ALT-PU-2017-1357-1
Package thunderbird updated to version 45.8.0-alt0.M70C.1 for branch c7 in task 174575.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2016-5290
Memory safety bugs were reported in Firefox 49 and Firefox ESR 45.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 45.5, Firefox ESR < 45.5, and Firefox < 50.
- RHSA-2016:2780
- RHSA-2016:2780
- RHSA-2016:2825
- RHSA-2016:2825
- 94335
- 94335
- 1037298
- 1037298
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1309720%2C1297062%2C1303710%2C1018486%2C1292590%2C1301343%2C1301496%2C1308048%2C1308346%2C1299519%2C1286911%2C1298169
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1309720%2C1297062%2C1303710%2C1018486%2C1292590%2C1301343%2C1301496%2C1308048%2C1308346%2C1299519%2C1286911%2C1298169
- GLSA-201701-15
- GLSA-201701-15
- DSA-3730
- DSA-3730
- https://www.mozilla.org/security/advisories/mfsa2016-89/
- https://www.mozilla.org/security/advisories/mfsa2016-89/
- https://www.mozilla.org/security/advisories/mfsa2016-90/
- https://www.mozilla.org/security/advisories/mfsa2016-90/
- https://www.mozilla.org/security/advisories/mfsa2016-93/
- https://www.mozilla.org/security/advisories/mfsa2016-93/
Modified: 2024-11-21
CVE-2016-5291
A same-origin policy bypass with local shortcut files to load arbitrary local content from disk. This vulnerability affects Thunderbird < 45.5, Firefox ESR < 45.5, and Firefox < 50.
- RHSA-2016:2780
- RHSA-2016:2780
- 94336
- 94336
- 1037298
- 1037298
- https://bugzilla.mozilla.org/show_bug.cgi?id=1292159
- https://bugzilla.mozilla.org/show_bug.cgi?id=1292159
- GLSA-201701-15
- GLSA-201701-15
- DSA-3730
- DSA-3730
- https://www.mozilla.org/security/advisories/mfsa2016-89/
- https://www.mozilla.org/security/advisories/mfsa2016-89/
- https://www.mozilla.org/security/advisories/mfsa2016-90/
- https://www.mozilla.org/security/advisories/mfsa2016-90/
- https://www.mozilla.org/security/advisories/mfsa2016-93/
- https://www.mozilla.org/security/advisories/mfsa2016-93/
Modified: 2024-11-21
CVE-2016-5296
A heap-buffer-overflow in Cairo when processing SVG content caused by compiler optimization, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 45.5, Firefox ESR < 45.5, and Firefox < 50.
- RHSA-2016:2780
- RHSA-2016:2780
- 94339
- 94339
- 1037298
- 1037298
- https://bugzilla.mozilla.org/show_bug.cgi?id=1292443
- https://bugzilla.mozilla.org/show_bug.cgi?id=1292443
- GLSA-201701-15
- GLSA-201701-15
- DSA-3730
- DSA-3730
- https://www.mozilla.org/security/advisories/mfsa2016-89/
- https://www.mozilla.org/security/advisories/mfsa2016-89/
- https://www.mozilla.org/security/advisories/mfsa2016-90/
- https://www.mozilla.org/security/advisories/mfsa2016-90/
- https://www.mozilla.org/security/advisories/mfsa2016-93/
- https://www.mozilla.org/security/advisories/mfsa2016-93/
Modified: 2024-11-21
CVE-2016-5297
An error in argument length checking in JavaScript, leading to potential integer overflows or other bounds checking issues. This vulnerability affects Thunderbird < 45.5, Firefox ESR < 45.5, and Firefox < 50.
- RHSA-2016:2780
- RHSA-2016:2780
- 94336
- 94336
- 1037298
- 1037298
- https://bugzilla.mozilla.org/show_bug.cgi?id=1303678
- https://bugzilla.mozilla.org/show_bug.cgi?id=1303678
- GLSA-201701-15
- GLSA-201701-15
- DSA-3730
- DSA-3730
- https://www.mozilla.org/security/advisories/mfsa2016-89/
- https://www.mozilla.org/security/advisories/mfsa2016-89/
- https://www.mozilla.org/security/advisories/mfsa2016-90/
- https://www.mozilla.org/security/advisories/mfsa2016-90/
- https://www.mozilla.org/security/advisories/mfsa2016-93/
- https://www.mozilla.org/security/advisories/mfsa2016-93/
Modified: 2024-11-21
CVE-2016-9066
A buffer overflow resulting in a potentially exploitable crash due to memory allocation issues when handling large amounts of incoming data. This vulnerability affects Thunderbird < 45.5, Firefox ESR < 45.5, and Firefox < 50.
