ALT-PU-2015-1974-1
Closed vulnerabilities
BDU:2015-11981
Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании или оказать иное воздействие на систему
BDU:2015-11982
Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании или оказать иное воздействие
BDU:2015-11983
Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2015-11984
Уязвимость браузера Firefox, позволяющая нарушителю получить конфиденциальную информацию
BDU:2015-11985
Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2015-11989
Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2015-11990
Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю обойти правила ограничения домена и провести межсайтовое выполнение сценариев
BDU:2015-11991
Уязвимость браузера Firefox, позволяющая нарушителю провести межсайтовое выполнение сценариев
BDU:2015-11994
Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2015-11995
Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2015-12003
Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю обойти существующие ограничения доступа
BDU:2015-12004
Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю обойти существующие ограничения доступа
BDU:2015-12005
Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2015-12007
Уязвимость браузера Firefox, позволяющая нарушителю обойти существующие ограничения доступа и провести межсайтовое выполнение сценариев
BDU:2015-12008
Уязвимость браузера Firefox, позволяющая нарушителю получить доступ к защищаемой информации
BDU:2015-12009
Уязвимости браузеров Firefox и Firefox ESR, позволяющие нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2015-12010
Уязвимости браузеров Firefox и Firefox ESR, позволяющие нарушителю вызвать отказ в обслуживании или выполнить произвольный код
Modified: 2024-11-21
CVE-2015-4513
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
- SUSE-SU-2015:1926
- SUSE-SU-2015:1926
- openSUSE-SU-2015:1942
- openSUSE-SU-2015:1942
- SUSE-SU-2015:1978
- SUSE-SU-2015:1978
- SUSE-SU-2015:1981
- SUSE-SU-2015:1981
- SUSE-SU-2015:2081
- SUSE-SU-2015:2081
- openSUSE-SU-2015:2229
- openSUSE-SU-2015:2229
- openSUSE-SU-2015:2245
- openSUSE-SU-2015:2245
- RHSA-2015:1982
- RHSA-2015:1982
- RHSA-2015:2519
- RHSA-2015:2519
- DSA-3393
- DSA-3393
- DSA-3410
- DSA-3410
- http://www.mozilla.org/security/announce/2015/mfsa2015-116.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-116.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 77411
- 77411
- 1034069
- 1034069
- USN-2785-1
- USN-2785-1
- USN-2819-1
- USN-2819-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1107011
- https://bugzilla.mozilla.org/show_bug.cgi?id=1107011
- https://bugzilla.mozilla.org/show_bug.cgi?id=1191942
- https://bugzilla.mozilla.org/show_bug.cgi?id=1191942
- https://bugzilla.mozilla.org/show_bug.cgi?id=1193038
- https://bugzilla.mozilla.org/show_bug.cgi?id=1193038
- https://bugzilla.mozilla.org/show_bug.cgi?id=1204580
- https://bugzilla.mozilla.org/show_bug.cgi?id=1204580
- https://bugzilla.mozilla.org/show_bug.cgi?id=1204669
- https://bugzilla.mozilla.org/show_bug.cgi?id=1204669
- https://bugzilla.mozilla.org/show_bug.cgi?id=1204700
- https://bugzilla.mozilla.org/show_bug.cgi?id=1204700
- https://bugzilla.mozilla.org/show_bug.cgi?id=1205707
- https://bugzilla.mozilla.org/show_bug.cgi?id=1205707
- https://bugzilla.mozilla.org/show_bug.cgi?id=1206564
- https://bugzilla.mozilla.org/show_bug.cgi?id=1206564
- https://bugzilla.mozilla.org/show_bug.cgi?id=1208665
- https://bugzilla.mozilla.org/show_bug.cgi?id=1208665
- https://bugzilla.mozilla.org/show_bug.cgi?id=1209471
- https://bugzilla.mozilla.org/show_bug.cgi?id=1209471
- https://bugzilla.mozilla.org/show_bug.cgi?id=1213979
- https://bugzilla.mozilla.org/show_bug.cgi?id=1213979
- GLSA-201512-10
- GLSA-201512-10
Modified: 2024-11-21
CVE-2015-4514
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 42.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
- openSUSE-SU-2015:1942
- openSUSE-SU-2015:1942
- openSUSE-SU-2015:2229
- openSUSE-SU-2015:2229
- openSUSE-SU-2015:2245
- openSUSE-SU-2015:2245
- http://www.mozilla.org/security/announce/2015/mfsa2015-116.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-116.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 77411
