ALT-BU-2019-4137-1
Branch c8.1 update bulletin.
Closed vulnerabilities
BDU:2020-01729
Уязвимость плагина rustdoc языка программирования Rust, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2018-1000622
The Rust Programming Language rustdoc version Between 0.8 and 1.27.0 contains a CWE-427: Uncontrolled Search Path Element vulnerability in rustdoc plugins that can result in local code execution as a different user. This attack appear to be exploitable via using the --plugin flag without the --plugin-path flag. This vulnerability appears to have been fixed in 1.27.1.
- openSUSE-SU-2019:2203
- openSUSE-SU-2019:2203
- openSUSE-SU-2019:2244
- openSUSE-SU-2019:2244
- openSUSE-SU-2019:2294
- openSUSE-SU-2019:2294
- https://groups.google.com/forum/#%21topic/rustlang-security-announcements/4ybxYLTtXuM
- https://groups.google.com/forum/#%21topic/rustlang-security-announcements/4ybxYLTtXuM
- GLSA-201812-11
- GLSA-201812-11
Modified: 2024-11-21
CVE-2018-25008
In the standard library in Rust before 1.29.0, there is weak synchronization in the Arc::get_mut method. This synchronization issue can be lead to memory safety issues through race conditions.
Modified: 2024-11-21
CVE-2019-1010299
The Rust Programming Language Standard Library 1.18.0 and later is affected by: CWE-200: Information Exposure. The impact is: Contents of uninitialized memory could be printed to string or to log file. The component is: Debug trait implementation for std::collections::vec_deque::Iter. The attack vector is: The program needs to invoke debug printing for iterator over an empty VecDeque. The fixed version is: 1.30.0, nightly versions after commit b85e4cc8fadaabd41da5b9645c08c68b8f89908d.
Modified: 2024-11-21
CVE-2019-16760
Cargo prior to Rust 1.26.0 may download the wrong dependency if your package.toml file uses the `package` configuration key. Usage of the `package` key to rename dependencies in `Cargo.toml` is ignored in Rust 1.25.0 and prior. When Rust 1.25.0 and prior is used Cargo may download the wrong dependency, which could be squatted on crates.io to be a malicious package. This not only affects manifests that you write locally yourself, but also manifests published to crates.io. Rust 1.0.0 through Rust 1.25.0 is affected by this advisory because Cargo will ignore the `package` key in manifests. Rust 1.26.0 through Rust 1.30.0 are not affected and typically will emit an error because the `package` key is unstable. Rust 1.31.0 and after are not affected because Cargo understands the `package` key. Users of the affected versions are strongly encouraged to update their compiler to the latest available one. Preventing this issue from happening requires updating your compiler to be either Rust 1.26.0 or newer. There will be no point release for Rust versions prior to 1.26.0. Users of Rust 1.19.0 to Rust 1.25.0 can instead apply linked patches to mitigate the issue.
- [oss-security] 20191008 CVE-2019-16760: Cargo prior to Rust 1.26.0 may download the wrong dependency
- [oss-security] 20191008 CVE-2019-16760: Cargo prior to Rust 1.26.0 may download the wrong dependency
- https://gist.github.com/pietroalbini/0d293b24a44babbeb6187e06eebd4992
- https://gist.github.com/pietroalbini/0d293b24a44babbeb6187e06eebd4992
- https://github.com/rust-lang/rust/security/advisories/GHSA-phjm-8x66-qw4r
- https://github.com/rust-lang/rust/security/advisories/GHSA-phjm-8x66-qw4r
- https://groups.google.com/forum/#%21topic/rustlang-security-announcements/rVQ5e3TDnpQ
- https://groups.google.com/forum/#%21topic/rustlang-security-announcements/rVQ5e3TDnpQ
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-1000667
NASM nasm-2.13.03 nasm- 2.14rc15 version 2.14rc15 and earlier contains a memory corruption (crashed) of nasm when handling a crafted file due to function assemble_file(inname, depend_ptr) at asm/nasm.c:482. vulnerability in function assemble_file(inname, depend_ptr) at asm/nasm.c:482. that can result in aborting/crash nasm program. This attack appear to be exploitable via a specially crafted asm file..
Modified: 2024-11-21
CVE-2018-16517
asm/labels.c in Netwide Assembler (NASM) is prone to NULL Pointer Dereference, which allows the attacker to cause a denial of service via a crafted file.
- openSUSE-SU-2020:0954
- openSUSE-SU-2020:0954
- openSUSE-SU-2020:0952
- openSUSE-SU-2020:0952
- http://packetstormsecurity.com/files/152566/Netwide-Assembler-NASM-2.14rc15-Null-Pointer-Dereference.html
- http://packetstormsecurity.com/files/152566/Netwide-Assembler-NASM-2.14rc15-Null-Pointer-Dereference.html
- https://bugzilla.nasm.us/show_bug.cgi?id=3392513
- https://bugzilla.nasm.us/show_bug.cgi?id=3392513
- https://fakhrizulkifli.github.io/CVE-2018-16517.html
- https://fakhrizulkifli.github.io/CVE-2018-16517.html
- 46726
- 46726
Modified: 2024-11-21
CVE-2018-19216
Netwide Assembler (NASM) before 2.13.02 has a use-after-free in detoken at asm/preproc.c.
- openSUSE-SU-2020:0954
- openSUSE-SU-2020:0954
- openSUSE-SU-2020:0952
- openSUSE-SU-2020:0952
- https://bugzilla.nasm.us/show_bug.cgi?id=3392424
- https://bugzilla.nasm.us/show_bug.cgi?id=3392424
- https://repo.or.cz/nasm.git/commitdiff/9b7ee09abfd426b99aa1ea81d19a3b2818eeabf9
- https://repo.or.cz/nasm.git/commitdiff/9b7ee09abfd426b99aa1ea81d19a3b2818eeabf9
Closed vulnerabilities
BDU:2017-01815
Уязвимость функции crc32_big библиотеки zlib, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2017-01816
Уязвимость компонента Inffast библиотеки zlib, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2017-02382
Уязвимость компонента inftrees библиотеки zlib, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2017-02383
Уязвимость функции inflateMark библиотеки zlib, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2018-00106
Уязвимость функции ares_parse_naptr_reply библиотеки асинхронных DNS-запросов c-ares, позволяющая нарушителю выполнить чтение за границами буфера в памяти
BDU:2018-01636
Уязвимость процессоров Intel архитектур Skylake и Kaby Lake, связанная с ошибками реализации технологии одновременной многопоточности (SMT), позволяющая нарушителю раскрыть защищаемую информацию
BDU:2019-00186
Уязвимость библиотеки OpenSSL, связанная с ошибками обработки криптографических ключей при использовании протокола DH (E), позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-02907
Уязвимость реализации алгоритма умножения Монтгомери библиотеки OpenSSL, связанная с ошибкой управления ключами , позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-02909
Уязвимость библиотеки OpenSSL, связанная с чтением за границами буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-02910
Уязвимость реализации алгоритма возведения в квадратичную форму Монтгомери библиотеки OpenSSL, связанная с ошибкой переноса разряда на платформе x86_64 , позволяющая нарушителю получить несанкционированный доступ к информации
BDU:2021-03037
Уязвимость процедуры AVX2 Montgomery библиотеки OpenSSL, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Modified: 2024-11-21
CVE-2016-7055
There is a carry propagating bug in the Broadwell-specific Montgomery multiplication procedure in OpenSSL 1.0.2 and 1.1.0 before 1.1.0c that handles input lengths divisible by, but longer than 256 bits. Analysis suggests that attacks against RSA, DSA and DH private keys are impossible. This is because the subroutine in question is not used in operations with the private key itself and an input of the attacker's direct choice. Otherwise the bug can manifest itself as transient authentication and key negotiation failures or reproducible erroneous outcome of public-key operations with specially crafted input. Among EC algorithms only Brainpool P-512 curves are affected and one presumably can attack ECDH key negotiation. Impact was not analyzed in detail, because pre-requisites for attack are considered unlikely. Namely multiple clients have to choose the curve in question and the server has to share the private key among them, neither of which is default behaviour. Even then only clients that chose the curve will be affected.
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- 94242
- 94242
- 1037261
- 1037261
- RHSA-2018:2185
- RHSA-2018:2185
- RHSA-2018:2186
- RHSA-2018:2186
- RHSA-2018:2187
- RHSA-2018:2187
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03752en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03752en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03744en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03744en_us
- FreeBSD-SA-17:02
- FreeBSD-SA-17:02
- GLSA-201702-07
- GLSA-201702-07
- https://www.openssl.org/news/secadv/20161110.txt
- https://www.openssl.org/news/secadv/20161110.txt
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.tenable.com/security/tns-2017-04
- https://www.tenable.com/security/tns-2017-04
Modified: 2024-11-21
CVE-2016-9840
inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.
- openSUSE-SU-2016:3202
- openSUSE-SU-2016:3202
- openSUSE-SU-2017:0077
- openSUSE-SU-2017:0077
- openSUSE-SU-2017:0080
- openSUSE-SU-2017:0080
- [oss-security] 20161205 Re: CVE Request: zlib security issues found during audit
- [oss-security] 20161205 Re: CVE Request: zlib security issues found during audit
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- 95131
- 95131
- 1039427
- 1039427
- RHSA-2017:1220
- RHSA-2017:1220
- RHSA-2017:1221
- RHSA-2017:1221
- RHSA-2017:1222
- RHSA-2017:1222
- RHSA-2017:2999
- RHSA-2017:2999
- RHSA-2017:3046
- RHSA-2017:3046
- RHSA-2017:3047
- RHSA-2017:3047
- RHSA-2017:3453
- RHSA-2017:3453
- https://bugzilla.redhat.com/show_bug.cgi?id=1402345
- https://bugzilla.redhat.com/show_bug.cgi?id=1402345
- https://github.com/madler/zlib/commit/6a043145ca6e9c55184013841a67b2fef87e44c0
- https://github.com/madler/zlib/commit/6a043145ca6e9c55184013841a67b2fef87e44c0
- [debian-lts-announce] 20190324 [SECURITY] [DLA 1725-1] rsync security update
- [debian-lts-announce] 20190324 [SECURITY] [DLA 1725-1] rsync security update
- [debian-lts-announce] 20200129 [SECURITY] [DLA 2085-1] zlib security update
- [debian-lts-announce] 20200129 [SECURITY] [DLA 2085-1] zlib security update
- GLSA-201701-56
- GLSA-201701-56
- GLSA-202007-54
- GLSA-202007-54
- https://support.apple.com/HT208112
- https://support.apple.com/HT208112
- https://support.apple.com/HT208113
- https://support.apple.com/HT208113
- https://support.apple.com/HT208115
- https://support.apple.com/HT208115
- https://support.apple.com/HT208144
- https://support.apple.com/HT208144
- USN-4246-1
- USN-4246-1
- USN-4292-1
- USN-4292-1
- https://wiki.mozilla.org/images/0/09/Zlib-report.pdf
- https://wiki.mozilla.org/images/0/09/Zlib-report.pdf
- https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib
- https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
Modified: 2024-11-21
CVE-2016-9841
inffast.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.
- openSUSE-SU-2016:3202
- openSUSE-SU-2016:3202
- openSUSE-SU-2017:0077
- openSUSE-SU-2017:0077
- openSUSE-SU-2017:0080
- openSUSE-SU-2017:0080
- [oss-security] 20161205 Re: CVE Request: zlib security issues found during audit
- [oss-security] 20161205 Re: CVE Request: zlib security issues found during audit
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- 95131
- 95131
- 1039427
- 1039427
- 1039596
- 1039596
- RHSA-2017:1220
- RHSA-2017:1220
- RHSA-2017:1221
- RHSA-2017:1221
- RHSA-2017:1222
- RHSA-2017:1222
- RHSA-2017:2999
- RHSA-2017:2999
- RHSA-2017:3046
- RHSA-2017:3046
- RHSA-2017:3047
- RHSA-2017:3047
- RHSA-2017:3453
- RHSA-2017:3453
- https://bugzilla.redhat.com/show_bug.cgi?id=1402346
- https://bugzilla.redhat.com/show_bug.cgi?id=1402346
- https://github.com/madler/zlib/commit/9aaec95e82117c1cb0f9624264c3618fc380cecb
- https://github.com/madler/zlib/commit/9aaec95e82117c1cb0f9624264c3618fc380cecb
- [debian-lts-announce] 20190324 [SECURITY] [DLA 1725-1] rsync security update
- [debian-lts-announce] 20190324 [SECURITY] [DLA 1725-1] rsync security update
- [debian-lts-announce] 20200129 [SECURITY] [DLA 2085-1] zlib security update
- [debian-lts-announce] 20200129 [SECURITY] [DLA 2085-1] zlib security update
- GLSA-201701-56
- GLSA-201701-56
- GLSA-202007-54
- GLSA-202007-54
- https://security.netapp.com/advisory/ntap-20171019-0001/
- https://security.netapp.com/advisory/ntap-20171019-0001/
- https://support.apple.com/HT208112
- https://support.apple.com/HT208112
- https://support.apple.com/HT208113
- https://support.apple.com/HT208113
- https://support.apple.com/HT208115
- https://support.apple.com/HT208115
- https://support.apple.com/HT208144
- https://support.apple.com/HT208144
- USN-4246-1
- USN-4246-1
- USN-4292-1
- USN-4292-1
- https://wiki.mozilla.org/images/0/09/Zlib-report.pdf
- https://wiki.mozilla.org/images/0/09/Zlib-report.pdf
- https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib
- https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
Modified: 2024-11-21
CVE-2016-9842
The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers.
- openSUSE-SU-2016:3202
- openSUSE-SU-2016:3202
- openSUSE-SU-2017:0077
- openSUSE-SU-2017:0077
- openSUSE-SU-2017:0080
- openSUSE-SU-2017:0080
- [oss-security] 20161205 Re: CVE Request: zlib security issues found during audit
- [oss-security] 20161205 Re: CVE Request: zlib security issues found during audit
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- 95131
- 95131
- 1039427
- 1039427
- RHSA-2017:1220
- RHSA-2017:1220
- RHSA-2017:1221
- RHSA-2017:1221
- RHSA-2017:1222
- RHSA-2017:1222
- RHSA-2017:2999
- RHSA-2017:2999
- RHSA-2017:3046
- RHSA-2017:3046
- RHSA-2017:3047
- RHSA-2017:3047
- RHSA-2017:3453
- RHSA-2017:3453
- https://bugzilla.redhat.com/show_bug.cgi?id=1402348
- https://bugzilla.redhat.com/show_bug.cgi?id=1402348
- https://github.com/madler/zlib/commit/e54e1299404101a5a9d0cf5e45512b543967f958
- https://github.com/madler/zlib/commit/e54e1299404101a5a9d0cf5e45512b543967f958
- [debian-lts-announce] 20190324 [SECURITY] [DLA 1725-1] rsync security update
- [debian-lts-announce] 20190324 [SECURITY] [DLA 1725-1] rsync security update
- [debian-lts-announce] 20200129 [SECURITY] [DLA 2085-1] zlib security update
- [debian-lts-announce] 20200129 [SECURITY] [DLA 2085-1] zlib security update
- GLSA-201701-56
- GLSA-201701-56
- GLSA-202007-54
- GLSA-202007-54
- https://support.apple.com/HT208112
- https://support.apple.com/HT208112
- https://support.apple.com/HT208113
- https://support.apple.com/HT208113
- https://support.apple.com/HT208115
- https://support.apple.com/HT208115
- https://support.apple.com/HT208144
- https://support.apple.com/HT208144
- USN-4246-1
- USN-4246-1
- USN-4292-1
- USN-4292-1
- https://wiki.mozilla.org/images/0/09/Zlib-report.pdf
- https://wiki.mozilla.org/images/0/09/Zlib-report.pdf
- https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib
- https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
Modified: 2024-11-21
CVE-2016-9843
The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.
- openSUSE-SU-2016:3202
- openSUSE-SU-2016:3202
- openSUSE-SU-2017:0077
- openSUSE-SU-2017:0077
- openSUSE-SU-2017:0080
- openSUSE-SU-2017:0080
- [oss-security] 20161205 Re: CVE Request: zlib security issues found during audit
- [oss-security] 20161205 Re: CVE Request: zlib security issues found during audit
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- 95131
- 95131
- 1039427
- 1039427
- 1041888
- 1041888
- RHSA-2017:1220
- RHSA-2017:1220
- RHSA-2017:1221
- RHSA-2017:1221
- RHSA-2017:1222
- RHSA-2017:1222
- RHSA-2017:2999
- RHSA-2017:2999
- RHSA-2017:3046
- RHSA-2017:3046
- RHSA-2017:3047
- RHSA-2017:3047
- RHSA-2017:3453
- RHSA-2017:3453
- https://bugzilla.redhat.com/show_bug.cgi?id=1402351
- https://bugzilla.redhat.com/show_bug.cgi?id=1402351
- https://github.com/madler/zlib/commit/d1d577490c15a0c6862473d7576352a9f18ef811
- https://github.com/madler/zlib/commit/d1d577490c15a0c6862473d7576352a9f18ef811
- [debian-lts-announce] 20190324 [SECURITY] [DLA 1725-1] rsync security update
- [debian-lts-announce] 20190324 [SECURITY] [DLA 1725-1] rsync security update
- [debian-lts-announce] 20200129 [SECURITY] [DLA 2085-1] zlib security update
- [debian-lts-announce] 20200129 [SECURITY] [DLA 2085-1] zlib security update
- GLSA-201701-56
- GLSA-201701-56
- GLSA-202007-54
- GLSA-202007-54
- https://security.netapp.com/advisory/ntap-20181018-0002/
- https://security.netapp.com/advisory/ntap-20181018-0002/
- https://support.apple.com/HT208112
- https://support.apple.com/HT208112
- https://support.apple.com/HT208113
- https://support.apple.com/HT208113
- https://support.apple.com/HT208115
- https://support.apple.com/HT208115
- https://support.apple.com/HT208144
- https://support.apple.com/HT208144
- USN-4246-1
- USN-4246-1
- USN-4292-1
- USN-4292-1
- https://wiki.mozilla.org/images/0/09/Zlib-report.pdf
- https://wiki.mozilla.org/images/0/09/Zlib-report.pdf
- https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib
- https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
Modified: 2024-11-21
CVE-2017-1000381
The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way.
Modified: 2024-11-21
CVE-2017-11499
Node.js v4.0 through v4.8.3, all versions of v5.x, v6.0 through v6.11.0, v7.0 through v7.10.0, and v8.0 through v8.1.3 was susceptible to hash flooding remote DoS attacks as the HashTable seed was constant across a given released version of Node.js. This was a result of building with V8 snapshots enabled by default which caused the initially randomized seed to be overwritten on startup.
Modified: 2024-11-21
CVE-2017-15896
Node.js was affected by OpenSSL vulnerability CVE-2017-3737 in regards to the use of SSL_read() due to TLS handshake failure. The result was that an active network attacker could send application data to Node.js using the TLS or HTTP2 modules in a way that bypassed TLS authentication and encryption.
Modified: 2024-11-21
CVE-2017-3731
If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.
- RHSA-2017:0286
- RHSA-2017:0286
- DSA-3773
- DSA-3773
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- 95813
- 95813
- 1037717
- 1037717
- RHSA-2018:2185
- RHSA-2018:2185
- RHSA-2018:2186
- RHSA-2018:2186
- RHSA-2018:2187
- RHSA-2018:2187
- https://github.com/openssl/openssl/commit/00d965474b22b54e4275232bc71ee0c699c5cd21
- https://github.com/openssl/openssl/commit/00d965474b22b54e4275232bc71ee0c699c5cd21
- FreeBSD-SA-17:02
- FreeBSD-SA-17:02
- GLSA-201702-07
- GLSA-201702-07
- https://security.netapp.com/advisory/ntap-20171019-0002/
- https://security.netapp.com/advisory/ntap-20171019-0002/
- https://security.paloaltonetworks.com/CVE-2017-3731
- https://security.paloaltonetworks.com/CVE-2017-3731
- https://source.android.com/security/bulletin/pixel/2017-11-01
- https://source.android.com/security/bulletin/pixel/2017-11-01
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03838en_us
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03838en_us
- https://www.openssl.org/news/secadv/20170126.txt
- https://www.openssl.org/news/secadv/20170126.txt
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.tenable.com/security/tns-2017-04
- https://www.tenable.com/security/tns-2017-04
Modified: 2024-11-21
CVE-2017-3732
There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL 1.0.2 before 1.0.2k and 1.1.0 before 1.1.0d. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. For example this can occur by default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very similar to CVE-2015-3193 but must be treated as a separate problem.