- RHSA-2016:2780
- RHSA-2016:2780
- 94336
- 94336
- 1037298
- 1037298
- https://bugzilla.mozilla.org/show_bug.cgi?id=1299686
- https://bugzilla.mozilla.org/show_bug.cgi?id=1299686
- GLSA-201701-15
- GLSA-201701-15
- DSA-3730
- DSA-3730
- https://www.mozilla.org/security/advisories/mfsa2016-89/
- https://www.mozilla.org/security/advisories/mfsa2016-89/
- https://www.mozilla.org/security/advisories/mfsa2016-90/
- https://www.mozilla.org/security/advisories/mfsa2016-90/
- https://www.mozilla.org/security/advisories/mfsa2016-93/
- https://www.mozilla.org/security/advisories/mfsa2016-93/
Modified: 2024-11-21
CVE-2016-9074
An existing mitigation of timing side-channel attacks is insufficient in some circumstances. This issue is addressed in Network Security Services (NSS) 3.26.1. This vulnerability affects Thunderbird < 45.5, Firefox ESR < 45.5, and Firefox < 50.
- 94341
- 94341
- 1037298
- 1037298
- https://bugzilla.mozilla.org/show_bug.cgi?id=1293334
- https://bugzilla.mozilla.org/show_bug.cgi?id=1293334
- GLSA-201701-15
- GLSA-201701-15
- GLSA-201701-46
- GLSA-201701-46
- DSA-3730
- DSA-3730
- https://www.mozilla.org/security/advisories/mfsa2016-89/
- https://www.mozilla.org/security/advisories/mfsa2016-89/
- https://www.mozilla.org/security/advisories/mfsa2016-90/
- https://www.mozilla.org/security/advisories/mfsa2016-90/
- https://www.mozilla.org/security/advisories/mfsa2016-93/
- https://www.mozilla.org/security/advisories/mfsa2016-93/
Modified: 2024-11-21
CVE-2016-9893
Memory safety bugs were reported in Thunderbird 45.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 50.1, Firefox ESR < 45.6, and Thunderbird < 45.6.
- RHSA-2016:2946
- RHSA-2016:2946
- RHSA-2016:2973
- RHSA-2016:2973
- 94885
- 94885
- 1037461
- 1037461
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1319524%2C1298773%2C1299098%2C1309834%2C1312609%2C1313212%2C1317805%2C1312548%2C1315631%2C1287912
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1319524%2C1298773%2C1299098%2C1309834%2C1312609%2C1313212%2C1317805%2C1312548%2C1315631%2C1287912
- GLSA-201701-15
- GLSA-201701-15
- DSA-3757
- DSA-3757
- https://www.mozilla.org/security/advisories/mfsa2016-94/
- https://www.mozilla.org/security/advisories/mfsa2016-94/
- https://www.mozilla.org/security/advisories/mfsa2016-95/
- https://www.mozilla.org/security/advisories/mfsa2016-95/
- https://www.mozilla.org/security/advisories/mfsa2016-96/
- https://www.mozilla.org/security/advisories/mfsa2016-96/
Modified: 2024-11-21
CVE-2016-9895
Event handlers on "marquee" elements were executed despite a strict Content Security Policy (CSP) that disallowed inline JavaScript. This vulnerability affects Firefox < 50.1, Firefox ESR < 45.6, and Thunderbird < 45.6.
