read can occur when the buffer of a texture client is freed while it is still in use during graphic operations. This results is a potentially exploitable crash and the possibility of reading from the memory of the freed buffers. This vulnerability affects Firefox < 65.
Modified: 2024-11-21
CVE-2018-18505
An earlier fix for an Inter-process Communication (IPC) vulnerability, CVE-2011-3079, added authentication to communication between IPC endpoints and server parents during IPC process creation. This authentication is insufficient for channels created after the IPC process is started, leading to the authentication not being correctly applied to later channels. This could allow for a sandbox escape through IPC channels due to lack of message validation in the listener process. This vulnerability affects Thunderbird < 60.5, Firefox ESR < 60.5, and Firefox < 65.
- openSUSE-SU-2019:1758
- openSUSE-SU-2019:1758
- 106781
- 106781
- RHSA-2019:0218
- RHSA-2019:0218
- RHSA-2019:0219
- RHSA-2019:0219
- RHSA-2019:0269
- RHSA-2019:0269
- RHSA-2019:0270
- RHSA-2019:0270
- https://bugzilla.mozilla.org/show_bug.cgi?id=1087565
- https://bugzilla.mozilla.org/show_bug.cgi?id=1087565
- [debian-lts-announce] 20190130 [SECURITY] [DLA 1648-1] firefox-esr security update
- [debian-lts-announce] 20190130 [SECURITY] [DLA 1648-1] firefox-esr security update
- [debian-lts-announce] 20190216 [SECURITY] [DLA 1678-1] thunderbird security update
- [debian-lts-announce] 20190216 [SECURITY] [DLA 1678-1] thunderbird security update
- GLSA-201903-04
- GLSA-201903-04
- GLSA-201904-07
- GLSA-201904-07
- USN-3874-1
- USN-3874-1
- USN-3897-1
- USN-3897-1
- DSA-4376
- DSA-4376
- DSA-4392
- DSA-4392
- https://www.mozilla.org/security/advisories/mfsa2019-01/
- https://www.mozilla.org/security/advisories/mfsa2019-01/
- https://www.mozilla.org/security/advisories/mfsa2019-02/
- https://www.mozilla.org/security/advisories/mfsa2019-02/
- https://www.mozilla.org/security/advisories/mfsa2019-03/
- https://www.mozilla.org/security/advisories/mfsa2019-03/
Modified: 2024-11-21
CVE-2018-18506
When proxy auto-detection is enabled, if a web server serves a Proxy Auto-Configuration (PAC) file or if a PAC file is loaded locally, this PAC file can specify that requests to the localhost are to be sent through the proxy to another server. This behavior is disallowed by default when a proxy is manually configured, but when enabled could allow for attacks on services and tools that bind to the localhost for networked behavior if they are accessed through browsing. This vulnerability affects Firefox < 65.
- openSUSE-SU-2019:1056
- openSUSE-SU-2019:1056
- openSUSE-SU-2019:1077
- openSUSE-SU-2019:1077
- openSUSE-SU-2019:1126
- openSUSE-SU-2019:1126
- openSUSE-SU-2019:1162
- openSUSE-SU-2019:1162
- 106773
- 106773
- RHSA-2019:0622
- RHSA-2019:0622
- RHSA-2019:0623
- RHSA-2019:0623
- RHSA-2019:0680
- RHSA-2019:0680
- RHSA-2019:0681
- RHSA-2019:0681
- RHSA-2019:0966
- RHSA-2019:0966
- RHSA-2019:1144
- RHSA-2019:1144
- [debian-lts-announce] 20190321 [SECURITY] [DLA 1722-1] firefox-esr security update
- [debian-lts-announce] 20190321 [SECURITY] [DLA 1722-1] firefox-esr security update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1743-1] thunderbird security update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1743-1] thunderbird security update
- 20190401 [SECURITY] [DSA 4420-1] thunderbird security update
- 20190401 [SECURITY] [DSA 4420-1] thunderbird security update
- 20190320 [SECURITY] [DSA 4411-1] firefox-esr security update
- 20190320 [SECURITY] [DSA 4411-1] firefox-esr security update
- GLSA-201904-07
- GLSA-201904-07
- USN-3874-1
- USN-3874-1
- USN-3927-1
- USN-3927-1
- DSA-4411
- DSA-4411
- DSA-4420
- DSA-4420
- https://www.mozilla.org/security/advisories/mfsa2019-01/
- https://www.mozilla.org/security/advisories/mfsa2019-01/
Modified: 2024-11-21
CVE-2018-18510
The about:crashcontent and about:crashparent pages can be triggered by web content. These pages are used to crash the loaded page or the browser for test purposes. This issue allows for a non-persistent denial of service (DOS) attack by a malicious site which links to these pages. This vulnerability affects Firefox < 64.
Modified: 2024-11-21
CVE-2018-5156
A vulnerability can occur when capturing a media stream when the media source type is changed as the capture is occurring. This can result in stream data being cast to the wrong type causing a potentially exploitable crash. This vulnerability affects Thunderbird < 60, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
- 104560
- 104560
- 1041193
- 1041193
- RHSA-2018:2112
- RHSA-2018:2112
- RHSA-2018:2113
- RHSA-2018:2113
- https://bugzilla.mozilla.org/show_bug.cgi?id=1453127
- https://bugzilla.mozilla.org/show_bug.cgi?id=1453127
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3705-1
- USN-3705-1
- DSA-4235
- DSA-4235
- DSA-4295
- DSA-4295
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
Modified: 2024-11-21
CVE-2018-5186
Memory safety bugs present in Firefox 60. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 61.
- 104557
- 104557
- 1041193
- 1041193
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1464872%2C1463329%2C1419373%2C1412882%2C1413033%2C1444673%2C1454448%2C1453505%2C1438671
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1464872%2C1463329%2C1419373%2C1412882%2C1413033%2C1444673%2C1454448%2C1453505%2C1438671
- GLSA-201810-01
- GLSA-201810-01
- USN-3705-1
- USN-3705-1
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
Modified: 2024-11-21
CVE-2018-5187
Memory safety bugs present in Firefox 60 and Firefox ESR 60. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 60, Firefox ESR < 60.1, and Firefox < 61.
- 104556
- 104556
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1461324%2C1414829%2C1395246%2C1467938%2C1461619%2C1425930%2C1438556%2C1454285%2C1459568%2C1463884
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1461324%2C1414829%2C1395246%2C1467938%2C1461619%2C1425930%2C1438556%2C1454285%2C1459568%2C1463884
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3705-1
- USN-3705-1
- DSA-4295
- DSA-4295
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
Modified: 2024-11-21
CVE-2018-5188
Memory safety bugs present in Firefox 60, Firefox ESR 60, and Firefox ESR 52.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
- 104555
- 104555
- RHSA-2018:2112
- RHSA-2018:2112
- RHSA-2018:2113
- RHSA-2018:2113
- RHSA-2018:2251
- RHSA-2018:2251
- RHSA-2018:2252
- RHSA-2018:2252
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1456189%2C1456975%2C1465898%2C1392739%2C1451297%2C1464063%2C1437842%2C1442722%2C1452576%2C1450688%2C1458264%2C1458270%2C1465108%2C1464829%2C1464079%2C1463494%2C1458048
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1456189%2C1456975%2C1465898%2C1392739%2C1451297%2C1464063%2C1437842%2C1442722%2C1452576%2C1450688%2C1458264%2C1458270%2C1465108%2C1464829%2C1464079%2C1463494%2C1458048
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3705-1
- USN-3705-1
- USN-3714-1
- USN-3714-1
- USN-3749-1
- USN-3749-1
- DSA-4244
- DSA-4244
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
Modified: 2024-11-21
CVE-2019-11691
A use-after-free vulnerability can occur when working with XMLHttpRequest (XHR) in an event loop, causing the XHR main thread to be called after it has been freed. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1542465
- https://bugzilla.mozilla.org/show_bug.cgi?id=1542465
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
Modified: 2024-11-21
CVE-2019-11692
A use-after-free vulnerability can occur when listeners are removed from the event listener manager while still in use, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1544670
- https://bugzilla.mozilla.org/show_bug.cgi?id=1544670
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
Modified: 2024-11-21
CVE-2019-11695
A custom cursor defined by scripting on a site can position itself over the addressbar to spoof the actual cursor when it should not be allowed outside of the primary web content area. This could be used by a malicious site to trick users into clicking on permission prompts, doorhanger notifications, or other buttons inadvertently if the location is spoofed over the user interface. This vulnerability affects Firefox < 67.
Modified: 2024-11-21
CVE-2019-11696
Files with the .JNLP extension used for "Java web start" applications are not treated as executable content for download prompts even though they can be executed if Java is installed on the local system. This could allow users to mistakenly launch an executable binary locally. This vulnerability affects Firefox < 67.
Modified: 2024-11-21
CVE-2019-11697
If the ALT and "a" keys are pressed when users receive an extension installation prompt, the extension will be installed without the install prompt delay that keeps the prompt visible in order for users to accept or decline the installation. A malicious web page could use this with spoofing on the page to trick users into installing a malicious extension. This vulnerability affects Firefox < 67.
Modified: 2024-11-21
CVE-2019-11698
If a crafted hyperlink is dragged and dropped to the bookmark bar or sidebar and the resulting bookmark is subsequently dragged and dropped into the web content area, an arbitrary query of a user's browser history can be run and transmitted to the content page via drop event data. This allows for the theft of browser history by a malicious site. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1543191
- https://bugzilla.mozilla.org/show_bug.cgi?id=1543191
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
Modified: 2024-11-21
CVE-2019-11699
A malicious page can briefly cause the wrong name to be highlighted as the domain name in the addressbar during page navigations. This could result in user confusion of which site is currently loaded for spoofing attacks. This vulnerability affects Firefox < 67.
Modified: 2024-11-21
CVE-2019-11701
The default webcal: protocol handler will load a web site vulnerable to cross-site scripting (XSS) attacks. This default was left in place as a legacy feature and has now been removed. *Note: this issue only affects users with an account on the vulnerable service. Other users are unaffected.*. This vulnerability affects Firefox < 67.
Modified: 2024-11-21
CVE-2019-11708
Insufficient vetting of parameters passed with the Prompt:Open IPC message between child and parent processes can result in the non-sandboxed parent process opening web content chosen by a compromised child process. When combined with additional vulnerabilities this could result in executing arbitrary code on the user's computer. This vulnerability affects Firefox ESR < 60.7.2, Firefox < 67.0.4, and Thunderbird < 60.7.2.
- http://packetstormsecurity.com/files/155592/Mozilla-Firefox-Windows-64-Bit-Chain-Exploit.html
- http://packetstormsecurity.com/files/155592/Mozilla-Firefox-Windows-64-Bit-Chain-Exploit.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1559858
- https://bugzilla.mozilla.org/show_bug.cgi?id=1559858
- GLSA-201908-12
- GLSA-201908-12
- https://www.mozilla.org/security/advisories/mfsa2019-19/
- https://www.mozilla.org/security/advisories/mfsa2019-19/
- https://www.mozilla.org/security/advisories/mfsa2019-20/
- https://www.mozilla.org/security/advisories/mfsa2019-20/
Modified: 2024-11-21
CVE-2019-11709
Mozilla developers and community members reported memory safety bugs present in Firefox 67 and Firefox ESR 60.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1547266%2C1540759%2C1548822%2C1550498%2C1515052%2C1539219%2C1547757%2C1550498%2C1533522
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1547266%2C1540759%2C1548822%2C1550498%2C1515052%2C1539219%2C1547757%2C1550498%2C1533522
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- GLSA-201908-12
- GLSA-201908-12
- GLSA-201908-20
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
Modified: 2024-11-21
CVE-2019-11710
Mozilla developers and community members reported memory safety bugs present in Firefox 67. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 68.
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1549768%2C1548611%2C1533842%2C1537692%2C1540590%2C1551907%2C1510345%2C1535482%2C1535848%2C1547472%2C1547760%2C1507696%2C1544180
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1549768%2C1548611%2C1533842%2C1537692%2C1540590%2C1551907%2C1510345%2C1535482%2C1535848%2C1547472%2C1547760%2C1507696%2C1544180
- GLSA-201908-12
- GLSA-201908-12
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
Modified: 2024-11-21
CVE-2019-11711
When an inner window is reused, it does not consider the use of document.domain for cross-origin protections. If pages on different subdomains ever cooperatively use document.domain, then either page can abuse this to inject script into arbitrary pages on the other subdomain, even those that did not use document.domain to relax their origin security. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- https://bugzilla.mozilla.org/show_bug.cgi?id=1552541
- https://bugzilla.mozilla.org/show_bug.cgi?id=1552541
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- GLSA-201908-12
- GLSA-201908-12
- GLSA-201908-20
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
Modified: 2024-11-21
CVE-2019-11712
POST requests made by NPAPI plugins, such as Flash, that receive a status 308 redirect response can bypass CORS requirements. This can allow an attacker to perform Cross-Site Request Forgery (CSRF) attacks. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- https://bugzilla.mozilla.org/show_bug.cgi?id=1543804
- https://bugzilla.mozilla.org/show_bug.cgi?id=1543804
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- GLSA-201908-12
- GLSA-201908-12
- GLSA-201908-20
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
Modified: 2024-11-21
CVE-2019-11713
A use-after-free vulnerability can occur in HTTP/2 when a cached HTTP/2 stream is closed while still in use, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- https://bugzilla.mozilla.org/show_bug.cgi?id=1528481
- https://bugzilla.mozilla.org/show_bug.cgi?id=1528481
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- GLSA-201908-12
- GLSA-201908-12
- GLSA-201908-20
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
Modified: 2024-11-21
CVE-2019-11714
Necko can access a child on the wrong thread during UDP connections, resulting in a potentially exploitable crash in some instances. This vulnerability affects Firefox < 68.
