ALT-PU-2015-1816-1
Closed vulnerabilities
BDU:2015-11311
Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код
BDU:2015-11312
Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю обойти процедуру подтверждения действий пользователем при установке обновления
BDU:2015-11485
Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2015-11486
Уязвимость браузера Firefox, позволяющая нарушителю получить доступ к защищаемой информации
BDU:2015-11508
Уязвимости браузеров Firefox и Firefox ESR, позволяющие нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2015-11509
Уязвимости браузера Firefox, позволяющие нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2015-11510
Уязвимость браузера Firefox, позволяющая нарушителю обойти ограничения доступа к элементам окна
BDU:2015-11511
Уязвимость браузера Firefox, позволяющая нарушителю получить доступ к защищаемой информации из памяти процесса
BDU:2015-11512
Уязвимость браузера Firefox, позволяющая нарушителю получить доступ к защищаемой информации или вызвать отказ в обслуживании
BDU:2015-11514
Уязвимость браузера Firefox ESR, позволяющая нарушителю выполнить произвольный код
BDU:2015-11515
Уязвимость браузера Firefox, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2015-11516
Уязвимость браузера Firefox, позволяющая нарушителю подменить содержимое окна
BDU:2015-11517
Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код
BDU:2015-11518
Уязвимость браузера Firefox, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2015-11519
Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код
BDU:2015-11521
Уязвимость браузера Firefox, позволяющая нарушителю обойти механизм защиты ECMAScript 5 (ES5) API и выполнить произвольный код
BDU:2015-11522
Уязвимость браузера Firefox, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2015-11523
Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю обойти существующие ограничения доступа и выполнить переход по заданному URL
BDU:2015-11524
Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю обойти механизм защиты CORS
BDU:2015-11525
Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2015-11526
Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2015-11532
Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2015-11533
Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2015-11534
Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2015-11535
Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2015-4497
Use-after-free vulnerability in the CanvasRenderingContext2D implementation in Mozilla Firefox before 40.0.3 and Firefox ESR 38.x before 38.2.1 allows remote attackers to execute arbitrary code by leveraging improper interaction between resize events and changes to Cascading Style Sheets (CSS) token sequences for a CANVAS element.
- SUSE-SU-2015:1504
- SUSE-SU-2015:1504
- SUSE-SU-2015:2081
- SUSE-SU-2015:2081
- openSUSE-SU-2015:1492
- openSUSE-SU-2015:1492
- RHSA-2015:1693
- RHSA-2015:1693
- DSA-3345
- DSA-3345
- http://www.mozilla.org/security/announce/2015/mfsa2015-94.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-94.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 76502
- 76502
- 1033397
- 1033397
- USN-2723-1
- USN-2723-1
- http://www.zerodayinitiative.com/advisories/ZDI-15-406
- http://www.zerodayinitiative.com/advisories/ZDI-15-406
- https://bugzilla.mozilla.org/show_bug.cgi?id=1164766
- https://bugzilla.mozilla.org/show_bug.cgi?id=1164766
- https://bugzilla.mozilla.org/show_bug.cgi?id=1175278
- https://bugzilla.mozilla.org/show_bug.cgi?id=1175278
Modified: 2024-11-21
CVE-2015-4498
The add-on installation feature in Mozilla Firefox before 40.0.3 and Firefox ESR 38.x before 38.2.1 allows remote attackers to bypass an intended user-confirmation requirement by constructing a crafted data: URL and triggering navigation to an arbitrary http: or https: URL at a certain early point in the installation process.