- RHSA-2016:2946
- RHSA-2016:2946
- RHSA-2016:2973
- RHSA-2016:2973
- 94885
- 94885
- 1037461
- 1037461
- https://bugzilla.mozilla.org/show_bug.cgi?id=1312272
- https://bugzilla.mozilla.org/show_bug.cgi?id=1312272
- GLSA-201701-15
- GLSA-201701-15
- DSA-3757
- DSA-3757
- https://www.mozilla.org/security/advisories/mfsa2016-94/
- https://www.mozilla.org/security/advisories/mfsa2016-94/
- https://www.mozilla.org/security/advisories/mfsa2016-95/
- https://www.mozilla.org/security/advisories/mfsa2016-95/
- https://www.mozilla.org/security/advisories/mfsa2016-96/
- https://www.mozilla.org/security/advisories/mfsa2016-96/
Modified: 2024-11-21
CVE-2016-9897
Memory corruption resulting in a potentially exploitable crash during WebGL functions using a vector constructor with a varying array within libGLES. This vulnerability affects Firefox < 50.1, Firefox ESR < 45.6, and Thunderbird < 45.6.
- RHSA-2016:2946
- RHSA-2016:2946
- 94885
- 94885
- 1037461
- 1037461
- https://bugzilla.mozilla.org/show_bug.cgi?id=1301381
- https://bugzilla.mozilla.org/show_bug.cgi?id=1301381
- GLSA-201701-15
- GLSA-201701-15
- DSA-3757
- DSA-3757
- https://www.mozilla.org/security/advisories/mfsa2016-94/
- https://www.mozilla.org/security/advisories/mfsa2016-94/
- https://www.mozilla.org/security/advisories/mfsa2016-95/
- https://www.mozilla.org/security/advisories/mfsa2016-95/
- https://www.mozilla.org/security/advisories/mfsa2016-96/
- https://www.mozilla.org/security/advisories/mfsa2016-96/
Modified: 2024-11-21
CVE-2016-9898
Use-after-free resulting in potentially exploitable crash when manipulating DOM subtrees in the Editor. This vulnerability affects Firefox < 50.1, Firefox ESR < 45.6, and Thunderbird < 45.6.
- RHSA-2016:2946
- RHSA-2016:2946
- 94885
- 94885
- 1037461
- 1037461
- https://bugzilla.mozilla.org/show_bug.cgi?id=1314442
- https://bugzilla.mozilla.org/show_bug.cgi?id=1314442
- GLSA-201701-15
- GLSA-201701-15
- DSA-3757
- DSA-3757
- https://www.mozilla.org/security/advisories/mfsa2016-94/
- https://www.mozilla.org/security/advisories/mfsa2016-94/
- https://www.mozilla.org/security/advisories/mfsa2016-95/
- https://www.mozilla.org/security/advisories/mfsa2016-95/
- https://www.mozilla.org/security/advisories/mfsa2016-96/
- https://www.mozilla.org/security/advisories/mfsa2016-96/
Modified: 2024-11-21
CVE-2016-9900
External resources that should be blocked when loaded by SVG images can bypass security restrictions through the use of "data:" URLs. This could allow for cross-domain data leakage. This vulnerability affects Firefox < 50.1, Firefox ESR < 45.6, and Thunderbird < 45.6.
- RHSA-2016:2946
- RHSA-2016:2946
- RHSA-2016:2973
- RHSA-2016:2973
- 94885
- 94885
- 1037461
- 1037461
- https://bugzilla.mozilla.org/show_bug.cgi?id=1319122
- https://bugzilla.mozilla.org/show_bug.cgi?id=1319122
- GLSA-201701-15
- GLSA-201701-15
- DSA-3757
- DSA-3757
- https://www.mozilla.org/security/advisories/mfsa2016-94/
- https://www.mozilla.org/security/advisories/mfsa2016-94/
- https://www.mozilla.org/security/advisories/mfsa2016-95/
- https://www.mozilla.org/security/advisories/mfsa2016-95/
- https://www.mozilla.org/security/advisories/mfsa2016-96/
- https://www.mozilla.org/security/advisories/mfsa2016-96/
Modified: 2024-11-21
CVE-2016-9904
An attacker could use a JavaScript Map/Set timing attack to determine whether an atom is used by another compartment/zone in specific contexts. This could be used to leak information, such as usernames embedded in JavaScript code, across websites. This vulnerability affects Firefox < 50.1, Firefox ESR < 45.6, and Thunderbird < 45.6.