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- 95814
- 95814
- 1037717
- 1037717
- RHSA-2018:2185
- RHSA-2018:2185
- RHSA-2018:2186
- RHSA-2018:2186
- RHSA-2018:2187
- RHSA-2018:2187
- RHSA-2018:2568
- RHSA-2018:2568
- RHSA-2018:2575
- RHSA-2018:2575
- RHSA-2018:2713
- RHSA-2018:2713
- https://github.com/openssl/openssl/commit/a59b90bf491410f1f2bc4540cc21f1980fd14c5b
- https://github.com/openssl/openssl/commit/a59b90bf491410f1f2bc4540cc21f1980fd14c5b
- FreeBSD-SA-17:02
- FreeBSD-SA-17:02
- GLSA-201702-07
- GLSA-201702-07
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03838en_us
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03838en_us
- https://www.openssl.org/news/secadv/20170126.txt
- https://www.openssl.org/news/secadv/20170126.txt
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.tenable.com/security/tns-2017-04
- https://www.tenable.com/security/tns-2017-04
Modified: 2024-11-21
CVE-2017-3738
There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. OpenSSL version 1.0.2-1.0.2m and 1.1.0-1.1.0g are affected. Fixed in OpenSSL 1.0.2n. Due to the low severity of this issue we are not issuing a new release of OpenSSL 1.1.0 at this time. The fix will be included in OpenSSL 1.1.0h when it becomes available. The fix is also available in commit e502cc86d in the OpenSSL git repository.
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- 102118
- 102118
- 1039978
- 1039978
- RHSA-2018:0998
- RHSA-2018:0998
- RHSA-2018:2185
- RHSA-2018:2185
- RHSA-2018:2186
- RHSA-2018:2186
- RHSA-2018:2187
- RHSA-2018:2187
- https://github.com/openssl/openssl/commit/e502cc86df9dafded1694fceb3228ee34d11c11a
- https://github.com/openssl/openssl/commit/e502cc86df9dafded1694fceb3228ee34d11c11a
- https://nodejs.org/en/blog/vulnerability/december-2017-security-releases/
- https://nodejs.org/en/blog/vulnerability/december-2017-security-releases/
- FreeBSD-SA-17:12
- FreeBSD-SA-17:12
- GLSA-201712-03
- GLSA-201712-03
- https://security.netapp.com/advisory/ntap-20171208-0001/
- https://security.netapp.com/advisory/ntap-20171208-0001/
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03881en_us
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03881en_us
- DSA-4065
- DSA-4065
- DSA-4157
- DSA-4157
- https://www.openssl.org/news/secadv/20171207.txt
- https://www.openssl.org/news/secadv/20171207.txt
- https://www.openssl.org/news/secadv/20180327.txt
- https://www.openssl.org/news/secadv/20180327.txt
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://www.tenable.com/security/tns-2017-16
- https://www.tenable.com/security/tns-2017-16
- https://www.tenable.com/security/tns-2018-04
- https://www.tenable.com/security/tns-2018-04
- https://www.tenable.com/security/tns-2018-06
- https://www.tenable.com/security/tns-2018-06
- https://www.tenable.com/security/tns-2018-07
- https://www.tenable.com/security/tns-2018-07
Modified: 2024-11-21
CVE-2018-0732
During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- 104442
- 104442
- 1041090
- 1041090
- RHSA-2018:2552
- RHSA-2018:2552
- RHSA-2018:2553
- RHSA-2018:2553
- RHSA-2018:3221
- RHSA-2018:3221
- RHSA-2018:3505
- RHSA-2018:3505
- RHSA-2019:1296
- RHSA-2019:1296
- RHSA-2019:1297
- RHSA-2019:1297
- RHSA-2019:1543
- RHSA-2019:1543
- https://cert-portal.siemens.com/productcert/pdf/ssa-419820.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-419820.pdf
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3984ef0b72831da8b3ece4745cac4f8575b19098
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3984ef0b72831da8b3ece4745cac4f8575b19098
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ea7abeeabf92b7aca160bdd0208636d4da69f4f4
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ea7abeeabf92b7aca160bdd0208636d4da69f4f4
- [debian-lts-announce] 20180728 [SECURITY] [DLA 1449-1] openssl security update
- [debian-lts-announce] 20180728 [SECURITY] [DLA 1449-1] openssl security update
- FEDORA-2019-db06efdea1
- FEDORA-2019-db06efdea1
- FEDORA-2019-9a0a7c0986
- FEDORA-2019-9a0a7c0986
- FEDORA-2019-00c25b9379
- FEDORA-2019-00c25b9379
- https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/
- https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/
- GLSA-201811-03
- GLSA-201811-03
- https://security.netapp.com/advisory/ntap-20181105-0001/
- https://security.netapp.com/advisory/ntap-20181105-0001/
- https://security.netapp.com/advisory/ntap-20190118-0002/
- https://security.netapp.com/advisory/ntap-20190118-0002/
- https://securityadvisories.paloaltonetworks.com/Home/Detail/133
- https://securityadvisories.paloaltonetworks.com/Home/Detail/133
- USN-3692-1
- USN-3692-1
- USN-3692-2
- USN-3692-2
- DSA-4348
- DSA-4348
- DSA-4355
- DSA-4355
- https://www.openssl.org/news/secadv/20180612.txt
- https://www.openssl.org/news/secadv/20180612.txt
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-12
- https://www.tenable.com/security/tns-2018-13
- https://www.tenable.com/security/tns-2018-13
- https://www.tenable.com/security/tns-2018-14
- https://www.tenable.com/security/tns-2018-14
- https://www.tenable.com/security/tns-2018-17
- https://www.tenable.com/security/tns-2018-17
Modified: 2024-11-21
CVE-2018-1000168
nghttp2 version >= 1.10.0 and nghttp2 <= v1.31.0 contains an Improper Input Validation CWE-20 vulnerability in ALTSVC frame handling that can result in segmentation fault leading to denial of service. This attack appears to be exploitable via network client. This vulnerability appears to have been fixed in >= 1.31.1.
- 103952
- 103952
- RHSA-2019:0366
- RHSA-2019:0366
- RHSA-2019:0367
- RHSA-2019:0367
- [debian-lts-announce] 20211017 [SECURITY] [DLA 2786-1] nghttp2 security update
- [debian-lts-announce] 20211017 [SECURITY] [DLA 2786-1] nghttp2 security update
- https://nghttp2.org/blog/2018/04/12/nghttp2-v1-31-1/
- https://nghttp2.org/blog/2018/04/12/nghttp2-v1-31-1/
- https://nodejs.org/en/blog/vulnerability/june-2018-security-releases/
- https://nodejs.org/en/blog/vulnerability/june-2018-security-releases/
Modified: 2024-11-21
CVE-2018-12115
In all versions of Node.js prior to 6.14.4, 8.11.4 and 10.9.0 when used with UCS-2 encoding (recognized by Node.js under the names `'ucs2'`, `'ucs-2'`, `'utf16le'` and `'utf-16le'`), `Buffer#write()` can be abused to write outside of the bounds of a single `Buffer`. Writes that start from the second-to-last position of a buffer cause a miscalculation of the maximum length of the input bytes to be written.
- 105127
- 105127
- RHSA-2018:2552
- RHSA-2018:2552
- RHSA-2018:2553
- RHSA-2018:2553
- RHSA-2018:2944
- RHSA-2018:2944
- RHSA-2018:2949
- RHSA-2018:2949
- RHSA-2018:3537
- RHSA-2018:3537
- https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/
- https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/
- GLSA-202003-48
- GLSA-202003-48
Modified: 2024-11-21
CVE-2018-12120
Node.js: All versions prior to Node.js 6.15.0: Debugger port 5858 listens on any interface by default: When the debugger is enabled with `node --debug` or `node debug`, it listens to port 5858 on all interfaces by default. This may allow remote computers to attach to the debug port and evaluate arbitrary JavaScript. The default interface is now localhost. It has always been possible to start the debugger on a specific interface, such as `node --debug=localhost`. The debugger was removed in Node.js 8 and replaced with the inspector, so no versions from 8 and later are vulnerable.
Modified: 2024-11-21
CVE-2018-5407
Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.
- 105897
- 105897
- RHSA-2019:0483
- RHSA-2019:0483
- RHSA-2019:0651
- RHSA-2019:0651
- RHSA-2019:0652
- RHSA-2019:0652
- RHSA-2019:2125
- RHSA-2019:2125
- RHSA-2019:3929
- RHSA-2019:3929
- RHSA-2019:3931
- RHSA-2019:3931
- RHSA-2019:3932
- RHSA-2019:3932
- RHSA-2019:3933
- RHSA-2019:3933
- RHSA-2019:3935
- RHSA-2019:3935
- https://eprint.iacr.org/2018/1060.pdf
- https://eprint.iacr.org/2018/1060.pdf
- https://github.com/bbbrumley/portsmash
- https://github.com/bbbrumley/portsmash
- [debian-lts-announce] 20181121 [SECURITY] [DLA 1586-1] openssl security update
- [debian-lts-announce] 20181121 [SECURITY] [DLA 1586-1] openssl security update
- https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/
- https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/
- GLSA-201903-10
- GLSA-201903-10
- https://security.netapp.com/advisory/ntap-20181126-0001/
- https://security.netapp.com/advisory/ntap-20181126-0001/
- https://support.f5.com/csp/article/K49711130?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K49711130?utm_source=f5support&%3Butm_medium=RSS
- USN-3840-1
- USN-3840-1
- DSA-4348
- DSA-4348
- DSA-4355
- DSA-4355
- 45785
- 45785
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://www.tenable.com/security/tns-2018-16
- https://www.tenable.com/security/tns-2018-16
- https://www.tenable.com/security/tns-2018-17
- https://www.tenable.com/security/tns-2018-17
Modified: 2024-11-21
CVE-2018-7159
The HTTP parser in all current versions of Node.js ignores spaces in the `Content-Length` header, allowing input such as `Content-Length: 1 2` to be interpreted as having a value of `12`. The HTTP specification does not allow for spaces in the `Content-Length` value and the Node.js HTTP parser has been brought into line on this particular difference. The security risk of this flaw to Node.js users is considered to be VERY LOW as it is difficult, and may be impossible, to craft an attack that makes use of this flaw in a way that could not already be achieved by supplying an incorrect value for `Content-Length`. Vulnerabilities may exist in user-code that make incorrect assumptions about the potential accuracy of this value compared to the actual length of the data supplied. Node.js users crafting lower-level HTTP utilities are advised to re-check the length of any input supplied after parsing is complete.
- RHSA-2019:2258
- RHSA-2019:2258
- https://nodejs.org/en/blog/vulnerability/march-2018-security-releases/
- https://nodejs.org/en/blog/vulnerability/march-2018-security-releases/
- https://support.f5.com/csp/article/K27228191?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K27228191?utm_source=f5support&%3Butm_medium=RSS
Modified: 2024-11-21
CVE-2018-7160
The Node.js inspector, in 6.x and later is vulnerable to a DNS rebinding attack which could be exploited to perform remote code execution. An attack is possible from malicious websites open in a web browser on the same computer, or another computer with network access to the computer running the Node.js process. A malicious website could use a DNS rebinding attack to trick the web browser to bypass same-origin-policy checks and to allow HTTP connections to localhost or to hosts on the local network. If a Node.js process with the debug port active is running on localhost or on a host on the local network, the malicious website could connect to it as a debugger, and get full code execution access.
- https://nodejs.org/en/blog/vulnerability/march-2018-security-releases/
- https://nodejs.org/en/blog/vulnerability/march-2018-security-releases/
- https://support.f5.com/csp/article/K63025104?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K63025104?utm_source=f5support&%3Butm_medium=RSS
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com//security-alerts/cpujul2021.html
Modified: 2024-11-21
CVE-2018-7161
All versions of Node.js 8.x, 9.x, and 10.x are vulnerable and the severity is HIGH. An attacker can cause a denial of service (DoS) by causing a node server providing an http2 server to crash. This can be accomplished by interacting with the http2 server in a manner that triggers a cleanup bug where objects are used in native code after they are no longer available. This has been addressed by updating the http2 implementation.
Modified: 2024-11-21
CVE-2018-7167
Calling Buffer.fill() or Buffer.alloc() with some parameters can lead to a hang which could result in a Denial of Service. In order to address this vulnerability, the implementations of Buffer.alloc() and Buffer.fill() were updated so that they zero fill instead of hanging in these cases. All versions of Node.js 6.x (LTS "Boron"), 8.x (LTS "Carbon"), and 9.x are vulnerable. All versions of Node.js 10.x (Current) are NOT vulnerable.
Modified: 2024-11-21
CVE-2019-5739
Keep-alive HTTP and HTTPS connections can remain open and inactive for up to 2 minutes in Node.js 6.16.0 and earlier. Node.js 8.0.0 introduced a dedicated server.keepAliveTimeout which defaults to 5 seconds. The behavior in Node.js 6.16.0 and earlier is a potential Denial of Service (DoS) attack vector. Node.js 6.17.0 introduces server.keepAliveTimeout and the 5-second default.
- openSUSE-SU-2019:1076
- openSUSE-SU-2019:1076
- openSUSE-SU-2019:1173
- openSUSE-SU-2019:1173
- https://nodejs.org/en/blog/vulnerability/february-2019-security-releases/
- https://nodejs.org/en/blog/vulnerability/february-2019-security-releases/
- GLSA-202003-48
- GLSA-202003-48
- https://security.netapp.com/advisory/ntap-20190502-0008/
- https://security.netapp.com/advisory/ntap-20190502-0008/
Package firefox-esr updated to version 68.3.0-alt1.M80C.1 for branch c8.1 in task 237100.
Closed vulnerabilities
BDU:2018-01122
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, вызванная переполнением буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2018-01333
Уязвимость веб-браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, связанная с использованием памяти после её освобождения, позволяющая нарушителю выполнить произвольный код или вызвать аварийное завершение работы приложения
BDU:2018-01334
Уязвимость компонента IndexedDB веб-браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код или вызвать аварийное завершение работы приложения
BDU:2018-01368
Уязвимость браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, связанная с ситуацией гонки в обработчике сигнала, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2018-01442
Уязвимость обработчика JavaScript-сценариев веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2019-00508
Уязвимость механизма записи потока мультимедиа веб-браузеров Firefox, Firefox ESR и программы для работы с электронной почтой Thunderbird, связанная с некорректной проверкой типа источника данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-00678
Уязвимость браузера Firefox, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2019-00679
Уязвимость браузера Firefox, связанная с ошибками освобождения ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-00680
Уязвимость компонента Texture Client Handler браузера Firefox, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-00681
Уязвимость компонента Proxy Auto-Config браузера Firefox, позволяющая нарушителю обойти существующие ограничения безопасности и произвести атаки на службы и инструменты, привязанные к локальному хосту
BDU:2019-00819
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с ошибками реализации механизма аутентификации межпроцессного взаимодействия (IPC), позволяющая нарушителю повысить свои привилегии и выйти из изолированной программной среды
BDU:2019-00820
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2019-00821
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с использованием памяти после её освобождения, позволяющая нарушителю выполнить произвольный код
BDU:2019-00919
Уязвимость веб-браузеров Firefox, Firefox ESR и программы для работы с электронной почтой Thunderbird, связанная с переполнением буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2019-00920
Уязвимость веб-браузеров Firefox, Firefox ESR и программы для работы с электронной почтой Thunderbird, связанная с обращением к освобожденной ячейке памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01276
Уязвимость метода Array.prototype.slice JIT-компилятора IonMonkey браузера Firefox ESR, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2019-01277
Уязвимость функции of __proto__ mutations JIT-компилятора IonMonkey браузера Firefox ESR, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2019-01422
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2019-01423
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с целочисленным переполнением, позволяющая нарушителю осуществить запись за границами буфера в памяти
BDU:2019-01424
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с использованием памяти после освобождения, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2019-01425
Уязвимость графической библиотеки Skia веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2019-01426
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с недостатками механизмов ограничения домена (Same Origin Policy), позволяющая нарушителю перенаправить пользователя на вредоносный сайт
BDU:2019-01556
Уязвимость браузеров Firefox и Firefox ESR, связанная с использованием памяти после ее освобождения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01557
Уязвимость JIT-компилятора IonMonkey браузеров Firefox и Firefox ESR, связанная с ошибкой преобразования типов данных, позволяющая нарушителю оказать воздействие на целостность защищаемых данных
BDU:2019-01568
Уязвимость just-in-time (JIT) компилятора IonMonkey веб-браузеров Firefox, Firefox ESR и программы для работы с электронной почтой Thunderbird, связанная с записью данных за пределы границ буфера, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01569
Уязвимость веб-браузеров Firefox, Firefox ESR, Firefox и программы для работы с электронной почтой Thunderbird, связанная с чтением данных за границами буфера памяти, позволяющая нарушителю получить несанкционированный доступ к защищаемым данным
BDU:2019-01950
Уязвимость программного обеспечения Firefox, Firefox ESR и Thunderbird, связанная с копированием буфера без проверки размера входных данных, позволяющая нарушителю выполнить произвольный код
BDU:2019-02851
Уязвимость браузеров Firefox, Firefox ESR, почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2019-02932
Уязвимость реализации сетевого протокола HTTP/2 браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-02933
Уязвимость браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, связанная с недостатками разграничения доступа, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-02934
Уязвимость плагина NPAPI браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, позволяющая нарушителю осуществить межсайтовую подделку запросов
BDU:2019-02935
Уязвимость компонента document.domain браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, позволяющая нарушителю осуществить межсайтовую сценарную атаку
BDU:2019-02947
Уязвимость браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, существующая из-за недостаточной проверки параметров в сообщениях Prompt:Open IPC между дочерним и родительским процессами, позволяющая нарушителю выполнить произвольный код
BDU:2019-03329
Уязвимость браузера Firefox, связанная с выходом операции за границы буфера данных, позволяющая нарушителю выполнить произвольный код
BDU:2019-03411
Уязвимость кросс-браузерной системы для разработки дополнений WebExtensions веб-браузеров Firefox, Firefox ESR, позволяющая нарушителю повысить свои привилегии
BDU:2019-03412
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с хранением паролей в незашифрованном виде, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2019-03413
Уязвимость компонента TransportSecurityInfo веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-03414
Уязвимость веб-браузеров Firefox, Firefox ESR, связанная с ошибками преобразования типов данных, позволяющая нарушителю выполнить произвольный код
BDU:2019-03415
Уязвимость реализации метода Array.prototype.push JIT-компилятора веб-браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код
BDU:2019-03461
Уязвимость браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2019-03462
Уязвимость браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2019-03463
Уязвимость функции SwizzleData браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2019-03464
Уязвимость браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, вызванная целочисленным переполнением, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2019-03465
Уязвимость браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, связанная с использованием памяти после её освобождения, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2019-03466
Уязвимость плагина NPAPI браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2019-03467
Уязвимость браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, связанная с ошибками межпроцессного взаимодействия (IPC), позволяющая нарушителю раскрыть защищаемую информацию
BDU:2019-03468
Уязвимость браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, связанная с недопустимым размером сетки во время QCMS-преобразований, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2019-03469
Уязвимость компонента PerformanceNavigationTiming браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2019-03471
Уязвимость библиотеки Skia браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-03558
Уязвимость компонента API XMLHttpRequest браузеров Firefox, Firefox ESR, почтового клиента Thunderbird, связанная с использованием памяти после ее освобождения, позволяющая нарушителю оказать воздействие на целостность данных, получить несанкционированный доступ к защищаемой информации, а также вызвать отказ в обслуживании
BDU:2019-03559
Уязвимость браузеров Firefox, Firefox ESR, почтового клиента Thunderbird, связанная с использованием памяти после ее освобождения, позволяющая нарушителю оказать воздействие на целостность данных, получить несанкционированный доступ к защищаемой информации, а также вызвать отказ в обслуживании
BDU:2019-03561
Уязвимость браузеров Firefox, Firefox ESR, почтового клиента Thunderbird, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2019-03614
Уязвимость почтового клиента Thunderbird и браузеров Firefox и Firefox ESR, связанная с неправильным синтаксическим анализом содержимого страницы или интерпретацией введенных пользователем данных, позволяющая нарушителю выполнить произвольный код
BDU:2019-03615
Уязвимость почтового клиента Thunderbird и браузеров Firefox и Firefox ESR, связанная с ошибками экранирования символа каретки("^"), позволяющая нарушителю нарушить целостность данных
BDU:2019-03616
Уязвимость библиотеки служб сетевой безопасности (NSS) почтового клиента Thunderbird и браузеров Firefox и Firefox ESR, позволяющая нарушителю получить несанкционированный доступ к информации
BDU:2019-03643
Уязвимость библиотеки для анализа XML-файлов libexpat, связанная с неверным ограничением xml-ссылок на внешние объекты, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04024
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2019-04250
Уязвимость браузера Firefox, связанная с использованием открытой переадресации, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2019-04291
Уязвимость функции Reader View браузера Firefox, позволяющая нарушителю выполнить произвольный код
BDU:2019-04295
Уязвимость браузера Firefox, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2019-04296
Уязвимость браузеров Firefox, Firefox ESR, почтового клиента Thunderbird, связанная с записью за границы буфера памяти, позволяющая нарушителю выполнить произвольный код
BDU:2019-04297
Уязвимость браузера Firefox, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2019-04298
Уязвимость системы для разработки дополнений WebExtensions браузеров Firefox, Firefox ESR, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2019-04299
Уязвимость системы для разработки дополнений WebExtensions браузеров Firefox, Firefox ESR, позволяющая нарушителю повысить свои привилегии
BDU:2019-04300
Уязвимость системы для разработки дополнений WebExtensions браузеров Firefox, Firefox ESR, позволяющая нарушителю получить несанкционированный доступ к локальным файлам
BDU:2019-04301