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1542593
- https://bugzilla.mozilla.org/show_bug.cgi?id=1542593
- GLSA-201908-12
- GLSA-201908-12
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
Modified: 2024-11-21
CVE-2019-11715
Due to an error while parsing page content, it is possible for properly sanitized user input to be misinterpreted and lead to XSS hazards on web sites in certain circumstances. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- https://bugzilla.mozilla.org/show_bug.cgi?id=1555523
- https://bugzilla.mozilla.org/show_bug.cgi?id=1555523
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- GLSA-201908-12
- GLSA-201908-12
- GLSA-201908-20
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
Modified: 2024-11-21
CVE-2019-11716
Until explicitly accessed by script, window.globalThis is not enumerable and, as a result, is not visible to code such as Object.getOwnPropertyNames(window). Sites that deploy a sandboxing that depends on enumerating and freezing access to the window object may miss this, allowing their sandboxes to be bypassed. This vulnerability affects Firefox < 68.
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1552632
- https://bugzilla.mozilla.org/show_bug.cgi?id=1552632
- GLSA-201908-12
- GLSA-201908-12
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
Modified: 2024-11-21
CVE-2019-11717
A vulnerability exists where the caret ("^") character is improperly escaped constructing some URIs due to it being used as a separator, allowing for possible spoofing of origin attributes. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- https://bugzilla.mozilla.org/show_bug.cgi?id=1548306
- https://bugzilla.mozilla.org/show_bug.cgi?id=1548306
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- GLSA-201908-12
- GLSA-201908-12
- GLSA-201908-20
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
Modified: 2024-11-21
CVE-2019-11718
Activity Stream can display content from sent from the Snippet Service website. This content is written to innerHTML on the Activity Stream page without sanitization, allowing for a potential access to other information available to the Activity Stream, such as browsing history, if the Snipper Service were compromised. This vulnerability affects Firefox < 68.
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1408349
- https://bugzilla.mozilla.org/show_bug.cgi?id=1408349
- GLSA-201908-12
- GLSA-201908-12
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
Modified: 2024-11-21
CVE-2019-11719
When importing a curve25519 private key in PKCS#8format with leading 0x00 bytes, it is possible to trigger an out-of-bounds read in the Network Security Services (NSS) library. This could lead to information disclosure. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- RHSA-2019:1951
- RHSA-2019:1951
- https://bugzilla.mozilla.org/show_bug.cgi?id=1540541
- https://bugzilla.mozilla.org/show_bug.cgi?id=1540541
- [debian-lts-announce] 20200929 [SECURITY] [DLA 2388-1] nss security update
- [debian-lts-announce] 20200929 [SECURITY] [DLA 2388-1] nss security update
- GLSA-201908-12
- GLSA-201908-12
- GLSA-201908-20
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
Modified: 2024-11-21
CVE-2019-11720
Some unicode characters are incorrectly treated as whitespace during the parsing of web content instead of triggering parsing errors. This allows malicious code to then be processed, evading cross-site scripting (XSS) filtering. This vulnerability affects Firefox < 68.
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1556230
- https://bugzilla.mozilla.org/show_bug.cgi?id=1556230
- GLSA-201908-12
- GLSA-201908-12
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
Modified: 2024-11-21
CVE-2019-11721
The unicode latin 'kra' character can be used to spoof a standard 'k' character in the addressbar. This allows for domain spoofing attacks as do not display as punycode text, allowing for user confusion. This vulnerability affects Firefox < 68.
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1256009
- https://bugzilla.mozilla.org/show_bug.cgi?id=1256009
- GLSA-201908-12
- GLSA-201908-12
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
Modified: 2024-11-21
CVE-2019-11723
A vulnerability exists during the installation of add-ons where the initial fetch ignored the origin attributes of the browsing context. This could leak cookies in private browsing mode or across different "containers" for people who use the Firefox Multi-Account Containers Web Extension. This vulnerability affects Firefox < 68.
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1528335
- https://bugzilla.mozilla.org/show_bug.cgi?id=1528335
- GLSA-201908-12
- GLSA-201908-12
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
Modified: 2024-11-21
CVE-2019-11724
Application permissions give additional remote troubleshooting permission to the site input.mozilla.org, which has been retired and now redirects to another site. This additional permission is unnecessary and is a potential vector for malicious attacks. This vulnerability affects Firefox < 68.
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1512511
- https://bugzilla.mozilla.org/show_bug.cgi?id=1512511
- GLSA-201908-12
- GLSA-201908-12
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
Modified: 2024-11-21
CVE-2019-11725
When a user navigates to site marked as unsafe by the Safebrowsing API, warning messages are displayed and navigation is interrupted but resources from the same site loaded through websockets are not blocked, leading to the loading of unsafe resources and bypassing safebrowsing protections. This vulnerability affects Firefox < 68.
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1483510
- https://bugzilla.mozilla.org/show_bug.cgi?id=1483510
- GLSA-201908-12
- GLSA-201908-12
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
Modified: 2024-11-21
CVE-2019-11727
A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages. This vulnerability affects Firefox < 68.
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- openSUSE-SU-2020:0008
- openSUSE-SU-2020:0008
- RHSA-2019:1951
- RHSA-2019:1951
- https://bugzilla.mozilla.org/show_bug.cgi?id=1552208
- https://bugzilla.mozilla.org/show_bug.cgi?id=1552208
- GLSA-201908-12
- GLSA-201908-12
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
Modified: 2024-11-21
CVE-2019-11728
The HTTP Alternative Services header, Alt-Svc, can be used by a malicious site to scan all TCP ports of any host that the accessible to a user when web content is loaded. This vulnerability affects Firefox < 68.
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1552993
- https://bugzilla.mozilla.org/show_bug.cgi?id=1552993
- GLSA-201908-12
- GLSA-201908-12
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
Modified: 2024-11-21
CVE-2019-11729
Empty or malformed p256-ECDH public keys may trigger a segmentation fault due values being improperly sanitized before being copied into memory and used. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- RHSA-2019:1951
- RHSA-2019:1951
- RHSA-2019:4190
- RHSA-2019:4190
- https://bugzilla.mozilla.org/show_bug.cgi?id=1515342
- https://bugzilla.mozilla.org/show_bug.cgi?id=1515342
- [debian-lts-announce] 20200929 [SECURITY] [DLA 2388-1] nss security update
- [debian-lts-announce] 20200929 [SECURITY] [DLA 2388-1] nss security update
- GLSA-201908-12
- GLSA-201908-12
- GLSA-201908-20
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
Modified: 2024-11-21
CVE-2019-11730
A vulnerability exists where if a user opens a locally saved HTML file, this file can use file: URIs to access other files in the same directory or sub-directories if the names are known or guessed. The Fetch API can then be used to read the contents of any files stored in these directories and they may uploaded to a server. It was demonstrated that in combination with a popular Android messaging app, if a malicious HTML attachment is sent to a user and they opened that attachment in Firefox, due to that app's predictable pattern for locally-saved file names, it is possible to read attachments the victim received from other correspondents. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- https://bugzilla.mozilla.org/show_bug.cgi?id=1558299
- https://bugzilla.mozilla.org/show_bug.cgi?id=1558299
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- GLSA-201908-12
- GLSA-201908-12
- GLSA-201908-20
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
Modified: 2024-11-21
CVE-2019-11733
When a master password is set, it is required to be entered again before stored passwords can be accessed in the 'Saved Logins' dialog. It was found that locally stored passwords can be copied to the clipboard thorough the 'copy password' context menu item without re-entering the master password if the master password had been previously entered in the same session, allowing for potential theft of stored passwords. This vulnerability affects Firefox < 68.0.2 and Firefox ESR < 68.0.2.
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1565780
- https://bugzilla.mozilla.org/show_bug.cgi?id=1565780
- https://www.mozilla.org/security/advisories/mfsa2019-24/
- https://www.mozilla.org/security/advisories/mfsa2019-24/
Modified: 2024-11-21
CVE-2019-11735
Mozilla developers and community members reported memory safety bugs present in Firefox 68 and Firefox ESR 68. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 69 and Firefox ESR < 68.1.
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1561404%2C1561484%2C1568047%2C1561912%2C1565744%2C1568858%2C1570358
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1561404%2C1561484%2C1568047%2C1561912%2C1565744%2C1568858%2C1570358
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
Modified: 2024-11-21
CVE-2019-11736
The Mozilla Maintenance Service does not guard against files being hardlinked to another file in the updates directory, allowing for the replacement of local files, including the Maintenance Service executable, which is run with privileged access. Additionally, there was a race condition during checks for junctions and symbolic links by the Maintenance Service, allowing for potential local file and directory manipulation to be undetected in some circumstances. This allows for potential privilege escalation by a user with unprivileged local access.
*Note: These attacks requires local system access and only affects Windows. Other operating systems are not affected.*. This vulnerability affects Firefox < 69 and Firefox ESR < 68.1.
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1551913
- https://bugzilla.mozilla.org/show_bug.cgi?id=1551913
- https://bugzilla.mozilla.org/show_bug.cgi?id=1552206
- https://bugzilla.mozilla.org/show_bug.cgi?id=1552206
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
Modified: 2024-11-21
CVE-2019-11738
If a Content Security Policy (CSP) directive is defined that uses a hash-based source that takes the empty string as input, execution of any javascript: URIs will be allowed. This could allow for malicious JavaScript content to be run, bypassing CSP permissions. This vulnerability affects Firefox < 69 and Firefox ESR < 68.1.
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1452037
- https://bugzilla.mozilla.org/show_bug.cgi?id=1452037
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
Modified: 2024-11-21
CVE-2019-11740
Mozilla developers and community members reported memory safety bugs present in Firefox 68, Firefox ESR 68, and Firefox 60.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 69, Thunderbird < 68.1, Thunderbird < 60.9, Firefox ESR < 60.9, and Firefox ESR < 68.1.
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1563133%2C1573160
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1563133%2C1573160
- GLSA-201911-07
- GLSA-201911-07
- USN-4150-1
- USN-4150-1
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-27/
- https://www.mozilla.org/security/advisories/mfsa2019-27/
- https://www.mozilla.org/security/advisories/mfsa2019-29/
- https://www.mozilla.org/security/advisories/mfsa2019-29/
- https://www.mozilla.org/security/advisories/mfsa2019-30/
- https://www.mozilla.org/security/advisories/mfsa2019-30/
Modified: 2024-11-21
CVE-2019-11742
A same-origin policy violation occurs allowing the theft of cross-origin images through a combination of SVG filters and a <canvas> element due to an error in how same-origin policy is applied to cached image content. The resulting same-origin policy violation could allow for data theft. This vulnerability affects Firefox < 69, Thunderbird < 68.1, Thunderbird < 60.9, Firefox ESR < 60.9, and Firefox ESR < 68.1.
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1559715
- https://bugzilla.mozilla.org/show_bug.cgi?id=1559715
- GLSA-201911-07
- GLSA-201911-07
- USN-4150-1
- USN-4150-1
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-27/
- https://www.mozilla.org/security/advisories/mfsa2019-27/
- https://www.mozilla.org/security/advisories/mfsa2019-29/
- https://www.mozilla.org/security/advisories/mfsa2019-29/
- https://www.mozilla.org/security/advisories/mfsa2019-30/
- https://www.mozilla.org/security/advisories/mfsa2019-30/
Modified: 2024-11-21
CVE-2019-11743
Navigation events were not fully adhering to the W3C's "Navigation-Timing Level 2" draft specification in some instances for the unload event, which restricts access to detailed timing attributes to only be same-origin. This resulted in potential cross-origin information exposure of history through timing side-channel attacks. This vulnerability affects Firefox < 69, Thunderbird < 68.1, Thunderbird < 60.9, Firefox ESR < 60.9, and Firefox ESR < 68.1.
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1560495
- https://bugzilla.mozilla.org/show_bug.cgi?id=1560495
- GLSA-201911-07
- GLSA-201911-07
- USN-4150-1
- USN-4150-1
- https://w3c.github.io/navigation-timing
- https://w3c.github.io/navigation-timing
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-27/
- https://www.mozilla.org/security/advisories/mfsa2019-27/
- https://www.mozilla.org/security/advisories/mfsa2019-29/
- https://www.mozilla.org/security/advisories/mfsa2019-29/
- https://www.mozilla.org/security/advisories/mfsa2019-30/
- https://www.mozilla.org/security/advisories/mfsa2019-30/
Modified: 2024-11-21
CVE-2019-11744
Some HTML elements, such as <title> and <textarea>, can contain literal angle brackets without treating them as markup. It is possible to pass a literal closing tag to .innerHTML on these elements, and subsequent content after that will be parsed as if it were outside the tag. This can lead to XSS if a site does not filter user input as strictly for these elements as it does for other elements. This vulnerability affects Firefox < 69, Thunderbird < 68.1, Thunderbird < 60.9, Firefox ESR < 60.9, and Firefox ESR < 68.1.
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1562033
- https://bugzilla.mozilla.org/show_bug.cgi?id=1562033
- GLSA-201911-07
- GLSA-201911-07
- USN-4150-1
- USN-4150-1
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-27/
- https://www.mozilla.org/security/advisories/mfsa2019-27/
- https://www.mozilla.org/security/advisories/mfsa2019-29/
- https://www.mozilla.org/security/advisories/mfsa2019-29/
- https://www.mozilla.org/security/advisories/mfsa2019-30/
- https://www.mozilla.org/security/advisories/mfsa2019-30/
Modified: 2024-11-21
CVE-2019-11746
A use-after-free vulnerability can occur while manipulating video elements if the body is freed while still in use. This results in a potentially exploitable crash. This vulnerability affects Firefox < 69, Thunderbird < 68.1, Thunderbird < 60.9, Firefox ESR < 60.9, and Firefox ESR < 68.1.
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1564449
- https://bugzilla.mozilla.org/show_bug.cgi?id=1564449
- GLSA-201911-07
- GLSA-201911-07
- USN-4150-1
- USN-4150-1
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-27/
- https://www.mozilla.org/security/advisories/mfsa2019-27/
- https://www.mozilla.org/security/advisories/mfsa2019-29/
- https://www.mozilla.org/security/advisories/mfsa2019-29/
- https://www.mozilla.org/security/advisories/mfsa2019-30/
- https://www.mozilla.org/security/advisories/mfsa2019-30/
Modified: 2024-11-21
CVE-2019-11747
The "Forget about this site" feature in the History pane is intended to remove all saved user data that indicates a user has visited a site. This includes removing any HTTP Strict Transport Security (HSTS) settings received from sites that use it. Due to a bug, sites on the pre-load list also have their HSTS setting removed. On the next visit to that site if the user specifies an http: URL rather than secure https: they will not be protected by the pre-loaded HSTS setting. After that visit the site's HSTS setting will be restored. This vulnerability affects Firefox < 69 and Firefox ESR < 68.1.