- RHSA-2016:2946
- RHSA-2016:2946
- 94885
- 94885
- 1037461
- 1037461
- https://bugzilla.mozilla.org/show_bug.cgi?id=1317936
- https://bugzilla.mozilla.org/show_bug.cgi?id=1317936
- GLSA-201701-15
- GLSA-201701-15
- DSA-3757
- DSA-3757
- https://www.mozilla.org/security/advisories/mfsa2016-94/
- https://www.mozilla.org/security/advisories/mfsa2016-94/
- https://www.mozilla.org/security/advisories/mfsa2016-95/
- https://www.mozilla.org/security/advisories/mfsa2016-95/
- https://www.mozilla.org/security/advisories/mfsa2016-96/
- https://www.mozilla.org/security/advisories/mfsa2016-96/
Modified: 2024-11-21
CVE-2016-9905
A potentially exploitable crash in "EnumerateSubDocuments" while adding or removing sub-documents. This vulnerability affects Firefox ESR < 45.6 and Thunderbird < 45.6.
- RHSA-2016:2946
- RHSA-2016:2946
- RHSA-2016:2973
- RHSA-2016:2973
- 94884
- 94884
- 1037462
- 1037462
- https://bugzilla.mozilla.org/show_bug.cgi?id=1293985
- https://bugzilla.mozilla.org/show_bug.cgi?id=1293985
- GLSA-201701-15
- GLSA-201701-15
- DSA-3757
- DSA-3757
- https://www.mozilla.org/security/advisories/mfsa2016-95/
- https://www.mozilla.org/security/advisories/mfsa2016-95/
- https://www.mozilla.org/security/advisories/mfsa2016-96/
- https://www.mozilla.org/security/advisories/mfsa2016-96/
Modified: 2024-11-21
CVE-2017-5373
Memory safety bugs were reported in Firefox 50.1 and Firefox ESR 45.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 45.7, Firefox ESR < 45.7, and Firefox < 51.
- RHSA-2017:0190
- RHSA-2017:0190
- RHSA-2017:0238
- RHSA-2017:0238
- 95762
- 95762
- 1037693
- 1037693
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1322315%2C1328834%2C1322420%2C1285833%2C1285960%2C1328251%2C1331058%2C1325938%2C1325877
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1322315%2C1328834%2C1322420%2C1285833%2C1285960%2C1328251%2C1331058%2C1325938%2C1325877
- GLSA-201702-13
- GLSA-201702-13
- GLSA-201702-22
- GLSA-201702-22
- DSA-3771
- DSA-3771
- DSA-3832
- DSA-3832
- https://www.mozilla.org/security/advisories/mfsa2017-01/
- https://www.mozilla.org/security/advisories/mfsa2017-01/
- https://www.mozilla.org/security/advisories/mfsa2017-02/
- https://www.mozilla.org/security/advisories/mfsa2017-02/
- https://www.mozilla.org/security/advisories/mfsa2017-03/
- https://www.mozilla.org/security/advisories/mfsa2017-03/
Modified: 2024-11-21
CVE-2017-5375
JIT code allocation can allow for a bypass of ASLR and DEP protections leading to potential memory corruption attacks. This vulnerability affects Thunderbird < 45.7, Firefox ESR < 45.7, and Firefox < 51.
- RHSA-2017:0190
- RHSA-2017:0190
- RHSA-2017:0238
- RHSA-2017:0238
- 95757
- 95757
- 1037693
- 1037693
- https://bugzilla.mozilla.org/show_bug.cgi?id=1325200
- https://bugzilla.mozilla.org/show_bug.cgi?id=1325200
- GLSA-201702-13
- GLSA-201702-13
- GLSA-201702-22
- GLSA-201702-22
- DSA-3771
- DSA-3771
- DSA-3832
- DSA-3832
- 42327
- 42327
- 44293
- 44293
- 44294
- 44294
- https://www.mozilla.org/security/advisories/mfsa2017-01/
- https://www.mozilla.org/security/advisories/mfsa2017-01/
- https://www.mozilla.org/security/advisories/mfsa2017-02/
- https://www.mozilla.org/security/advisories/mfsa2017-02/
- https://www.mozilla.org/security/advisories/mfsa2017-03/
- https://www.mozilla.org/security/advisories/mfsa2017-03/
Modified: 2024-11-21
CVE-2017-5376
Use-after-free while manipulating XSL in XSLT documents. This vulnerability affects Thunderbird < 45.7, Firefox ESR < 45.7, and Firefox < 51.