Уязвимость браузера Firefox, связанная с отсутствием мер по очистке входных данных, позволяющая нарушителю обойти защитный механизм CSP
BDU:2019-04302
Уязвимость компонента API браузера Firefox, позволяющая нарушителю подменить пользовательский интерфейс
BDU:2019-04303
Уязвимость браузера Firefox, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04304
Уязвимость компонента WebBrowserPersist браузера Firefox, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2019-04305
Уязвимость браузера Firefox, вызванная отсутствием предупреждения о смешанном содержимом, когда компонент веб-страницы favicon загружается через HTTP, позволяющая нарушителю проводить спуфинг-атаки
BDU:2019-04569
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2019-04581
Уязвимость браузера Firefox, связанная с ошибками при обработке объектов в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2019-04582
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с ошибками при обработке объектов в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2019-04635
Уязвимость обработчика событий браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04637
Уязвимость объекта canvas браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2019-04638
Уязвимость функций работы с объектами JavaScript браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю получить доступ к конфиденциальной информации и вызвать отказ в обслуживании
BDU:2019-04639
Уязвимость функций соответствия отсеков JavaScript браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04640
Уязвимость безопасности памяти браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании и нарушить целостность данных
BDU:2019-04642
Уязвимость функции формирования открытых ключей p256-ECDH браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00585
Уязвимость функции AssertWorkerThread браузера Firefox, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-00586
Уязвимость браузера Firefox, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-00587
Уязвимость протокола передачи файлов FTP браузера Firefox, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00588
Уязвимость расширения WebRTC браузера Firefox, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2020-00589
Уязвимость протокола передачи файлов FTP браузера Firefox, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2020-00590
Уязвимость протокола передачи файлов FTP браузера Firefox, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00591
Уязвимость библиотеки Prio браузера Firefox, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-00592
Уязвимость спецификации Upgrade-Insecure-Requests браузера Firefox, связанная с ошибкой подтверждения источника данных, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность
BDU:2020-00593
Уязвимость браузера Firefox, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2020-00594
Уязвимость браузера Firefox, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2020-00595
Уязвимость браузера Firefox, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-00596
Уязвимость браузера Firefox, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2020-00597
Уязвимость браузера Firefox, связанная с ошибкой службы сетевой безопасности CertificateVerify, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2020-00598
Уязвимость браузера Firefox, связанная с ошибками в настройках разрешений, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность
BDU:2020-00599
Уязвимость браузера Firefox, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2020-00600
Уязвимость браузера Firefox, связанная с ошибкой кодировки латинского символа kra, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2020-00601
Уязвимость браузера Firefox, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2020-00602
Уязвимость реализации страницы Activity Stream браузера Firefox, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2020-00603
Уязвимость компонента window.globalThis браузера Firefox, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-00604
Уязвимость сетевой библиотеки Necko браузера Firefox, связанная с ошибкой доступа к дочернему элементу при неправильном потоке во время UDP-соединения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-00605
Уязвимость идентификатора ресурсов webcal браузера Firefox, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2020-00606
Уязвимость браузера Firefox, связанная с ошибкой отображения доменного имени в адресной строке, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2020-00607
Уязвимость браузера Firefox, связанная с некорректной установкой приложений при нажатых клавиш на клавиатуре (ALT + a), позволяющая нарушителю оказать воздействие на целостность данных
BDU:2020-00608
Уязвимость браузера Firefox, связанная с ошибками обработки исполняемого контента для приложений с расширением .JNLP, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-00609
Уязвимость браузера Firefox, связанная с ошибкой определения пользовательского курсора, который может находиться над адресной строкой, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2020-00610
Уязвимость компонента WebExtension браузера Firefox, связанная с некорректным ограничением URI, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2020-00723
Уязвимость веб-браузеров Firefox, Firefox ESR и программы для работы с электронной почтой Thunderbird, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным
BDU:2020-00746
Уязвимость контроллера анимации SMIL почтового клиента Thunderbird и браузеров Firefox и Firefox ESR, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность
BDU:2020-00747
Уязвимость компилятора IonMonkey Just-in-Time почтового клиента Thunderbird и браузеров Firefox и Firefox ESR, связанная с неправильным преобразованием типов, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00771
Уязвимость функции createImageBitmap браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с ошибкой подтверждения источника данных, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2020-00782
Уязвимость браузера Firefox, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-00783
Уязвимость модуля VertexBuffer11 браузера Firefox, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-00784
Уязвимость компонента WebExtension браузера Firefox, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2020-01389
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с ошибкой извлечения документа из DocShell, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-01390
Уязвимость программного обеспечения Firefox, Firefox ESR, Thunderbird, связанная с копированием буфера без проверки размера входных данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-01394
Уязвимость компонента IndexedDB веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-01395
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с отсутствием мер по защите структуры веб-страницы, позволяющая нарушителю осуществлять межсайтовые сценарные атаки
BDU:2020-01396
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с включением функциональности из ненадежной управляющей сферы, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2020-01397
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с выходом операции за границы буфера памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-01398
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с ошибкой навигации событий, которые не соответствовали спецификации W3C, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2020-01399
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с использованием памяти после освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-01404
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с ошибкой переполнения буфера стека nrappkit, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-01405
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с копированием буфера без проверки размера входных данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-01406
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с ошибкой вызова произвольных методов у двух одинаковых документов, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность
BDU:2020-01408
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная связанна с ошибкой сохранения цепочки файлов, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-01409
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с ошибкой получения доступа к привилегированному объекту JSONView, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность
BDU:2020-01410
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с использованием памяти после ее освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-01411
Уязвимость компонента account.firefox.com веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю нарушить целостность данных или вызвать отказ в обслуживании
BDU:2020-01412
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с некорректной нейтрализацией ввода при генерации веб-страницы, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2020-01649
Уязвимость механизма сериализации веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с отсутствием проверки размера вводимых данных при использовании буфера, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании и оказать воздействие на целостность данных
BDU:2020-01668
Уязвимость компонента Spidermonkey веб-браузеров Firefox, Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-01675
Уязвимость механизма идентификации по отпечатку пальца веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная использование области памяти после её освобождения, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании и оказать воздействие на целостность данных
BDU:2020-01797
Уязвимость механизма использования nested workers браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с использование области памяти после её освобождения, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании и оказать воздействие на целостность данных
BDU:2020-01820
Уязвимость браузера Firefox, связанная с копированием буфера без проверки размера входных данных, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность
BDU:2020-01822
Уязвимость браузера Firefox, связанная с неправильными стандартными правами доступа, позволяющая нарушителю выполнить произвольный код
BDU:2020-01824
Уязвимость браузера Firefox, связанная с записью за границами буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность
BDU:2020-01825
Уязвимость браузера Firefox, связанная с неправильной инициализацией данных, позволяющая нарушителю нарушить целостность данных
BDU:2020-01826
Уязвимость браузера Firefox, связанная с неправильным назначением прав доступа для критического ресурса, позволяющая нарушителю получить несанкционированный доступ к информации
BDU:2020-01827
Уязвимость браузера Firefox, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить несанкционированный доступ к информации
BDU:2021-03845
Уязвимость компонента 360 Total Security браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код
BDU:2021-04379
Уязвимость службы Mozilla Maintenance Service браузеров Firefox ESR и Firefox, позволяющая нарушителю повысить свои привилегии
BDU:2022-05798
Уязвимость браузеров Mozilla Firefox и Mozilla Firefox ESR для Windows, связанная с непринятием мер по чистке данных на управляющем уровне, позволяющая нарушителю выполнить произвольные команды
BDU:2022-05799
Уязвимость службы Maintenance Service браузеров Mozilla Firefox и Mozilla Firefox ESR для Windows, позволяющая нарушителю повысить свои привилегии
BDU:2022-05929
Уязвимость службы обновления браузеров Mozilla Firefox, Mozilla Firefox ESR и почтового клиента Thunderbird для Windows, позволяющая нарушителю записать файлы состояний и журнала в незащищенный каталог
Modified: 2024-11-21
CVE-2018-12358
Service workers can use redirection to avoid the tainting of cross-origin resources in some instances, allowing a malicious site to read responses which are supposed to be opaque. This vulnerability affects Firefox < 61.
Modified: 2024-11-21
CVE-2018-12359
A buffer overflow can occur when rendering canvas content while adjusting the height and width of the canvas element dynamically, causing data to be written outside of the currently computed boundaries. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
- 104555
- 104555
- 1041193
- 1041193
- RHSA-2018:2112
- RHSA-2018:2112
- RHSA-2018:2113
- RHSA-2018:2113
- RHSA-2018:2251
- RHSA-2018:2251
- RHSA-2018:2252
- RHSA-2018:2252
- https://bugzilla.mozilla.org/show_bug.cgi?id=1459162
- https://bugzilla.mozilla.org/show_bug.cgi?id=1459162
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3705-1
- USN-3705-1
- USN-3714-1
- USN-3714-1
- DSA-4235
- DSA-4235
- DSA-4244
- DSA-4244
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
Modified: 2024-11-21
CVE-2018-12360
A use-after-free vulnerability can occur when deleting an input element during a mutation event handler triggered by focusing that element. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
- 104555
- 104555
- 1041193
- 1041193
- RHSA-2018:2112
- RHSA-2018:2112
- RHSA-2018:2113
- RHSA-2018:2113
- RHSA-2018:2251
- RHSA-2018:2251
- RHSA-2018:2252
- RHSA-2018:2252
- https://bugzilla.mozilla.org/show_bug.cgi?id=1459693
- https://bugzilla.mozilla.org/show_bug.cgi?id=1459693
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3705-1
- USN-3705-1
- USN-3714-1
- USN-3714-1
- DSA-4235
- DSA-4235
- DSA-4244
- DSA-4244
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
Modified: 2024-11-21
CVE-2018-12361
An integer overflow can occur in the SwizzleData code while calculating buffer sizes. The overflowed value is used for subsequent graphics computations when their inputs are not sanitized which results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60, Firefox ESR < 60.1, and Firefox < 61.
- 104558
- 104558
- 1041193
- 1041193
- https://bugzilla.mozilla.org/show_bug.cgi?id=1463244
- https://bugzilla.mozilla.org/show_bug.cgi?id=1463244
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3705-1
- USN-3705-1
- DSA-4295
- DSA-4295
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
Modified: 2024-11-21
CVE-2018-12362
An integer overflow can occur during graphics operations done by the Supplemental Streaming SIMD Extensions 3 (SSSE3) scaler, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
- 104560
- 104560
- 1041193
- 1041193
- RHSA-2018:2112
- RHSA-2018:2112
- RHSA-2018:2113
- RHSA-2018:2113
- RHSA-2018:2251
- RHSA-2018:2251
- RHSA-2018:2252
- RHSA-2018:2252
- https://bugzilla.mozilla.org/show_bug.cgi?id=1452375
- https://bugzilla.mozilla.org/show_bug.cgi?id=1452375
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3705-1
- USN-3705-1
- USN-3714-1
- USN-3714-1
- DSA-4235
- DSA-4235
- DSA-4244
- DSA-4244
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
Modified: 2024-11-21
CVE-2018-12363
A use-after-free vulnerability can occur when script uses mutation events to move DOM nodes between documents, resulting in the old document that held the node being freed but the node still having a pointer referencing it. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
- 104560
- 104560
- 1041193
- 1041193
- RHSA-2018:2112
- RHSA-2018:2112
- RHSA-2018:2113
- RHSA-2018:2113
- RHSA-2018:2251
- RHSA-2018:2251
- RHSA-2018:2252
- RHSA-2018:2252
- https://bugzilla.mozilla.org/show_bug.cgi?id=1464784
- https://bugzilla.mozilla.org/show_bug.cgi?id=1464784
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3705-1
- USN-3705-1
- USN-3714-1
- USN-3714-1
- DSA-4235
- DSA-4235
- DSA-4244
- DSA-4244
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
Modified: 2024-11-21
CVE-2018-12364
NPAPI plugins, such as Adobe Flash, can send non-simple cross-origin requests, bypassing CORS by making a same-origin POST that does a 307 redirect to the target site. This allows for a malicious site to engage in cross-site request forgery (CSRF) attacks. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
- 104560
- 104560
- 1041193
- 1041193
- RHSA-2018:2112
- RHSA-2018:2112
- RHSA-2018:2113
- RHSA-2018:2113
- RHSA-2018:2251
- RHSA-2018:2251
- RHSA-2018:2252
- RHSA-2018:2252
- https://bugzilla.mozilla.org/show_bug.cgi?id=1436241
- https://bugzilla.mozilla.org/show_bug.cgi?id=1436241
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3705-1
- USN-3705-1
- USN-3714-1
- USN-3714-1
- DSA-4235
- DSA-4235
- DSA-4244
- DSA-4244
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
Modified: 2024-11-21
CVE-2018-12365
A compromised IPC child process can escape the content sandbox and list the names of arbitrary files on the file system without user consent or interaction. This could result in exposure of private local files. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
- 104560
- 104560
- 1041193
- 1041193
- RHSA-2018:2112
- RHSA-2018:2112
- RHSA-2018:2113
- RHSA-2018:2113
- RHSA-2018:2251
- RHSA-2018:2251
- RHSA-2018:2252
- RHSA-2018:2252
- https://bugzilla.mozilla.org/show_bug.cgi?id=1459206
- https://bugzilla.mozilla.org/show_bug.cgi?id=1459206
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3705-1
- USN-3705-1
- USN-3714-1
- USN-3714-1
- DSA-4235
- DSA-4235
- DSA-4244
- DSA-4244
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
Modified: 2024-11-21
CVE-2018-12366
An invalid grid size during QCMS (color profile) transformations can result in the out-of-bounds read interpreted as a float value. This could leak private data into the output. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
- 104560
- 104560
- 1041193
- 1041193
- RHSA-2018:2112
- RHSA-2018:2112
- RHSA-2018:2113
- RHSA-2018:2113
- RHSA-2018:2251
- RHSA-2018:2251
- RHSA-2018:2252
- RHSA-2018:2252
- https://bugzilla.mozilla.org/show_bug.cgi?id=1464039
- https://bugzilla.mozilla.org/show_bug.cgi?id=1464039
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3705-1
- USN-3705-1
- USN-3714-1
- USN-3714-1
- DSA-4235
- DSA-4235
- DSA-4244
- DSA-4244
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
Modified: 2024-11-21
CVE-2018-12367
In the previous mitigations for Spectre, the resolution or precision of various methods was reduced to counteract the ability to measure precise time intervals. In that work PerformanceNavigationTiming was not adjusted but it was found that it could be used as a precision timer. This vulnerability affects Thunderbird < 60, Firefox ESR < 60.1, and Firefox < 61.
- 104561
- 104561
- 1041193
- 1041193
- https://bugzilla.mozilla.org/show_bug.cgi?id=1462891
- https://bugzilla.mozilla.org/show_bug.cgi?id=1462891
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3705-1
- USN-3705-1
- DSA-4295
- DSA-4295
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
Modified: 2024-11-21
CVE-2018-12369
WebExtensions bundled with embedded experiments were not correctly checked for proper authorization. This allowed a malicious WebExtension to gain full browser permissions. This vulnerability affects Firefox ESR < 60.1 and Firefox < 61.
- 104561
- 104561
- 1041193
- 1041193
- https://bugzilla.mozilla.org/show_bug.cgi?id=1454909
- https://bugzilla.mozilla.org/show_bug.cgi?id=1454909
- GLSA-201810-01
- GLSA-201810-01
- USN-3705-1
- USN-3705-1
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
Modified: 2024-11-21
CVE-2018-12370
In Reader View SameSite cookie protections are not checked on exiting. This allows for a payload to be triggered when Reader View is exited if loaded by a malicious site while Reader mode is active, bypassing CSRF protections. This vulnerability affects Firefox < 61.
Modified: 2024-11-21
CVE-2018-12371
An integer overflow vulnerability in the Skia library when allocating memory for edge builders on some systems with at least 16 GB of RAM. This results in the use of uninitialized memory, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR < 60.1, Thunderbird < 60, and Firefox < 61.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1465686
- https://bugzilla.mozilla.org/show_bug.cgi?id=1465686
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
Modified: 2024-11-21
CVE-2018-12375
Memory safety bugs present in Firefox 61. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 62.
- 105276
- 105276
- 1041610
- 1041610
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1478849%2C1433502%2C1480965%2C894215%2C1462693%2C1475431%2C1461027
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1478849%2C1433502%2C1480965%2C894215%2C1462693%2C1475431%2C1461027
- USN-3761-1
- USN-3761-1
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-20/
Modified: 2024-11-21
CVE-2018-12376
Memory safety bugs present in Firefox 61 and Firefox ESR 60.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 62, Firefox ESR < 60.2, and Thunderbird < 60.2.1.
- 105280
- 105280
- 1041610
- 1041610
- RHSA-2018:2692
- RHSA-2018:2692
- RHSA-2018:2693
- RHSA-2018:2693
- RHSA-2018:3403
- RHSA-2018:3403
- RHSA-2018:3458
- RHSA-2018:3458
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1469309%2C1469914%2C1450989%2C1480092%2C1480517%2C1481093%2C1478575%2C1471953%2C1473161%2C1466991%2C1468738%2C1483120%2C1467363%2C1472925%2C1466577%2C1467889%2C1480521%2C1478849
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1469309%2C1469914%2C1450989%2C1480092%2C1480517%2C1481093%2C1478575%2C1471953%2C1473161%2C1466991%2C1468738%2C1483120%2C1467363%2C1472925%2C1466577%2C1467889%2C1480521%2C1478849
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3761-1
- USN-3761-1
- USN-3793-1
- USN-3793-1
- DSA-4287
- DSA-4287
- DSA-4327
- DSA-4327
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-21/
- https://www.mozilla.org/security/advisories/mfsa2018-21/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
Modified: 2024-11-21
CVE-2018-12377
A use-after-free vulnerability can occur when refresh driver timers are refreshed in some circumstances during shutdown when the timer is deleted while still in use. This results in a potentially exploitable crash. This vulnerability affects Firefox < 62, Firefox ESR < 60.2, and Thunderbird < 60.2.1.
- 105280
- 105280
- 1041610
- 1041610
- RHSA-2018:2692
- RHSA-2018:2692
- RHSA-2018:2693
- RHSA-2018:2693
- RHSA-2018:3403
- RHSA-2018:3403
- RHSA-2018:3458
- RHSA-2018:3458
- https://bugzilla.mozilla.org/show_bug.cgi?id=1470260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1470260
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3761-1
- USN-3761-1
- USN-3793-1
- USN-3793-1
- DSA-4287
- DSA-4287
- DSA-4327
- DSA-4327
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-21/
- https://www.mozilla.org/security/advisories/mfsa2018-21/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
Modified: 2024-11-21
CVE-2018-12378
A use-after-free vulnerability can occur when an IndexedDB index is deleted while still in use by JavaScript code that is providing payload values to be stored. This results in a potentially exploitable crash. This vulnerability affects Firefox < 62, Firefox ESR < 60.2, and Thunderbird < 60.2.1.
- 105280
- 105280
- 1041610
- 1041610
- RHSA-2018:2692
- RHSA-2018:2692
- RHSA-2018:2693
- RHSA-2018:2693
- RHSA-2018:3403
- RHSA-2018:3403
- RHSA-2018:3458
- RHSA-2018:3458
- https://bugzilla.mozilla.org/show_bug.cgi?id=1459383
- https://bugzilla.mozilla.org/show_bug.cgi?id=1459383
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3761-1
- USN-3761-1
- USN-3793-1
- USN-3793-1
- DSA-4287
- DSA-4287
- DSA-4327
- DSA-4327
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-21/
- https://www.mozilla.org/security/advisories/mfsa2018-21/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
Modified: 2024-11-21
CVE-2018-12379
When the Mozilla Updater opens a MAR format file which contains a very long item filename, an out-of-bounds write can be triggered, leading to a potentially exploitable crash. This requires running the Mozilla Updater manually on the local system with the malicious MAR file in order to occur. This vulnerability affects Firefox < 62, Firefox ESR < 60.2, and Thunderbird < 60.2.1.