- SUSE-SU-2015:1504
- SUSE-SU-2015:1504
- SUSE-SU-2015:2081
- SUSE-SU-2015:2081
- openSUSE-SU-2015:1492
- openSUSE-SU-2015:1492
- RHSA-2015:1693
- RHSA-2015:1693
- DSA-3345
- DSA-3345
- http://www.mozilla.org/security/announce/2015/mfsa2015-95.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-95.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 76505
- 76505
- 1033396
- 1033396
- USN-2723-1
- USN-2723-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1042699
- https://bugzilla.mozilla.org/show_bug.cgi?id=1042699
Modified: 2024-11-21
CVE-2015-4500
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
- openSUSE-SU-2015:1658
- openSUSE-SU-2015:1658
- openSUSE-SU-2015:1679
- openSUSE-SU-2015:1679
- SUSE-SU-2015:1680
- SUSE-SU-2015:1680
- openSUSE-SU-2015:1681
- openSUSE-SU-2015:1681
- SUSE-SU-2015:1703
- SUSE-SU-2015:1703
- SUSE-SU-2015:2081
- SUSE-SU-2015:2081
- RHSA-2015:1834
- RHSA-2015:1834
- RHSA-2015:1852
- RHSA-2015:1852
- DSA-3365
- DSA-3365
- http://www.mozilla.org/security/announce/2015/mfsa2015-96.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-96.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 76816
- 76816
- 1033640
- 1033640
- USN-2743-1
- USN-2743-1
- USN-2743-2
- USN-2743-2
- USN-2743-3
- USN-2743-3
- USN-2743-4
- USN-2743-4
- USN-2754-1
- USN-2754-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1044077
- https://bugzilla.mozilla.org/show_bug.cgi?id=1044077
- https://bugzilla.mozilla.org/show_bug.cgi?id=1152026
- https://bugzilla.mozilla.org/show_bug.cgi?id=1152026
- https://bugzilla.mozilla.org/show_bug.cgi?id=1161063
- https://bugzilla.mozilla.org/show_bug.cgi?id=1161063
- https://bugzilla.mozilla.org/show_bug.cgi?id=1181651
- https://bugzilla.mozilla.org/show_bug.cgi?id=1181651
- https://bugzilla.mozilla.org/show_bug.cgi?id=1183153
- https://bugzilla.mozilla.org/show_bug.cgi?id=1183153
- https://bugzilla.mozilla.org/show_bug.cgi?id=1186962
- https://bugzilla.mozilla.org/show_bug.cgi?id=1186962
- https://bugzilla.mozilla.org/show_bug.cgi?id=1201793
- https://bugzilla.mozilla.org/show_bug.cgi?id=1201793
- https://bugzilla.mozilla.org/show_bug.cgi?id=1202844
- https://bugzilla.mozilla.org/show_bug.cgi?id=1202844
Modified: 2024-11-21
CVE-2015-4501
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 41.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
- openSUSE-SU-2015:1658
- openSUSE-SU-2015:1658
- SUSE-SU-2015:1680
- SUSE-SU-2015:1680
- openSUSE-SU-2015:1681
- openSUSE-SU-2015:1681
- SUSE-SU-2015:1703
- SUSE-SU-2015:1703
- SUSE-SU-2015:2081
- SUSE-SU-2015:2081
- http://www.mozilla.org/security/announce/2015/mfsa2015-96.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-96.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 76816
- 76816
- 1033640
- 1033640
- USN-2743-1
- USN-2743-1
- USN-2743-2
- USN-2743-2
- USN-2743-3
- USN-2743-3
- USN-2743-4
- USN-2743-4
- https://bugzilla.mozilla.org/show_bug.cgi?id=1165706
- https://bugzilla.mozilla.org/show_bug.cgi?id=1165706
- https://bugzilla.mozilla.org/show_bug.cgi?id=1186657
- https://bugzilla.mozilla.org/show_bug.cgi?id=1186657
Modified: 2024-11-21
CVE-2015-4502
js/src/proxy/Proxy.cpp in Mozilla Firefox before 41.0 mishandles certain receiver arguments, which allows remote attackers to bypass intended window access restrictions via a crafted web site.
- openSUSE-SU-2015:1658
- openSUSE-SU-2015:1658
- openSUSE-SU-2015:1681
- openSUSE-SU-2015:1681
- http://www.mozilla.org/security/announce/2015/mfsa2015-108.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-108.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 76815
- 76815
- 1033640
- 1033640
- USN-2743-1
- USN-2743-1
- USN-2743-2
- USN-2743-2
- USN-2743-3
- USN-2743-3
- USN-2743-4
- USN-2743-4
- https://bugzilla.mozilla.org/show_bug.cgi?id=1105045
- https://bugzilla.mozilla.org/show_bug.cgi?id=1105045
- https://hg.mozilla.org/mozilla-central/rev/dc21224de25b
- https://hg.mozilla.org/mozilla-central/rev/dc21224de25b
Modified: 2024-11-21
CVE-2015-4503
The TCP Socket API implementation in Mozilla Firefox before 41.0 mishandles array boundaries that were established with a navigator.mozTCPSocket.open method call and send method calls, which allows remote TCP servers to obtain sensitive information from process memory by reading packet data, as demonstrated by availability of this API in a Firefox OS application.