- RHSA-2017:0190
- RHSA-2017:0190
- RHSA-2017:0238
- RHSA-2017:0238
- 95758
- 95758
- 1037693
- 1037693
- https://bugzilla.mozilla.org/show_bug.cgi?id=1311687
- https://bugzilla.mozilla.org/show_bug.cgi?id=1311687
- GLSA-201702-13
- GLSA-201702-13
- GLSA-201702-22
- GLSA-201702-22
- DSA-3771
- DSA-3771
- DSA-3832
- DSA-3832
- https://www.mozilla.org/security/advisories/mfsa2017-01/
- https://www.mozilla.org/security/advisories/mfsa2017-01/
- https://www.mozilla.org/security/advisories/mfsa2017-02/
- https://www.mozilla.org/security/advisories/mfsa2017-02/
- https://www.mozilla.org/security/advisories/mfsa2017-03/
- https://www.mozilla.org/security/advisories/mfsa2017-03/
Modified: 2024-11-21
CVE-2017-5378
Hashed codes of JavaScript objects are shared between pages. This allows for pointer leaks because an object's address can be discovered through hash codes, and also allows for data leakage of an object's content using these hash codes. This vulnerability affects Thunderbird < 45.7, Firefox ESR < 45.7, and Firefox < 51.
- RHSA-2017:0190
- RHSA-2017:0190
- RHSA-2017:0238
- RHSA-2017:0238
- 95769
- 95769
- 1037693
- 1037693
- https://bugzilla.mozilla.org/show_bug.cgi?id=1312001
- https://bugzilla.mozilla.org/show_bug.cgi?id=1312001
- https://bugzilla.mozilla.org/show_bug.cgi?id=1330769
- https://bugzilla.mozilla.org/show_bug.cgi?id=1330769
- GLSA-201702-13
- GLSA-201702-13
- GLSA-201702-22
- GLSA-201702-22
- DSA-3771
- DSA-3771
- DSA-3832
- DSA-3832
- https://www.mozilla.org/security/advisories/mfsa2017-01/
- https://www.mozilla.org/security/advisories/mfsa2017-01/
- https://www.mozilla.org/security/advisories/mfsa2017-02/
- https://www.mozilla.org/security/advisories/mfsa2017-02/
- https://www.mozilla.org/security/advisories/mfsa2017-03/
- https://www.mozilla.org/security/advisories/mfsa2017-03/
Modified: 2024-11-21
CVE-2017-5380
A potential use-after-free found through fuzzing during DOM manipulation of SVG content. This vulnerability affects Thunderbird < 45.7, Firefox ESR < 45.7, and Firefox < 51.
- RHSA-2017:0190
- RHSA-2017:0190
- RHSA-2017:0238
- RHSA-2017:0238
- 95769
- 95769
- 1037693
- 1037693
- https://bugzilla.mozilla.org/show_bug.cgi?id=1322107
- https://bugzilla.mozilla.org/show_bug.cgi?id=1322107
- GLSA-201702-13
- GLSA-201702-13
- GLSA-201702-22
- GLSA-201702-22
- DSA-3771
- DSA-3771
- DSA-3832
- DSA-3832
- https://www.mozilla.org/security/advisories/mfsa2017-01/
- https://www.mozilla.org/security/advisories/mfsa2017-01/
- https://www.mozilla.org/security/advisories/mfsa2017-02/
- https://www.mozilla.org/security/advisories/mfsa2017-02/
- https://www.mozilla.org/security/advisories/mfsa2017-03/
- https://www.mozilla.org/security/advisories/mfsa2017-03/
Modified: 2024-11-21
CVE-2017-5383
URLs containing certain unicode glyphs for alternative hyphens and quotes do not properly trigger punycode display, allowing for domain name spoofing attacks in the location bar. This vulnerability affects Thunderbird < 45.7, Firefox ESR < 45.7, and Firefox < 51.