- 105280
- 105280
- 1041610
- 1041610
- RHSA-2018:2692
- RHSA-2018:2692
- RHSA-2018:2693
- RHSA-2018:2693
- RHSA-2018:3403
- RHSA-2018:3403
- RHSA-2018:3458
- RHSA-2018:3458
- https://bugzilla.mozilla.org/show_bug.cgi?id=1473113
- https://bugzilla.mozilla.org/show_bug.cgi?id=1473113
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- DSA-4327
- DSA-4327
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-21/
- https://www.mozilla.org/security/advisories/mfsa2018-21/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
Modified: 2024-11-21
CVE-2018-12383
If a user saved passwords before Firefox 58 and then later set a master password, an unencrypted copy of these passwords is still accessible. This is because the older stored password file was not deleted when the data was copied to a new format starting in Firefox 58. The new master password is added only on the new file. This could allow the exposure of stored password data outside of user expectations. This vulnerability affects Firefox < 62, Firefox ESR < 60.2.1, and Thunderbird < 60.2.1.
- 105276
- 105276
- 1041610
- 1041610
- 1041701
- 1041701
- RHSA-2018:2834
- RHSA-2018:2834
- RHSA-2018:2835
- RHSA-2018:2835
- RHSA-2018:3403
- RHSA-2018:3403
- RHSA-2018:3458
- RHSA-2018:3458
- https://bugzilla.mozilla.org/show_bug.cgi?id=1475775
- https://bugzilla.mozilla.org/show_bug.cgi?id=1475775
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3761-1
- USN-3761-1
- USN-3793-1
- USN-3793-1
- DSA-4304
- DSA-4304
- DSA-4327
- DSA-4327
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-23/
- https://www.mozilla.org/security/advisories/mfsa2018-23/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
Modified: 2024-11-21
CVE-2018-12385
A potentially exploitable crash in TransportSecurityInfo used for SSL can be triggered by data stored in the local cache in the user profile directory. This issue is only exploitable in combination with another vulnerability allowing an attacker to write data into the local cache or from locally installed malware. This issue also triggers a non-exploitable startup crash for users switching between the Nightly and Release versions of Firefox if the same profile is used. This vulnerability affects Thunderbird < 60.2.1, Firefox ESR < 60.2.1, and Firefox < 62.0.2.
- 105380
- 105380
- 1041700
- 1041700
- 1041701
- 1041701
- RHSA-2018:2834
- RHSA-2018:2834
- RHSA-2018:2835
- RHSA-2018:2835
- RHSA-2018:3403
- RHSA-2018:3403
- RHSA-2018:3458
- RHSA-2018:3458
- https://bugzilla.mozilla.org/show_bug.cgi?id=1490585
- https://bugzilla.mozilla.org/show_bug.cgi?id=1490585
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3778-1
- USN-3778-1
- USN-3793-1
- USN-3793-1
- DSA-4304
- DSA-4304
- DSA-4327
- DSA-4327
- https://www.mozilla.org/security/advisories/mfsa2018-22/
- https://www.mozilla.org/security/advisories/mfsa2018-22/
- https://www.mozilla.org/security/advisories/mfsa2018-23/
- https://www.mozilla.org/security/advisories/mfsa2018-23/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
Modified: 2024-11-21
CVE-2018-12386
A vulnerability in register allocation in JavaScript can lead to type confusion, allowing for an arbitrary read and write. This leads to remote code execution inside the sandboxed content process when triggered. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.
- 105460
- 105460
- 1041770
- 1041770
- RHSA-2018:2881
- RHSA-2018:2881
- RHSA-2018:2884
- RHSA-2018:2884
- https://bugzilla.mozilla.org/show_bug.cgi?id=1493900
- https://bugzilla.mozilla.org/show_bug.cgi?id=1493900
- GLSA-201810-01
- GLSA-201810-01
- USN-3778-1
- USN-3778-1
- DSA-4310
- DSA-4310
- https://www.mozilla.org/security/advisories/mfsa2018-24/
- https://www.mozilla.org/security/advisories/mfsa2018-24/
Modified: 2024-11-21
CVE-2018-12387
A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.
- 105460
- 105460
- 1041770
- 1041770
- RHSA-2018:2881
- RHSA-2018:2881
- RHSA-2018:2884
- RHSA-2018:2884
- https://bugzilla.mozilla.org/show_bug.cgi?id=1493903
- https://bugzilla.mozilla.org/show_bug.cgi?id=1493903
- GLSA-201810-01
- GLSA-201810-01
- USN-3778-1
- USN-3778-1
- DSA-4310
- DSA-4310
- https://www.mozilla.org/security/advisories/mfsa2018-24/
- https://www.mozilla.org/security/advisories/mfsa2018-24/
Modified: 2024-11-21
CVE-2018-12388
Mozilla developers and community members reported memory safety bugs present in Firefox 62. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 63.
- 105721
- 105721
- 1041944
- 1041944
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1472639%2C1485698%2C1301547%2C1471427%2C1379411%2C1482122%2C1486314%2C1487167
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1472639%2C1485698%2C1301547%2C1471427%2C1379411%2C1482122%2C1486314%2C1487167
- USN-3801-1
- USN-3801-1
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-26/
Modified: 2024-11-21
CVE-2018-12390
Mozilla developers and community members reported memory safety bugs present in Firefox 62 and Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 63, Firefox ESR < 60.3, and Thunderbird < 60.3.
- 105718
- 105718
- 105769
- 105769
- 1041944
- 1041944
- RHSA-2018:3005
- RHSA-2018:3005
- RHSA-2018:3006
- RHSA-2018:3006
- RHSA-2018:3531
- RHSA-2018:3531
- RHSA-2018:3532
- RHSA-2018:3532
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1487098%2C1487660%2C1490234%2C1496159%2C1443748%2C1496340%2C1483905%2C1493347%2C1488803%2C1498701%2C1498482%2C1442010%2C1495245%2C1483699%2C1469486%2C1484905%2C1490561%2C1492524%2C1481844
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1487098%2C1487660%2C1490234%2C1496159%2C1443748%2C1496340%2C1483905%2C1493347%2C1488803%2C1498701%2C1498482%2C1442010%2C1495245%2C1483699%2C1469486%2C1484905%2C1490561%2C1492524%2C1481844
- [debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update
- [debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201811-04
- GLSA-201811-04
- GLSA-201811-13
- GLSA-201811-13
- USN-3801-1
- USN-3801-1
- USN-3868-1
- USN-3868-1
- DSA-4324
- DSA-4324
- DSA-4337
- DSA-4337
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-28/
- https://www.mozilla.org/security/advisories/mfsa2018-28/
Modified: 2024-11-21
CVE-2018-12392
When manipulating user events in nested loops while opening a document through script, it is possible to trigger a potentially exploitable crash due to poor event handling. This vulnerability affects Firefox < 63, Firefox ESR < 60.3, and Thunderbird < 60.3.
- 105718
- 105718
- 105769
- 105769
- 1041944
- 1041944
- RHSA-2018:3005
- RHSA-2018:3005
- RHSA-2018:3006
- RHSA-2018:3006
- RHSA-2018:3531
- RHSA-2018:3531
- RHSA-2018:3532
- RHSA-2018:3532
- https://bugzilla.mozilla.org/show_bug.cgi?id=1492823
- https://bugzilla.mozilla.org/show_bug.cgi?id=1492823
- [debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update
- [debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201811-04
- GLSA-201811-04
- GLSA-201811-13
- GLSA-201811-13
- USN-3801-1
- USN-3801-1
- USN-3868-1
- USN-3868-1
- DSA-4324
- DSA-4324
- DSA-4337
- DSA-4337
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-28/
- https://www.mozilla.org/security/advisories/mfsa2018-28/
Modified: 2024-11-21
CVE-2018-12393
A potential vulnerability was found in 32-bit builds where an integer overflow during the conversion of scripts to an internal UTF-16 representation could result in allocating a buffer too small for the conversion. This leads to a possible out-of-bounds write. *Note: 64-bit builds are not vulnerable to this issue.*. This vulnerability affects Firefox < 63, Firefox ESR < 60.3, and Thunderbird < 60.3.
- 105718
- 105718
- 105769
- 105769
- 1041944
- 1041944
- RHSA-2018:3005
- RHSA-2018:3005
- RHSA-2018:3006
- RHSA-2018:3006
- RHSA-2018:3531
- RHSA-2018:3531
- RHSA-2018:3532
- RHSA-2018:3532
- https://bugzilla.mozilla.org/show_bug.cgi?id=1495011
- https://bugzilla.mozilla.org/show_bug.cgi?id=1495011
- [debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update
- [debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201811-04
- GLSA-201811-04
- GLSA-201811-13
- GLSA-201811-13
- USN-3801-1
- USN-3801-1
- USN-3868-1
- USN-3868-1
- DSA-4324
- DSA-4324
- DSA-4337
- DSA-4337
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-28/
- https://www.mozilla.org/security/advisories/mfsa2018-28/
Modified: 2024-11-21
CVE-2018-12395
By rewriting the Host: request headers using the webRequest API, a WebExtension can bypass domain restrictions through domain fronting. This would allow access to domains that share a host that are otherwise restricted. This vulnerability affects Firefox ESR < 60.3 and Firefox < 63.
- 105718
- 105718
- 1041944
- 1041944
- RHSA-2018:3005
- RHSA-2018:3005
- RHSA-2018:3006
- RHSA-2018:3006
- https://bugzilla.mozilla.org/show_bug.cgi?id=1467523
- https://bugzilla.mozilla.org/show_bug.cgi?id=1467523
- [debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update
- [debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update
- GLSA-201811-04
- GLSA-201811-04
- USN-3801-1
- USN-3801-1
- DSA-4324
- DSA-4324
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
Modified: 2024-11-21
CVE-2018-12396
A vulnerability where a WebExtension can run content scripts in disallowed contexts following navigation or other events. This allows for potential privilege escalation by the WebExtension on sites where content scripts should not be run. This vulnerability affects Firefox ESR < 60.3 and Firefox < 63.
- 105718
- 105718
- 1041944
- 1041944
- RHSA-2018:3005
- RHSA-2018:3005
- RHSA-2018:3006
- RHSA-2018:3006
- https://bugzilla.mozilla.org/show_bug.cgi?id=1483602
- https://bugzilla.mozilla.org/show_bug.cgi?id=1483602
- [debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update
- [debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update
- GLSA-201811-04
- GLSA-201811-04
- USN-3801-1
- USN-3801-1
- DSA-4324
- DSA-4324
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
Modified: 2024-11-21
CVE-2018-12397
A WebExtension can request access to local files without the warning prompt stating that the extension will "Access your data for all websites" being displayed to the user. This allows extensions to run content scripts in local pages without permission warnings when a local file is opened. This vulnerability affects Firefox ESR < 60.3 and Firefox < 63.
- 105718
- 105718
- 1041944
- 1041944
- RHSA-2018:3005
- RHSA-2018:3005
- RHSA-2018:3006
- RHSA-2018:3006
- https://bugzilla.mozilla.org/show_bug.cgi?id=1487478
- https://bugzilla.mozilla.org/show_bug.cgi?id=1487478
- [debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update
- [debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update
- GLSA-201811-04
- GLSA-201811-04
- USN-3801-1
- USN-3801-1
- DSA-4324
- DSA-4324
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
Modified: 2024-11-21
CVE-2018-12398
By using the reflected URL in some special resource URIs, such as chrome:, it is possible to inject stylesheets and bypass Content Security Policy (CSP). This vulnerability affects Firefox < 63.
- 105721
- 105721
- 1041944
- 1041944
- https://bugzilla.mozilla.org/show_bug.cgi?id=1460538
- https://bugzilla.mozilla.org/show_bug.cgi?id=1460538
- https://bugzilla.mozilla.org/show_bug.cgi?id=1488061
- https://bugzilla.mozilla.org/show_bug.cgi?id=1488061
- USN-3801-1
- USN-3801-1
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-26/
Modified: 2024-11-21
CVE-2018-12399
When a new protocol handler is registered, the API accepts a title argument which can be used to mislead users about which domain is registering the new protocol. This may result in the user approving a protocol handler that they otherwise would not have. This vulnerability affects Firefox < 63.
Modified: 2024-11-21
CVE-2018-12401
Some special resource URIs will cause a non-exploitable crash if loaded with optional parameters following a '?' in the parsed string. This could lead to denial of service (DOS) attacks. This vulnerability affects Firefox < 63.
Modified: 2024-11-21
CVE-2018-12402
The internal WebBrowserPersist code does not use correct origin context for a resource being saved. This manifests when sub-resources are loaded as part of "Save Page As..." functionality. For example, a malicious page could recover a visitor's Windows username and NTLM hash by including resources otherwise unreachable to the malicious page, if they can convince the visitor to save the complete web page. Similarly, SameSite cookies are sent on cross-origin requests when the "Save Page As..." menu item is selected to save a page, which can result in saving the wrong version of resources based on those cookies. This vulnerability affects Firefox < 63.
- 105721
- 105721
- 1041944
- 1041944
- https://bugzilla.mozilla.org/show_bug.cgi?id=1447087
- https://bugzilla.mozilla.org/show_bug.cgi?id=1447087
- https://bugzilla.mozilla.org/show_bug.cgi?id=1469916
- https://bugzilla.mozilla.org/show_bug.cgi?id=1469916
- USN-3801-1
- USN-3801-1
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-26/
Modified: 2024-11-21
CVE-2018-12403
If a site is loaded over a HTTPS connection but loads a favicon resource over HTTP, the mixed content warning is not displayed to users. This vulnerability affects Firefox < 63.
Modified: 2024-11-21
CVE-2018-12405
Mozilla developers and community members reported memory safety bugs present in Firefox 63 and Firefox ESR 60.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 64.
- 106168
- 106168
- RHSA-2018:3831
- RHSA-2018:3831
- RHSA-2018:3833
- RHSA-2018:3833
- RHSA-2019:0159
- RHSA-2019:0159
- RHSA-2019:0160
- RHSA-2019:0160
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1494752%2C1498765%2C1503326%2C1505181%2C1500759%2C1504365%2C1506640%2C1503082%2C1502013%2C1510471
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1494752%2C1498765%2C1503326%2C1505181%2C1500759%2C1504365%2C1506640%2C1503082%2C1502013%2C1510471
- [debian-lts-announce] 20181213 [SECURITY] [DLA 1605-1] firefox-esr security update
- [debian-lts-announce] 20181213 [SECURITY] [DLA 1605-1] firefox-esr security update
- GLSA-201903-04
- GLSA-201903-04
- USN-3844-1
- USN-3844-1
- USN-3868-1
- USN-3868-1
- DSA-4354
- DSA-4354
- DSA-4362
- DSA-4362
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://www.mozilla.org/security/advisories/mfsa2018-30/
- https://www.mozilla.org/security/advisories/mfsa2018-30/
- https://www.mozilla.org/security/advisories/mfsa2018-31/
- https://www.mozilla.org/security/advisories/mfsa2018-31/
Modified: 2024-11-21
CVE-2018-12406
Mozilla developers and community members reported memory safety bugs present in Firefox 63. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 64.
- 106167
- 106167
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1456947%2C1475669%2C1504816%2C1502886%2C1500064%2C1500310%2C1500696%2C1499198%2C1434490%2C1481745%2C1458129
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1456947%2C1475669%2C1504816%2C1502886%2C1500064%2C1500310%2C1500696%2C1499198%2C1434490%2C1481745%2C1458129
- USN-3844-1
- USN-3844-1
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://www.mozilla.org/security/advisories/mfsa2018-29/
Modified: 2024-11-21
CVE-2018-12407
A buffer overflow occurs when drawing and validating elements with the ANGLE graphics library, used for WebGL content, when working with the VertexBuffer11 module. This results in a potentially exploitable crash. This vulnerability affects Firefox < 64.
Modified: 2024-11-21
CVE-2018-18492
A use-after-free vulnerability can occur after deleting a selection element due to a weak reference to the select element in the options collection. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 64.
- 106168
- 106168
- RHSA-2018:3831
- RHSA-2018:3831
- RHSA-2018:3833
- RHSA-2018:3833
- RHSA-2019:0159
- RHSA-2019:0159
- RHSA-2019:0160
- RHSA-2019:0160
- https://bugzilla.mozilla.org/show_bug.cgi?id=1499861
- https://bugzilla.mozilla.org/show_bug.cgi?id=1499861
- [debian-lts-announce] 20181213 [SECURITY] [DLA 1605-1] firefox-esr security update
- [debian-lts-announce] 20181213 [SECURITY] [DLA 1605-1] firefox-esr security update
- GLSA-201903-04
- GLSA-201903-04
- USN-3844-1
- USN-3844-1
- USN-3868-1
- USN-3868-1
- DSA-4354
- DSA-4354
- DSA-4362
- DSA-4362
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://www.mozilla.org/security/advisories/mfsa2018-30/
- https://www.mozilla.org/security/advisories/mfsa2018-30/
- https://www.mozilla.org/security/advisories/mfsa2018-31/
- https://www.mozilla.org/security/advisories/mfsa2018-31/
Modified: 2024-11-21
CVE-2018-18493
A buffer overflow can occur in the Skia library during buffer offset calculations with hardware accelerated canvas 2D actions due to the use of 32-bit calculations instead of 64-bit. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 64.
- 106168
- 106168
- RHSA-2018:3831
- RHSA-2018:3831
- RHSA-2018:3833
- RHSA-2018:3833
- RHSA-2019:0159
- RHSA-2019:0159
- RHSA-2019:0160
- RHSA-2019:0160
- https://bugzilla.mozilla.org/show_bug.cgi?id=1504452
- https://bugzilla.mozilla.org/show_bug.cgi?id=1504452
- [debian-lts-announce] 20181213 [SECURITY] [DLA 1605-1] firefox-esr security update
- [debian-lts-announce] 20181213 [SECURITY] [DLA 1605-1] firefox-esr security update
- GLSA-201903-04
- GLSA-201903-04
- USN-3844-1
- USN-3844-1
- USN-3868-1
- USN-3868-1
- DSA-4354
- DSA-4354
- DSA-4362
- DSA-4362
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://www.mozilla.org/security/advisories/mfsa2018-30/
- https://www.mozilla.org/security/advisories/mfsa2018-30/
- https://www.mozilla.org/security/advisories/mfsa2018-31/
- https://www.mozilla.org/security/advisories/mfsa2018-31/
Modified: 2024-11-21
CVE-2018-18494
A same-origin policy violation allowing the theft of cross-origin URL entries when using the Javascript location property to cause a redirection to another site using performance.getEntries(). This is a same-origin policy violation and could allow for data theft. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 64.
- 106168
- 106168
- RHSA-2018:3831
- RHSA-2018:3831
- RHSA-2018:3833
- RHSA-2018:3833
- RHSA-2019:0159
- RHSA-2019:0159
- RHSA-2019:0160
- RHSA-2019:0160
- https://bugzilla.mozilla.org/show_bug.cgi?id=1487964
- https://bugzilla.mozilla.org/show_bug.cgi?id=1487964
- [debian-lts-announce] 20181213 [SECURITY] [DLA 1605-1] firefox-esr security update
- [debian-lts-announce] 20181213 [SECURITY] [DLA 1605-1] firefox-esr security update
- GLSA-201903-04
- GLSA-201903-04
- USN-3844-1
- USN-3844-1
- USN-3868-1
- USN-3868-1
- DSA-4354
- DSA-4354
- DSA-4362
- DSA-4362
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://www.mozilla.org/security/advisories/mfsa2018-30/
- https://www.mozilla.org/security/advisories/mfsa2018-30/
- https://www.mozilla.org/security/advisories/mfsa2018-31/
- https://www.mozilla.org/security/advisories/mfsa2018-31/
Modified: 2024-11-21
CVE-2018-18495
WebExtension content scripts can be loaded into about: pages in some circumstances, in violation of the permissions granted to extensions. This could allow an extension to interfere with the loading and usage of these pages and use capabilities that were intended to be restricted from extensions. This vulnerability affects Firefox < 64.
Modified: 2024-11-21
CVE-2018-18497
Limitations on the URIs allowed to WebExtensions by the browser.windows.create API can be bypassed when a pipe in the URL field is used within the extension to load multiple pages as a single argument. This could allow a malicious WebExtension to open privileged about: or file: locations. This vulnerability affects Firefox < 64.