- openSUSE-SU-2015:1658
- openSUSE-SU-2015:1658
- openSUSE-SU-2015:1681
- openSUSE-SU-2015:1681
- http://www.mozilla.org/security/announce/2015/mfsa2015-97.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-97.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 76815
- 76815
- 1033640
- 1033640
- https://bugzilla.mozilla.org/show_bug.cgi?id=994337
- https://bugzilla.mozilla.org/show_bug.cgi?id=994337
Modified: 2024-11-21
CVE-2015-4504
The lut_inverse_interp16 function in the QCMS library in Mozilla Firefox before 41.0 allows remote attackers to obtain sensitive information or cause a denial of service (buffer over-read and application crash) via crafted attributes in the ICC 4 profile of an image.
- openSUSE-SU-2015:1658
- openSUSE-SU-2015:1658
- openSUSE-SU-2015:1681
- openSUSE-SU-2015:1681
- http://www.mozilla.org/security/announce/2015/mfsa2015-98.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-98.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 76815
- 76815
- 1033640
- 1033640
- USN-2743-1
- USN-2743-1
- USN-2743-2
- USN-2743-2
- USN-2743-3
- USN-2743-3
- USN-2743-4
- USN-2743-4
- https://bugzilla.mozilla.org/show_bug.cgi?id=1132467
- https://bugzilla.mozilla.org/show_bug.cgi?id=1132467
Modified: 2024-11-21
CVE-2015-4506
Buffer overflow in the vp9_init_context_buffers function in libvpx, as used in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3, allows remote attackers to execute arbitrary code via a crafted VP9 file.
- openSUSE-SU-2015:1658
- openSUSE-SU-2015:1658
- openSUSE-SU-2015:1679
- openSUSE-SU-2015:1679
- SUSE-SU-2015:1680
- SUSE-SU-2015:1680
- openSUSE-SU-2015:1681
- openSUSE-SU-2015:1681
- SUSE-SU-2015:1703
- SUSE-SU-2015:1703
- SUSE-SU-2015:2081
- SUSE-SU-2015:2081
- RHSA-2015:1834
- RHSA-2015:1834
- DSA-3365
- DSA-3365
- http://www.mozilla.org/security/announce/2015/mfsa2015-101.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-101.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 76816
- 76816
- 1033640
- 1033640
- USN-2743-1
- USN-2743-1
- USN-2743-2
- USN-2743-2
- USN-2743-3
- USN-2743-3
- USN-2743-4
- USN-2743-4
- USN-2754-1
- USN-2754-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1192226
- https://bugzilla.mozilla.org/show_bug.cgi?id=1192226
Modified: 2024-11-21
CVE-2015-4507
The SavedStacks class in the JavaScript implementation in Mozilla Firefox before 41.0, when the Debugger API is enabled, allows remote attackers to cause a denial of service (getSlotRef assertion failure and application exit) or possibly execute arbitrary code via a crafted web site.
- openSUSE-SU-2015:1658
- openSUSE-SU-2015:1658
- openSUSE-SU-2015:1681
- openSUSE-SU-2015:1681
- http://www.mozilla.org/security/announce/2015/mfsa2015-102.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-102.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 76815
- 76815
- 1033640
- 1033640
- USN-2743-1
- USN-2743-1
- USN-2743-2
- USN-2743-2
- USN-2743-3
- USN-2743-3
- USN-2743-4
- USN-2743-4
- https://bugzilla.mozilla.org/show_bug.cgi?id=1192401
- https://bugzilla.mozilla.org/show_bug.cgi?id=1192401
Modified: 2024-11-21
CVE-2015-4508
Mozilla Firefox before 41.0, when reader mode is enabled, allows remote attackers to spoof the relationship between address-bar URLs and web content via a crafted web site.
- openSUSE-SU-2015:1658
- openSUSE-SU-2015:1658
- http://www.mozilla.org/security/announce/2015/mfsa2015-103.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-103.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 76815
- 76815
- 1033640
- 1033640
- USN-2743-1
- USN-2743-1
- USN-2743-2
- USN-2743-2
- USN-2743-3
- USN-2743-3
- USN-2743-4
- USN-2743-4
- https://bugzilla.mozilla.org/show_bug.cgi?id=1195976
- https://bugzilla.mozilla.org/show_bug.cgi?id=1195976
Modified: 2024-11-21
CVE-2015-4509
Use-after-free vulnerability in the HTMLVideoElement interface in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allows remote attackers to execute arbitrary code via crafted JavaScript code that modifies the URI table of a media element, aka ZDI-CAN-3176.