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1564481
- https://bugzilla.mozilla.org/show_bug.cgi?id=1564481
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
Modified: 2024-11-21
CVE-2019-11748
WebRTC in Firefox will honor persisted permissions given to sites for access to microphone and camera resources even when in a third-party context. In light of recent high profile vulnerabilities in other software, a decision was made to no longer persist these permissions. This avoids the possibility of trusted WebRTC resources being invisibly embedded in web content and abusing permissions previously given by users. Users will now be prompted for permissions on each use. This vulnerability affects Firefox < 69 and Firefox ESR < 68.1.
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1564588
- https://bugzilla.mozilla.org/show_bug.cgi?id=1564588
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
Modified: 2024-11-21
CVE-2019-11749
A vulnerability exists in WebRTC where malicious web content can use probing techniques on the getUserMedia API using constraints to reveal device properties of cameras on the system without triggering a user prompt or notification. This allows for the potential fingerprinting of users. This vulnerability affects Firefox < 69 and Firefox ESR < 68.1.
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1565374
- https://bugzilla.mozilla.org/show_bug.cgi?id=1565374
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
Modified: 2024-11-21
CVE-2019-11750
A type confusion vulnerability exists in Spidermonkey, which results in a non-exploitable crash. This vulnerability affects Firefox < 69 and Firefox ESR < 68.1.
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1568397
- https://bugzilla.mozilla.org/show_bug.cgi?id=1568397
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
Modified: 2024-11-21
CVE-2019-11751
Logging-related command line parameters are not properly sanitized when Firefox is launched by another program, such as when a user clicks on malicious links in a chat application. This can be used to write a log file to an arbitrary location such as the Windows 'Startup' folder.
*Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox < 69 and Firefox ESR < 68.1.
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1572838
- https://bugzilla.mozilla.org/show_bug.cgi?id=1572838
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
Modified: 2024-11-21
CVE-2019-11752
It is possible to delete an IndexedDB key value and subsequently try to extract it during conversion. This results in a use-after-free and a potentially exploitable crash. This vulnerability affects Firefox < 69, Thunderbird < 68.1, Thunderbird < 60.9, Firefox ESR < 60.9, and Firefox ESR < 68.1.
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1501152
- https://bugzilla.mozilla.org/show_bug.cgi?id=1501152
- GLSA-201911-07
- GLSA-201911-07
- USN-4150-1
- USN-4150-1
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-27/
- https://www.mozilla.org/security/advisories/mfsa2019-27/
- https://www.mozilla.org/security/advisories/mfsa2019-29/
- https://www.mozilla.org/security/advisories/mfsa2019-29/
- https://www.mozilla.org/security/advisories/mfsa2019-30/
- https://www.mozilla.org/security/advisories/mfsa2019-30/
Modified: 2024-11-21
CVE-2019-11753
The Firefox installer allows Firefox to be installed to a custom user writable location, leaving it unprotected from manipulation by unprivileged users or malware. If the Mozilla Maintenance Service is manipulated to update this unprotected location and the updated maintenance service in the unprotected location has been altered, the altered maintenance service can run with elevated privileges during the update process due to a lack of integrity checks. This allows for privilege escalation if the executable has been replaced locally.
*Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.*. This vulnerability affects Firefox < 69, Firefox ESR < 60.9, and Firefox ESR < 68.1.
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1574980
- https://bugzilla.mozilla.org/show_bug.cgi?id=1574980
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-27/
- https://www.mozilla.org/security/advisories/mfsa2019-27/
Modified: 2024-11-21
CVE-2019-9788
Mozilla developers and community members reported memory safety bugs present in Firefox 65, Firefox ESR 60.5, and Thunderbird 60.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.
- RHSA-2019:0966
- RHSA-2019:1144
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1518001%2C1521304%2C1521214%2C1506665%2C1516834%2C1518774%2C1524755%2C1523362%2C1524214%2C1529203
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- RHSA-2019:0966
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1518001%2C1521304%2C1521214%2C1506665%2C1516834%2C1518774%2C1524755%2C1523362%2C1524214%2C1529203
- RHSA-2019:1144
Modified: 2024-11-21
CVE-2019-9789
Mozilla developers and community members reported memory safety bugs present in Firefox 65. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 66.
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1520483%2C1522987%2C1528199%2C1519337%2C1525549%2C1516179%2C1518524%2C1518331%2C1526579%2C1512567%2C1524335%2C1448505%2C1518821
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1520483%2C1522987%2C1528199%2C1519337%2C1525549%2C1516179%2C1518524%2C1518331%2C1526579%2C1512567%2C1524335%2C1448505%2C1518821
- https://www.mozilla.org/security/advisories/mfsa2019-07/
Modified: 2024-11-21
CVE-2019-9790
A use-after-free vulnerability can occur when a raw pointer to a DOM element on a page is obtained using JavaScript and the element is then removed while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.
- RHSA-2019:0966
- RHSA-2019:1144
- https://bugzilla.mozilla.org/show_bug.cgi?id=1525145
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- RHSA-2019:0966
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1525145
- RHSA-2019:1144
Modified: 2024-11-21
CVE-2019-9791
The type inference system allows the compilation of functions that can cause type confusions between arbitrary objects when compiled through the IonMonkey just-in-time (JIT) compiler and when the constructor function is entered through on-stack replacement (OSR). This allows for possible arbitrary reading and writing of objects during an exploitable crash. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.
- RHSA-2019:0966
- RHSA-2019:1144
- https://bugzilla.mozilla.org/show_bug.cgi?id=1530958
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- RHSA-2019:0966
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1530958
- RHSA-2019:1144
Modified: 2024-11-21
CVE-2019-9792
The IonMonkey just-in-time (JIT) compiler can leak an internal JS_OPTIMIZED_OUT magic value to the running script during a bailout. This magic value can then be used by JavaScript to achieve memory corruption, which results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.
- http://packetstormsecurity.com/files/153106/Spidermonkey-IonMonkey-JS_OPTIMIZED_OUT-Value-Leak.html
- RHSA-2019:0966
- RHSA-2019:1144
- https://bugzilla.mozilla.org/show_bug.cgi?id=1532599
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- http://packetstormsecurity.com/files/153106/Spidermonkey-IonMonkey-JS_OPTIMIZED_OUT-Value-Leak.html
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1532599
- RHSA-2019:1144
- RHSA-2019:0966
Modified: 2024-11-21
CVE-2019-9793
A mechanism was discovered that removes some bounds checking for string, array, or typed array accesses if Spectre mitigations have been disabled. This vulnerability could allow an attacker to create an arbitrary value in compiled JavaScript, for which the range analysis will infer a fully controlled, incorrect range in circumstances where users have explicitly disabled Spectre mitigations. *Note: Spectre mitigations are currently enabled for all users by default settings.*. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.
- RHSA-2019:0966
- RHSA-2019:1144
- https://bugzilla.mozilla.org/show_bug.cgi?id=1528829
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- RHSA-2019:0966
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1528829
- RHSA-2019:1144
Modified: 2024-11-21
CVE-2019-9795
A vulnerability where type-confusion in the IonMonkey just-in-time (JIT) compiler could potentially be used by malicious JavaScript to trigger a potentially exploitable crash. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.
- RHSA-2019:0966
- RHSA-2019:1144
- https://bugzilla.mozilla.org/show_bug.cgi?id=1514682
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- RHSA-2019:0966
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1514682
- RHSA-2019:1144
Modified: 2024-11-21
CVE-2019-9796
A use-after-free vulnerability can occur when the SMIL animation controller incorrectly registers with the refresh driver twice when only a single registration is expected. When a registration is later freed with the removal of the animation controller element, the refresh driver incorrectly leaves a dangling pointer to the driver's observer array. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.
- RHSA-2019:0966
- RHSA-2019:1144
- https://bugzilla.mozilla.org/show_bug.cgi?id=1531277
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- RHSA-2019:0966
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1531277
- RHSA-2019:1144
Modified: 2024-11-21
CVE-2019-9797
Cross-origin images can be read in violation of the same-origin policy by exporting an image after using createImageBitmap to read the image and then rendering the resulting bitmap image within a canvas element. This vulnerability affects Firefox < 66.
- openSUSE-SU-2019:1484
- openSUSE-SU-2019:1534
- openSUSE-SU-2019:1664
- RHSA-2019:1265
- RHSA-2019:1267
- RHSA-2019:1269
- RHSA-2019:1308
- RHSA-2019:1309
- RHSA-2019:1310
- https://bugzilla.mozilla.org/show_bug.cgi?id=1528909
- [debian-lts-announce] 20190523 [SECURITY] [DLA 1800-1] firefox-esr security update
- [debian-lts-announce] 20190527 [SECURITY] [DLA 1806-1] thunderbird security update
- 20190522 [slackware-security] mozilla-firefox (SSA:2019-141-01)
- 20190523 [SECURITY] [DSA 4448-1] firefox-esr security update
- 20190527 [SECURITY] [DSA 4451-1] thunderbird security update
- USN-3997-1
- DSA-4448
- DSA-4451
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- openSUSE-SU-2019:1484
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- DSA-4451
- DSA-4448
- USN-3997-1
- 20190527 [SECURITY] [DSA 4451-1] thunderbird security update
- 20190523 [SECURITY] [DSA 4448-1] firefox-esr security update
- 20190522 [slackware-security] mozilla-firefox (SSA:2019-141-01)
- [debian-lts-announce] 20190527 [SECURITY] [DLA 1806-1] thunderbird security update
- [debian-lts-announce] 20190523 [SECURITY] [DLA 1800-1] firefox-esr security update
- https://bugzilla.mozilla.org/show_bug.cgi?id=1528909
- RHSA-2019:1310
- RHSA-2019:1309
- RHSA-2019:1308
- RHSA-2019:1269
- RHSA-2019:1267
- RHSA-2019:1265
- openSUSE-SU-2019:1664
- openSUSE-SU-2019:1534
Modified: 2024-11-21
CVE-2019-9799
Insufficient bounds checking of data during inter-process communication might allow a compromised content process to be able to read memory from the parent process under certain conditions. This vulnerability affects Firefox < 66.
Modified: 2024-11-21
CVE-2019-9800
Mozilla developers and community members reported memory safety bugs present in Firefox 66, Firefox ESR 60.6, and Thunderbird 60.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1540166%2C1534593%2C1546327%2C1540136%2C1538736%2C1538042%2C1535612%2C1499719%2C1499108%2C1538619%2C1535194%2C1516325%2C1542324%2C1542097%2C1532465%2C1533554%2C1541580
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1540166%2C1534593%2C1546327%2C1540136%2C1538736%2C1538042%2C1535612%2C1499719%2C1499108%2C1538619%2C1535194%2C1516325%2C1542324%2C1542097%2C1532465%2C1533554%2C1541580
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-13/
Modified: 2024-11-21
CVE-2019-9802
If a Sandbox content process is compromised, it can initiate an FTP download which will then use a child process to render the downloaded data. The downloaded data can then be passed to the Chrome process with an arbitrary file length supplied by an attacker, bypassing sandbox protections and allow for a potential memory read of adjacent data from the privileged Chrome process, which may include sensitive data. This vulnerability affects Firefox < 66.
Modified: 2024-11-21
CVE-2019-9803
The Upgrade-Insecure-Requests (UIR) specification states that if UIR is enabled through Content Security Policy (CSP), navigation to a same-origin URL must be upgraded to HTTPS. Firefox will incorrectly navigate to an HTTP URL rather than perform the security upgrade requested by the CSP in some circumstances, allowing for potential man-in-the-middle attacks on the linked resources. This vulnerability affects Firefox < 66.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1437009
- https://bugzilla.mozilla.org/show_bug.cgi?id=1515863
- https://w3c.github.io/webappsec-upgrade-insecure-requests/
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1437009
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://w3c.github.io/webappsec-upgrade-insecure-requests/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1515863
Modified: 2024-11-21
CVE-2019-9805
A latent vulnerability exists in the Prio library where data may be read from uninitialized memory for some functions, leading to potential memory corruption. This vulnerability affects Firefox < 66.
Modified: 2024-11-21
CVE-2019-9806
A vulnerability exists during authorization prompting for FTP transaction where successive modal prompts are displayed and cannot be immediately dismissed. This allows for a denial of service (DOS) attack. This vulnerability affects Firefox < 66.
Modified: 2024-11-21
CVE-2019-9807
When arbitrary text is sent over an FTP connection and a page reload is initiated, it is possible to create a modal alert message with this text as the content. This could potentially be used for social engineering attacks. This vulnerability affects Firefox < 66.
Modified: 2024-11-21
CVE-2019-9808
If WebRTC permission is requested from documents with data: or blob: URLs, the permission notifications do not properly display the originating domain. The notification states "Unknown origin" as the requestee, leading to user confusion about which site is asking for this permission. This vulnerability affects Firefox < 66.
Modified: 2024-11-21
CVE-2019-9809
If the source for resources on a page is through an FTP connection, it is possible to trigger a series of modal alert messages for these resources through invalid credentials or locations. These messages cannot be immediately dismissed, allowing for a denial of service (DOS) attack. This vulnerability affects Firefox < 66.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1282430
- https://bugzilla.mozilla.org/show_bug.cgi?id=1523249
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1282430
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1523249
Modified: 2024-11-21
CVE-2019-9810
Incorrect alias information in IonMonkey JIT compiler for Array.prototype.slice method may lead to missing bounds check and a buffer overflow. This vulnerability affects Firefox < 66.0.1, Firefox ESR < 60.6.1, and Thunderbird < 60.6.1.