- RHSA-2017:0190
- RHSA-2017:0190
- RHSA-2017:0238
- RHSA-2017:0238
- 95769
- 95769
- 1037693
- 1037693
- https://bugzilla.mozilla.org/show_bug.cgi?id=1323338
- https://bugzilla.mozilla.org/show_bug.cgi?id=1323338
- https://bugzilla.mozilla.org/show_bug.cgi?id=1324716
- https://bugzilla.mozilla.org/show_bug.cgi?id=1324716
- GLSA-201702-13
- GLSA-201702-13
- GLSA-201702-22
- GLSA-201702-22
- DSA-3771
- DSA-3771
- DSA-3832
- DSA-3832
- https://www.mozilla.org/security/advisories/mfsa2017-01/
- https://www.mozilla.org/security/advisories/mfsa2017-01/
- https://www.mozilla.org/security/advisories/mfsa2017-02/
- https://www.mozilla.org/security/advisories/mfsa2017-02/
- https://www.mozilla.org/security/advisories/mfsa2017-03/
- https://www.mozilla.org/security/advisories/mfsa2017-03/
Modified: 2024-11-21
CVE-2017-5390
The JSON viewer in the Developer Tools uses insecure methods to create a communication channel for copying and viewing JSON or HTTP headers data, allowing for potential privilege escalation. This vulnerability affects Thunderbird < 45.7, Firefox ESR < 45.7, and Firefox < 51.
- RHSA-2017:0190
- RHSA-2017:0190
- RHSA-2017:0238
- RHSA-2017:0238
- 95769
- 95769
- 1037693
- 1037693
- https://bugzilla.mozilla.org/show_bug.cgi?id=1297361
- https://bugzilla.mozilla.org/show_bug.cgi?id=1297361
- GLSA-201702-13
- GLSA-201702-13
- GLSA-201702-22
- GLSA-201702-22
- DSA-3771
- DSA-3771
- DSA-3832
- DSA-3832
- https://www.mozilla.org/security/advisories/mfsa2017-01/
- https://www.mozilla.org/security/advisories/mfsa2017-01/
- https://www.mozilla.org/security/advisories/mfsa2017-02/
- https://www.mozilla.org/security/advisories/mfsa2017-02/
- https://www.mozilla.org/security/advisories/mfsa2017-03/
- https://www.mozilla.org/security/advisories/mfsa2017-03/
Modified: 2024-11-21
CVE-2017-5396
A use-after-free vulnerability in the Media Decoder when working with media files when some events are fired after the media elements are freed from memory. This vulnerability affects Thunderbird < 45.7, Firefox ESR < 45.7, and Firefox < 51.
- RHSA-2017:0190
- RHSA-2017:0190
- RHSA-2017:0238
- RHSA-2017:0238
- 95769
- 95769
- 1037693
- 1037693
- https://bugzilla.mozilla.org/show_bug.cgi?id=1329403
- https://bugzilla.mozilla.org/show_bug.cgi?id=1329403
- GLSA-201702-13
- GLSA-201702-13
- GLSA-201702-22
- GLSA-201702-22
- DSA-3771
- DSA-3771
- DSA-3832
- DSA-3832
- https://www.mozilla.org/security/advisories/mfsa2017-01/
- https://www.mozilla.org/security/advisories/mfsa2017-01/
- https://www.mozilla.org/security/advisories/mfsa2017-02/
- https://www.mozilla.org/security/advisories/mfsa2017-02/
- https://www.mozilla.org/security/advisories/mfsa2017-03/
- https://www.mozilla.org/security/advisories/mfsa2017-03/
Modified: 2024-11-21
CVE-2017-5400
JIT-spray targeting asm.js combined with a heap spray allows for a bypass of ASLR and DEP protections leading to potential memory corruption attacks. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8.
- RHSA-2017:0459
- RHSA-2017:0459
- RHSA-2017:0461
- RHSA-2017:0461
- RHSA-2017:0498
- RHSA-2017:0498
- 96654
- 96654
- 1037966
- 1037966
- https://bugzilla.mozilla.org/show_bug.cgi?id=1334933
- https://bugzilla.mozilla.org/show_bug.cgi?id=1334933
- GLSA-201705-06
- GLSA-201705-06
- GLSA-201705-07
- GLSA-201705-07
- DSA-3805
- DSA-3805
- DSA-3832
- DSA-3832
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
Modified: 2024-11-21
CVE-2017-5401
A crash triggerable by web content in which an "ErrorResult" references unassigned memory due to a logic error. The resulting crash may be exploitable. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8.