- openSUSE-SU-2015:1658
- openSUSE-SU-2015:1658
- openSUSE-SU-2015:1679
- openSUSE-SU-2015:1679
- SUSE-SU-2015:1680
- SUSE-SU-2015:1680
- openSUSE-SU-2015:1681
- openSUSE-SU-2015:1681
- SUSE-SU-2015:1703
- SUSE-SU-2015:1703
- SUSE-SU-2015:2081
- SUSE-SU-2015:2081
- RHSA-2015:1834
- RHSA-2015:1834
- RHSA-2015:1852
- RHSA-2015:1852
- DSA-3365
- DSA-3365
- http://www.mozilla.org/security/announce/2015/mfsa2015-106.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-106.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 76816
- 76816
- 1033640
- 1033640
- USN-2743-1
- USN-2743-1
- USN-2743-2
- USN-2743-2
- USN-2743-3
- USN-2743-3
- USN-2743-4
- USN-2743-4
- USN-2754-1
- USN-2754-1
- http://www.zerodayinitiative.com/advisories/ZDI-15-646
- http://www.zerodayinitiative.com/advisories/ZDI-15-646
- https://bugzilla.mozilla.org/show_bug.cgi?id=1198435
- https://bugzilla.mozilla.org/show_bug.cgi?id=1198435
Modified: 2024-11-21
CVE-2015-4510
Race condition in the WorkerPrivate::NotifyFeatures function in Mozilla Firefox before 41.0 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and application crash) by leveraging improper interaction between shared workers and the IndexedDB implementation.
- openSUSE-SU-2015:1658
- openSUSE-SU-2015:1658
- openSUSE-SU-2015:1681
- openSUSE-SU-2015:1681
- http://www.mozilla.org/security/announce/2015/mfsa2015-104.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-104.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 76815
- 76815
- 1033640
- 1033640
- USN-2743-1
- USN-2743-1
- USN-2743-2
- USN-2743-2
- USN-2743-3
- USN-2743-3
- USN-2743-4
- USN-2743-4
- https://bugzilla.mozilla.org/show_bug.cgi?id=1200004
- https://bugzilla.mozilla.org/show_bug.cgi?id=1200004
Modified: 2024-11-21
CVE-2015-4511
Heap-based buffer overflow in the nestegg_track_codec_data function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allows remote attackers to execute arbitrary code via a crafted header in a WebM video.
- openSUSE-SU-2015:1658
- openSUSE-SU-2015:1658
- openSUSE-SU-2015:1679
- openSUSE-SU-2015:1679
- SUSE-SU-2015:1680
- SUSE-SU-2015:1680
- openSUSE-SU-2015:1681
- openSUSE-SU-2015:1681
- SUSE-SU-2015:1703
- SUSE-SU-2015:1703
- SUSE-SU-2015:2081
- SUSE-SU-2015:2081
- RHSA-2015:1834
- RHSA-2015:1834
- DSA-3365
- DSA-3365
- http://www.mozilla.org/security/announce/2015/mfsa2015-105.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-105.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 76816
- 76816
- 1033640
- 1033640
- USN-2754-1
- USN-2754-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1200148
- https://bugzilla.mozilla.org/show_bug.cgi?id=1200148
Modified: 2024-11-21
CVE-2015-4516
Mozilla Firefox before 41.0 allows remote attackers to bypass certain ECMAScript 5 (aka ES5) API protection mechanisms and modify immutable properties, and consequently execute arbitrary JavaScript code with chrome privileges, via a crafted web page that does not use ES5 APIs.