- http://packetstormsecurity.com/files/155592/Mozilla-Firefox-Windows-64-Bit-Chain-Exploit.html
- RHSA-2019:0966
- RHSA-2019:1144
- https://bugzilla.mozilla.org/show_bug.cgi?id=1537924
- https://www.mozilla.org/security/advisories/mfsa2019-09/
- https://www.mozilla.org/security/advisories/mfsa2019-10/
- https://www.mozilla.org/security/advisories/mfsa2019-12/
- http://packetstormsecurity.com/files/155592/Mozilla-Firefox-Windows-64-Bit-Chain-Exploit.html
- https://www.mozilla.org/security/advisories/mfsa2019-12/
- https://www.mozilla.org/security/advisories/mfsa2019-10/
- https://www.mozilla.org/security/advisories/mfsa2019-09/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1537924
- RHSA-2019:1144
- RHSA-2019:0966
Modified: 2024-11-21
CVE-2019-9811
As part of a winning Pwn2Own entry, a researcher demonstrated a sandbox escape by installing a malicious language pack and then opening a browser feature that used the compromised translation. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1538007
- https://bugzilla.mozilla.org/show_bug.cgi?id=1539598
- https://bugzilla.mozilla.org/show_bug.cgi?id=1563327
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- GLSA-201908-12
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- openSUSE-SU-2019:1811
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- GLSA-201908-20
- GLSA-201908-12
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- https://bugzilla.mozilla.org/show_bug.cgi?id=1563327
- https://bugzilla.mozilla.org/show_bug.cgi?id=1539598
- https://bugzilla.mozilla.org/show_bug.cgi?id=1538007
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1813
Modified: 2024-11-21
CVE-2019-9812
Given a compromised sandboxed content process due to a separate vulnerability, it is possible to escape that sandbox by loading accounts.firefox.com in that process and forcing a log-in to a malicious Firefox Sync account. Preference settings that disable the sandbox are then synchronized to the local machine and the compromised browser would restart without the sandbox if a crash is triggered. This vulnerability affects Firefox ESR < 60.9, Firefox ESR < 68.1, and Firefox < 69.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1538008
- https://bugzilla.mozilla.org/show_bug.cgi?id=1538015
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-27/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1538008
- https://www.mozilla.org/security/advisories/mfsa2019-27/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1538015
Modified: 2024-11-21
CVE-2019-9813
Incorrect handling of __proto__ mutations may lead to type confusion in IonMonkey JIT code and can be leveraged for arbitrary memory read and write. This vulnerability affects Firefox < 66.0.1, Firefox ESR < 60.6.1, and Thunderbird < 60.6.1.
- RHSA-2019:0966
- RHSA-2019:1144
- https://bugzilla.mozilla.org/show_bug.cgi?id=1538006
- https://www.mozilla.org/security/advisories/mfsa2019-09/
- https://www.mozilla.org/security/advisories/mfsa2019-10/
- https://www.mozilla.org/security/advisories/mfsa2019-12/
- RHSA-2019:0966
- https://www.mozilla.org/security/advisories/mfsa2019-12/
- https://www.mozilla.org/security/advisories/mfsa2019-10/
- https://www.mozilla.org/security/advisories/mfsa2019-09/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1538006
- RHSA-2019:1144
Modified: 2024-11-21
CVE-2019-9814
Mozilla developers and community members reported memory safety bugs present in Firefox 66. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 67.
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1527592%2C1534536%2C1520132%2C1543159%2C1539393%2C1459932%2C1459182%2C1516425
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1527592%2C1534536%2C1520132%2C1543159%2C1539393%2C1459932%2C1459182%2C1516425
- https://www.mozilla.org/security/advisories/mfsa2019-13/
Modified: 2024-11-21
CVE-2019-9816
A possible vulnerability exists where type confusion can occur when manipulating JavaScript objects in object groups, allowing for the bypassing of security checks within these groups. *Note: this vulnerability has only been demonstrated with UnboxedObjects, which are disabled by default on all supported releases.*. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1536768
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1536768
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-13/
Modified: 2024-11-21
CVE-2019-9817
Images from a different domain can be read using a canvas object in some circumstances. This could be used to steal image data from a different site in violation of same-origin policy. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1540221
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1540221
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-13/
Modified: 2024-11-21
CVE-2019-9819
A vulnerability where a JavaScript compartment mismatch can occur while working with the fetch API, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1532553
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1532553
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-13/
Modified: 2024-11-21
CVE-2019-9820
A use-after-free vulnerability can occur in the chrome event handler when it is freed while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1536405
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1536405
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-13/
Modified: 2024-11-21
CVE-2019-9821
A use-after-free vulnerability can occur in AssertWorkerThread due to a race condition with shared workers. This results in a potentially exploitable crash. This vulnerability affects Firefox < 67.
Closed vulnerabilities
BDU:2018-01339
Уязвимость библиотеи angle веб-браузера Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2019-00013
Уязвимость графической библиотеки Skia веб-браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2019-00678
Уязвимость браузера Firefox, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2019-00679
Уязвимость браузера Firefox, связанная с ошибками освобождения ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-00680
Уязвимость компонента Texture Client Handler браузера Firefox, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-00681
Уязвимость компонента Proxy Auto-Config браузера Firefox, позволяющая нарушителю обойти существующие ограничения безопасности и произвести атаки на службы и инструменты, привязанные к локальному хосту
BDU:2019-00819
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с ошибками реализации механизма аутентификации межпроцессного взаимодействия (IPC), позволяющая нарушителю повысить свои привилегии и выйти из изолированной программной среды
BDU:2019-00820
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2019-00821
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с использованием памяти после её освобождения, позволяющая нарушителю выполнить произвольный код
BDU:2019-00919
Уязвимость веб-браузеров Firefox, Firefox ESR и программы для работы с электронной почтой Thunderbird, связанная с переполнением буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2019-00920
Уязвимость веб-браузеров Firefox, Firefox ESR и программы для работы с электронной почтой Thunderbird, связанная с обращением к освобожденной ячейке памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01276
Уязвимость метода Array.prototype.slice JIT-компилятора IonMonkey браузера Firefox ESR, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2019-01277
Уязвимость функции of __proto__ mutations JIT-компилятора IonMonkey браузера Firefox ESR, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2019-01422
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2019-01423
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с целочисленным переполнением, позволяющая нарушителю осуществить запись за границами буфера в памяти
BDU:2019-01424
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с использованием памяти после освобождения, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2019-01425
Уязвимость графической библиотеки Skia веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2019-01426
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с недостатками механизмов ограничения домена (Same Origin Policy), позволяющая нарушителю перенаправить пользователя на вредоносный сайт
BDU:2019-01556
Уязвимость браузеров Firefox и Firefox ESR, связанная с использованием памяти после ее освобождения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01557
Уязвимость JIT-компилятора IonMonkey браузеров Firefox и Firefox ESR, связанная с ошибкой преобразования типов данных, позволяющая нарушителю оказать воздействие на целостность защищаемых данных
BDU:2019-01568
Уязвимость just-in-time (JIT) компилятора IonMonkey веб-браузеров Firefox, Firefox ESR и программы для работы с электронной почтой Thunderbird, связанная с записью данных за пределы границ буфера, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01569
Уязвимость веб-браузеров Firefox, Firefox ESR, Firefox и программы для работы с электронной почтой Thunderbird, связанная с чтением данных за границами буфера памяти, позволяющая нарушителю получить несанкционированный доступ к защищаемым данным
BDU:2019-01571
Уязвимость библиотеки Skia используемой веб-браузеров Firefox, Firefox ESR и программы для работы с электронной почтой Thunderbird, связанная с целочисленным переполнением, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01950
Уязвимость программного обеспечения Firefox, Firefox ESR и Thunderbird, связанная с копированием буфера без проверки размера входных данных, позволяющая нарушителю выполнить произвольный код
BDU:2019-02851
Уязвимость браузеров Firefox, Firefox ESR, почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2019-02932
Уязвимость реализации сетевого протокола HTTP/2 браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-02933
Уязвимость браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, связанная с недостатками разграничения доступа, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-02934
Уязвимость плагина NPAPI браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, позволяющая нарушителю осуществить межсайтовую подделку запросов
BDU:2019-02935
Уязвимость компонента document.domain браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, позволяющая нарушителю осуществить межсайтовую сценарную атаку
BDU:2019-02947
Уязвимость браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, существующая из-за недостаточной проверки параметров в сообщениях Prompt:Open IPC между дочерним и родительским процессами, позволяющая нарушителю выполнить произвольный код
BDU:2019-03329
Уязвимость браузера Firefox, связанная с выходом операции за границы буфера данных, позволяющая нарушителю выполнить произвольный код
BDU:2019-03330
Уязвимость функции png_image_free (png.c) библиотеки для работы с растровой графикой в формате PNG libpng, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-03558
Уязвимость компонента API XMLHttpRequest браузеров Firefox, Firefox ESR, почтового клиента Thunderbird, связанная с использованием памяти после ее освобождения, позволяющая нарушителю оказать воздействие на целостность данных, получить несанкционированный доступ к защищаемой информации, а также вызвать отказ в обслуживании
BDU:2019-03559
Уязвимость браузеров Firefox, Firefox ESR, почтового клиента Thunderbird, связанная с использованием памяти после ее освобождения, позволяющая нарушителю оказать воздействие на целостность данных, получить несанкционированный доступ к защищаемой информации, а также вызвать отказ в обслуживании
BDU:2019-03560
Уязвимость буферных данных WebGL браузеров Firefox, Firefox ESR, почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю оказать воздействие на целостность данных, получить несанкционированный доступ к защищаемой информации, а также вызвать отказ в обслуживании
BDU:2019-03561
Уязвимость браузеров Firefox, Firefox ESR, почтового клиента Thunderbird, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2019-03613
Уязвимость метода Array.pop почтового клиента Thunderbird и браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-03614
Уязвимость почтового клиента Thunderbird и браузеров Firefox и Firefox ESR, связанная с неправильным синтаксическим анализом содержимого страницы или интерпретацией введенных пользователем данных, позволяющая нарушителю выполнить произвольный код
BDU:2019-03615
Уязвимость почтового клиента Thunderbird и браузеров Firefox и Firefox ESR, связанная с ошибками экранирования символа каретки("^"), позволяющая нарушителю нарушить целостность данных
BDU:2019-03616
Уязвимость библиотеки служб сетевой безопасности (NSS) почтового клиента Thunderbird и браузеров Firefox и Firefox ESR, позволяющая нарушителю получить несанкционированный доступ к информации
BDU:2019-04635
Уязвимость обработчика событий браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04637
Уязвимость объекта canvas браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2019-04638
Уязвимость функций работы с объектами JavaScript браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю получить доступ к конфиденциальной информации и вызвать отказ в обслуживании
BDU:2019-04639
Уязвимость функций соответствия отсеков JavaScript браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04640
Уязвимость безопасности памяти браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании и нарушить целостность данных
BDU:2019-04642
Уязвимость функции формирования открытых ключей p256-ECDH браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00585
Уязвимость функции AssertWorkerThread браузера Firefox, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-00586
Уязвимость браузера Firefox, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-00587
Уязвимость протокола передачи файлов FTP браузера Firefox, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00588
Уязвимость расширения WebRTC браузера Firefox, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2020-00589
Уязвимость протокола передачи файлов FTP браузера Firefox, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2020-00590
Уязвимость протокола передачи файлов FTP браузера Firefox, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00591
Уязвимость библиотеки Prio браузера Firefox, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-00592
Уязвимость спецификации Upgrade-Insecure-Requests браузера Firefox, связанная с ошибкой подтверждения источника данных, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность
BDU:2020-00593
Уязвимость браузера Firefox, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2020-00594
Уязвимость браузера Firefox, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2020-00595
Уязвимость браузера Firefox, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-00596
Уязвимость браузера Firefox, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2020-00597
Уязвимость браузера Firefox, связанная с ошибкой службы сетевой безопасности CertificateVerify, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2020-00598
Уязвимость браузера Firefox, связанная с ошибками в настройках разрешений, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность
BDU:2020-00599
Уязвимость браузера Firefox, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2020-00600
Уязвимость браузера Firefox, связанная с ошибкой кодировки латинского символа kra, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2020-00601
Уязвимость браузера Firefox, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2020-00602
Уязвимость реализации страницы Activity Stream браузера Firefox, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2020-00603
Уязвимость компонента window.globalThis браузера Firefox, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-00604
Уязвимость сетевой библиотеки Necko браузера Firefox, связанная с ошибкой доступа к дочернему элементу при неправильном потоке во время UDP-соединения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-00605
Уязвимость идентификатора ресурсов webcal браузера Firefox, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2020-00606
Уязвимость браузера Firefox, связанная с ошибкой отображения доменного имени в адресной строке, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2020-00607
Уязвимость браузера Firefox, связанная с некорректной установкой приложений при нажатых клавиш на клавиатуре (ALT + a), позволяющая нарушителю оказать воздействие на целостность данных
BDU:2020-00608
Уязвимость браузера Firefox, связанная с ошибками обработки исполняемого контента для приложений с расширением .JNLP, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-00609
Уязвимость браузера Firefox, связанная с ошибкой определения пользовательского курсора, который может находиться над адресной строкой, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2020-00610
Уязвимость компонента WebExtension браузера Firefox, связанная с некорректным ограничением URI, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2020-00611
Уязвимость браузера Firefox, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-00723
Уязвимость веб-браузеров Firefox, Firefox ESR и программы для работы с электронной почтой Thunderbird, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным
BDU:2020-00727
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность
BDU:2020-00746
Уязвимость контроллера анимации SMIL почтового клиента Thunderbird и браузеров Firefox и Firefox ESR, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность
BDU:2020-00747
Уязвимость компилятора IonMonkey Just-in-Time почтового клиента Thunderbird и браузеров Firefox и Firefox ESR, связанная с неправильным преобразованием типов, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00759
Уязвимость метода TransferFromImageBitmap почтового клиента Thunderbird и браузеров Firefox и Firefox ESR, связанная с возможностью чтения элемента canvas, игнорируя политику безопасности, позволяющая нарушителю получить несанкционированный доступ к информации
BDU:2020-00771
Уязвимость функции createImageBitmap браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с ошибкой подтверждения источника данных, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2020-00782
Уязвимость браузера Firefox, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-00783
Уязвимость модуля VertexBuffer11 браузера Firefox, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-00784
Уязвимость компонента WebExtension браузера Firefox, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2021-03830
Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, вызванная ошибками синхронизации при использовании общего ресурса, позволяющая нарушителю выйти из изолированной программной среды
Modified: 2024-11-21
CVE-2018-12405
Mozilla developers and community members reported memory safety bugs present in Firefox 63 and Firefox ESR 60.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 64.