Modified: 2024-11-21
CVE-2018-18498
A potential vulnerability leading to an integer overflow can occur during buffer size calculations for images when a raw value is used instead of the checked value. This leads to a possible out-of-bounds write. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 64.
- 106168
- 106168
- RHSA-2018:3831
- RHSA-2018:3831
- RHSA-2018:3833
- RHSA-2018:3833
- RHSA-2019:0159
- RHSA-2019:0159
- RHSA-2019:0160
- RHSA-2019:0160
- https://bugzilla.mozilla.org/show_bug.cgi?id=1500011
- https://bugzilla.mozilla.org/show_bug.cgi?id=1500011
- [debian-lts-announce] 20181213 [SECURITY] [DLA 1605-1] firefox-esr security update
- [debian-lts-announce] 20181213 [SECURITY] [DLA 1605-1] firefox-esr security update
- GLSA-201903-04
- GLSA-201903-04
- USN-3844-1
- USN-3844-1
- USN-3868-1
- USN-3868-1
- DSA-4354
- DSA-4354
- DSA-4362
- DSA-4362
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://www.mozilla.org/security/advisories/mfsa2018-30/
- https://www.mozilla.org/security/advisories/mfsa2018-30/
- https://www.mozilla.org/security/advisories/mfsa2018-31/
- https://www.mozilla.org/security/advisories/mfsa2018-31/
Modified: 2024-11-21
CVE-2018-18499
A same-origin policy violation allowing the theft of cross-origin URL entries when using a meta http-equiv="refresh" on a page to cause a redirection to another site using performance.getEntries(). This is a same-origin policy violation and could allow for data theft. This vulnerability affects Firefox < 62, Firefox ESR < 60.2, and Thunderbird < 60.2.1.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1468523
- https://bugzilla.mozilla.org/show_bug.cgi?id=1468523
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://www.mozilla.org/security/advisories/mfsa2018-21/
- https://www.mozilla.org/security/advisories/mfsa2018-21/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
- https://www.mozilla.org/security/advisories/mfsa2018-25/
Modified: 2024-11-21
CVE-2018-18500
A use-after-free vulnerability can occur while parsing an HTML5 stream in concert with custom HTML elements. This results in the stream parser object being freed while still in use, leading to a potentially exploitable crash. This vulnerability affects Thunderbird < 60.5, Firefox ESR < 60.5, and Firefox < 65.
- openSUSE-SU-2019:1758
- openSUSE-SU-2019:1758
- 106781
- 106781
- RHSA-2019:0218
- RHSA-2019:0218
- RHSA-2019:0219
- RHSA-2019:0219
- RHSA-2019:0269
- RHSA-2019:0269
- RHSA-2019:0270
- RHSA-2019:0270
- [debian-lts-announce] 20190130 [SECURITY] [DLA 1648-1] firefox-esr security update
- [debian-lts-announce] 20190130 [SECURITY] [DLA 1648-1] firefox-esr security update
- [debian-lts-announce] 20190216 [SECURITY] [DLA 1678-1] thunderbird security update
- [debian-lts-announce] 20190216 [SECURITY] [DLA 1678-1] thunderbird security update
- GLSA-201903-04
- GLSA-201903-04
- GLSA-201904-07
- GLSA-201904-07
- USN-3874-1
- USN-3874-1
- USN-3897-1
- USN-3897-1
- DSA-4376
- DSA-4376
- DSA-4392
- DSA-4392
- https://www.mozilla.org/security/advisories/mfsa2019-01/
- https://www.mozilla.org/security/advisories/mfsa2019-01/
- https://www.mozilla.org/security/advisories/mfsa2019-02/
- https://www.mozilla.org/security/advisories/mfsa2019-02/
- https://www.mozilla.org/security/advisories/mfsa2019-03/
- https://www.mozilla.org/security/advisories/mfsa2019-03/
Modified: 2024-11-21
CVE-2018-18501
Mozilla developers and community members reported memory safety bugs present in Firefox 64 and Firefox ESR 60.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 60.5, Firefox ESR < 60.5, and Firefox < 65.
- openSUSE-SU-2019:1758
- openSUSE-SU-2019:1758
- 106781
- 106781
- RHSA-2019:0218
- RHSA-2019:0218
- RHSA-2019:0219
- RHSA-2019:0219
- RHSA-2019:0269
- RHSA-2019:0269
- RHSA-2019:0270
- RHSA-2019:0270
- [debian-lts-announce] 20190130 [SECURITY] [DLA 1648-1] firefox-esr security update
- [debian-lts-announce] 20190130 [SECURITY] [DLA 1648-1] firefox-esr security update
- [debian-lts-announce] 20190216 [SECURITY] [DLA 1678-1] thunderbird security update
- [debian-lts-announce] 20190216 [SECURITY] [DLA 1678-1] thunderbird security update
- GLSA-201903-04
- GLSA-201903-04
- GLSA-201904-07
- GLSA-201904-07
- USN-3874-1
- USN-3874-1
- USN-3897-1
- USN-3897-1
- DSA-4376
- DSA-4376
- DSA-4392
- DSA-4392
- https://www.mozilla.org/security/advisories/mfsa2019-01/
- https://www.mozilla.org/security/advisories/mfsa2019-01/
- https://www.mozilla.org/security/advisories/mfsa2019-02/
- https://www.mozilla.org/security/advisories/mfsa2019-02/
- https://www.mozilla.org/security/advisories/mfsa2019-03/
- https://www.mozilla.org/security/advisories/mfsa2019-03/
Modified: 2024-11-21
CVE-2018-18502
Mozilla developers and community members reported memory safety bugs present in Firefox 64. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 65.
Modified: 2024-11-21
CVE-2018-18503
When JavaScript is used to create and manipulate an audio buffer, a potentially exploitable crash may occur because of a compartment mismatch in some situations. This vulnerability affects Firefox < 65.
Modified: 2024-11-21
CVE-2018-18504
A crash and out-of-bounds read can occur when the buffer of a texture client is freed while it is still in use during graphic operations. This results is a potentially exploitable crash and the possibility of reading from the memory of the freed buffers. This vulnerability affects Firefox < 65.
Modified: 2024-11-21
CVE-2018-18505
An earlier fix for an Inter-process Communication (IPC) vulnerability, CVE-2011-3079, added authentication to communication between IPC endpoints and server parents during IPC process creation. This authentication is insufficient for channels created after the IPC process is started, leading to the authentication not being correctly applied to later channels. This could allow for a sandbox escape through IPC channels due to lack of message validation in the listener process. This vulnerability affects Thunderbird < 60.5, Firefox ESR < 60.5, and Firefox < 65.
- openSUSE-SU-2019:1758
- openSUSE-SU-2019:1758
- 106781
- 106781
- RHSA-2019:0218
- RHSA-2019:0218
- RHSA-2019:0219
- RHSA-2019:0219
- RHSA-2019:0269
- RHSA-2019:0269
- RHSA-2019:0270
- RHSA-2019:0270
- https://bugzilla.mozilla.org/show_bug.cgi?id=1087565
- https://bugzilla.mozilla.org/show_bug.cgi?id=1087565
- [debian-lts-announce] 20190130 [SECURITY] [DLA 1648-1] firefox-esr security update
- [debian-lts-announce] 20190130 [SECURITY] [DLA 1648-1] firefox-esr security update
- [debian-lts-announce] 20190216 [SECURITY] [DLA 1678-1] thunderbird security update
- [debian-lts-announce] 20190216 [SECURITY] [DLA 1678-1] thunderbird security update
- GLSA-201903-04
- GLSA-201903-04
- GLSA-201904-07
- GLSA-201904-07
- USN-3874-1
- USN-3874-1
- USN-3897-1
- USN-3897-1
- DSA-4376
- DSA-4376
- DSA-4392
- DSA-4392
- https://www.mozilla.org/security/advisories/mfsa2019-01/
- https://www.mozilla.org/security/advisories/mfsa2019-01/
- https://www.mozilla.org/security/advisories/mfsa2019-02/
- https://www.mozilla.org/security/advisories/mfsa2019-02/
- https://www.mozilla.org/security/advisories/mfsa2019-03/
- https://www.mozilla.org/security/advisories/mfsa2019-03/
Modified: 2024-11-21
CVE-2018-18506
When proxy auto-detection is enabled, if a web server serves a Proxy Auto-Configuration (PAC) file or if a PAC file is loaded locally, this PAC file can specify that requests to the localhost are to be sent through the proxy to another server. This behavior is disallowed by default when a proxy is manually configured, but when enabled could allow for attacks on services and tools that bind to the localhost for networked behavior if they are accessed through browsing. This vulnerability affects Firefox < 65.
- openSUSE-SU-2019:1056
- openSUSE-SU-2019:1056
- openSUSE-SU-2019:1077
- openSUSE-SU-2019:1077
- openSUSE-SU-2019:1126
- openSUSE-SU-2019:1126
- openSUSE-SU-2019:1162
- openSUSE-SU-2019:1162
- 106773
- 106773
- RHSA-2019:0622
- RHSA-2019:0622
- RHSA-2019:0623
- RHSA-2019:0623
- RHSA-2019:0680
- RHSA-2019:0680
- RHSA-2019:0681
- RHSA-2019:0681
- RHSA-2019:0966
- RHSA-2019:0966
- RHSA-2019:1144
- RHSA-2019:1144
- [debian-lts-announce] 20190321 [SECURITY] [DLA 1722-1] firefox-esr security update
- [debian-lts-announce] 20190321 [SECURITY] [DLA 1722-1] firefox-esr security update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1743-1] thunderbird security update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1743-1] thunderbird security update
- 20190401 [SECURITY] [DSA 4420-1] thunderbird security update
- 20190401 [SECURITY] [DSA 4420-1] thunderbird security update
- 20190320 [SECURITY] [DSA 4411-1] firefox-esr security update
- 20190320 [SECURITY] [DSA 4411-1] firefox-esr security update
- GLSA-201904-07
- GLSA-201904-07
- USN-3874-1
- USN-3874-1
- USN-3927-1
- USN-3927-1
- DSA-4411
- DSA-4411
- DSA-4420
- DSA-4420
- https://www.mozilla.org/security/advisories/mfsa2019-01/
- https://www.mozilla.org/security/advisories/mfsa2019-01/
Modified: 2024-11-21
CVE-2018-18510
The about:crashcontent and about:crashparent pages can be triggered by web content. These pages are used to crash the loaded page or the browser for test purposes. This issue allows for a non-persistent denial of service (DOS) attack by a malicious site which links to these pages. This vulnerability affects Firefox < 64.
Modified: 2024-11-21
CVE-2018-5156
A vulnerability can occur when capturing a media stream when the media source type is changed as the capture is occurring. This can result in stream data being cast to the wrong type causing a potentially exploitable crash. This vulnerability affects Thunderbird < 60, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
- 104560
- 104560
- 1041193
- 1041193
- RHSA-2018:2112
- RHSA-2018:2112
- RHSA-2018:2113
- RHSA-2018:2113
- https://bugzilla.mozilla.org/show_bug.cgi?id=1453127
- https://bugzilla.mozilla.org/show_bug.cgi?id=1453127
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3705-1
- USN-3705-1
- DSA-4235
- DSA-4235
- DSA-4295
- DSA-4295
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
Modified: 2024-11-21
CVE-2018-5186
Memory safety bugs present in Firefox 60. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 61.
- 104557
- 104557
- 1041193
- 1041193
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1464872%2C1463329%2C1419373%2C1412882%2C1413033%2C1444673%2C1454448%2C1453505%2C1438671
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1464872%2C1463329%2C1419373%2C1412882%2C1413033%2C1444673%2C1454448%2C1453505%2C1438671
- GLSA-201810-01
- GLSA-201810-01
- USN-3705-1
- USN-3705-1
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
Modified: 2024-11-21
CVE-2018-5187
Memory safety bugs present in Firefox 60 and Firefox ESR 60. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 60, Firefox ESR < 60.1, and Firefox < 61.
- 104556
- 104556
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1461324%2C1414829%2C1395246%2C1467938%2C1461619%2C1425930%2C1438556%2C1454285%2C1459568%2C1463884
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1461324%2C1414829%2C1395246%2C1467938%2C1461619%2C1425930%2C1438556%2C1454285%2C1459568%2C1463884
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3705-1
- USN-3705-1
- DSA-4295
- DSA-4295
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
Modified: 2024-11-21
CVE-2018-5188
Memory safety bugs present in Firefox 60, Firefox ESR 60, and Firefox ESR 52.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
- 104555
- 104555
- RHSA-2018:2112
- RHSA-2018:2112
- RHSA-2018:2113
- RHSA-2018:2113
- RHSA-2018:2251
- RHSA-2018:2251
- RHSA-2018:2252
- RHSA-2018:2252
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1456189%2C1456975%2C1465898%2C1392739%2C1451297%2C1464063%2C1437842%2C1442722%2C1452576%2C1450688%2C1458264%2C1458270%2C1465108%2C1464829%2C1464079%2C1463494%2C1458048
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1456189%2C1456975%2C1465898%2C1392739%2C1451297%2C1464063%2C1437842%2C1442722%2C1452576%2C1450688%2C1458264%2C1458270%2C1465108%2C1464829%2C1464079%2C1463494%2C1458048
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3705-1
- USN-3705-1
- USN-3714-1
- USN-3714-1
- USN-3749-1
- USN-3749-1
- DSA-4244
- DSA-4244
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-19/
Modified: 2024-11-21
CVE-2019-11691
A use-after-free vulnerability can occur when working with XMLHttpRequest (XHR) in an event loop, causing the XHR main thread to be called after it has been freed. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1542465
- https://bugzilla.mozilla.org/show_bug.cgi?id=1542465
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
Modified: 2024-11-21
CVE-2019-11692
A use-after-free vulnerability can occur when listeners are removed from the event listener manager while still in use, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1544670
- https://bugzilla.mozilla.org/show_bug.cgi?id=1544670
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
Modified: 2024-11-21
CVE-2019-11695
A custom cursor defined by scripting on a site can position itself over the addressbar to spoof the actual cursor when it should not be allowed outside of the primary web content area. This could be used by a malicious site to trick users into clicking on permission prompts, doorhanger notifications, or other buttons inadvertently if the location is spoofed over the user interface. This vulnerability affects Firefox < 67.
Modified: 2024-11-21
CVE-2019-11696
Files with the .JNLP extension used for "Java web start" applications are not treated as executable content for download prompts even though they can be executed if Java is installed on the local system. This could allow users to mistakenly launch an executable binary locally. This vulnerability affects Firefox < 67.
Modified: 2024-11-21
CVE-2019-11697
If the ALT and "a" keys are pressed when users receive an extension installation prompt, the extension will be installed without the install prompt delay that keeps the prompt visible in order for users to accept or decline the installation. A malicious web page could use this with spoofing on the page to trick users into installing a malicious extension. This vulnerability affects Firefox < 67.
Modified: 2024-11-21
CVE-2019-11698
If a crafted hyperlink is dragged and dropped to the bookmark bar or sidebar and the resulting bookmark is subsequently dragged and dropped into the web content area, an arbitrary query of a user's browser history can be run and transmitted to the content page via drop event data. This allows for the theft of browser history by a malicious site. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1543191
- https://bugzilla.mozilla.org/show_bug.cgi?id=1543191
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
Modified: 2024-11-21
CVE-2019-11699
A malicious page can briefly cause the wrong name to be highlighted as the domain name in the addressbar during page navigations. This could result in user confusion of which site is currently loaded for spoofing attacks. This vulnerability affects Firefox < 67.
Modified: 2024-11-21
CVE-2019-11701
The default webcal: protocol handler will load a web site vulnerable to cross-site scripting (XSS) attacks. This default was left in place as a legacy feature and has now been removed. *Note: this issue only affects users with an account on the vulnerable service. Other users are unaffected.*. This vulnerability affects Firefox < 67.
Modified: 2024-11-21
CVE-2019-11708
Insufficient vetting of parameters passed with the Prompt:Open IPC message between child and parent processes can result in the non-sandboxed parent process opening web content chosen by a compromised child process. When combined with additional vulnerabilities this could result in executing arbitrary code on the user's computer. This vulnerability affects Firefox ESR < 60.7.2, Firefox < 67.0.4, and Thunderbird < 60.7.2.
- http://packetstormsecurity.com/files/155592/Mozilla-Firefox-Windows-64-Bit-Chain-Exploit.html
- http://packetstormsecurity.com/files/155592/Mozilla-Firefox-Windows-64-Bit-Chain-Exploit.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1559858
- https://bugzilla.mozilla.org/show_bug.cgi?id=1559858
- GLSA-201908-12
- GLSA-201908-12
- https://www.mozilla.org/security/advisories/mfsa2019-19/
- https://www.mozilla.org/security/advisories/mfsa2019-19/
- https://www.mozilla.org/security/advisories/mfsa2019-20/
- https://www.mozilla.org/security/advisories/mfsa2019-20/
Modified: 2024-11-21
CVE-2019-11709
Mozilla developers and community members reported memory safety bugs present in Firefox 67 and Firefox ESR 60.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1547266%2C1540759%2C1548822%2C1550498%2C1515052%2C1539219%2C1547757%2C1550498%2C1533522
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1547266%2C1540759%2C1548822%2C1550498%2C1515052%2C1539219%2C1547757%2C1550498%2C1533522
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- GLSA-201908-12
- GLSA-201908-12
- GLSA-201908-20
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
Modified: 2024-11-21
CVE-2019-11710
Mozilla developers and community members reported memory safety bugs present in Firefox 67. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 68.
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1549768%2C1548611%2C1533842%2C1537692%2C1540590%2C1551907%2C1510345%2C1535482%2C1535848%2C1547472%2C1547760%2C1507696%2C1544180
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1549768%2C1548611%2C1533842%2C1537692%2C1540590%2C1551907%2C1510345%2C1535482%2C1535848%2C1547472%2C1547760%2C1507696%2C1544180
- GLSA-201908-12
- GLSA-201908-12
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
Modified: 2024-11-21
CVE-2019-11711
When an inner window is reused, it does not consider the use of document.domain for cross-origin protections. If pages on different subdomains ever cooperatively use document.domain, then either page can abuse this to inject script into arbitrary pages on the other subdomain, even those that did not use document.domain to relax their origin security. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- https://bugzilla.mozilla.org/show_bug.cgi?id=1552541
- https://bugzilla.mozilla.org/show_bug.cgi?id=1552541
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- GLSA-201908-12
- GLSA-201908-12
- GLSA-201908-20
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
Modified: 2024-11-21
CVE-2019-11712
POST requests made by NPAPI plugins, such as Flash, that receive a status 308 redirect response can bypass CORS requirements. This can allow an attacker to perform Cross-Site Request Forgery (CSRF) attacks. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- https://bugzilla.mozilla.org/show_bug.cgi?id=1543804
- https://bugzilla.mozilla.org/show_bug.cgi?id=1543804
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- GLSA-201908-12
- GLSA-201908-12
- GLSA-201908-20
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
Modified: 2024-11-21
CVE-2019-11713
A use-after-free vulnerability can occur in HTTP/2 when a cached HTTP/2 stream is closed while still in use, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- https://bugzilla.mozilla.org/show_bug.cgi?id=1528481
- https://bugzilla.mozilla.org/show_bug.cgi?id=1528481
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- GLSA-201908-12
- GLSA-201908-12
- GLSA-201908-20
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
Modified: 2024-11-21
CVE-2019-11714
Necko can access a child on the wrong thread during UDP connections, resulting in a potentially exploitable crash in some instances. This vulnerability affects Firefox < 68.
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1542593
- https://bugzilla.mozilla.org/show_bug.cgi?id=1542593
- GLSA-201908-12
- GLSA-201908-12
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
Modified: 2024-11-21
CVE-2019-11715
Due to an error while parsing page content, it is possible for properly sanitized user input to be misinterpreted and lead to XSS hazards on web sites in certain circumstances. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- https://bugzilla.mozilla.org/show_bug.cgi?id=1555523
- https://bugzilla.mozilla.org/show_bug.cgi?id=1555523
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- GLSA-201908-12
- GLSA-201908-12
- GLSA-201908-20
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
Modified: 2024-11-21
CVE-2019-11716
Until explicitly accessed by script, window.globalThis is not enumerable and, as a result, is not visible to code such as Object.getOwnPropertyNames(window). Sites that deploy a sandboxing that depends on enumerating and freezing access to the window object may miss this, allowing their sandboxes to be bypassed. This vulnerability affects Firefox < 68.