- openSUSE-SU-2015:1658
- openSUSE-SU-2015:1658
- openSUSE-SU-2015:1681
- openSUSE-SU-2015:1681
- http://www.mozilla.org/security/announce/2015/mfsa2015-109.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-109.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 76815
- 76815
- 1033640
- 1033640
- USN-2743-1
- USN-2743-1
- USN-2743-2
- USN-2743-2
- USN-2743-3
- USN-2743-3
- USN-2743-4
- USN-2743-4
- https://bugzilla.mozilla.org/show_bug.cgi?id=904886
- https://bugzilla.mozilla.org/show_bug.cgi?id=904886
Modified: 2024-11-21
CVE-2015-4517
NetworkUtils.cpp in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
- openSUSE-SU-2015:1658
- openSUSE-SU-2015:1658
- openSUSE-SU-2015:1679
- openSUSE-SU-2015:1679
- SUSE-SU-2015:1680
- SUSE-SU-2015:1680
- openSUSE-SU-2015:1681
- openSUSE-SU-2015:1681
- SUSE-SU-2015:1703
- SUSE-SU-2015:1703
- SUSE-SU-2015:2081
- SUSE-SU-2015:2081
- RHSA-2015:1834
- RHSA-2015:1834
- RHSA-2015:1852
- RHSA-2015:1852
- DSA-3365
- DSA-3365
- http://www.mozilla.org/security/announce/2015/mfsa2015-112.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-112.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 76816
- 76816
- 1033640
- 1033640
- USN-2743-1
- USN-2743-1
- USN-2743-2
- USN-2743-2
- USN-2743-3
- USN-2743-3
- USN-2743-4
- USN-2743-4
- USN-2754-1
- USN-2754-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1168959
- https://bugzilla.mozilla.org/show_bug.cgi?id=1168959
Modified: 2024-11-21
CVE-2015-4519
Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allow user-assisted remote attackers to bypass intended access restrictions and discover a redirect's target URL via crafted JavaScript code that executes after a drag-and-drop action of an image into a TEXTBOX element.
- openSUSE-SU-2015:1658
- openSUSE-SU-2015:1658
- openSUSE-SU-2015:1679
- openSUSE-SU-2015:1679
- SUSE-SU-2015:1680
- SUSE-SU-2015:1680
- openSUSE-SU-2015:1681
- openSUSE-SU-2015:1681
- SUSE-SU-2015:1703
- SUSE-SU-2015:1703
- SUSE-SU-2015:2081
- SUSE-SU-2015:2081
- RHSA-2015:1834
- RHSA-2015:1834
- RHSA-2015:1852
- RHSA-2015:1852
- DSA-3365
- DSA-3365
- http://www.mozilla.org/security/announce/2015/mfsa2015-110.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-110.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 76816
- 76816
- 1033640
- 1033640
- USN-2743-1
- USN-2743-1
- USN-2743-2
- USN-2743-2
- USN-2743-3
- USN-2743-3
- USN-2743-4
- USN-2743-4
- USN-2754-1
- USN-2754-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1189814
- https://bugzilla.mozilla.org/show_bug.cgi?id=1189814
Modified: 2024-11-21
CVE-2015-4520
Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allow remote attackers to bypass CORS preflight protection mechanisms by leveraging (1) duplicate cache-key generation or (2) retrieval of a value from an incorrect HTTP Access-Control-* response header.
- openSUSE-SU-2015:1658
- openSUSE-SU-2015:1658
- openSUSE-SU-2015:1679
- openSUSE-SU-2015:1679
- SUSE-SU-2015:1680
- SUSE-SU-2015:1680
- openSUSE-SU-2015:1681
- openSUSE-SU-2015:1681
- SUSE-SU-2015:1703
- SUSE-SU-2015:1703
- SUSE-SU-2015:2081
- SUSE-SU-2015:2081
- RHSA-2015:1834
- RHSA-2015:1834
- RHSA-2015:1852
- RHSA-2015:1852
- DSA-3365
- DSA-3365
- http://www.mozilla.org/security/announce/2015/mfsa2015-111.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-111.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 76816
- 76816
- 1033640
- 1033640
- USN-2743-1
- USN-2743-1
- USN-2743-2
- USN-2743-2
- USN-2743-3
- USN-2743-3
- USN-2743-4
- USN-2743-4
- USN-2754-1
- USN-2754-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1200856
- https://bugzilla.mozilla.org/show_bug.cgi?id=1200856
- https://bugzilla.mozilla.org/show_bug.cgi?id=1200869
- https://bugzilla.mozilla.org/show_bug.cgi?id=1200869
Modified: 2024-11-21
CVE-2015-4521
The ConvertDialogOptions function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
- openSUSE-SU-2015:1658
- openSUSE-SU-2015:1658
- openSUSE-SU-2015:1679
- openSUSE-SU-2015:1679
- SUSE-SU-2015:1680
- SUSE-SU-2015:1680
- openSUSE-SU-2015:1681
- openSUSE-SU-2015:1681
- SUSE-SU-2015:1703
- SUSE-SU-2015:1703
- SUSE-SU-2015:2081
- SUSE-SU-2015:2081
- RHSA-2015:1834
- RHSA-2015:1834
- RHSA-2015:1852
- RHSA-2015:1852
- DSA-3365
- DSA-3365
- http://www.mozilla.org/security/announce/2015/mfsa2015-112.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-112.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 76816
- 76816
- 1033640
- 1033640
- USN-2743-1
- USN-2743-1
- USN-2743-2
- USN-2743-2
- USN-2743-3
- USN-2743-3
- USN-2743-4
- USN-2743-4
- USN-2754-1
- USN-2754-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1170246
- https://bugzilla.mozilla.org/show_bug.cgi?id=1170246
Modified: 2024-11-21
CVE-2015-4522
The nsUnicodeToUTF8::GetMaxLength function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors, related to an "overflow."