- 106168
- 106168
- RHSA-2018:3831
- RHSA-2018:3831
- RHSA-2018:3833
- RHSA-2018:3833
- RHSA-2019:0159
- RHSA-2019:0159
- RHSA-2019:0160
- RHSA-2019:0160
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1494752%2C1498765%2C1503326%2C1505181%2C1500759%2C1504365%2C1506640%2C1503082%2C1502013%2C1510471
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1494752%2C1498765%2C1503326%2C1505181%2C1500759%2C1504365%2C1506640%2C1503082%2C1502013%2C1510471
- [debian-lts-announce] 20181213 [SECURITY] [DLA 1605-1] firefox-esr security update
- [debian-lts-announce] 20181213 [SECURITY] [DLA 1605-1] firefox-esr security update
- GLSA-201903-04
- GLSA-201903-04
- USN-3844-1
- USN-3844-1
- USN-3868-1
- USN-3868-1
- DSA-4354
- DSA-4354
- DSA-4362
- DSA-4362
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://www.mozilla.org/security/advisories/mfsa2018-30/
- https://www.mozilla.org/security/advisories/mfsa2018-30/
- https://www.mozilla.org/security/advisories/mfsa2018-31/
- https://www.mozilla.org/security/advisories/mfsa2018-31/
Modified: 2024-11-21
CVE-2018-12406
Mozilla developers and community members reported memory safety bugs present in Firefox 63. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 64.
- 106167
- 106167
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1456947%2C1475669%2C1504816%2C1502886%2C1500064%2C1500310%2C1500696%2C1499198%2C1434490%2C1481745%2C1458129
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1456947%2C1475669%2C1504816%2C1502886%2C1500064%2C1500310%2C1500696%2C1499198%2C1434490%2C1481745%2C1458129
- USN-3844-1
- USN-3844-1
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://www.mozilla.org/security/advisories/mfsa2018-29/
Modified: 2024-11-21
CVE-2018-12407
A buffer overflow occurs when drawing and validating elements with the ANGLE graphics library, used for WebGL content, when working with the VertexBuffer11 module. This results in a potentially exploitable crash. This vulnerability affects Firefox < 64.
Modified: 2024-11-21
CVE-2018-17466
Incorrect texture handling in Angle in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
- 105666
- 105666
- 106168
- 106168
- RHSA-2018:3004
- RHSA-2018:3004
- RHSA-2018:3831
- RHSA-2018:3831
- RHSA-2018:3833
- RHSA-2018:3833
- RHSA-2019:0159
- RHSA-2019:0159
- RHSA-2019:0160
- RHSA-2019:0160
- https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html
- https://crbug.com/880906
- https://crbug.com/880906
- [debian-lts-announce] 20181213 [SECURITY] [DLA 1605-1] firefox-esr security update
- [debian-lts-announce] 20181213 [SECURITY] [DLA 1605-1] firefox-esr security update
- GLSA-201811-10
- GLSA-201811-10
- USN-3844-1
- USN-3844-1
- USN-3868-1
- USN-3868-1
- DSA-4330
- DSA-4330
- DSA-4354
- DSA-4354
- DSA-4362
- DSA-4362
Modified: 2024-11-21
CVE-2018-18356
An integer overflow in path handling lead to a use after free in Skia in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2019:1162
- openSUSE-SU-2019:1162
- 106084
- 106084
- RHSA-2018:3803
- RHSA-2018:3803
- RHSA-2019:0373
- RHSA-2019:0373
- RHSA-2019:0374
- RHSA-2019:0374
- RHSA-2019:1144
- RHSA-2019:1144
- https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html
- https://crbug.com/883666
- https://crbug.com/883666
- [debian-lts-announce] 20190215 [SECURITY] [DLA 1677-1] firefox-esr security update
- [debian-lts-announce] 20190215 [SECURITY] [DLA 1677-1] firefox-esr security update
- [debian-lts-announce] 20190216 [SECURITY] [DLA 1678-1] thunderbird security update
- [debian-lts-announce] 20190216 [SECURITY] [DLA 1678-1] thunderbird security update
- GLSA-201903-04
- GLSA-201903-04
- GLSA-201904-07
- GLSA-201904-07
- GLSA-201908-18
- GLSA-201908-18
- USN-3896-1
- USN-3896-1
- USN-3897-1
- USN-3897-1
- DSA-4352
- DSA-4352
- DSA-4391
- DSA-4391
- DSA-4392
- DSA-4392
Modified: 2024-11-21
CVE-2018-18492
A use-after-free vulnerability can occur after deleting a selection element due to a weak reference to the select element in the options collection. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 64.
- 106168
- 106168
- RHSA-2018:3831
- RHSA-2018:3831
- RHSA-2018:3833
- RHSA-2018:3833
- RHSA-2019:0159
- RHSA-2019:0159
- RHSA-2019:0160
- RHSA-2019:0160
- https://bugzilla.mozilla.org/show_bug.cgi?id=1499861
- https://bugzilla.mozilla.org/show_bug.cgi?id=1499861
- [debian-lts-announce] 20181213 [SECURITY] [DLA 1605-1] firefox-esr security update
- [debian-lts-announce] 20181213 [SECURITY] [DLA 1605-1] firefox-esr security update
- GLSA-201903-04
- GLSA-201903-04
- USN-3844-1
- USN-3844-1
- USN-3868-1
- USN-3868-1
- DSA-4354
- DSA-4354
- DSA-4362
- DSA-4362
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://www.mozilla.org/security/advisories/mfsa2018-30/
- https://www.mozilla.org/security/advisories/mfsa2018-30/
- https://www.mozilla.org/security/advisories/mfsa2018-31/
- https://www.mozilla.org/security/advisories/mfsa2018-31/
Modified: 2024-11-21
CVE-2018-18493
A buffer overflow can occur in the Skia library during buffer offset calculations with hardware accelerated canvas 2D actions due to the use of 32-bit calculations instead of 64-bit. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 64.
- 106168
- 106168
- RHSA-2018:3831
- RHSA-2018:3831
- RHSA-2018:3833
- RHSA-2018:3833
- RHSA-2019:0159
- RHSA-2019:0159
- RHSA-2019:0160
- RHSA-2019:0160
- https://bugzilla.mozilla.org/show_bug.cgi?id=1504452
- https://bugzilla.mozilla.org/show_bug.cgi?id=1504452
- [debian-lts-announce] 20181213 [SECURITY] [DLA 1605-1] firefox-esr security update
- [debian-lts-announce] 20181213 [SECURITY] [DLA 1605-1] firefox-esr security update
- GLSA-201903-04
- GLSA-201903-04
- USN-3844-1
- USN-3844-1
- USN-3868-1
- USN-3868-1
- DSA-4354
- DSA-4354
- DSA-4362
- DSA-4362
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://www.mozilla.org/security/advisories/mfsa2018-30/
- https://www.mozilla.org/security/advisories/mfsa2018-30/
- https://www.mozilla.org/security/advisories/mfsa2018-31/
- https://www.mozilla.org/security/advisories/mfsa2018-31/
Modified: 2024-11-21
CVE-2018-18494
A same-origin policy violation allowing the theft of cross-origin URL entries when using the Javascript location property to cause a redirection to another site using performance.getEntries(). This is a same-origin policy violation and could allow for data theft. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 64.
- 106168
- 106168
- RHSA-2018:3831
- RHSA-2018:3831
- RHSA-2018:3833
- RHSA-2018:3833
- RHSA-2019:0159
- RHSA-2019:0159
- RHSA-2019:0160
- RHSA-2019:0160
- https://bugzilla.mozilla.org/show_bug.cgi?id=1487964
- https://bugzilla.mozilla.org/show_bug.cgi?id=1487964
- [debian-lts-announce] 20181213 [SECURITY] [DLA 1605-1] firefox-esr security update
- [debian-lts-announce] 20181213 [SECURITY] [DLA 1605-1] firefox-esr security update
- GLSA-201903-04
- GLSA-201903-04
- USN-3844-1
- USN-3844-1
- USN-3868-1
- USN-3868-1
- DSA-4354
- DSA-4354
- DSA-4362
- DSA-4362
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://www.mozilla.org/security/advisories/mfsa2018-30/
- https://www.mozilla.org/security/advisories/mfsa2018-30/
- https://www.mozilla.org/security/advisories/mfsa2018-31/
- https://www.mozilla.org/security/advisories/mfsa2018-31/
Modified: 2024-11-21
CVE-2018-18495
WebExtension content scripts can be loaded into about: pages in some circumstances, in violation of the permissions granted to extensions. This could allow an extension to interfere with the loading and usage of these pages and use capabilities that were intended to be restricted from extensions. This vulnerability affects Firefox < 64.
Modified: 2024-11-21
CVE-2018-18496
When the RSS Feed preview about:feeds page is framed within another page, it can be used in concert with scripted content for a clickjacking attack that confuses users into downloading and executing an executable file from a temporary directory. *Note: This issue only affects Windows operating systems. Other operating systems are not affected.*. This vulnerability affects Firefox < 64.
Modified: 2024-11-21
CVE-2018-18497
Limitations on the URIs allowed to WebExtensions by the browser.windows.create API can be bypassed when a pipe in the URL field is used within the extension to load multiple pages as a single argument. This could allow a malicious WebExtension to open privileged about: or file: locations. This vulnerability affects Firefox < 64.
Modified: 2024-11-21
CVE-2018-18498
A potential vulnerability leading to an integer overflow can occur during buffer size calculations for images when a raw value is used instead of the checked value. This leads to a possible out-of-bounds write. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 64.
- 106168
- 106168
- RHSA-2018:3831
- RHSA-2018:3831
- RHSA-2018:3833
- RHSA-2018:3833
- RHSA-2019:0159
- RHSA-2019:0159
- RHSA-2019:0160
- RHSA-2019:0160
- https://bugzilla.mozilla.org/show_bug.cgi?id=1500011
- https://bugzilla.mozilla.org/show_bug.cgi?id=1500011
- [debian-lts-announce] 20181213 [SECURITY] [DLA 1605-1] firefox-esr security update
- [debian-lts-announce] 20181213 [SECURITY] [DLA 1605-1] firefox-esr security update
- GLSA-201903-04
- GLSA-201903-04
- USN-3844-1
- USN-3844-1
- USN-3868-1
- USN-3868-1
- DSA-4354
- DSA-4354
- DSA-4362
- DSA-4362
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://www.mozilla.org/security/advisories/mfsa2018-30/
- https://www.mozilla.org/security/advisories/mfsa2018-30/
- https://www.mozilla.org/security/advisories/mfsa2018-31/
- https://www.mozilla.org/security/advisories/mfsa2018-31/
Modified: 2024-11-21
CVE-2018-18500
A use-after-free vulnerability can occur while parsing an HTML5 stream in concert with custom HTML elements. This results in the stream parser object being freed while still in use, leading to a potentially exploitable crash. This vulnerability affects Thunderbird < 60.5, Firefox ESR < 60.5, and Firefox < 65.
- openSUSE-SU-2019:1758
- openSUSE-SU-2019:1758
- 106781
- 106781
- RHSA-2019:0218
- RHSA-2019:0218
- RHSA-2019:0219
- RHSA-2019:0219
- RHSA-2019:0269
- RHSA-2019:0269
- RHSA-2019:0270
- RHSA-2019:0270
- [debian-lts-announce] 20190130 [SECURITY] [DLA 1648-1] firefox-esr security update
- [debian-lts-announce] 20190130 [SECURITY] [DLA 1648-1] firefox-esr security update
- [debian-lts-announce] 20190216 [SECURITY] [DLA 1678-1] thunderbird security update
- [debian-lts-announce] 20190216 [SECURITY] [DLA 1678-1] thunderbird security update
- GLSA-201903-04
- GLSA-201903-04
- GLSA-201904-07
- GLSA-201904-07
- USN-3874-1
- USN-3874-1
- USN-3897-1
- USN-3897-1
- DSA-4376
- DSA-4376
- DSA-4392
- DSA-4392
- https://www.mozilla.org/security/advisories/mfsa2019-01/
- https://www.mozilla.org/security/advisories/mfsa2019-01/
- https://www.mozilla.org/security/advisories/mfsa2019-02/
- https://www.mozilla.org/security/advisories/mfsa2019-02/
- https://www.mozilla.org/security/advisories/mfsa2019-03/
- https://www.mozilla.org/security/advisories/mfsa2019-03/
Modified: 2024-11-21
CVE-2018-18501
Mozilla developers and community members reported memory safety bugs present in Firefox 64 and Firefox ESR 60.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 60.5, Firefox ESR < 60.5, and Firefox < 65.
- openSUSE-SU-2019:1758
- openSUSE-SU-2019:1758
- 106781
- 106781
- RHSA-2019:0218
- RHSA-2019:0218
- RHSA-2019:0219
- RHSA-2019:0219
- RHSA-2019:0269
- RHSA-2019:0269
- RHSA-2019:0270
- RHSA-2019:0270
- [debian-lts-announce] 20190130 [SECURITY] [DLA 1648-1] firefox-esr security update
- [debian-lts-announce] 20190130 [SECURITY] [DLA 1648-1] firefox-esr security update
- [debian-lts-announce] 20190216 [SECURITY] [DLA 1678-1] thunderbird security update
- [debian-lts-announce] 20190216 [SECURITY] [DLA 1678-1] thunderbird security update
- GLSA-201903-04
- GLSA-201903-04
- GLSA-201904-07
- GLSA-201904-07
- USN-3874-1
- USN-3874-1
- USN-3897-1
- USN-3897-1
- DSA-4376
- DSA-4376
- DSA-4392
- DSA-4392
- https://www.mozilla.org/security/advisories/mfsa2019-01/
- https://www.mozilla.org/security/advisories/mfsa2019-01/
- https://www.mozilla.org/security/advisories/mfsa2019-02/
- https://www.mozilla.org/security/advisories/mfsa2019-02/
- https://www.mozilla.org/security/advisories/mfsa2019-03/
- https://www.mozilla.org/security/advisories/mfsa2019-03/
Modified: 2024-11-21
CVE-2018-18502
Mozilla developers and community members reported memory safety bugs present in Firefox 64. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 65.