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1552632
- https://bugzilla.mozilla.org/show_bug.cgi?id=1552632
- GLSA-201908-12
- GLSA-201908-12
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
Modified: 2024-11-21
CVE-2019-11717
A vulnerability exists where the caret ("^") character is improperly escaped constructing some URIs due to it being used as a separator, allowing for possible spoofing of origin attributes. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- https://bugzilla.mozilla.org/show_bug.cgi?id=1548306
- https://bugzilla.mozilla.org/show_bug.cgi?id=1548306
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- GLSA-201908-12
- GLSA-201908-12
- GLSA-201908-20
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
Modified: 2024-11-21
CVE-2019-11718
Activity Stream can display content from sent from the Snippet Service website. This content is written to innerHTML on the Activity Stream page without sanitization, allowing for a potential access to other information available to the Activity Stream, such as browsing history, if the Snipper Service were compromised. This vulnerability affects Firefox < 68.
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1408349
- https://bugzilla.mozilla.org/show_bug.cgi?id=1408349
- GLSA-201908-12
- GLSA-201908-12
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
Modified: 2024-11-21
CVE-2019-11719
When importing a curve25519 private key in PKCS#8format with leading 0x00 bytes, it is possible to trigger an out-of-bounds read in the Network Security Services (NSS) library. This could lead to information disclosure. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- RHSA-2019:1951
- RHSA-2019:1951
- https://bugzilla.mozilla.org/show_bug.cgi?id=1540541
- https://bugzilla.mozilla.org/show_bug.cgi?id=1540541
- [debian-lts-announce] 20200929 [SECURITY] [DLA 2388-1] nss security update
- [debian-lts-announce] 20200929 [SECURITY] [DLA 2388-1] nss security update
- GLSA-201908-12
- GLSA-201908-12
- GLSA-201908-20
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
Modified: 2024-11-21
CVE-2019-11720
Some unicode characters are incorrectly treated as whitespace during the parsing of web content instead of triggering parsing errors. This allows malicious code to then be processed, evading cross-site scripting (XSS) filtering. This vulnerability affects Firefox < 68.
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1556230
- https://bugzilla.mozilla.org/show_bug.cgi?id=1556230
- GLSA-201908-12
- GLSA-201908-12
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
Modified: 2024-11-21
CVE-2019-11721
The unicode latin 'kra' character can be used to spoof a standard 'k' character in the addressbar. This allows for domain spoofing attacks as do not display as punycode text, allowing for user confusion. This vulnerability affects Firefox < 68.
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1256009
- https://bugzilla.mozilla.org/show_bug.cgi?id=1256009
- GLSA-201908-12
- GLSA-201908-12
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
Modified: 2024-11-21
CVE-2019-11723
A vulnerability exists during the installation of add-ons where the initial fetch ignored the origin attributes of the browsing context. This could leak cookies in private browsing mode or across different "containers" for people who use the Firefox Multi-Account Containers Web Extension. This vulnerability affects Firefox < 68.
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1528335
- https://bugzilla.mozilla.org/show_bug.cgi?id=1528335
- GLSA-201908-12
- GLSA-201908-12
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
Modified: 2024-11-21
CVE-2019-11724
Application permissions give additional remote troubleshooting permission to the site input.mozilla.org, which has been retired and now redirects to another site. This additional permission is unnecessary and is a potential vector for malicious attacks. This vulnerability affects Firefox < 68.
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1512511
- https://bugzilla.mozilla.org/show_bug.cgi?id=1512511
- GLSA-201908-12
- GLSA-201908-12
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
Modified: 2024-11-21
CVE-2019-11725
When a user navigates to site marked as unsafe by the Safebrowsing API, warning messages are displayed and navigation is interrupted but resources from the same site loaded through websockets are not blocked, leading to the loading of unsafe resources and bypassing safebrowsing protections. This vulnerability affects Firefox < 68.
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1483510
- https://bugzilla.mozilla.org/show_bug.cgi?id=1483510
- GLSA-201908-12
- GLSA-201908-12
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
Modified: 2024-11-21
CVE-2019-11727
A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages. This vulnerability affects Firefox < 68.
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- openSUSE-SU-2020:0008
- openSUSE-SU-2020:0008
- RHSA-2019:1951
- RHSA-2019:1951
- https://bugzilla.mozilla.org/show_bug.cgi?id=1552208
- https://bugzilla.mozilla.org/show_bug.cgi?id=1552208
- GLSA-201908-12
- GLSA-201908-12
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
Modified: 2024-11-21
CVE-2019-11728
The HTTP Alternative Services header, Alt-Svc, can be used by a malicious site to scan all TCP ports of any host that the accessible to a user when web content is loaded. This vulnerability affects Firefox < 68.
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1552993
- https://bugzilla.mozilla.org/show_bug.cgi?id=1552993
- GLSA-201908-12
- GLSA-201908-12
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
Modified: 2024-11-21
CVE-2019-11729
Empty or malformed p256-ECDH public keys may trigger a segmentation fault due values being improperly sanitized before being copied into memory and used. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- RHSA-2019:1951
- RHSA-2019:1951
- RHSA-2019:4190
- RHSA-2019:4190
- https://bugzilla.mozilla.org/show_bug.cgi?id=1515342
- https://bugzilla.mozilla.org/show_bug.cgi?id=1515342
- [debian-lts-announce] 20200929 [SECURITY] [DLA 2388-1] nss security update
- [debian-lts-announce] 20200929 [SECURITY] [DLA 2388-1] nss security update
- GLSA-201908-12
- GLSA-201908-12
- GLSA-201908-20
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
Modified: 2024-11-21
CVE-2019-11730
A vulnerability exists where if a user opens a locally saved HTML file, this file can use file: URIs to access other files in the same directory or sub-directories if the names are known or guessed. The Fetch API can then be used to read the contents of any files stored in these directories and they may uploaded to a server. It was demonstrated that in combination with a popular Android messaging app, if a malicious HTML attachment is sent to a user and they opened that attachment in Firefox, due to that app's predictable pattern for locally-saved file names, it is possible to read attachments the victim received from other correspondents. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- https://bugzilla.mozilla.org/show_bug.cgi?id=1558299
- https://bugzilla.mozilla.org/show_bug.cgi?id=1558299
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- GLSA-201908-12
- GLSA-201908-12
- GLSA-201908-20
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
Modified: 2024-11-21
CVE-2019-11733
When a master password is set, it is required to be entered again before stored passwords can be accessed in the 'Saved Logins' dialog. It was found that locally stored passwords can be copied to the clipboard thorough the 'copy password' context menu item without re-entering the master password if the master password had been previously entered in the same session, allowing for potential theft of stored passwords. This vulnerability affects Firefox < 68.0.2 and Firefox ESR < 68.0.2.
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1565780
- https://bugzilla.mozilla.org/show_bug.cgi?id=1565780
- https://www.mozilla.org/security/advisories/mfsa2019-24/
- https://www.mozilla.org/security/advisories/mfsa2019-24/
Modified: 2024-11-21
CVE-2019-11735
Mozilla developers and community members reported memory safety bugs present in Firefox 68 and Firefox ESR 68. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 69 and Firefox ESR < 68.1.
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1561404%2C1561484%2C1568047%2C1561912%2C1565744%2C1568858%2C1570358
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1561404%2C1561484%2C1568047%2C1561912%2C1565744%2C1568858%2C1570358
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
Modified: 2024-11-21
CVE-2019-11736
The Mozilla Maintenance Service does not guard against files being hardlinked to another file in the updates directory, allowing for the replacement of local files, including the Maintenance Service executable, which is run with privileged access. Additionally, there was a race condition during checks for junctions and symbolic links by the Maintenance Service, allowing for potential local file and directory manipulation to be undetected in some circumstances. This allows for potential privilege escalation by a user with unprivileged local access.
*Note: These attacks requires local system access and only affects Windows. Other operating systems are not affected.*. This vulnerability affects Firefox < 69 and Firefox ESR < 68.1.
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1551913
- https://bugzilla.mozilla.org/show_bug.cgi?id=1551913
- https://bugzilla.mozilla.org/show_bug.cgi?id=1552206
- https://bugzilla.mozilla.org/show_bug.cgi?id=1552206
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
Modified: 2024-11-21
CVE-2019-11738
If a Content Security Policy (CSP) directive is defined that uses a hash-based source that takes the empty string as input, execution of any javascript: URIs will be allowed. This could allow for malicious JavaScript content to be run, bypassing CSP permissions. This vulnerability affects Firefox < 69 and Firefox ESR < 68.1.
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1452037
- https://bugzilla.mozilla.org/show_bug.cgi?id=1452037
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
Modified: 2024-11-21
CVE-2019-11740
Mozilla developers and community members reported memory safety bugs present in Firefox 68, Firefox ESR 68, and Firefox 60.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 69, Thunderbird < 68.1, Thunderbird < 60.9, Firefox ESR < 60.9, and Firefox ESR < 68.1.
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1563133%2C1573160
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1563133%2C1573160
- GLSA-201911-07
- GLSA-201911-07
- USN-4150-1
- USN-4150-1
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-27/
- https://www.mozilla.org/security/advisories/mfsa2019-27/
- https://www.mozilla.org/security/advisories/mfsa2019-29/
- https://www.mozilla.org/security/advisories/mfsa2019-29/
- https://www.mozilla.org/security/advisories/mfsa2019-30/
- https://www.mozilla.org/security/advisories/mfsa2019-30/
Modified: 2024-11-21
CVE-2019-11742
A same-origin policy violation occurs allowing the theft of cross-origin images through a combination of SVG filters and a <canvas> element due to an error in how same-origin policy is applied to cached image content. The resulting same-origin policy violation could allow for data theft. This vulnerability affects Firefox < 69, Thunderbird < 68.1, Thunderbird < 60.9, Firefox ESR < 60.9, and Firefox ESR < 68.1.
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1559715
- https://bugzilla.mozilla.org/show_bug.cgi?id=1559715
- GLSA-201911-07
- GLSA-201911-07
- USN-4150-1
- USN-4150-1
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-27/
- https://www.mozilla.org/security/advisories/mfsa2019-27/
- https://www.mozilla.org/security/advisories/mfsa2019-29/
- https://www.mozilla.org/security/advisories/mfsa2019-29/
- https://www.mozilla.org/security/advisories/mfsa2019-30/
- https://www.mozilla.org/security/advisories/mfsa2019-30/
Modified: 2024-11-21
CVE-2019-11743
Navigation events were not fully adhering to the W3C's "Navigation-Timing Level 2" draft specification in some instances for the unload event, which restricts access to detailed timing attributes to only be same-origin. This resulted in potential cross-origin information exposure of history through timing side-channel attacks. This vulnerability affects Firefox < 69, Thunderbird < 68.1, Thunderbird < 60.9, Firefox ESR < 60.9, and Firefox ESR < 68.1.
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1560495
- https://bugzilla.mozilla.org/show_bug.cgi?id=1560495
- GLSA-201911-07
- GLSA-201911-07
- USN-4150-1
- USN-4150-1
- https://w3c.github.io/navigation-timing
- https://w3c.github.io/navigation-timing
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-27/
- https://www.mozilla.org/security/advisories/mfsa2019-27/
- https://www.mozilla.org/security/advisories/mfsa2019-29/
- https://www.mozilla.org/security/advisories/mfsa2019-29/
- https://www.mozilla.org/security/advisories/mfsa2019-30/
- https://www.mozilla.org/security/advisories/mfsa2019-30/
Modified: 2024-11-21
CVE-2019-11744
Some HTML elements, such as <title> and <textarea>, can contain literal angle brackets without treating them as markup. It is possible to pass a literal closing tag to .innerHTML on these elements, and subsequent content after that will be parsed as if it were outside the tag. This can lead to XSS if a site does not filter user input as strictly for these elements as it does for other elements. This vulnerability affects Firefox < 69, Thunderbird < 68.1, Thunderbird < 60.9, Firefox ESR < 60.9, and Firefox ESR < 68.1.
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1562033
- https://bugzilla.mozilla.org/show_bug.cgi?id=1562033
- GLSA-201911-07
- GLSA-201911-07
- USN-4150-1
- USN-4150-1
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-27/
- https://www.mozilla.org/security/advisories/mfsa2019-27/
- https://www.mozilla.org/security/advisories/mfsa2019-29/
- https://www.mozilla.org/security/advisories/mfsa2019-29/
- https://www.mozilla.org/security/advisories/mfsa2019-30/
- https://www.mozilla.org/security/advisories/mfsa2019-30/
Modified: 2024-11-21
CVE-2019-11745
When encrypting with a block cipher, if a call to NSC_EncryptUpdate was made with data smaller than the block size, a small out of bounds write could occur. This could have caused heap corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.
- openSUSE-SU-2020:0003
- openSUSE-SU-2020:0003
- openSUSE-SU-2020:0002
- openSUSE-SU-2020:0002
- openSUSE-SU-2020:0008
- openSUSE-SU-2020:0008
- RHSA-2020:0243
- RHSA-2020:0243
- RHSA-2020:0466
- RHSA-2020:0466
- https://bugzilla.mozilla.org/show_bug.cgi?id=1586176
- https://bugzilla.mozilla.org/show_bug.cgi?id=1586176
- https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
- [debian-lts-announce] 20200929 [SECURITY] [DLA 2388-1] nss security update
- [debian-lts-announce] 20200929 [SECURITY] [DLA 2388-1] nss security update
- GLSA-202003-02
- GLSA-202003-02
- GLSA-202003-10
- GLSA-202003-10
- GLSA-202003-37
- GLSA-202003-37
- https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
- https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
- USN-4241-1
- USN-4241-1
- USN-4335-1
- USN-4335-1
- https://www.mozilla.org/security/advisories/mfsa2019-36/
- https://www.mozilla.org/security/advisories/mfsa2019-36/
- https://www.mozilla.org/security/advisories/mfsa2019-37/
- https://www.mozilla.org/security/advisories/mfsa2019-37/
- https://www.mozilla.org/security/advisories/mfsa2019-38/
- https://www.mozilla.org/security/advisories/mfsa2019-38/
Modified: 2024-11-21
CVE-2019-11746
A use-after-free vulnerability can occur while manipulating video elements if the body is freed while still in use. This results in a potentially exploitable crash. This vulnerability affects Firefox < 69, Thunderbird < 68.1, Thunderbird < 60.9, Firefox ESR < 60.9, and Firefox ESR < 68.1.
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1564449
- https://bugzilla.mozilla.org/show_bug.cgi?id=1564449
- GLSA-201911-07
- GLSA-201911-07
- USN-4150-1
- USN-4150-1
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-27/
- https://www.mozilla.org/security/advisories/mfsa2019-27/
- https://www.mozilla.org/security/advisories/mfsa2019-29/
- https://www.mozilla.org/security/advisories/mfsa2019-29/
- https://www.mozilla.org/security/advisories/mfsa2019-30/
- https://www.mozilla.org/security/advisories/mfsa2019-30/
Modified: 2024-11-21
CVE-2019-11747
The "Forget about this site" feature in the History pane is intended to remove all saved user data that indicates a user has visited a site. This includes removing any HTTP Strict Transport Security (HSTS) settings received from sites that use it. Due to a bug, sites on the pre-load list also have their HSTS setting removed. On the next visit to that site if the user specifies an http: URL rather than secure https: they will not be protected by the pre-loaded HSTS setting. After that visit the site's HSTS setting will be restored. This vulnerability affects Firefox < 69 and Firefox ESR < 68.1.
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1564481
- https://bugzilla.mozilla.org/show_bug.cgi?id=1564481
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
Modified: 2024-11-21
CVE-2019-11748
WebRTC in Firefox will honor persisted permissions given to sites for access to microphone and camera resources even when in a third-party context. In light of recent high profile vulnerabilities in other software, a decision was made to no longer persist these permissions. This avoids the possibility of trusted WebRTC resources being invisibly embedded in web content and abusing permissions previously given by users. Users will now be prompted for permissions on each use. This vulnerability affects Firefox < 69 and Firefox ESR < 68.1.
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1564588
- https://bugzilla.mozilla.org/show_bug.cgi?id=1564588
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
Modified: 2024-11-21
CVE-2019-11749
A vulnerability exists in WebRTC where malicious web content can use probing techniques on the getUserMedia API using constraints to reveal device properties of cameras on the system without triggering a user prompt or notification. This allows for the potential fingerprinting of users. This vulnerability affects Firefox < 69 and Firefox ESR < 68.1.
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1565374
- https://bugzilla.mozilla.org/show_bug.cgi?id=1565374
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
Modified: 2024-11-21
CVE-2019-11750
A type confusion vulnerability exists in Spidermonkey, which results in a non-exploitable crash. This vulnerability affects Firefox < 69 and Firefox ESR < 68.1.
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1568397
- https://bugzilla.mozilla.org/show_bug.cgi?id=1568397
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
Modified: 2024-11-21
CVE-2019-11751
Logging-related command line parameters are not properly sanitized when Firefox is launched by another program, such as when a user clicks on malicious links in a chat application. This can be used to write a log file to an arbitrary location such as the Windows 'Startup' folder.
*Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox < 69 and Firefox ESR < 68.1.
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1572838
- https://bugzilla.mozilla.org/show_bug.cgi?id=1572838
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
Modified: 2024-11-21
CVE-2019-11752
It is possible to delete an IndexedDB key value and subsequently try to extract it during conversion. This results in a use-after-free and a potentially exploitable crash. This vulnerability affects Firefox < 69, Thunderbird < 68.1, Thunderbird < 60.9, Firefox ESR < 60.9, and Firefox ESR < 68.1.
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1501152
- https://bugzilla.mozilla.org/show_bug.cgi?id=1501152
- GLSA-201911-07
- GLSA-201911-07
- USN-4150-1
- USN-4150-1
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-27/
- https://www.mozilla.org/security/advisories/mfsa2019-27/
- https://www.mozilla.org/security/advisories/mfsa2019-29/
- https://www.mozilla.org/security/advisories/mfsa2019-29/
- https://www.mozilla.org/security/advisories/mfsa2019-30/
- https://www.mozilla.org/security/advisories/mfsa2019-30/
Modified: 2024-11-21
CVE-2019-11753
The Firefox installer allows Firefox to be installed to a custom user writable location, leaving it unprotected from manipulation by unprivileged users or malware. If the Mozilla Maintenance Service is manipulated to update this unprotected location and the updated maintenance service in the unprotected location has been altered, the altered maintenance service can run with elevated privileges during the update process due to a lack of integrity checks. This allows for privilege escalation if the executable has been replaced locally.
*Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.*. This vulnerability affects Firefox < 69, Firefox ESR < 60.9, and Firefox ESR < 68.1.