- openSUSE-SU-2015:1658
- openSUSE-SU-2015:1658
- openSUSE-SU-2015:1679
- openSUSE-SU-2015:1679
- SUSE-SU-2015:1680
- SUSE-SU-2015:1680
- openSUSE-SU-2015:1681
- openSUSE-SU-2015:1681
- SUSE-SU-2015:1703
- SUSE-SU-2015:1703
- SUSE-SU-2015:2081
- SUSE-SU-2015:2081
- RHSA-2015:1834
- RHSA-2015:1834
- RHSA-2015:1852
- RHSA-2015:1852
- DSA-3365
- DSA-3365
- http://www.mozilla.org/security/announce/2015/mfsa2015-112.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-112.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 76816
- 76816
- 1033640
- 1033640
- USN-2743-1
- USN-2743-1
- USN-2743-2
- USN-2743-2
- USN-2743-3
- USN-2743-3
- USN-2743-4
- USN-2743-4
- USN-2754-1
- USN-2754-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1170794
- https://bugzilla.mozilla.org/show_bug.cgi?id=1170794
Modified: 2024-11-21
CVE-2015-7174
The nsAttrAndChildArray::GrowBy function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors, related to an "overflow."
- openSUSE-SU-2015:1658
- openSUSE-SU-2015:1658
- openSUSE-SU-2015:1679
- openSUSE-SU-2015:1679
- SUSE-SU-2015:1680
- SUSE-SU-2015:1680
- openSUSE-SU-2015:1681
- openSUSE-SU-2015:1681
- SUSE-SU-2015:1703
- SUSE-SU-2015:1703
- SUSE-SU-2015:2081
- SUSE-SU-2015:2081
- RHSA-2015:1834
- RHSA-2015:1834
- RHSA-2015:1852
- RHSA-2015:1852
- DSA-3365
- DSA-3365
- http://www.mozilla.org/security/announce/2015/mfsa2015-112.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-112.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 76816
- 76816
- 1033640
- 1033640
- USN-2743-1
- USN-2743-1
- USN-2743-2
- USN-2743-2
- USN-2743-3
- USN-2743-3
- USN-2743-4
- USN-2743-4
- USN-2754-1
- USN-2754-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1172055
- https://bugzilla.mozilla.org/show_bug.cgi?id=1172055
Modified: 2024-11-21
CVE-2015-7175
The XULContentSinkImpl::AddText function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors, related to an "overflow."
- openSUSE-SU-2015:1658
- openSUSE-SU-2015:1658
- openSUSE-SU-2015:1679
- openSUSE-SU-2015:1679
- SUSE-SU-2015:1680
- SUSE-SU-2015:1680
- openSUSE-SU-2015:1681
- openSUSE-SU-2015:1681
- SUSE-SU-2015:1703
- SUSE-SU-2015:1703
- SUSE-SU-2015:2081
- SUSE-SU-2015:2081
- RHSA-2015:1834
- RHSA-2015:1834
- RHSA-2015:1852
- RHSA-2015:1852
- DSA-3365
- DSA-3365
- http://www.mozilla.org/security/announce/2015/mfsa2015-112.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-112.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 76816
- 76816
- 1033640
- 1033640
- USN-2743-1
- USN-2743-1
- USN-2743-2
- USN-2743-2
- USN-2743-3
- USN-2743-3
- USN-2743-4
- USN-2743-4
- USN-2754-1
- USN-2754-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1172189
- https://bugzilla.mozilla.org/show_bug.cgi?id=1172189
Modified: 2024-11-21
CVE-2015-7176
The AnimationThread function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 uses an incorrect argument to the sscanf function, which might allow remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via unknown vectors.