Modified: 2024-11-21
CVE-2018-18503
When JavaScript is used to create and manipulate an audio buffer, a potentially exploitable crash may occur because of a compartment mismatch in some situations. This vulnerability affects Firefox < 65.
Modified: 2024-11-21
CVE-2018-18504
A crash and out-of-bounds read can occur when the buffer of a texture client is freed while it is still in use during graphic operations. This results is a potentially exploitable crash and the possibility of reading from the memory of the freed buffers. This vulnerability affects Firefox < 65.
Modified: 2024-11-21
CVE-2018-18505
An earlier fix for an Inter-process Communication (IPC) vulnerability, CVE-2011-3079, added authentication to communication between IPC endpoints and server parents during IPC process creation. This authentication is insufficient for channels created after the IPC process is started, leading to the authentication not being correctly applied to later channels. This could allow for a sandbox escape through IPC channels due to lack of message validation in the listener process. This vulnerability affects Thunderbird < 60.5, Firefox ESR < 60.5, and Firefox < 65.
- openSUSE-SU-2019:1758
- openSUSE-SU-2019:1758
- 106781
- 106781
- RHSA-2019:0218
- RHSA-2019:0218
- RHSA-2019:0219
- RHSA-2019:0219
- RHSA-2019:0269
- RHSA-2019:0269
- RHSA-2019:0270
- RHSA-2019:0270
- https://bugzilla.mozilla.org/show_bug.cgi?id=1087565
- https://bugzilla.mozilla.org/show_bug.cgi?id=1087565
- [debian-lts-announce] 20190130 [SECURITY] [DLA 1648-1] firefox-esr security update
- [debian-lts-announce] 20190130 [SECURITY] [DLA 1648-1] firefox-esr security update
- [debian-lts-announce] 20190216 [SECURITY] [DLA 1678-1] thunderbird security update
- [debian-lts-announce] 20190216 [SECURITY] [DLA 1678-1] thunderbird security update
- GLSA-201903-04
- GLSA-201903-04
- GLSA-201904-07
- GLSA-201904-07
- USN-3874-1
- USN-3874-1
- USN-3897-1
- USN-3897-1
- DSA-4376
- DSA-4376
- DSA-4392
- DSA-4392
- https://www.mozilla.org/security/advisories/mfsa2019-01/
- https://www.mozilla.org/security/advisories/mfsa2019-01/
- https://www.mozilla.org/security/advisories/mfsa2019-02/
- https://www.mozilla.org/security/advisories/mfsa2019-02/
- https://www.mozilla.org/security/advisories/mfsa2019-03/
- https://www.mozilla.org/security/advisories/mfsa2019-03/
Modified: 2024-11-21
CVE-2018-18506
When proxy auto-detection is enabled, if a web server serves a Proxy Auto-Configuration (PAC) file or if a PAC file is loaded locally, this PAC file can specify that requests to the localhost are to be sent through the proxy to another server. This behavior is disallowed by default when a proxy is manually configured, but when enabled could allow for attacks on services and tools that bind to the localhost for networked behavior if they are accessed through browsing. This vulnerability affects Firefox < 65.
- openSUSE-SU-2019:1056
- openSUSE-SU-2019:1056
- openSUSE-SU-2019:1077
- openSUSE-SU-2019:1077
- openSUSE-SU-2019:1126
- openSUSE-SU-2019:1126
- openSUSE-SU-2019:1162
- openSUSE-SU-2019:1162
- 106773
- 106773
- RHSA-2019:0622
- RHSA-2019:0622
- RHSA-2019:0623
- RHSA-2019:0623
- RHSA-2019:0680
- RHSA-2019:0680
- RHSA-2019:0681
- RHSA-2019:0681
- RHSA-2019:0966
- RHSA-2019:0966
- RHSA-2019:1144
- RHSA-2019:1144
- [debian-lts-announce] 20190321 [SECURITY] [DLA 1722-1] firefox-esr security update
- [debian-lts-announce] 20190321 [SECURITY] [DLA 1722-1] firefox-esr security update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1743-1] thunderbird security update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1743-1] thunderbird security update
- 20190401 [SECURITY] [DSA 4420-1] thunderbird security update
- 20190401 [SECURITY] [DSA 4420-1] thunderbird security update
- 20190320 [SECURITY] [DSA 4411-1] firefox-esr security update
- 20190320 [SECURITY] [DSA 4411-1] firefox-esr security update
- GLSA-201904-07
- GLSA-201904-07
- USN-3874-1
- USN-3874-1
- USN-3927-1
- USN-3927-1
- DSA-4411
- DSA-4411
- DSA-4420
- DSA-4420
- https://www.mozilla.org/security/advisories/mfsa2019-01/
- https://www.mozilla.org/security/advisories/mfsa2019-01/
Modified: 2024-11-21
CVE-2018-18510
The about:crashcontent and about:crashparent pages can be triggered by web content. These pages are used to crash the loaded page or the browser for test purposes. This issue allows for a non-persistent denial of service (DOS) attack by a malicious site which links to these pages. This vulnerability affects Firefox < 64.
Modified: 2024-11-21
CVE-2018-18511
Cross-origin images can be read from a canvas element in violation of the same-origin policy using the transferFromImageBitmap method. *Note: This only affects Firefox 65. Previous versions are unaffected.*. This vulnerability affects Firefox < 65.0.1.
- openSUSE-SU-2019:1484
- openSUSE-SU-2019:1484
- openSUSE-SU-2019:1534
- openSUSE-SU-2019:1534
- openSUSE-SU-2019:1664
- openSUSE-SU-2019:1664
- RHSA-2019:1265
- RHSA-2019:1265
- RHSA-2019:1267
- RHSA-2019:1267
- RHSA-2019:1269
- RHSA-2019:1269
- RHSA-2019:1308
- RHSA-2019:1308
- RHSA-2019:1309
- RHSA-2019:1309
- RHSA-2019:1310
- RHSA-2019:1310
- https://bugzilla.mozilla.org/show_bug.cgi?id=1526218
- https://bugzilla.mozilla.org/show_bug.cgi?id=1526218
- [debian-lts-announce] 20190523 [SECURITY] [DLA 1800-1] firefox-esr security update
- [debian-lts-announce] 20190523 [SECURITY] [DLA 1800-1] firefox-esr security update
- [debian-lts-announce] 20190527 [SECURITY] [DLA 1806-1] thunderbird security update
- [debian-lts-announce] 20190527 [SECURITY] [DLA 1806-1] thunderbird security update
- 20190522 [slackware-security] mozilla-firefox (SSA:2019-141-01)
- 20190522 [slackware-security] mozilla-firefox (SSA:2019-141-01)
- 20190523 [SECURITY] [DSA 4448-1] firefox-esr security update
- 20190523 [SECURITY] [DSA 4448-1] firefox-esr security update
- 20190527 [SECURITY] [DSA 4451-1] thunderbird security update
- 20190527 [SECURITY] [DSA 4451-1] thunderbird security update
- USN-3997-1
- USN-3997-1
- DSA-4448
- DSA-4448
- DSA-4451
- DSA-4451
- https://www.mozilla.org/security/advisories/mfsa2019-04/
- https://www.mozilla.org/security/advisories/mfsa2019-04/
Modified: 2024-11-21
CVE-2019-11691
A use-after-free vulnerability can occur when working with XMLHttpRequest (XHR) in an event loop, causing the XHR main thread to be called after it has been freed. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1542465
- https://bugzilla.mozilla.org/show_bug.cgi?id=1542465
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
Modified: 2024-11-21
CVE-2019-11692
A use-after-free vulnerability can occur when listeners are removed from the event listener manager while still in use, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1544670
- https://bugzilla.mozilla.org/show_bug.cgi?id=1544670
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
Modified: 2024-11-21
CVE-2019-11693
The bufferdata function in WebGL is vulnerable to a buffer overflow with specific graphics drivers on Linux. This could result in malicious content freezing a tab or triggering a potentially exploitable crash. *Note: this issue only occurs on Linux. Other operating systems are unaffected.*. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1532525
- https://bugzilla.mozilla.org/show_bug.cgi?id=1532525
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
Modified: 2024-11-21
CVE-2019-11694
A vulnerability exists in the Windows sandbox where an uninitialized value in memory can be leaked to a renderer from a broker when making a call to access an otherwise unavailable file. This results in the potential leaking of information stored at that memory location. *Note: this issue only occurs on Windows. Other operating systems are unaffected.*. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1534196
- https://bugzilla.mozilla.org/show_bug.cgi?id=1534196
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
Modified: 2024-11-21
CVE-2019-11695
A custom cursor defined by scripting on a site can position itself over the addressbar to spoof the actual cursor when it should not be allowed outside of the primary web content area. This could be used by a malicious site to trick users into clicking on permission prompts, doorhanger notifications, or other buttons inadvertently if the location is spoofed over the user interface. This vulnerability affects Firefox < 67.
Modified: 2024-11-21
CVE-2019-11696
Files with the .JNLP extension used for "Java web start" applications are not treated as executable content for download prompts even though they can be executed if Java is installed on the local system. This could allow users to mistakenly launch an executable binary locally. This vulnerability affects Firefox < 67.
Modified: 2024-11-21
CVE-2019-11697
If the ALT and "a" keys are pressed when users receive an extension installation prompt, the extension will be installed without the install prompt delay that keeps the prompt visible in order for users to accept or decline the installation. A malicious web page could use this with spoofing on the page to trick users into installing a malicious extension. This vulnerability affects Firefox < 67.
Modified: 2024-11-21
CVE-2019-11698
If a crafted hyperlink is dragged and dropped to the bookmark bar or sidebar and the resulting bookmark is subsequently dragged and dropped into the web content area, an arbitrary query of a user's browser history can be run and transmitted to the content page via drop event data. This allows for the theft of browser history by a malicious site. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1543191
- https://bugzilla.mozilla.org/show_bug.cgi?id=1543191
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
Modified: 2024-11-21
CVE-2019-11699
A malicious page can briefly cause the wrong name to be highlighted as the domain name in the addressbar during page navigations. This could result in user confusion of which site is currently loaded for spoofing attacks. This vulnerability affects Firefox < 67.
Modified: 2024-11-21
CVE-2019-11700
A hyperlink using the res: protocol can be used to open local files at a known location in Internet Explorer if a user approves execution when prompted. *Note: this issue only occurs on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox < 67.
Modified: 2024-11-21
CVE-2019-11701
The default webcal: protocol handler will load a web site vulnerable to cross-site scripting (XSS) attacks. This default was left in place as a legacy feature and has now been removed. *Note: this issue only affects users with an account on the vulnerable service. Other users are unaffected.*. This vulnerability affects Firefox < 67.
Modified: 2024-11-21
CVE-2019-11702
A hyperlink using protocols associated with Internet Explorer, such as IE.HTTP:, can be used to open local files at a known location with Internet Explorer if a user approves execution when prompted. *Note: this issue only occurs on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox < 67.0.2.
Modified: 2024-11-21
CVE-2019-11707
A type confusion vulnerability can occur when manipulating JavaScript objects due to issues in Array.pop. This can allow for an exploitable crash. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Firefox ESR < 60.7.1, Firefox < 67.0.3, and Thunderbird < 60.7.2.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1544386
- https://bugzilla.mozilla.org/show_bug.cgi?id=1544386
- GLSA-201908-12
- GLSA-201908-12
- https://www.mozilla.org/security/advisories/mfsa2019-18/
- https://www.mozilla.org/security/advisories/mfsa2019-18/
- https://www.mozilla.org/security/advisories/mfsa2019-20/
- https://www.mozilla.org/security/advisories/mfsa2019-20/
Modified: 2024-11-21
CVE-2019-11708
Insufficient vetting of parameters passed with the Prompt:Open IPC message between child and parent processes can result in the non-sandboxed parent process opening web content chosen by a compromised child process. When combined with additional vulnerabilities this could result in executing arbitrary code on the user's computer. This vulnerability affects Firefox ESR < 60.7.2, Firefox < 67.0.4, and Thunderbird < 60.7.2.
- http://packetstormsecurity.com/files/155592/Mozilla-Firefox-Windows-64-Bit-Chain-Exploit.html
- http://packetstormsecurity.com/files/155592/Mozilla-Firefox-Windows-64-Bit-Chain-Exploit.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1559858
- https://bugzilla.mozilla.org/show_bug.cgi?id=1559858
- GLSA-201908-12
- GLSA-201908-12
- https://www.mozilla.org/security/advisories/mfsa2019-19/
- https://www.mozilla.org/security/advisories/mfsa2019-19/
- https://www.mozilla.org/security/advisories/mfsa2019-20/
- https://www.mozilla.org/security/advisories/mfsa2019-20/
Modified: 2024-11-21
CVE-2019-11709
Mozilla developers and community members reported memory safety bugs present in Firefox 67 and Firefox ESR 60.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1547266%2C1540759%2C1548822%2C1550498%2C1515052%2C1539219%2C1547757%2C1550498%2C1533522
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1547266%2C1540759%2C1548822%2C1550498%2C1515052%2C1539219%2C1547757%2C1550498%2C1533522
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- GLSA-201908-12
- GLSA-201908-12
- GLSA-201908-20
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
Modified: 2024-11-21
CVE-2019-11710
Mozilla developers and community members reported memory safety bugs present in Firefox 67. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 68.