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1574980
- https://bugzilla.mozilla.org/show_bug.cgi?id=1574980
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-27/
- https://www.mozilla.org/security/advisories/mfsa2019-27/
Modified: 2024-11-21
CVE-2019-11757
When following the value's prototype chain, it was possible to retain a reference to a locale, delete it, and subsequently reference it. This resulted in a use-after-free and a potentially exploitable crash. This vulnerability affects Firefox < 70, Thunderbird < 68.2, and Firefox ESR < 68.2.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1577107
- https://bugzilla.mozilla.org/show_bug.cgi?id=1577107
- GLSA-202003-10
- GLSA-202003-10
- USN-4335-1
- USN-4335-1
- https://www.mozilla.org/security/advisories/mfsa2019-33/
- https://www.mozilla.org/security/advisories/mfsa2019-33/
- https://www.mozilla.org/security/advisories/mfsa2019-34/
- https://www.mozilla.org/security/advisories/mfsa2019-34/
- https://www.mozilla.org/security/advisories/mfsa2019-35/
- https://www.mozilla.org/security/advisories/mfsa2019-35/
Modified: 2024-11-21
CVE-2019-11758
Mozilla community member Philipp reported a memory safety bug present in Firefox 68 when 360 Total Security was installed. This bug showed evidence of memory corruption in the accessibility engine and we presume that with enough effort that it could be exploited to run arbitrary code. This vulnerability affects Firefox < 69, Thunderbird < 68.2, and Firefox ESR < 68.2.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1536227
- https://bugzilla.mozilla.org/show_bug.cgi?id=1536227
- USN-4335-1
- USN-4335-1
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-33/
- https://www.mozilla.org/security/advisories/mfsa2019-33/
- https://www.mozilla.org/security/advisories/mfsa2019-35/
- https://www.mozilla.org/security/advisories/mfsa2019-35/
Modified: 2024-11-21
CVE-2019-11759
An attacker could have caused 4 bytes of HMAC output to be written past the end of a buffer stored on the stack. This could be used by an attacker to execute arbitrary code or more likely lead to a crash. This vulnerability affects Firefox < 70, Thunderbird < 68.2, and Firefox ESR < 68.2.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1577953
- https://bugzilla.mozilla.org/show_bug.cgi?id=1577953
- GLSA-202003-10
- GLSA-202003-10
- USN-4335-1
- USN-4335-1
- https://www.mozilla.org/security/advisories/mfsa2019-33/
- https://www.mozilla.org/security/advisories/mfsa2019-33/
- https://www.mozilla.org/security/advisories/mfsa2019-34/
- https://www.mozilla.org/security/advisories/mfsa2019-34/
- https://www.mozilla.org/security/advisories/mfsa2019-35/
- https://www.mozilla.org/security/advisories/mfsa2019-35/
Modified: 2024-11-21
CVE-2019-11760
A fixed-size stack buffer could overflow in nrappkit when doing WebRTC signaling. This resulted in a potentially exploitable crash in some instances. This vulnerability affects Firefox < 70, Thunderbird < 68.2, and Firefox ESR < 68.2.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1577719
- https://bugzilla.mozilla.org/show_bug.cgi?id=1577719
- GLSA-202003-10
- GLSA-202003-10
- USN-4335-1
- USN-4335-1
- https://www.mozilla.org/security/advisories/mfsa2019-33/
- https://www.mozilla.org/security/advisories/mfsa2019-33/
- https://www.mozilla.org/security/advisories/mfsa2019-34/
- https://www.mozilla.org/security/advisories/mfsa2019-34/
- https://www.mozilla.org/security/advisories/mfsa2019-35/
- https://www.mozilla.org/security/advisories/mfsa2019-35/
Modified: 2024-11-21
CVE-2019-11761
By using a form with a data URI it was possible to gain access to the privileged JSONView object that had been cloned into content. Impact from exposing this object appears to be minimal, however it was a bypass of existing defense in depth mechanisms. This vulnerability affects Firefox < 70, Thunderbird < 68.2, and Firefox ESR < 68.2.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1561502
- https://bugzilla.mozilla.org/show_bug.cgi?id=1561502
- GLSA-202003-10
- GLSA-202003-10
- USN-4335-1
- USN-4335-1
- https://www.mozilla.org/security/advisories/mfsa2019-33/
- https://www.mozilla.org/security/advisories/mfsa2019-33/
- https://www.mozilla.org/security/advisories/mfsa2019-34/
- https://www.mozilla.org/security/advisories/mfsa2019-34/
- https://www.mozilla.org/security/advisories/mfsa2019-35/
- https://www.mozilla.org/security/advisories/mfsa2019-35/
Modified: 2024-11-21
CVE-2019-11762
If two same-origin documents set document.domain differently to become cross-origin, it was possible for them to call arbitrary DOM methods/getters/setters on the now-cross-origin window. This vulnerability affects Firefox < 70, Thunderbird < 68.2, and Firefox ESR < 68.2.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1582857
- https://bugzilla.mozilla.org/show_bug.cgi?id=1582857
- GLSA-202003-10
- GLSA-202003-10
- USN-4335-1
- USN-4335-1
- https://www.mozilla.org/security/advisories/mfsa2019-33/
- https://www.mozilla.org/security/advisories/mfsa2019-33/
- https://www.mozilla.org/security/advisories/mfsa2019-34/
- https://www.mozilla.org/security/advisories/mfsa2019-34/
- https://www.mozilla.org/security/advisories/mfsa2019-35/
- https://www.mozilla.org/security/advisories/mfsa2019-35/
Modified: 2024-11-21
CVE-2019-11763
Failure to correctly handle null bytes when processing HTML entities resulted in Firefox incorrectly parsing these entities. This could have led to HTML comment text being treated as HTML which could have led to XSS in a web application under certain conditions. It could have also led to HTML entities being masked from filters - enabling the use of entities to mask the actual characters of interest from filters. This vulnerability affects Firefox < 70, Thunderbird < 68.2, and Firefox ESR < 68.2.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1584216
- https://bugzilla.mozilla.org/show_bug.cgi?id=1584216
- GLSA-202003-10
- GLSA-202003-10
- USN-4335-1
- USN-4335-1
- https://www.mozilla.org/security/advisories/mfsa2019-33/
- https://www.mozilla.org/security/advisories/mfsa2019-33/
- https://www.mozilla.org/security/advisories/mfsa2019-34/
- https://www.mozilla.org/security/advisories/mfsa2019-34/
- https://www.mozilla.org/security/advisories/mfsa2019-35/
- https://www.mozilla.org/security/advisories/mfsa2019-35/
Modified: 2024-11-21
CVE-2019-11764
Mozilla developers and community members reported memory safety bugs present in Firefox 69 and Firefox ESR 68.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 70, Thunderbird < 68.2, and Firefox ESR < 68.2.
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1558522%2C1577061%2C1548044%2C1571223%2C1573048%2C1578933%2C1575217%2C1583684%2C1586845%2C1581950%2C1583463%2C1586599
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1558522%2C1577061%2C1548044%2C1571223%2C1573048%2C1578933%2C1575217%2C1583684%2C1586845%2C1581950%2C1583463%2C1586599
- GLSA-202003-10
- GLSA-202003-10
- USN-4335-1
- USN-4335-1
- https://www.mozilla.org/security/advisories/mfsa2019-33/
- https://www.mozilla.org/security/advisories/mfsa2019-33/
- https://www.mozilla.org/security/advisories/mfsa2019-34/
- https://www.mozilla.org/security/advisories/mfsa2019-34/
- https://www.mozilla.org/security/advisories/mfsa2019-35/
- https://www.mozilla.org/security/advisories/mfsa2019-35/
Modified: 2024-11-21
CVE-2019-13722
Inappropriate implementation in WebRTC in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Modified: 2024-11-21
CVE-2019-15903
In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.
- openSUSE-SU-2019:2204
- openSUSE-SU-2019:2204
- openSUSE-SU-2019:2205
- openSUSE-SU-2019:2205
- openSUSE-SU-2019:2420
- openSUSE-SU-2019:2420
- openSUSE-SU-2019:2424
- openSUSE-SU-2019:2424
- openSUSE-SU-2019:2425
- openSUSE-SU-2019:2425
- openSUSE-SU-2019:2447
- openSUSE-SU-2019:2447
- openSUSE-SU-2019:2451
- openSUSE-SU-2019:2451
- openSUSE-SU-2019:2459
- openSUSE-SU-2019:2459
- openSUSE-SU-2019:2452
- openSUSE-SU-2019:2452
- openSUSE-SU-2019:2464
- openSUSE-SU-2019:2464
- openSUSE-SU-2020:0010
- openSUSE-SU-2020:0010
- openSUSE-SU-2020:0086
- openSUSE-SU-2020:0086
- http://packetstormsecurity.com/files/154503/Slackware-Security-Advisory-expat-Updates.html
- http://packetstormsecurity.com/files/154503/Slackware-Security-Advisory-expat-Updates.html
- http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html
- http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html
- http://packetstormsecurity.com/files/154947/Slackware-Security-Advisory-mozilla-firefox-Updates.html
- http://packetstormsecurity.com/files/154947/Slackware-Security-Advisory-mozilla-firefox-Updates.html
- 20191213 APPLE-SA-2019-12-10-1 iOS 13.3 and iPadOS 13.3
- 20191213 APPLE-SA-2019-12-10-1 iOS 13.3 and iPadOS 13.3
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191213 APPLE-SA-2019-12-10-5 tvOS 13.3
- 20191213 APPLE-SA-2019-12-10-5 tvOS 13.3
- 20191213 APPLE-SA-2019-12-10-8 watchOS 6.1.1
- 20191213 APPLE-SA-2019-12-10-8 watchOS 6.1.1
- RHSA-2019:3210
- RHSA-2019:3210
- RHSA-2019:3237
- RHSA-2019:3237
- RHSA-2019:3756
- RHSA-2019:3756
- https://github.com/libexpat/libexpat/commit/c20b758c332d9a13afbbb276d30db1d183a85d43
- https://github.com/libexpat/libexpat/commit/c20b758c332d9a13afbbb276d30db1d183a85d43
- https://github.com/libexpat/libexpat/issues/317
- https://github.com/libexpat/libexpat/issues/317
- https://github.com/libexpat/libexpat/issues/342
- https://github.com/libexpat/libexpat/issues/342
- https://github.com/libexpat/libexpat/pull/318
- https://github.com/libexpat/libexpat/pull/318
- [debian-lts-announce] 20191110 [SECURITY] [DLA 1987-1] firefox-esr security update
- [debian-lts-announce] 20191110 [SECURITY] [DLA 1987-1] firefox-esr security update
- [debian-lts-announce] 20191118 [SECURITY] [DLA 1997-1] thunderbird security update
- [debian-lts-announce] 20191118 [SECURITY] [DLA 1997-1] thunderbird security update
- FEDORA-2019-9505c6b555
- FEDORA-2019-9505c6b555
- FEDORA-2019-613edfe68b
- FEDORA-2019-613edfe68b
- FEDORA-2019-672ae0f060
- FEDORA-2019-672ae0f060
- 20191211 APPLE-SA-2019-12-10-8 watchOS 6.1.1
- 20191211 APPLE-SA-2019-12-10-8 watchOS 6.1.1
- 20191211 APPLE-SA-2019-12-10-5 tvOS 13.3
- 20191211 APPLE-SA-2019-12-10-5 tvOS 13.3
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191101 [SECURITY] [DSA 4549-1] firefox-esr security update
- 20191101 [SECURITY] [DSA 4549-1] firefox-esr security update
- 20191118 [SECURITY] [DSA 4571-1] thunderbird security update
- 20191118 [SECURITY] [DSA 4571-1] thunderbird security update
- 20191021 [slackware-security] python (SSA:2019-293-01)
- 20191021 [slackware-security] python (SSA:2019-293-01)
- 20190917 [slackware-security] expat (SSA:2019-259-01)
- 20190917 [slackware-security] expat (SSA:2019-259-01)
- 20190923 [SECURITY] [DSA 4530-1] expat security update
- 20190923 [SECURITY] [DSA 4530-1] expat security update
- GLSA-201911-08
- GLSA-201911-08
- https://security.netapp.com/advisory/ntap-20190926-0004/
- https://security.netapp.com/advisory/ntap-20190926-0004/
- https://support.apple.com/kb/HT210785
- https://support.apple.com/kb/HT210785
- https://support.apple.com/kb/HT210788
- https://support.apple.com/kb/HT210788
- https://support.apple.com/kb/HT210789
- https://support.apple.com/kb/HT210789
- https://support.apple.com/kb/HT210790
- https://support.apple.com/kb/HT210790
- https://support.apple.com/kb/HT210793
- https://support.apple.com/kb/HT210793
- https://support.apple.com/kb/HT210794
- https://support.apple.com/kb/HT210794
- https://support.apple.com/kb/HT210795
- https://support.apple.com/kb/HT210795
- USN-4132-1
- USN-4132-1
- USN-4132-2
- USN-4132-2
- USN-4165-1
- USN-4165-1
- USN-4202-1
- USN-4202-1
- USN-4335-1
- USN-4335-1
- DSA-4530
- DSA-4530
- DSA-4549
- DSA-4549
- DSA-4571
- DSA-4571
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.tenable.com/security/tns-2021-11
- https://www.tenable.com/security/tns-2021-11
Modified: 2024-11-21
CVE-2019-17005
The plain text serializer used a fixed-size array for the number of
- elements it could process; however it was possible to overflow the static-sized array leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.
- openSUSE-SU-2020:0003
- openSUSE-SU-2020:0003
- openSUSE-SU-2020:0002
- openSUSE-SU-2020:0002
- RHSA-2020:0292
- RHSA-2020:0292
- RHSA-2020:0295
- RHSA-2020:0295
- https://bugzilla.mozilla.org/show_bug.cgi?id=1584170
- https://bugzilla.mozilla.org/show_bug.cgi?id=1584170
- GLSA-202003-02
- GLSA-202003-02
- GLSA-202003-10
- GLSA-202003-10
- USN-4241-1
- USN-4241-1
- USN-4335-1
- USN-4335-1
- https://www.mozilla.org/security/advisories/mfsa2019-36/
- https://www.mozilla.org/security/advisories/mfsa2019-36/
- https://www.mozilla.org/security/advisories/mfsa2019-37/
- https://www.mozilla.org/security/advisories/mfsa2019-37/
- https://www.mozilla.org/security/advisories/mfsa2019-38/
- https://www.mozilla.org/security/advisories/mfsa2019-38/
Modified: 2024-11-21
CVE-2019-17008
When using nested workers, a use-after-free could occur during worker destruction. This resulted in a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.
- openSUSE-SU-2020:0003
- openSUSE-SU-2020:0003
- openSUSE-SU-2020:0002
- openSUSE-SU-2020:0002
- RHSA-2020:0292
- RHSA-2020:0292
- RHSA-2020:0295
- RHSA-2020:0295
- https://bugzilla.mozilla.org/show_bug.cgi?id=1546331
- https://bugzilla.mozilla.org/show_bug.cgi?id=1546331
- GLSA-202003-02
- GLSA-202003-02
- GLSA-202003-10
- GLSA-202003-10
- USN-4241-1
- USN-4241-1
- USN-4335-1
- USN-4335-1
- https://www.mozilla.org/security/advisories/mfsa2019-36/
- https://www.mozilla.org/security/advisories/mfsa2019-36/
- https://www.mozilla.org/security/advisories/mfsa2019-37/
- https://www.mozilla.org/security/advisories/mfsa2019-37/
- https://www.mozilla.org/security/advisories/mfsa2019-38/
- https://www.mozilla.org/security/advisories/mfsa2019-38/
Modified: 2024-11-21
CVE-2019-17009
When running, the updater service wrote status and log files to an unrestricted location; potentially allowing an unprivileged process to locate and exploit a vulnerability in file handling in the updater service. *Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.*. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.
- openSUSE-SU-2020:0003
- openSUSE-SU-2020:0003
- openSUSE-SU-2020:0002
- openSUSE-SU-2020:0002
- https://bugzilla.mozilla.org/show_bug.cgi?id=1510494
- https://bugzilla.mozilla.org/show_bug.cgi?id=1510494
- https://www.mozilla.org/security/advisories/mfsa2019-36/
- https://www.mozilla.org/security/advisories/mfsa2019-36/
- https://www.mozilla.org/security/advisories/mfsa2019-37/
- https://www.mozilla.org/security/advisories/mfsa2019-37/
- https://www.mozilla.org/security/advisories/mfsa2019-38/
- https://www.mozilla.org/security/advisories/mfsa2019-38/
Modified: 2024-11-21
CVE-2019-17010
Under certain conditions, when checking the Resist Fingerprinting preference during device orientation checks, a race condition could have caused a use-after-free and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.
- openSUSE-SU-2020:0003
- openSUSE-SU-2020:0003
- openSUSE-SU-2020:0002
- openSUSE-SU-2020:0002
- RHSA-2020:0292
- RHSA-2020:0292
- RHSA-2020:0295
- RHSA-2020:0295
- https://bugzilla.mozilla.org/show_bug.cgi?id=1581084
- https://bugzilla.mozilla.org/show_bug.cgi?id=1581084
- GLSA-202003-02
- GLSA-202003-02
- GLSA-202003-10
- GLSA-202003-10
- USN-4241-1
- USN-4241-1
- USN-4335-1
- USN-4335-1
- https://www.mozilla.org/security/advisories/mfsa2019-36/
- https://www.mozilla.org/security/advisories/mfsa2019-36/
- https://www.mozilla.org/security/advisories/mfsa2019-37/
- https://www.mozilla.org/security/advisories/mfsa2019-37/
- https://www.mozilla.org/security/advisories/mfsa2019-38/
- https://www.mozilla.org/security/advisories/mfsa2019-38/
Modified: 2024-11-21
CVE-2019-17011
Under certain conditions, when retrieving a document from a DocShell in the antitracking code, a race condition could cause a use-after-free condition and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.
- openSUSE-SU-2020:0003
- openSUSE-SU-2020:0003
- openSUSE-SU-2020:0002
- openSUSE-SU-2020:0002
- RHSA-2020:0292
- RHSA-2020:0292
- RHSA-2020:0295
- RHSA-2020:0295
- https://bugzilla.mozilla.org/show_bug.cgi?id=1591334
- https://bugzilla.mozilla.org/show_bug.cgi?id=1591334
- GLSA-202003-02
- GLSA-202003-02
- GLSA-202003-10
- GLSA-202003-10
- USN-4241-1
- USN-4241-1
- USN-4335-1
- USN-4335-1
- https://www.mozilla.org/security/advisories/mfsa2019-36/
- https://www.mozilla.org/security/advisories/mfsa2019-36/
- https://www.mozilla.org/security/advisories/mfsa2019-37/
- https://www.mozilla.org/security/advisories/mfsa2019-37/
- https://www.mozilla.org/security/advisories/mfsa2019-38/
- https://www.mozilla.org/security/advisories/mfsa2019-38/
Modified: 2024-11-21
CVE-2019-17012
Mozilla developers reported memory safety bugs present in Firefox 70 and Firefox ESR 68.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.
- openSUSE-SU-2020:0003
- openSUSE-SU-2020:0003
- openSUSE-SU-2020:0002
- openSUSE-SU-2020:0002
- RHSA-2020:0292
- RHSA-2020:0292
- RHSA-2020:0295
- RHSA-2020:0295
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1449736%2C1533957%2C1560667%2C1567209%2C1580288%2C1585760%2C1592502
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1449736%2C1533957%2C1560667%2C1567209%2C1580288%2C1585760%2C1592502
- GLSA-202003-02
- GLSA-202003-02
- GLSA-202003-10
- GLSA-202003-10
- USN-4241-1
- USN-4241-1
- USN-4335-1
- USN-4335-1
- https://www.mozilla.org/security/advisories/mfsa2019-36/
- https://www.mozilla.org/security/advisories/mfsa2019-36/
- https://www.mozilla.org/security/advisories/mfsa2019-37/
- https://www.mozilla.org/security/advisories/mfsa2019-37/
- https://www.mozilla.org/security/advisories/mfsa2019-38/
- https://www.mozilla.org/security/advisories/mfsa2019-38/
Modified: 2024-11-21
CVE-2019-9788
Mozilla developers and community members reported memory safety bugs present in Firefox 65, Firefox ESR 60.5, and Thunderbird 60.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.
- RHSA-2019:0966
- RHSA-2019:1144
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1518001%2C1521304%2C1521214%2C1506665%2C1516834%2C1518774%2C1524755%2C1523362%2C1524214%2C1529203
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- RHSA-2019:0966
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1518001%2C1521304%2C1521214%2C1506665%2C1516834%2C1518774%2C1524755%2C1523362%2C1524214%2C1529203
- RHSA-2019:1144
Modified: 2024-11-21
CVE-2019-9789
Mozilla developers and community members reported memory safety bugs present in Firefox 65. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 66.
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1520483%2C1522987%2C1528199%2C1519337%2C1525549%2C1516179%2C1518524%2C1518331%2C1526579%2C1512567%2C1524335%2C1448505%2C1518821
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1520483%2C1522987%2C1528199%2C1519337%2C1525549%2C1516179%2C1518524%2C1518331%2C1526579%2C1512567%2C1524335%2C1448505%2C1518821
- https://www.mozilla.org/security/advisories/mfsa2019-07/
Modified: 2024-11-21
CVE-2019-9790
A use-after-free vulnerability can occur when a raw pointer to a DOM element on a page is obtained using JavaScript and the element is then removed while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.
- RHSA-2019:0966
- RHSA-2019:1144
- https://bugzilla.mozilla.org/show_bug.cgi?id=1525145
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- RHSA-2019:0966
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1525145
- RHSA-2019:1144
Modified: 2024-11-21
CVE-2019-9791
The type inference system allows the compilation of functions that can cause type confusions between arbitrary objects when compiled through the IonMonkey just-in-time (JIT) compiler and when the constructor function is entered through on-stack replacement (OSR). This allows for possible arbitrary reading and writing of objects during an exploitable crash. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.
- RHSA-2019:0966
- RHSA-2019:1144
- https://bugzilla.mozilla.org/show_bug.cgi?id=1530958
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- RHSA-2019:0966
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1530958
- RHSA-2019:1144
Modified: 2024-11-21
CVE-2019-9792
The IonMonkey just-in-time (JIT) compiler can leak an internal JS_OPTIMIZED_OUT magic value to the running script during a bailout. This magic value can then be used by JavaScript to achieve memory corruption, which results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.
- http://packetstormsecurity.com/files/153106/Spidermonkey-IonMonkey-JS_OPTIMIZED_OUT-Value-Leak.html
- RHSA-2019:0966
- RHSA-2019:1144
- https://bugzilla.mozilla.org/show_bug.cgi?id=1532599
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- http://packetstormsecurity.com/files/153106/Spidermonkey-IonMonkey-JS_OPTIMIZED_OUT-Value-Leak.html
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1532599
- RHSA-2019:1144
- RHSA-2019:0966
Modified: 2024-11-21
CVE-2019-9793
A mechanism was discovered that removes some bounds checking for string, array, or typed array accesses if Spectre mitigations have been disabled. This vulnerability could allow an attacker to create an arbitrary value in compiled JavaScript, for which the range analysis will infer a fully controlled, incorrect range in circumstances where users have explicitly disabled Spectre mitigations. *Note: Spectre mitigations are currently enabled for all users by default settings.*. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.