- 77411
- 1034069
- 1034069
- USN-2785-1
- USN-2785-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1185157
- https://bugzilla.mozilla.org/show_bug.cgi?id=1185157
- https://bugzilla.mozilla.org/show_bug.cgi?id=1186160
- https://bugzilla.mozilla.org/show_bug.cgi?id=1186160
- https://bugzilla.mozilla.org/show_bug.cgi?id=1196237
- https://bugzilla.mozilla.org/show_bug.cgi?id=1196237
- https://bugzilla.mozilla.org/show_bug.cgi?id=1200326
- https://bugzilla.mozilla.org/show_bug.cgi?id=1200326
- https://bugzilla.mozilla.org/show_bug.cgi?id=1202677
- https://bugzilla.mozilla.org/show_bug.cgi?id=1202677
- https://bugzilla.mozilla.org/show_bug.cgi?id=1205937
- https://bugzilla.mozilla.org/show_bug.cgi?id=1205937
- https://bugzilla.mozilla.org/show_bug.cgi?id=969309
- https://bugzilla.mozilla.org/show_bug.cgi?id=969309
- GLSA-201512-10
- GLSA-201512-10
Modified: 2024-11-21
CVE-2015-4515
Mozilla Firefox before 42.0, when NTLM v1 is enabled for HTTP authentication, allows remote attackers to obtain sensitive hostname information by constructing a crafted web site that sends an NTLM request and reads the Workstation field of an NTLM type 3 message.
- openSUSE-SU-2015:1942
- openSUSE-SU-2015:1942
- http://www.mozilla.org/security/announce/2015/mfsa2015-117.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-117.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 1034069
- 1034069
- USN-2785-1
- USN-2785-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1046421
- https://bugzilla.mozilla.org/show_bug.cgi?id=1046421
- GLSA-201512-10
- GLSA-201512-10
Modified: 2024-11-21
CVE-2015-4518
The Reader View implementation in Mozilla Firefox before 42.0 has an improper whitelist, which makes it easier for remote attackers to bypass the Content Security Policy (CSP) protection mechanism and conduct cross-site scripting (XSS) attacks via vectors involving SVG animations and the about:reader URL.
- openSUSE-SU-2015:1942
- openSUSE-SU-2015:1942
- http://www.mozilla.org/security/announce/2015/mfsa2015-118.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-118.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 1034069
- 1034069
- USN-2785-1
- USN-2785-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1136692
- https://bugzilla.mozilla.org/show_bug.cgi?id=1136692
- https://bugzilla.mozilla.org/show_bug.cgi?id=1182778
- https://bugzilla.mozilla.org/show_bug.cgi?id=1182778
- GLSA-201512-10
- GLSA-201512-10
Modified: 2024-11-21
CVE-2015-7181
The sec_asn1d_parse_leaf function in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, improperly restricts access to an unspecified data structure, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data, related to a "use-after-poison" issue.
- SUSE-SU-2015:1926
- SUSE-SU-2015:1926
- openSUSE-SU-2015:1942
- openSUSE-SU-2015:1942
- SUSE-SU-2015:1978
- SUSE-SU-2015:1978
- SUSE-SU-2015:1981
- SUSE-SU-2015:1981
- SUSE-SU-2015:2081
- SUSE-SU-2015:2081
- openSUSE-SU-2015:2229
- openSUSE-SU-2015:2229
- openSUSE-SU-2015:2245
- openSUSE-SU-2015:2245
- http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html
- http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html
- RHSA-2015:1980
- RHSA-2015:1980
- RHSA-2015:1981
- RHSA-2015:1981
- DSA-3393
- DSA-3393
- DSA-3410
- DSA-3410
- DSA-3688
- DSA-3688
- http://www.mozilla.org/security/announce/2015/mfsa2015-133.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-133.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 77416
- 77416
- 91787
- 91787
- 1034069
- 1034069
- SSA:2015-310-02
- SSA:2015-310-02
- USN-2785-1
- USN-2785-1
- USN-2791-1
- USN-2791-1
- USN-2819-1
- USN-2819-1
- https://bto.bluecoat.com/security-advisory/sa119
- https://bto.bluecoat.com/security-advisory/sa119
- https://bugzilla.mozilla.org/show_bug.cgi?id=1192028
- https://bugzilla.mozilla.org/show_bug.cgi?id=1192028
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes
- GLSA-201512-10
- GLSA-201512-10
- GLSA-201605-06
- GLSA-201605-06
Modified: 2024-11-21
CVE-2015-7182
Heap-based buffer overflow in the ASN.1 decoder in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data.