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1549768%2C1548611%2C1533842%2C1537692%2C1540590%2C1551907%2C1510345%2C1535482%2C1535848%2C1547472%2C1547760%2C1507696%2C1544180
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1549768%2C1548611%2C1533842%2C1537692%2C1540590%2C1551907%2C1510345%2C1535482%2C1535848%2C1547472%2C1547760%2C1507696%2C1544180
- GLSA-201908-12
- GLSA-201908-12
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
Modified: 2024-11-21
CVE-2019-11711
When an inner window is reused, it does not consider the use of document.domain for cross-origin protections. If pages on different subdomains ever cooperatively use document.domain, then either page can abuse this to inject script into arbitrary pages on the other subdomain, even those that did not use document.domain to relax their origin security. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- https://bugzilla.mozilla.org/show_bug.cgi?id=1552541
- https://bugzilla.mozilla.org/show_bug.cgi?id=1552541
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- GLSA-201908-12
- GLSA-201908-12
- GLSA-201908-20
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
Modified: 2024-11-21
CVE-2019-11712
POST requests made by NPAPI plugins, such as Flash, that receive a status 308 redirect response can bypass CORS requirements. This can allow an attacker to perform Cross-Site Request Forgery (CSRF) attacks. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- https://bugzilla.mozilla.org/show_bug.cgi?id=1543804
- https://bugzilla.mozilla.org/show_bug.cgi?id=1543804
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- GLSA-201908-12
- GLSA-201908-12
- GLSA-201908-20
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
Modified: 2024-11-21
CVE-2019-11713
A use-after-free vulnerability can occur in HTTP/2 when a cached HTTP/2 stream is closed while still in use, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- https://bugzilla.mozilla.org/show_bug.cgi?id=1528481
- https://bugzilla.mozilla.org/show_bug.cgi?id=1528481
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- GLSA-201908-12
- GLSA-201908-12
- GLSA-201908-20
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
Modified: 2024-11-21
CVE-2019-11714
Necko can access a child on the wrong thread during UDP connections, resulting in a potentially exploitable crash in some instances. This vulnerability affects Firefox < 68.
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1542593
- https://bugzilla.mozilla.org/show_bug.cgi?id=1542593
- GLSA-201908-12
- GLSA-201908-12
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
Modified: 2024-11-21
CVE-2019-11715
Due to an error while parsing page content, it is possible for properly sanitized user input to be misinterpreted and lead to XSS hazards on web sites in certain circumstances. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- https://bugzilla.mozilla.org/show_bug.cgi?id=1555523
- https://bugzilla.mozilla.org/show_bug.cgi?id=1555523
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- GLSA-201908-12
- GLSA-201908-12
- GLSA-201908-20
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
Modified: 2024-11-21
CVE-2019-11716
Until explicitly accessed by script, window.globalThis is not enumerable and, as a result, is not visible to code such as Object.getOwnPropertyNames(window). Sites that deploy a sandboxing that depends on enumerating and freezing access to the window object may miss this, allowing their sandboxes to be bypassed. This vulnerability affects Firefox < 68.
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1552632
- https://bugzilla.mozilla.org/show_bug.cgi?id=1552632
- GLSA-201908-12
- GLSA-201908-12
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
Modified: 2024-11-21
CVE-2019-11717
A vulnerability exists where the caret ("^") character is improperly escaped constructing some URIs due to it being used as a separator, allowing for possible spoofing of origin attributes. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- https://bugzilla.mozilla.org/show_bug.cgi?id=1548306
- https://bugzilla.mozilla.org/show_bug.cgi?id=1548306
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- GLSA-201908-12
- GLSA-201908-12
- GLSA-201908-20
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
Modified: 2024-11-21
CVE-2019-11718
Activity Stream can display content from sent from the Snippet Service website. This content is written to innerHTML on the Activity Stream page without sanitization, allowing for a potential access to other information available to the Activity Stream, such as browsing history, if the Snipper Service were compromised. This vulnerability affects Firefox < 68.
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1408349
- https://bugzilla.mozilla.org/show_bug.cgi?id=1408349
- GLSA-201908-12
- GLSA-201908-12
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
Modified: 2024-11-21
CVE-2019-11719
When importing a curve25519 private key in PKCS#8format with leading 0x00 bytes, it is possible to trigger an out-of-bounds read in the Network Security Services (NSS) library. This could lead to information disclosure. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- RHSA-2019:1951
- RHSA-2019:1951
- https://bugzilla.mozilla.org/show_bug.cgi?id=1540541
- https://bugzilla.mozilla.org/show_bug.cgi?id=1540541
- [debian-lts-announce] 20200929 [SECURITY] [DLA 2388-1] nss security update
- [debian-lts-announce] 20200929 [SECURITY] [DLA 2388-1] nss security update
- GLSA-201908-12
- GLSA-201908-12
- GLSA-201908-20
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
Modified: 2024-11-21
CVE-2019-11720
Some unicode characters are incorrectly treated as whitespace during the parsing of web content instead of triggering parsing errors. This allows malicious code to then be processed, evading cross-site scripting (XSS) filtering. This vulnerability affects Firefox < 68.
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1556230
- https://bugzilla.mozilla.org/show_bug.cgi?id=1556230
- GLSA-201908-12
- GLSA-201908-12
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
Modified: 2024-11-21
CVE-2019-11721
The unicode latin 'kra' character can be used to spoof a standard 'k' character in the addressbar. This allows for domain spoofing attacks as do not display as punycode text, allowing for user confusion. This vulnerability affects Firefox < 68.
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1256009
- https://bugzilla.mozilla.org/show_bug.cgi?id=1256009
- GLSA-201908-12
- GLSA-201908-12
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
Modified: 2024-11-21
CVE-2019-11723
A vulnerability exists during the installation of add-ons where the initial fetch ignored the origin attributes of the browsing context. This could leak cookies in private browsing mode or across different "containers" for people who use the Firefox Multi-Account Containers Web Extension. This vulnerability affects Firefox < 68.
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1528335
- https://bugzilla.mozilla.org/show_bug.cgi?id=1528335
- GLSA-201908-12
- GLSA-201908-12
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
Modified: 2024-11-21
CVE-2019-11724
Application permissions give additional remote troubleshooting permission to the site input.mozilla.org, which has been retired and now redirects to another site. This additional permission is unnecessary and is a potential vector for malicious attacks. This vulnerability affects Firefox < 68.
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1512511
- https://bugzilla.mozilla.org/show_bug.cgi?id=1512511
- GLSA-201908-12
- GLSA-201908-12
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
Modified: 2024-11-21
CVE-2019-11725
When a user navigates to site marked as unsafe by the Safebrowsing API, warning messages are displayed and navigation is interrupted but resources from the same site loaded through websockets are not blocked, leading to the loading of unsafe resources and bypassing safebrowsing protections. This vulnerability affects Firefox < 68.
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1483510
- https://bugzilla.mozilla.org/show_bug.cgi?id=1483510
- GLSA-201908-12
- GLSA-201908-12
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
Modified: 2024-11-21
CVE-2019-11727
A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages. This vulnerability affects Firefox < 68.
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- openSUSE-SU-2020:0008
- openSUSE-SU-2020:0008
- RHSA-2019:1951
- RHSA-2019:1951
- https://bugzilla.mozilla.org/show_bug.cgi?id=1552208
- https://bugzilla.mozilla.org/show_bug.cgi?id=1552208
- GLSA-201908-12
- GLSA-201908-12
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
Modified: 2024-11-21
CVE-2019-11728
The HTTP Alternative Services header, Alt-Svc, can be used by a malicious site to scan all TCP ports of any host that the accessible to a user when web content is loaded. This vulnerability affects Firefox < 68.
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1552993
- https://bugzilla.mozilla.org/show_bug.cgi?id=1552993
- GLSA-201908-12
- GLSA-201908-12
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
Modified: 2024-11-21
CVE-2019-11729
Empty or malformed p256-ECDH public keys may trigger a segmentation fault due values being improperly sanitized before being copied into memory and used. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- RHSA-2019:1951
- RHSA-2019:1951
- RHSA-2019:4190
- RHSA-2019:4190
- https://bugzilla.mozilla.org/show_bug.cgi?id=1515342
- https://bugzilla.mozilla.org/show_bug.cgi?id=1515342
- [debian-lts-announce] 20200929 [SECURITY] [DLA 2388-1] nss security update
- [debian-lts-announce] 20200929 [SECURITY] [DLA 2388-1] nss security update
- GLSA-201908-12
- GLSA-201908-12
- GLSA-201908-20
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
Modified: 2024-11-21
CVE-2019-11730
A vulnerability exists where if a user opens a locally saved HTML file, this file can use file: URIs to access other files in the same directory or sub-directories if the names are known or guessed. The Fetch API can then be used to read the contents of any files stored in these directories and they may uploaded to a server. It was demonstrated that in combination with a popular Android messaging app, if a malicious HTML attachment is sent to a user and they opened that attachment in Firefox, due to that app's predictable pattern for locally-saved file names, it is possible to read attachments the victim received from other correspondents. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- https://bugzilla.mozilla.org/show_bug.cgi?id=1558299
- https://bugzilla.mozilla.org/show_bug.cgi?id=1558299
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- GLSA-201908-12
- GLSA-201908-12
- GLSA-201908-20
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
Modified: 2024-11-21
CVE-2019-5785
Incorrect convexity calculations in Skia in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.
Modified: 2024-11-21
CVE-2019-7317
png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute.
- openSUSE-SU-2019:1484
- openSUSE-SU-2019:1534
- openSUSE-SU-2019:1664
- openSUSE-SU-2019:1916
- openSUSE-SU-2019:1912
- http://packetstormsecurity.com/files/152561/Slackware-Security-Advisory-libpng-Updates.html
- 108098
- RHSA-2019:1265
- RHSA-2019:1267
- RHSA-2019:1269
- RHSA-2019:1308
- RHSA-2019:1309
- RHSA-2019:1310
- RHSA-2019:2494
- RHSA-2019:2495
- RHSA-2019:2585
- RHSA-2019:2590
- RHSA-2019:2592
- RHSA-2019:2737
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12803
- https://github.com/glennrp/libpng/issues/275
- [debian-lts-announce] 20190523 [SECURITY] [DLA 1800-1] firefox-esr security update
- [debian-lts-announce] 20190527 [SECURITY] [DLA 1806-1] thunderbird security update
- 20190417 [slackware-security] libpng (SSA:2019-107-01)
- 20190429 [SECURITY] [DSA 4435-1] libpng1.6 security update
- 20190522 [slackware-security] mozilla-firefox (SSA:2019-141-01)
- 20190523 [SECURITY] [DSA 4448-1] firefox-esr security update
- 20190527 [SECURITY] [DSA 4451-1] thunderbird security update
- GLSA-201908-02
- https://security.netapp.com/advisory/ntap-20190719-0005/
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03977en_us
- USN-3962-1
- USN-3991-1
- USN-3997-1
- USN-4080-1
- USN-4083-1
- DSA-4435
- DSA-4448
- DSA-4451
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- openSUSE-SU-2019:1484
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- DSA-4451
- DSA-4448
- DSA-4435
- USN-4083-1
- USN-4080-1
- USN-3997-1
- USN-3991-1
- USN-3962-1
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03977en_us
- https://security.netapp.com/advisory/ntap-20190719-0005/
- GLSA-201908-02
- 20190527 [SECURITY] [DSA 4451-1] thunderbird security update
- 20190523 [SECURITY] [DSA 4448-1] firefox-esr security update
- 20190522 [slackware-security] mozilla-firefox (SSA:2019-141-01)
- 20190429 [SECURITY] [DSA 4435-1] libpng1.6 security update
- 20190417 [slackware-security] libpng (SSA:2019-107-01)
- [debian-lts-announce] 20190527 [SECURITY] [DLA 1806-1] thunderbird security update
- [debian-lts-announce] 20190523 [SECURITY] [DLA 1800-1] firefox-esr security update
- https://github.com/glennrp/libpng/issues/275
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12803
- RHSA-2019:2737
- RHSA-2019:2592
- RHSA-2019:2590
- RHSA-2019:2585
- RHSA-2019:2495
- RHSA-2019:2494
- RHSA-2019:1310
- RHSA-2019:1309
- RHSA-2019:1308
- RHSA-2019:1269
- RHSA-2019:1267
- RHSA-2019:1265
- 108098
- http://packetstormsecurity.com/files/152561/Slackware-Security-Advisory-libpng-Updates.html
- openSUSE-SU-2019:1912
- openSUSE-SU-2019:1916
- openSUSE-SU-2019:1664
- openSUSE-SU-2019:1534
Modified: 2024-11-21
CVE-2019-9788
Mozilla developers and community members reported memory safety bugs present in Firefox 65, Firefox ESR 60.5, and Thunderbird 60.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.
- RHSA-2019:0966
- RHSA-2019:1144
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1518001%2C1521304%2C1521214%2C1506665%2C1516834%2C1518774%2C1524755%2C1523362%2C1524214%2C1529203
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- RHSA-2019:0966
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1518001%2C1521304%2C1521214%2C1506665%2C1516834%2C1518774%2C1524755%2C1523362%2C1524214%2C1529203
- RHSA-2019:1144
Modified: 2024-11-21
CVE-2019-9789
Mozilla developers and community members reported memory safety bugs present in Firefox 65. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 66.
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1520483%2C1522987%2C1528199%2C1519337%2C1525549%2C1516179%2C1518524%2C1518331%2C1526579%2C1512567%2C1524335%2C1448505%2C1518821
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1520483%2C1522987%2C1528199%2C1519337%2C1525549%2C1516179%2C1518524%2C1518331%2C1526579%2C1512567%2C1524335%2C1448505%2C1518821
- https://www.mozilla.org/security/advisories/mfsa2019-07/
Modified: 2024-11-21
CVE-2019-9790
A use-after-free vulnerability can occur when a raw pointer to a DOM element on a page is obtained using JavaScript and the element is then removed while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.
- RHSA-2019:0966
- RHSA-2019:1144
- https://bugzilla.mozilla.org/show_bug.cgi?id=1525145
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- RHSA-2019:0966
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1525145
- RHSA-2019:1144
Modified: 2024-11-21
CVE-2019-9791
The type inference system allows the compilation of functions that can cause type confusions between arbitrary objects when compiled through the IonMonkey just-in-time (JIT) compiler and when the constructor function is entered through on-stack replacement (OSR). This allows for possible arbitrary reading and writing of objects during an exploitable crash. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.
- RHSA-2019:0966
- RHSA-2019:1144
- https://bugzilla.mozilla.org/show_bug.cgi?id=1530958
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- RHSA-2019:0966
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1530958
- RHSA-2019:1144
Modified: 2024-11-21
CVE-2019-9792
The IonMonkey just-in-time (JIT) compiler can leak an internal JS_OPTIMIZED_OUT magic value to the running script during a bailout. This magic value can then be used by JavaScript to achieve memory corruption, which results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.