- RHSA-2019:0966
- RHSA-2019:1144
- https://bugzilla.mozilla.org/show_bug.cgi?id=1528829
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- RHSA-2019:0966
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1528829
- RHSA-2019:1144
Modified: 2024-11-21
CVE-2019-9795
A vulnerability where type-confusion in the IonMonkey just-in-time (JIT) compiler could potentially be used by malicious JavaScript to trigger a potentially exploitable crash. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.
- RHSA-2019:0966
- RHSA-2019:1144
- https://bugzilla.mozilla.org/show_bug.cgi?id=1514682
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- RHSA-2019:0966
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1514682
- RHSA-2019:1144
Modified: 2024-11-21
CVE-2019-9796
A use-after-free vulnerability can occur when the SMIL animation controller incorrectly registers with the refresh driver twice when only a single registration is expected. When a registration is later freed with the removal of the animation controller element, the refresh driver incorrectly leaves a dangling pointer to the driver's observer array. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.
- RHSA-2019:0966
- RHSA-2019:1144
- https://bugzilla.mozilla.org/show_bug.cgi?id=1531277
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- RHSA-2019:0966
- https://www.mozilla.org/security/advisories/mfsa2019-11/
- https://www.mozilla.org/security/advisories/mfsa2019-08/
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1531277
- RHSA-2019:1144
Modified: 2024-11-21
CVE-2019-9797
Cross-origin images can be read in violation of the same-origin policy by exporting an image after using createImageBitmap to read the image and then rendering the resulting bitmap image within a canvas element. This vulnerability affects Firefox < 66.
- openSUSE-SU-2019:1484
- openSUSE-SU-2019:1534
- openSUSE-SU-2019:1664
- RHSA-2019:1265
- RHSA-2019:1267
- RHSA-2019:1269
- RHSA-2019:1308
- RHSA-2019:1309
- RHSA-2019:1310
- https://bugzilla.mozilla.org/show_bug.cgi?id=1528909
- [debian-lts-announce] 20190523 [SECURITY] [DLA 1800-1] firefox-esr security update
- [debian-lts-announce] 20190527 [SECURITY] [DLA 1806-1] thunderbird security update
- 20190522 [slackware-security] mozilla-firefox (SSA:2019-141-01)
- 20190523 [SECURITY] [DSA 4448-1] firefox-esr security update
- 20190527 [SECURITY] [DSA 4451-1] thunderbird security update
- USN-3997-1
- DSA-4448
- DSA-4451
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- openSUSE-SU-2019:1484
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- DSA-4451
- DSA-4448
- USN-3997-1
- 20190527 [SECURITY] [DSA 4451-1] thunderbird security update
- 20190523 [SECURITY] [DSA 4448-1] firefox-esr security update
- 20190522 [slackware-security] mozilla-firefox (SSA:2019-141-01)
- [debian-lts-announce] 20190527 [SECURITY] [DLA 1806-1] thunderbird security update
- [debian-lts-announce] 20190523 [SECURITY] [DLA 1800-1] firefox-esr security update
- https://bugzilla.mozilla.org/show_bug.cgi?id=1528909
- RHSA-2019:1310
- RHSA-2019:1309
- RHSA-2019:1308
- RHSA-2019:1269
- RHSA-2019:1267
- RHSA-2019:1265
- openSUSE-SU-2019:1664
- openSUSE-SU-2019:1534
Modified: 2024-11-21
CVE-2019-9799
Insufficient bounds checking of data during inter-process communication might allow a compromised content process to be able to read memory from the parent process under certain conditions. This vulnerability affects Firefox < 66.
Modified: 2024-11-21
CVE-2019-9800
Mozilla developers and community members reported memory safety bugs present in Firefox 66, Firefox ESR 60.6, and Thunderbird 60.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1540166%2C1534593%2C1546327%2C1540136%2C1538736%2C1538042%2C1535612%2C1499719%2C1499108%2C1538619%2C1535194%2C1516325%2C1542324%2C1542097%2C1532465%2C1533554%2C1541580
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1540166%2C1534593%2C1546327%2C1540136%2C1538736%2C1538042%2C1535612%2C1499719%2C1499108%2C1538619%2C1535194%2C1516325%2C1542324%2C1542097%2C1532465%2C1533554%2C1541580
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-13/
Modified: 2024-11-21
CVE-2019-9802
If a Sandbox content process is compromised, it can initiate an FTP download which will then use a child process to render the downloaded data. The downloaded data can then be passed to the Chrome process with an arbitrary file length supplied by an attacker, bypassing sandbox protections and allow for a potential memory read of adjacent data from the privileged Chrome process, which may include sensitive data. This vulnerability affects Firefox < 66.
Modified: 2024-11-21
CVE-2019-9803
The Upgrade-Insecure-Requests (UIR) specification states that if UIR is enabled through Content Security Policy (CSP), navigation to a same-origin URL must be upgraded to HTTPS. Firefox will incorrectly navigate to an HTTP URL rather than perform the security upgrade requested by the CSP in some circumstances, allowing for potential man-in-the-middle attacks on the linked resources. This vulnerability affects Firefox < 66.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1437009
- https://bugzilla.mozilla.org/show_bug.cgi?id=1515863
- https://w3c.github.io/webappsec-upgrade-insecure-requests/
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1437009
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://w3c.github.io/webappsec-upgrade-insecure-requests/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1515863
Modified: 2024-11-21
CVE-2019-9805
A latent vulnerability exists in the Prio library where data may be read from uninitialized memory for some functions, leading to potential memory corruption. This vulnerability affects Firefox < 66.
Modified: 2024-11-21
CVE-2019-9806
A vulnerability exists during authorization prompting for FTP transaction where successive modal prompts are displayed and cannot be immediately dismissed. This allows for a denial of service (DOS) attack. This vulnerability affects Firefox < 66.
Modified: 2024-11-21
CVE-2019-9807
When arbitrary text is sent over an FTP connection and a page reload is initiated, it is possible to create a modal alert message with this text as the content. This could potentially be used for social engineering attacks. This vulnerability affects Firefox < 66.
Modified: 2024-11-21
CVE-2019-9808
If WebRTC permission is requested from documents with data: or blob: URLs, the permission notifications do not properly display the originating domain. The notification states "Unknown origin" as the requestee, leading to user confusion about which site is asking for this permission. This vulnerability affects Firefox < 66.
Modified: 2024-11-21
CVE-2019-9809
If the source for resources on a page is through an FTP connection, it is possible to trigger a series of modal alert messages for these resources through invalid credentials or locations. These messages cannot be immediately dismissed, allowing for a denial of service (DOS) attack. This vulnerability affects Firefox < 66.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1282430
- https://bugzilla.mozilla.org/show_bug.cgi?id=1523249
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1282430
- https://www.mozilla.org/security/advisories/mfsa2019-07/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1523249
Modified: 2024-11-21
CVE-2019-9810
Incorrect alias information in IonMonkey JIT compiler for Array.prototype.slice method may lead to missing bounds check and a buffer overflow. This vulnerability affects Firefox < 66.0.1, Firefox ESR < 60.6.1, and Thunderbird < 60.6.1.
- http://packetstormsecurity.com/files/155592/Mozilla-Firefox-Windows-64-Bit-Chain-Exploit.html
- RHSA-2019:0966
- RHSA-2019:1144
- https://bugzilla.mozilla.org/show_bug.cgi?id=1537924
- https://www.mozilla.org/security/advisories/mfsa2019-09/
- https://www.mozilla.org/security/advisories/mfsa2019-10/
- https://www.mozilla.org/security/advisories/mfsa2019-12/
- http://packetstormsecurity.com/files/155592/Mozilla-Firefox-Windows-64-Bit-Chain-Exploit.html
- https://www.mozilla.org/security/advisories/mfsa2019-12/
- https://www.mozilla.org/security/advisories/mfsa2019-10/
- https://www.mozilla.org/security/advisories/mfsa2019-09/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1537924
- RHSA-2019:1144
- RHSA-2019:0966
Modified: 2024-11-21
CVE-2019-9811
As part of a winning Pwn2Own entry, a researcher demonstrated a sandbox escape by installing a malicious language pack and then opening a browser feature that used the compromised translation. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1538007
- https://bugzilla.mozilla.org/show_bug.cgi?id=1539598
- https://bugzilla.mozilla.org/show_bug.cgi?id=1563327
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- GLSA-201908-12
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- openSUSE-SU-2019:1811
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- GLSA-201908-20
- GLSA-201908-12
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- https://bugzilla.mozilla.org/show_bug.cgi?id=1563327
- https://bugzilla.mozilla.org/show_bug.cgi?id=1539598
- https://bugzilla.mozilla.org/show_bug.cgi?id=1538007
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1813
Modified: 2024-11-21
CVE-2019-9812
Given a compromised sandboxed content process due to a separate vulnerability, it is possible to escape that sandbox by loading accounts.firefox.com in that process and forcing a log-in to a malicious Firefox Sync account. Preference settings that disable the sandbox are then synchronized to the local machine and the compromised browser would restart without the sandbox if a crash is triggered. This vulnerability affects Firefox ESR < 60.9, Firefox ESR < 68.1, and Firefox < 69.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1538008
- https://bugzilla.mozilla.org/show_bug.cgi?id=1538015
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-27/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1538008
- https://www.mozilla.org/security/advisories/mfsa2019-27/
- https://www.mozilla.org/security/advisories/mfsa2019-26/
- https://www.mozilla.org/security/advisories/mfsa2019-25/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1538015
Modified: 2024-11-21
CVE-2019-9813
Incorrect handling of __proto__ mutations may lead to type confusion in IonMonkey JIT code and can be leveraged for arbitrary memory read and write. This vulnerability affects Firefox < 66.0.1, Firefox ESR < 60.6.1, and Thunderbird < 60.6.1.
- RHSA-2019:0966
- RHSA-2019:1144
- https://bugzilla.mozilla.org/show_bug.cgi?id=1538006
- https://www.mozilla.org/security/advisories/mfsa2019-09/
- https://www.mozilla.org/security/advisories/mfsa2019-10/
- https://www.mozilla.org/security/advisories/mfsa2019-12/
- RHSA-2019:0966
- https://www.mozilla.org/security/advisories/mfsa2019-12/
- https://www.mozilla.org/security/advisories/mfsa2019-10/
- https://www.mozilla.org/security/advisories/mfsa2019-09/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1538006
- RHSA-2019:1144
Modified: 2024-11-21
CVE-2019-9814
Mozilla developers and community members reported memory safety bugs present in Firefox 66. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 67.
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1527592%2C1534536%2C1520132%2C1543159%2C1539393%2C1459932%2C1459182%2C1516425
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1527592%2C1534536%2C1520132%2C1543159%2C1539393%2C1459932%2C1459182%2C1516425
- https://www.mozilla.org/security/advisories/mfsa2019-13/
Modified: 2024-11-21
CVE-2019-9816
A possible vulnerability exists where type confusion can occur when manipulating JavaScript objects in object groups, allowing for the bypassing of security checks within these groups. *Note: this vulnerability has only been demonstrated with UnboxedObjects, which are disabled by default on all supported releases.*. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1536768
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1536768
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-13/
Modified: 2024-11-21
CVE-2019-9817
Images from a different domain can be read using a canvas object in some circumstances. This could be used to steal image data from a different site in violation of same-origin policy. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1540221
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1540221
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-13/
Modified: 2024-11-21
CVE-2019-9819
A vulnerability where a JavaScript compartment mismatch can occur while working with the fetch API, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1532553
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1532553
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-13/
Modified: 2024-11-21
CVE-2019-9820
A use-after-free vulnerability can occur in the chrome event handler when it is freed while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1536405
- https://www.mozilla.org/security/advisories/mfsa2019-13/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1536405
- https://www.mozilla.org/security/advisories/mfsa2019-15/
- https://www.mozilla.org/security/advisories/mfsa2019-14/
- https://www.mozilla.org/security/advisories/mfsa2019-13/
Modified: 2024-11-21
CVE-2019-9821
A use-after-free vulnerability can occur in AssertWorkerThread due to a race condition with shared workers. This results in a potentially exploitable crash. This vulnerability affects Firefox < 67.
Closed vulnerabilities
BDU:2021-01694
Уязвимость компонента DCE/RPC DNS программного обеспечения для общения с сетевыми дисками Samba, связанная с настройками прав доступа по умолчанию, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01743
Уязвимость пакета программ сетевого взаимодействия Samba, связанная с недостатками процедуры аутентификации, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность
Modified: 2024-11-21
CVE-2019-14861
All Samba versions 4.x.x before 4.9.17, 4.10.x before 4.10.11 and 4.11.x before 4.11.3 have an issue, where the (poorly named) dnsserver RPC pipe provides administrative facilities to modify DNS records and zones. Samba, when acting as an AD DC, stores DNS records in LDAP. In AD, the default permissions on the DNS partition allow creation of new records by authenticated users. This is used for example to allow machines to self-register in DNS. If a DNS record was created that case-insensitively matched the name of the zone, the ldb_qsort() and dns_name_compare() routines could be confused into reading memory prior to the list of DNS entries when responding to DnssrvEnumRecords() or DnssrvEnumRecords2() and so following invalid memory as a pointer.
- openSUSE-SU-2019:2700
- openSUSE-SU-2019:2700
- [oss-security] 20240625 Re: Out-of-bounds read & write in the glibc's qsort()
- [oss-security] 20240625 Re: Out-of-bounds read & write in the glibc's qsort()
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14861
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14861
- [debian-lts-announce] 20210529 [SECURITY] [DLA 2668-1] samba security update
- [debian-lts-announce] 20210529 [SECURITY] [DLA 2668-1] samba security update
- FEDORA-2019-be98a08835
- FEDORA-2019-be98a08835
- FEDORA-2019-11dddb785b
- FEDORA-2019-11dddb785b
- GLSA-202003-52
- GLSA-202003-52
- https://security.netapp.com/advisory/ntap-20191210-0002/
- https://security.netapp.com/advisory/ntap-20191210-0002/
- USN-4217-1
- USN-4217-1
- USN-4217-2
- USN-4217-2
- https://www.samba.org/samba/security/CVE-2019-14861.html
- https://www.samba.org/samba/security/CVE-2019-14861.html
- https://www.synology.com/security/advisory/Synology_SA_19_40
- https://www.synology.com/security/advisory/Synology_SA_19_40
Modified: 2024-11-21
CVE-2019-14870
All Samba versions 4.x.x before 4.9.17, 4.10.x before 4.10.11 and 4.11.x before 4.11.3 have an issue, where the S4U (MS-SFU) Kerberos delegation model includes a feature allowing for a subset of clients to be opted out of constrained delegation in any way, either S4U2Self or regular Kerberos authentication, by forcing all tickets for these clients to be non-forwardable. In AD this is implemented by a user attribute delegation_not_allowed (aka not-delegated), which translates to disallow-forwardable. However the Samba AD DC does not do that for S4U2Self and does set the forwardable flag even if the impersonated client has the not-delegated flag set.
- openSUSE-SU-2019:2700
- openSUSE-SU-2019:2700
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14870
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14870
- [debian-lts-announce] 20210529 [SECURITY] [DLA 2668-1] samba security update
- [debian-lts-announce] 20210529 [SECURITY] [DLA 2668-1] samba security update
- [debian-lts-announce] 20221126 [SECURITY] [DLA 3206-1] heimdal security update
- [debian-lts-announce] 20221126 [SECURITY] [DLA 3206-1] heimdal security update
- FEDORA-2019-be98a08835
- FEDORA-2019-be98a08835
- FEDORA-2019-11dddb785b
- FEDORA-2019-11dddb785b
- GLSA-202003-52
- GLSA-202003-52
- GLSA-202310-06
- GLSA-202310-06
- https://security.netapp.com/advisory/ntap-20191210-0002/
- https://security.netapp.com/advisory/ntap-20191210-0002/
- https://security.netapp.com/advisory/ntap-20230216-0008/
- https://security.netapp.com/advisory/ntap-20230216-0008/
- USN-4217-1
- USN-4217-1
- USN-4217-2
- USN-4217-2
- https://www.samba.org/samba/security/CVE-2019-14870.html
- https://www.samba.org/samba/security/CVE-2019-14870.html
- https://www.synology.com/security/advisory/Synology_SA_19_40
- https://www.synology.com/security/advisory/Synology_SA_19_40
Closed bugs
Проблема при печати на принтер расшареный с Windows
Closed vulnerabilities
BDU:2021-01694
Уязвимость компонента DCE/RPC DNS программного обеспечения для общения с сетевыми дисками Samba, связанная с настройками прав доступа по умолчанию, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01743
Уязвимость пакета программ сетевого взаимодействия Samba, связанная с недостатками процедуры аутентификации, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность
Modified: 2024-11-21
CVE-2019-14861
All Samba versions 4.x.x before 4.9.17, 4.10.x before 4.10.11 and 4.11.x before 4.11.3 have an issue, where the (poorly named) dnsserver RPC pipe provides administrative facilities to modify DNS records and zones. Samba, when acting as an AD DC, stores DNS records in LDAP. In AD, the default permissions on the DNS partition allow creation of new records by authenticated users. This is used for example to allow machines to self-register in DNS. If a DNS record was created that case-insensitively matched the name of the zone, the ldb_qsort() and dns_name_compare() routines could be confused into reading memory prior to the list of DNS entries when responding to DnssrvEnumRecords() or DnssrvEnumRecords2() and so following invalid memory as a pointer.
- openSUSE-SU-2019:2700
- openSUSE-SU-2019:2700
- [oss-security] 20240625 Re: Out-of-bounds read & write in the glibc's qsort()
- [oss-security] 20240625 Re: Out-of-bounds read & write in the glibc's qsort()
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14861
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14861
- [debian-lts-announce] 20210529 [SECURITY] [DLA 2668-1] samba security update
- [debian-lts-announce] 20210529 [SECURITY] [DLA 2668-1] samba security update
- FEDORA-2019-be98a08835
- FEDORA-2019-be98a08835
- FEDORA-2019-11dddb785b
- FEDORA-2019-11dddb785b
- GLSA-202003-52
- GLSA-202003-52
- https://security.netapp.com/advisory/ntap-20191210-0002/
- https://security.netapp.com/advisory/ntap-20191210-0002/
- USN-4217-1
- USN-4217-1
- USN-4217-2
- USN-4217-2
- https://www.samba.org/samba/security/CVE-2019-14861.html
- https://www.samba.org/samba/security/CVE-2019-14861.html
- https://www.synology.com/security/advisory/Synology_SA_19_40
- https://www.synology.com/security/advisory/Synology_SA_19_40
Modified: 2024-11-21
CVE-2019-14870
All Samba versions 4.x.x before 4.9.17, 4.10.x before 4.10.11 and 4.11.x before 4.11.3 have an issue, where the S4U (MS-SFU) Kerberos delegation model includes a feature allowing for a subset of clients to be opted out of constrained delegation in any way, either S4U2Self or regular Kerberos authentication, by forcing all tickets for these clients to be non-forwardable. In AD this is implemented by a user attribute delegation_not_allowed (aka not-delegated), which translates to disallow-forwardable. However the Samba AD DC does not do that for S4U2Self and does set the forwardable flag even if the impersonated client has the not-delegated flag set.
- openSUSE-SU-2019:2700
- openSUSE-SU-2019:2700
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14870
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14870
- [debian-lts-announce] 20210529 [SECURITY] [DLA 2668-1] samba security update
- [debian-lts-announce] 20210529 [SECURITY] [DLA 2668-1] samba security update
- [debian-lts-announce] 20221126 [SECURITY] [DLA 3206-1] heimdal security update
- [debian-lts-announce] 20221126 [SECURITY] [DLA 3206-1] heimdal security update
- FEDORA-2019-be98a08835
- FEDORA-2019-be98a08835
- FEDORA-2019-11dddb785b
- FEDORA-2019-11dddb785b
- GLSA-202003-52
- GLSA-202003-52
- GLSA-202310-06
- GLSA-202310-06
- https://security.netapp.com/advisory/ntap-20191210-0002/
- https://security.netapp.com/advisory/ntap-20191210-0002/
- https://security.netapp.com/advisory/ntap-20230216-0008/
- https://security.netapp.com/advisory/ntap-20230216-0008/
- USN-4217-1
- USN-4217-1
- USN-4217-2
- USN-4217-2
- https://www.samba.org/samba/security/CVE-2019-14870.html
- https://www.samba.org/samba/security/CVE-2019-14870.html
- https://www.synology.com/security/advisory/Synology_SA_19_40
- https://www.synology.com/security/advisory/Synology_SA_19_40
Closed bugs
Проблема при печати на принтер расшареный с Windows