- openSUSE-SU-2015:1658
- openSUSE-SU-2015:1658
- openSUSE-SU-2015:1679
- openSUSE-SU-2015:1679
- SUSE-SU-2015:1680
- SUSE-SU-2015:1680
- openSUSE-SU-2015:1681
- openSUSE-SU-2015:1681
- SUSE-SU-2015:1703
- SUSE-SU-2015:1703
- SUSE-SU-2015:2081
- SUSE-SU-2015:2081
- RHSA-2015:1834
- RHSA-2015:1834
- RHSA-2015:1852
- RHSA-2015:1852
- DSA-3365
- DSA-3365
- http://www.mozilla.org/security/announce/2015/mfsa2015-112.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-112.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 76816
- 76816
- 1033640
- 1033640
- USN-2743-1
- USN-2743-1
- USN-2743-2
- USN-2743-2
- USN-2743-3
- USN-2743-3
- USN-2743-4
- USN-2743-4
- USN-2754-1
- USN-2754-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1174479
- https://bugzilla.mozilla.org/show_bug.cgi?id=1174479
Modified: 2024-11-21
CVE-2015-7177
The InitTextures function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
- openSUSE-SU-2015:1658
- openSUSE-SU-2015:1658
- openSUSE-SU-2015:1679
- openSUSE-SU-2015:1679
- SUSE-SU-2015:1680
- SUSE-SU-2015:1680
- openSUSE-SU-2015:1681
- openSUSE-SU-2015:1681
- SUSE-SU-2015:1703
- SUSE-SU-2015:1703
- SUSE-SU-2015:2081
- SUSE-SU-2015:2081
- RHSA-2015:1834
- RHSA-2015:1834
- RHSA-2015:1852
- RHSA-2015:1852
- DSA-3365
- DSA-3365
- http://www.mozilla.org/security/announce/2015/mfsa2015-112.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-112.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 76816
- 76816
- 1033640
- 1033640
- USN-2743-1
- USN-2743-1
- USN-2743-2
- USN-2743-2
- USN-2743-3
- USN-2743-3
- USN-2743-4
- USN-2743-4
- USN-2754-1
- USN-2754-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1186725
- https://bugzilla.mozilla.org/show_bug.cgi?id=1186725
Modified: 2024-11-21
CVE-2015-7180
The ReadbackResultWriterD3D11::Run function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 misinterprets the return value of a function call, which might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
- openSUSE-SU-2015:1658
- openSUSE-SU-2015:1658
- openSUSE-SU-2015:1679
- openSUSE-SU-2015:1679
- SUSE-SU-2015:1680
- SUSE-SU-2015:1680
- openSUSE-SU-2015:1681
- openSUSE-SU-2015:1681
- SUSE-SU-2015:1703
- SUSE-SU-2015:1703
- SUSE-SU-2015:2081
- SUSE-SU-2015:2081
- RHSA-2015:1834
- RHSA-2015:1834
- RHSA-2015:1852
- RHSA-2015:1852
- DSA-3365
- DSA-3365
- http://www.mozilla.org/security/announce/2015/mfsa2015-112.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-112.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 76816
- 76816
- 1033640
- 1033640
- USN-2743-1
- USN-2743-1
- USN-2743-2
- USN-2743-2
- USN-2743-3
- USN-2743-3
- USN-2743-4
- USN-2743-4
- USN-2754-1
- USN-2754-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1191463
- https://bugzilla.mozilla.org/show_bug.cgi?id=1191463
Modified: 2024-11-21
CVE-2015-7327
Mozilla Firefox before 41.0 does not properly restrict the availability of High Resolution Time API times, which allows remote attackers to track last-level cache access, and consequently obtain sensitive information, via crafted JavaScript code that makes performance.now calls.
- http://arxiv.org/abs/1502.07373
- http://arxiv.org/abs/1502.07373
- http://www.mozilla.org/security/announce/2015/mfsa2015-114.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-114.html
- 1033640
- 1033640
- https://bugzilla.mozilla.org/show_bug.cgi?id=1153672
- https://bugzilla.mozilla.org/show_bug.cgi?id=1153672
- https://bugzilla.mozilla.org/show_bug.cgi?id=1167489
- https://bugzilla.mozilla.org/show_bug.cgi?id=1167489