- SUSE-SU-2015:1926
- SUSE-SU-2015:1926
- openSUSE-SU-2015:1942
- openSUSE-SU-2015:1942
- SUSE-SU-2015:1978
- SUSE-SU-2015:1978
- SUSE-SU-2015:1981
- SUSE-SU-2015:1981
- SUSE-SU-2015:2081
- SUSE-SU-2015:2081
- openSUSE-SU-2015:2229
- openSUSE-SU-2015:2229
- openSUSE-SU-2015:2245
- openSUSE-SU-2015:2245
- http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html
- http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html
- RHSA-2015:1980
- RHSA-2015:1980
- RHSA-2015:1981
- RHSA-2015:1981
- DSA-3393
- DSA-3393
- DSA-3410
- DSA-3410
- DSA-3688
- DSA-3688
- http://www.mozilla.org/security/announce/2015/mfsa2015-133.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-133.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 77416
- 77416
- 91787
- 91787
- 1034069
- 1034069
- SSA:2015-310-02
- SSA:2015-310-02
- USN-2785-1
- USN-2785-1
- USN-2791-1
- USN-2791-1
- USN-2819-1
- USN-2819-1
- https://bto.bluecoat.com/security-advisory/sa119
- https://bto.bluecoat.com/security-advisory/sa119
- https://bugzilla.mozilla.org/show_bug.cgi?id=1202868
- https://bugzilla.mozilla.org/show_bug.cgi?id=1202868
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes
- GLSA-201512-10
- GLSA-201512-10
- GLSA-201605-06
- GLSA-201605-06
Modified: 2024-11-21
CVE-2015-7183
Integer overflow in the PL_ARENA_ALLOCATE implementation in Netscape Portable Runtime (NSPR) in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unspecified vectors.
- SUSE-SU-2015:1926
- SUSE-SU-2015:1926
- openSUSE-SU-2015:1942
- openSUSE-SU-2015:1942
- SUSE-SU-2015:1978
- SUSE-SU-2015:1978
- SUSE-SU-2015:1981
- SUSE-SU-2015:1981
- SUSE-SU-2015:2081
- SUSE-SU-2015:2081
- openSUSE-SU-2015:2229
- openSUSE-SU-2015:2229
- openSUSE-SU-2015:2245
- openSUSE-SU-2015:2245
- http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html
- http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html
- RHSA-2015:1980
- RHSA-2015:1980
- RHSA-2015:1981
- RHSA-2015:1981
- DSA-3393
- DSA-3393
- DSA-3406
- DSA-3406
- http://www.mozilla.org/security/announce/2015/mfsa2015-133.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-133.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 77415
- 77415
- 91787
- 91787
- 1034069
- 1034069
- SSA:2015-310-02
- SSA:2015-310-02
- USN-2785-1
- USN-2785-1
- USN-2790-1
- USN-2790-1
- USN-2819-1
- USN-2819-1
- https://bto.bluecoat.com/security-advisory/sa119
- https://bto.bluecoat.com/security-advisory/sa119
- https://bugzilla.mozilla.org/show_bug.cgi?id=1205157
- https://bugzilla.mozilla.org/show_bug.cgi?id=1205157
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes
- GLSA-201512-10
- GLSA-201512-10
- GLSA-201605-06
- GLSA-201605-06
Modified: 2024-11-21
CVE-2015-7187
The Add-on SDK in Mozilla Firefox before 42.0 misinterprets a "script: false" panel setting, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via inline JavaScript code that is executed within a third-party extension.