- RHSA-2017:0459
- RHSA-2017:0459
- RHSA-2017:0461
- RHSA-2017:0461
- RHSA-2017:0498
- RHSA-2017:0498
- 96677
- 96677
- 1037966
- 1037966
- https://bugzilla.mozilla.org/show_bug.cgi?id=1328861
- https://bugzilla.mozilla.org/show_bug.cgi?id=1328861
- GLSA-201705-06
- GLSA-201705-06
- GLSA-201705-07
- GLSA-201705-07
- DSA-3805
- DSA-3805
- DSA-3832
- DSA-3832
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
Modified: 2024-11-21
CVE-2017-5402
A use-after-free can occur when events are fired for a "FontFace" object after the object has been already been destroyed while working with fonts. This results in a potentially exploitable crash. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8.
- RHSA-2017:0459
- RHSA-2017:0459
- RHSA-2017:0461
- RHSA-2017:0461
- RHSA-2017:0498
- RHSA-2017:0498
- 96664
- 96664
- 1037966
- 1037966
- https://bugzilla.mozilla.org/show_bug.cgi?id=1334876
- https://bugzilla.mozilla.org/show_bug.cgi?id=1334876
- GLSA-201705-06
- GLSA-201705-06
- GLSA-201705-07
- GLSA-201705-07
- DSA-3805
- DSA-3805
- DSA-3832
- DSA-3832
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
Modified: 2024-11-21
CVE-2017-5404
A use-after-free error can occur when manipulating ranges in selections with one node inside a native anonymous tree and one node outside of it. This results in a potentially exploitable crash. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8.
- RHSA-2017:0459
- RHSA-2017:0459
- RHSA-2017:0461
- RHSA-2017:0461
- RHSA-2017:0498
- RHSA-2017:0498
- 96664
- 96664
- 1037966
- 1037966
- https://bugzilla.mozilla.org/show_bug.cgi?id=1340138
- https://bugzilla.mozilla.org/show_bug.cgi?id=1340138
- GLSA-201705-06
- GLSA-201705-06
- GLSA-201705-07
- GLSA-201705-07
- DSA-3805
- DSA-3805
- DSA-3832
- DSA-3832
- 41660
- 41660
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
Modified: 2024-11-21
CVE-2017-5405
Certain response codes in FTP connections can result in the use of uninitialized values for ports in FTP operations. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8.
- RHSA-2017:0459
- RHSA-2017:0459
- RHSA-2017:0461
- RHSA-2017:0461
- RHSA-2017:0498
- RHSA-2017:0498
- 96693
- 96693
- 1037966
- 1037966
- https://bugzilla.mozilla.org/show_bug.cgi?id=1336699
- https://bugzilla.mozilla.org/show_bug.cgi?id=1336699
- GLSA-201705-06
- GLSA-201705-06
- GLSA-201705-07
- GLSA-201705-07
- DSA-3805
- DSA-3805
- DSA-3832
- DSA-3832
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
Modified: 2024-11-21
CVE-2017-5408
Video files loaded video captions cross-origin without checking for the presence of CORS headers permitting such cross-origin use, leading to potential information disclosure for video captions. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8.
- RHSA-2017:0459
- RHSA-2017:0459
- RHSA-2017:0461
- RHSA-2017:0461
- RHSA-2017:0498
- RHSA-2017:0498
- 96693
- 96693
- 1037966
- 1037966
- https://bugzilla.mozilla.org/show_bug.cgi?id=1313711
- https://bugzilla.mozilla.org/show_bug.cgi?id=1313711
- GLSA-201705-06
- GLSA-201705-06
- GLSA-201705-07
- GLSA-201705-07
- DSA-3805
- DSA-3805
- DSA-3832
- DSA-3832
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
Modified: 2024-11-21
CVE-2017-5410
Memory corruption resulting in a potentially exploitable crash during garbage collection of JavaScript due errors in how incremental sweeping is managed for memory cleanup. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8.
- RHSA-2017:0459
- RHSA-2017:0459
- RHSA-2017:0461
- RHSA-2017:0461
- RHSA-2017:0498
- RHSA-2017:0498
- 96693
- 96693
- 1037966
- 1037966
- https://bugzilla.mozilla.org/show_bug.cgi?id=1330687
- https://bugzilla.mozilla.org/show_bug.cgi?id=1330687
- GLSA-201705-06
- GLSA-201705-06
- GLSA-201705-07
- GLSA-201705-07
- DSA-3805
- DSA-3805
- DSA-3832
- DSA-3832
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
No data currently available.
Closed bugs
Падает на старте