- http://packetstormsecurity.com/files/153106/Spidermonkey-IonMonkey-JS_OPTIMIZED_OUT-Value-Leak.html
- RHSA-2019:0966
- RHSA-2019:1144
- https://bugzilla.mozilla.org/show_bug.cgi?id=1532599
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- http://packetstormsecurity.com/files/153106/Spidermonkey-IonMonkey-JS_OPTIMIZED_OUT-Value-Leak.html
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1532599
- RHSA-2019:1144
- RHSA-2019:0966
Modified: 2024-11-21
CVE-2019-9793
A mechanism was discovered that removes some bounds checking for string, array, or typed array accesses if Spectre mitigations have been disabled. This vulnerability could allow an attacker to create an arbitrary value in compiled JavaScript, for which the range analysis will infer a fully controlled, incorrect range in circumstances where users have explicitly disabled Spectre mitigations. *Note: Spectre mitigations are currently enabled for all users by default settings.*. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.
- RHSA-2019:0966
- RHSA-2019:1144
- https://bugzilla.mozilla.org/show_bug.cgi?id=1528829
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- RHSA-2019:0966
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1528829
- RHSA-2019:1144
Modified: 2024-11-21
CVE-2019-9794
A vulnerability was discovered where specific command line arguments are not properly discarded during Firefox invocation as a shell handler for URLs. This could be used to retrieve and execute files whose location is supplied through these command line arguments if Firefox is configured as the default URI handler for a given URI scheme in third party applications and these applications insufficiently sanitize URL data. *Note: This issue only affects Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1530103
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1530103
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-07/
Modified: 2024-11-21
CVE-2019-9795
A vulnerability where type-confusion in the IonMonkey just-in-time (JIT) compiler could potentially be used by malicious JavaScript to trigger a potentially exploitable crash. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.
- RHSA-2019:0966
- RHSA-2019:1144
- https://bugzilla.mozilla.org/show_bug.cgi?id=1514682
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- RHSA-2019:0966
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1514682
- RHSA-2019:1144
Modified: 2024-11-21
CVE-2019-9796
A use-after-free vulnerability can occur when the SMIL animation controller incorrectly registers with the refresh driver twice when only a single registration is expected. When a registration is later freed with the removal of the animation controller element, the refresh driver incorrectly leaves a dangling pointer to the driver's observer array. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.
- RHSA-2019:0966
- RHSA-2019:1144
- https://bugzilla.mozilla.org/show_bug.cgi?id=1531277
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- RHSA-2019:0966
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1531277
- RHSA-2019:1144
Modified: 2024-11-21
CVE-2019-9797
Cross-origin images can be read in violation of the same-origin policy by exporting an image after using createImageBitmap to read the image and then rendering the resulting bitmap image within a canvas element. This vulnerability affects Firefox < 66.
- openSUSE-SU-2019:1484
- openSUSE-SU-2019:1534
- openSUSE-SU-2019:1664
- RHSA-2019:1265
- RHSA-2019:1267
- RHSA-2019:1269
- RHSA-2019:1308
- RHSA-2019:1309
- RHSA-2019:1310
- https://bugzilla.mozilla.org/show_bug.cgi?id=1528909
- [debian-lts-announce] 20190523 [SECURITY] [DLA 1800-1] firefox-esr security update
- [debian-lts-announce] 20190527 [SECURITY] [DLA 1806-1] thunderbird security update
- 20190522 [slackware-security] mozilla-firefox (SSA:2019-141-01)
- 20190523 [SECURITY] [DSA 4448-1] firefox-esr security update
- 20190527 [SECURITY] [DSA 4451-1] thunderbird security update
- USN-3997-1
- DSA-4448
- DSA-4451
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- openSUSE-SU-2019:1484
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- DSA-4451
- DSA-4448
- USN-3997-1
- 20190527 [SECURITY] [DSA 4451-1] thunderbird security update
- 20190523 [SECURITY] [DSA 4448-1] firefox-esr security update
- 20190522 [slackware-security] mozilla-firefox (SSA:2019-141-01)
- [debian-lts-announce] 20190527 [SECURITY] [DLA 1806-1] thunderbird security update
- [debian-lts-announce] 20190523 [SECURITY] [DLA 1800-1] firefox-esr security update
- https://bugzilla.mozilla.org/show_bug.cgi?id=1528909
- RHSA-2019:1310
- RHSA-2019:1309
- RHSA-2019:1308
- RHSA-2019:1269
- RHSA-2019:1267
- RHSA-2019:1265
- openSUSE-SU-2019:1664
- openSUSE-SU-2019:1534
Modified: 2024-11-21
CVE-2019-9798
On Android systems, Firefox can load a library from APITRACE_LIB, which is writable by all users and applications. This could allow malicious third party applications to execute a man-in-the-middle attack if a malicious code was written to that location and loaded. *Note: This issue only affects Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 66.
Modified: 2024-11-21
CVE-2019-9799
Insufficient bounds checking of data during inter-process communication might allow a compromised content process to be able to read memory from the parent process under certain conditions. This vulnerability affects Firefox < 66.
Modified: 2024-11-21
CVE-2019-9800
Mozilla developers and community members reported memory safety bugs present in Firefox 66, Firefox ESR 60.6, and Thunderbird 60.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1540166%2C1534593%2C1546327%2C1540136%2C1538736%2C1538042%2C1535612%2C1499719%2C1499108%2C1538619%2C1535194%2C1516325%2C1542324%2C1542097%2C1532465%2C1533554%2C1541580
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1540166%2C1534593%2C1546327%2C1540136%2C1538736%2C1538042%2C1535612%2C1499719%2C1499108%2C1538619%2C1535194%2C1516325%2C1542324%2C1542097%2C1532465%2C1533554%2C1541580
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-13/
Modified: 2024-11-21
CVE-2019-9801
Firefox will accept any registered Program ID as an external protocol handler and offer to launch this local application when given a matching URL on Windows operating systems. This should only happen if the program has specifically registered itself as a "URL Handler" in the Windows registry. *Note: This issue only affects Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1527717
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1527717
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-07/
Modified: 2024-11-21
CVE-2019-9802
If a Sandbox content process is compromised, it can initiate an FTP download which will then use a child process to render the downloaded data. The downloaded data can then be passed to the Chrome process with an arbitrary file length supplied by an attacker, bypassing sandbox protections and allow for a potential memory read of adjacent data from the privileged Chrome process, which may include sensitive data. This vulnerability affects Firefox < 66.
Modified: 2024-11-21
CVE-2019-9803
The Upgrade-Insecure-Requests (UIR) specification states that if UIR is enabled through Content Security Policy (CSP), navigation to a same-origin URL must be upgraded to HTTPS. Firefox will incorrectly navigate to an HTTP URL rather than perform the security upgrade requested by the CSP in some circumstances, allowing for potential man-in-the-middle attacks on the linked resources. This vulnerability affects Firefox < 66.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1437009
- https://bugzilla.mozilla.org/show_bug.cgi?id=1515863
- https://w3c.github.io/webappsec-upgrade-insecure-requests/
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1437009
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://w3c.github.io/webappsec-upgrade-insecure-requests/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1515863
Modified: 2024-11-21
CVE-2019-9804
In Firefox Developer Tools it is possible that pasting the result of the 'Copy as cURL' command into a command shell on macOS will cause the execution of unintended additional bash script commands if the URL was maliciously crafted. This is the result of an issue with the native version of Bash on macOS. *Note: This issue only affects macOS. Other operating systems are unaffected.*. This vulnerability affects Firefox < 66.
Modified: 2024-11-21
CVE-2019-9805
A latent vulnerability exists in the Prio library where data may be read from uninitialized memory for some functions, leading to potential memory corruption. This vulnerability affects Firefox < 66.
Modified: 2024-11-21
CVE-2019-9806
A vulnerability exists during authorization prompting for FTP transaction where successive modal prompts are displayed and cannot be immediately dismissed. This allows for a denial of service (DOS) attack. This vulnerability affects Firefox < 66.
Modified: 2024-11-21
CVE-2019-9807
When arbitrary text is sent over an FTP connection and a page reload is initiated, it is possible to create a modal alert message with this text as the content. This could potentially be used for social engineering attacks. This vulnerability affects Firefox < 66.
Modified: 2024-11-21
CVE-2019-9808
If WebRTC permission is requested from documents with data: or blob: URLs, the permission notifications do not properly display the originating domain. The notification states "Unknown origin" as the requestee, leading to user confusion about which site is asking for this permission. This vulnerability affects Firefox < 66.
Modified: 2024-11-21
CVE-2019-9809
If the source for resources on a page is through an FTP connection, it is possible to trigger a series of modal alert messages for these resources through invalid credentials or locations. These messages cannot be immediately dismissed, allowing for a denial of service (DOS) attack. This vulnerability affects Firefox < 66.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1282430
- https://bugzilla.mozilla.org/show_bug.cgi?id=1523249
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1282430
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1523249
Modified: 2024-11-21
CVE-2019-9810
Incorrect alias information in IonMonkey JIT compiler for Array.prototype.slice method may lead to missing bounds check and a buffer overflow. This vulnerability affects Firefox < 66.0.1, Firefox ESR < 60.6.1, and Thunderbird < 60.6.1.
- http://packetstormsecurity.com/files/155592/Mozilla-Firefox-Windows-64-Bit-Chain-Exploit.html
- RHSA-2019:0966
- RHSA-2019:1144
- https://bugzilla.mozilla.org/show_bug.cgi?id=1537924
- https://www.mozilla.org/security/advisories/mfsa2019-09/
- https://www.mozilla.org/security/advisories/mfsa2019-10/
- https://www.mozilla.org/security/advisories/mfsa2019-12/
- http://packetstormsecurity.com/files/155592/Mozilla-Firefox-Windows-64-Bit-Chain-Exploit.html
- https://www.mozilla.org/security/advisories/mfsa2019-12/
- https://www.mozilla.org/security/advisories/mfsa2019-10/
- https://www.mozilla.org/security/advisories/mfsa2019-09/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1537924
- RHSA-2019:1144
- RHSA-2019:0966
Modified: 2024-11-21
CVE-2019-9811
As part of a winning Pwn2Own entry, a researcher demonstrated a sandbox escape by installing a malicious language pack and then opening a browser feature that used the compromised translation. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1538007
- https://bugzilla.mozilla.org/show_bug.cgi?id=1539598
- https://bugzilla.mozilla.org/show_bug.cgi?id=1563327
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- GLSA-201908-12
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- openSUSE-SU-2019:1811
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- GLSA-201908-20
- GLSA-201908-12
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- https://bugzilla.mozilla.org/show_bug.cgi?id=1563327
- https://bugzilla.mozilla.org/show_bug.cgi?id=1539598
- https://bugzilla.mozilla.org/show_bug.cgi?id=1538007
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1813
Modified: 2024-11-21
CVE-2019-9813
Incorrect handling of __proto__ mutations may lead to type confusion in IonMonkey JIT code and can be leveraged for arbitrary memory read and write. This vulnerability affects Firefox < 66.0.1, Firefox ESR < 60.6.1, and Thunderbird < 60.6.1.
- RHSA-2019:0966
- RHSA-2019:1144
- https://bugzilla.mozilla.org/show_bug.cgi?id=1538006
- https://www.mozilla.org/security/advisories/mfsa2019-09/
- https://www.mozilla.org/security/advisories/mfsa2019-10/
- https://www.mozilla.org/security/advisories/mfsa2019-12/
- RHSA-2019:0966
- https://www.mozilla.org/security/advisories/mfsa2019-12/
- https://www.mozilla.org/security/advisories/mfsa2019-10/
- https://www.mozilla.org/security/advisories/mfsa2019-09/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1538006
- RHSA-2019:1144
Modified: 2024-11-21
CVE-2019-9814
Mozilla developers and community members reported memory safety bugs present in Firefox 66. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 67.
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1527592%2C1534536%2C1520132%2C1543159%2C1539393%2C1459932%2C1459182%2C1516425
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1527592%2C1534536%2C1520132%2C1543159%2C1539393%2C1459932%2C1459182%2C1516425
- https://www.mozilla.org/security/advisories/mfsa2019-13/
Modified: 2024-11-21
CVE-2019-9815
If hyperthreading is not disabled, a timing attack vulnerability exists, similar to previous Spectre attacks. Apple has shipped macOS 10.14.5 with an option to disable hyperthreading in applications running untrusted code in a thread through a new sysctl. Firefox now makes use of it on the main thread and any worker threads. *Note: users need to update to macOS 10.14.5 in order to take advantage of this change.*. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1546544
- https://mdsattacks.com/
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1546544
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://mdsattacks.com/
Modified: 2024-11-21
CVE-2019-9816
A possible vulnerability exists where type confusion can occur when manipulating JavaScript objects in object groups, allowing for the bypassing of security checks within these groups. *Note: this vulnerability has only been demonstrated with UnboxedObjects, which are disabled by default on all supported releases.*. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1536768
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1536768
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-13/
Modified: 2024-11-21
CVE-2019-9817
Images from a different domain can be read using a canvas object in some circumstances. This could be used to steal image data from a different site in violation of same-origin policy. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1540221
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1540221
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-13/
Modified: 2024-11-21
CVE-2019-9818
A race condition is present in the crash generation server used to generate data for the crash reporter. This issue can lead to a use-after-free in the main process, resulting in a potentially exploitable crash and a sandbox escape. *Note: this vulnerability only affects Windows. Other operating systems are unaffected.*. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1542581
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1542581
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-13/
Modified: 2024-11-21
CVE-2019-9819
A vulnerability where a JavaScript compartment mismatch can occur while working with the fetch API, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1532553
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1532553
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-13/
Modified: 2024-11-21
CVE-2019-9820
A use-after-free vulnerability can occur in the chrome event handler when it is freed while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1536405
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1536405
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-13/
Modified: 2024-11-21
CVE-2019-9821
A use-after-free vulnerability can occur in AssertWorkerThread due to a race condition with shared workers. This results in a potentially exploitable crash. This vulnerability affects Firefox < 67.