- openSUSE-SU-2015:1942
- openSUSE-SU-2015:1942
- http://www.mozilla.org/security/announce/2015/mfsa2015-121.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-121.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 1034069
- 1034069
- USN-2785-1
- USN-2785-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1195735
- https://bugzilla.mozilla.org/show_bug.cgi?id=1195735
- GLSA-201512-10
- GLSA-201512-10
Modified: 2024-11-21
CVE-2015-7188
Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 allow remote attackers to bypass the Same Origin Policy for an IP address origin, and conduct cross-site scripting (XSS) attacks, by appending whitespace characters to an IP address string.
- SUSE-SU-2015:1926
- SUSE-SU-2015:1926
- openSUSE-SU-2015:1942
- openSUSE-SU-2015:1942
- SUSE-SU-2015:1978
- SUSE-SU-2015:1978
- SUSE-SU-2015:1981
- SUSE-SU-2015:1981
- SUSE-SU-2015:2081
- SUSE-SU-2015:2081
- openSUSE-SU-2015:2229
- openSUSE-SU-2015:2229
- openSUSE-SU-2015:2245
- openSUSE-SU-2015:2245
- RHSA-2015:1982
- RHSA-2015:1982
- DSA-3393
- DSA-3393
- DSA-3410
- DSA-3410
- http://www.mozilla.org/security/announce/2015/mfsa2015-122.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-122.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 77411
- 77411
- 1034069
- 1034069
- USN-2785-1
- USN-2785-1
- USN-2819-1
- USN-2819-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1199430
- https://bugzilla.mozilla.org/show_bug.cgi?id=1199430
- GLSA-201512-10
- GLSA-201512-10
Modified: 2024-11-21
CVE-2015-7189
Race condition in the JPEGEncoder function in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow) via vectors involving a CANVAS element and crafted JavaScript code.
- SUSE-SU-2015:1926
- SUSE-SU-2015:1926
- openSUSE-SU-2015:1942
- openSUSE-SU-2015:1942
- SUSE-SU-2015:1978
- SUSE-SU-2015:1978
- SUSE-SU-2015:1981
- SUSE-SU-2015:1981
- SUSE-SU-2015:2081
- SUSE-SU-2015:2081
- openSUSE-SU-2015:2229
- openSUSE-SU-2015:2229
- openSUSE-SU-2015:2245
- openSUSE-SU-2015:2245
- RHSA-2015:1982
- RHSA-2015:1982
- RHSA-2015:2519
- RHSA-2015:2519
- DSA-3393
- DSA-3393
- DSA-3410
- DSA-3410
- http://www.mozilla.org/security/announce/2015/mfsa2015-123.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-123.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 77411
- 77411
- 1034069
- 1034069
- USN-2785-1
- USN-2785-1
- USN-2819-1
- USN-2819-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1205900
- https://bugzilla.mozilla.org/show_bug.cgi?id=1205900
- GLSA-201512-10
- GLSA-201512-10
Modified: 2024-11-21
CVE-2015-7193
Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 improperly follow the CORS cross-origin request algorithm for the POST method in situations involving an unspecified Content-Type header manipulation, which allows remote attackers to bypass the Same Origin Policy by leveraging the lack of a preflight-request step.
- SUSE-SU-2015:1926
- SUSE-SU-2015:1926
- openSUSE-SU-2015:1942
- openSUSE-SU-2015:1942
- SUSE-SU-2015:1978
- SUSE-SU-2015:1978
- SUSE-SU-2015:1981
- SUSE-SU-2015:1981
- SUSE-SU-2015:2081
- SUSE-SU-2015:2081
- openSUSE-SU-2015:2229
- openSUSE-SU-2015:2229
- openSUSE-SU-2015:2245
- openSUSE-SU-2015:2245
- RHSA-2015:1982
- RHSA-2015:1982
- RHSA-2015:2519
- RHSA-2015:2519
- DSA-3393
- DSA-3393
- DSA-3410
- DSA-3410
- http://www.mozilla.org/security/announce/2015/mfsa2015-127.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-127.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 77411
- 77411
- 1034069
- 1034069
- USN-2785-1
- USN-2785-1
- USN-2819-1
- USN-2819-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1210302
- https://bugzilla.mozilla.org/show_bug.cgi?id=1210302
- GLSA-201512-10
- GLSA-201512-10
Modified: 2024-11-21
CVE-2015-7194
Buffer underflow in libjar in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted ZIP archive.
- SUSE-SU-2015:1926
- SUSE-SU-2015:1926
- openSUSE-SU-2015:1942
- openSUSE-SU-2015:1942
- SUSE-SU-2015:1978
- SUSE-SU-2015:1978
- SUSE-SU-2015:1981
- SUSE-SU-2015:1981
- SUSE-SU-2015:2081
- SUSE-SU-2015:2081
- openSUSE-SU-2015:2229
- openSUSE-SU-2015:2229
- openSUSE-SU-2015:2245
- openSUSE-SU-2015:2245
- RHSA-2015:1982
- RHSA-2015:1982
- DSA-3393
- DSA-3393
- DSA-3410
- DSA-3410
- http://www.mozilla.org/security/announce/2015/mfsa2015-128.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-128.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 77411
- 77411
- 1034069
- 1034069
- USN-2785-1
- USN-2785-1
- USN-2819-1
- USN-2819-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1211262
- https://bugzilla.mozilla.org/show_bug.cgi?id=1211262
- GLSA-201512-10
- GLSA-201512-10
Modified: 2024-11-21
CVE-2015-7195
The URL parsing implementation in Mozilla Firefox before 42.0 improperly recognizes escaped characters in hostnames within Location headers, which allows remote attackers to obtain sensitive information via vectors involving a redirect.
- openSUSE-SU-2015:1942
- openSUSE-SU-2015:1942
- http://www.mozilla.org/security/announce/2015/mfsa2015-129.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-129.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 1034069
- 1034069
- USN-2785-1
- USN-2785-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1211871
- https://bugzilla.mozilla.org/show_bug.cgi?id=1211871
- GLSA-201512-10
- GLSA-201512-10
Modified: 2024-11-21
CVE-2015-7196
Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4, when a Java plugin is enabled, allow remote attackers to cause a denial of service (incorrect garbage collection and application crash) or possibly execute arbitrary code via a crafted Java applet that deallocates an in-use JavaScript wrapper.
- SUSE-SU-2015:1926
- SUSE-SU-2015:1926
- openSUSE-SU-2015:1942
- openSUSE-SU-2015:1942
- SUSE-SU-2015:1978
- SUSE-SU-2015:1978
- SUSE-SU-2015:1981
- SUSE-SU-2015:1981
- SUSE-SU-2015:2081
- SUSE-SU-2015:2081
- openSUSE-SU-2015:2229
- openSUSE-SU-2015:2229
- openSUSE-SU-2015:2245
- openSUSE-SU-2015:2245
- RHSA-2015:1982
- RHSA-2015:1982
- DSA-3393
- DSA-3393
- http://www.mozilla.org/security/announce/2015/mfsa2015-130.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-130.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 77411
- 77411
- 1034069
- 1034069
- USN-2785-1
- USN-2785-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1140616
- https://bugzilla.mozilla.org/show_bug.cgi?id=1140616
- GLSA-201512-10
- GLSA-201512-10
Modified: 2024-11-21
CVE-2015-7197
Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 improperly control the ability of a web worker to create a WebSocket object, which allows remote attackers to bypass intended mixed-content restrictions via crafted JavaScript code.
- SUSE-SU-2015:1926
- SUSE-SU-2015:1926
- openSUSE-SU-2015:1942
- openSUSE-SU-2015:1942
- SUSE-SU-2015:1978
- SUSE-SU-2015:1978
- SUSE-SU-2015:1981
- SUSE-SU-2015:1981
- SUSE-SU-2015:2081
- SUSE-SU-2015:2081
- openSUSE-SU-2015:2229
- openSUSE-SU-2015:2229
- openSUSE-SU-2015:2245
- openSUSE-SU-2015:2245
- RHSA-2015:1982
- RHSA-2015:1982
- RHSA-2015:2519
- RHSA-2015:2519
- DSA-3393
- DSA-3393
- DSA-3410
- DSA-3410
- http://www.mozilla.org/security/announce/2015/mfsa2015-132.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-132.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 77411
- 77411
- 1034069
- 1034069
- USN-2785-1
- USN-2785-1
- USN-2819-1
- USN-2819-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1204269
- https://bugzilla.mozilla.org/show_bug.cgi?id=1204269
- GLSA-201512-10
- GLSA-201512-10
Modified: 2024-11-21
CVE-2015-7198
Buffer overflow in the rx::TextureStorage11 class in ANGLE, as used in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted texture data.
- SUSE-SU-2015:1926
- SUSE-SU-2015:1926
- openSUSE-SU-2015:1942
- openSUSE-SU-2015:1942
- SUSE-SU-2015:1978
- SUSE-SU-2015:1978
- SUSE-SU-2015:1981
- SUSE-SU-2015:1981
- SUSE-SU-2015:2081
- SUSE-SU-2015:2081
- openSUSE-SU-2015:2229
- openSUSE-SU-2015:2229
- openSUSE-SU-2015:2245
- openSUSE-SU-2015:2245
- RHSA-2015:1982
- RHSA-2015:1982
- RHSA-2015:2519
- RHSA-2015:2519
- DSA-3393
- DSA-3393
- DSA-3410
- DSA-3410
- http://www.mozilla.org/security/announce/2015/mfsa2015-131.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-131.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 77411
- 77411
- 1034069
- 1034069
- USN-2785-1
- USN-2785-1
- USN-2819-1
- USN-2819-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1188010
- https://bugzilla.mozilla.org/show_bug.cgi?id=1188010
- GLSA-201512-10
- GLSA-201512-10
Modified: 2024-11-21
CVE-2015-7199
The (1) AddWeightedPathSegLists and (2) SVGPathSegListSMILType::Interpolate functions in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 lack status checking, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted SVG document.
- SUSE-SU-2015:1926
- SUSE-SU-2015:1926
- openSUSE-SU-2015:1942
- openSUSE-SU-2015:1942
- SUSE-SU-2015:1978
- SUSE-SU-2015:1978
- SUSE-SU-2015:1981
- SUSE-SU-2015:1981
- SUSE-SU-2015:2081
- SUSE-SU-2015:2081
- openSUSE-SU-2015:2229
- openSUSE-SU-2015:2229
- openSUSE-SU-2015:2245
- openSUSE-SU-2015:2245
- RHSA-2015:1982
- RHSA-2015:1982
- RHSA-2015:2519
- RHSA-2015:2519
- DSA-3393
- DSA-3393
- DSA-3410
- DSA-3410
- http://www.mozilla.org/security/announce/2015/mfsa2015-131.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-131.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 77411
- 77411
- 1034069
- 1034069
- USN-2785-1
- USN-2785-1
- USN-2819-1
- USN-2819-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1204061
- https://bugzilla.mozilla.org/show_bug.cgi?id=1204061
- GLSA-201512-10
- GLSA-201512-10
Modified: 2024-11-21
CVE-2015-7200
The CryptoKey interface implementation in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 lacks status checking, which allows attackers to have an unspecified impact via vectors related to a cryptographic key.
- SUSE-SU-2015:1926
- SUSE-SU-2015:1926
- openSUSE-SU-2015:1942
- openSUSE-SU-2015:1942
- SUSE-SU-2015:1978
- SUSE-SU-2015:1978
- SUSE-SU-2015:1981
- SUSE-SU-2015:1981
- SUSE-SU-2015:2081
- SUSE-SU-2015:2081
- openSUSE-SU-2015:2229
- openSUSE-SU-2015:2229
- openSUSE-SU-2015:2245
- openSUSE-SU-2015:2245
- RHSA-2015:1982
- RHSA-2015:1982
- RHSA-2015:2519
- RHSA-2015:2519
- DSA-3393
- DSA-3393
- DSA-3410
- DSA-3410
- http://www.mozilla.org/security/announce/2015/mfsa2015-131.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-131.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 77411
- 77411
- 1034069
- 1034069
- USN-2785-1
- USN-2785-1
- USN-2819-1
- USN-2819-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1204155
- https://bugzilla.mozilla.org/show_bug.cgi?id=1204155
- GLSA-201512-10
- GLSA-201512-10