Unrated severityNVD Advisory· Published Nov 5, 2015· Updated May 6, 2026
CVE-2015-7198
CVE-2015-7198
Description
Buffer overflow in the rx::TextureStorage11 class in ANGLE, as used in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted texture data.
Affected products
53- osv-coords53 versionspkg:rpm/suse/MozillaFirefox-branding-SLED&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP3pkg:rpm/suse/MozillaFirefox-branding-SLED&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP4pkg:rpm/suse/MozillaFirefox-branding-SLED&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP2-LTSSpkg:rpm/suse/MozillaFirefox-branding-SLED&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3pkg:rpm/suse/MozillaFirefox-branding-SLED&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-TERADATApkg:rpm/suse/MozillaFirefox-branding-SLED&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/MozillaFirefox-branding-SLED&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP3pkg:rpm/suse/MozillaFirefox-branding-SLED&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/MozillaFirefox-branding-SLE&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/MozillaFirefox-branding-SLE&distro=SUSE%20Linux%20Enterprise%20Server%2012pkg:rpm/suse/MozillaFirefox-branding-SLE&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP3pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP4pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP2-LTSSpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-TERADATApkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2012pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP3pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP3pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012pkg:rpm/suse/mozilla-nspr&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP3pkg:rpm/suse/mozilla-nspr&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP4pkg:rpm/suse/mozilla-nspr&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/mozilla-nspr&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP2-LTSSpkg:rpm/suse/mozilla-nspr&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3pkg:rpm/suse/mozilla-nspr&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-TERADATApkg:rpm/suse/mozilla-nspr&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/mozilla-nspr&distro=SUSE%20Linux%20Enterprise%20Server%2012pkg:rpm/suse/mozilla-nspr&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP3pkg:rpm/suse/mozilla-nspr&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/mozilla-nspr&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/mozilla-nspr&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP3pkg:rpm/suse/mozilla-nspr&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4pkg:rpm/suse/mozilla-nspr&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012pkg:rpm/suse/mozilla-nss&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP3pkg:rpm/suse/mozilla-nss&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP4pkg:rpm/suse/mozilla-nss&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/mozilla-nss&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP2-LTSSpkg:rpm/suse/mozilla-nss&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3pkg:rpm/suse/mozilla-nss&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-TERADATApkg:rpm/suse/mozilla-nss&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/mozilla-nss&distro=SUSE%20Linux%20Enterprise%20Server%2012pkg:rpm/suse/mozilla-nss&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP3pkg:rpm/suse/mozilla-nss&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/mozilla-nss&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/mozilla-nss&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP3pkg:rpm/suse/mozilla-nss&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4pkg:rpm/suse/mozilla-nss&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012
< 38-15.31+ 52 more
- (no CPE)range: < 38-15.31
- (no CPE)range: < 38-15.31
- (no CPE)range: < 38-12.19
- (no CPE)range: < 38-15.31
- (no CPE)range: < 38-15.31
- (no CPE)range: < 38-15.31
- (no CPE)range: < 38-15.31
- (no CPE)range: < 38-15.31
- (no CPE)range: < 31.0-17.1
- (no CPE)range: < 31.0-17.1
- (no CPE)range: < 31.0-17.1
- (no CPE)range: < 38.4.0esr-25.6
- (no CPE)range: < 38.4.0esr-25.6
- (no CPE)range: < 38.4.0esr-51.1
- (no CPE)range: < 38.4.0esr-25.3
- (no CPE)range: < 38.4.0esr-25.6
- (no CPE)range: < 38.4.0esr-25.6
- (no CPE)range: < 38.4.0esr-25.6
- (no CPE)range: < 38.4.0esr-51.1
- (no CPE)range: < 38.4.0esr-25.6
- (no CPE)range: < 38.4.0esr-25.6
- (no CPE)range: < 38.4.0esr-51.1
- (no CPE)range: < 38.4.0esr-25.6
- (no CPE)range: < 38.4.0esr-25.6
- (no CPE)range: < 38.4.0esr-51.1
- (no CPE)range: < 4.10.10-16.1
- (no CPE)range: < 4.10.10-16.1
- (no CPE)range: < 4.10.10-9.1
- (no CPE)range: < 4.10.10-16.1
- (no CPE)range: < 4.10.10-16.1
- (no CPE)range: < 4.10.10-16.1
- (no CPE)range: < 4.10.10-16.1
- (no CPE)range: < 4.10.10-9.1
- (no CPE)range: < 4.10.10-16.1
- (no CPE)range: < 4.10.10-16.1
- (no CPE)range: < 4.10.10-9.1
- (no CPE)range: < 4.10.10-16.1
- (no CPE)range: < 4.10.10-16.1
- (no CPE)range: < 4.10.10-9.1
- (no CPE)range: < 3.19.2.1-19.3
- (no CPE)range: < 3.19.2.1-19.3
- (no CPE)range: < 3.19.2.1-29.1
- (no CPE)range: < 3.19.2.1-12.1
- (no CPE)range: < 3.19.2.1-19.3
- (no CPE)range: < 3.19.2.1-19.3
- (no CPE)range: < 3.19.2.1-19.3
- (no CPE)range: < 3.19.2.1-29.1
- (no CPE)range: < 3.19.2.1-19.3
- (no CPE)range: < 3.19.2.1-19.3
- (no CPE)range: < 3.19.2.1-29.1
- (no CPE)range: < 3.19.2.1-19.3
- (no CPE)range: < 3.19.2.1-19.3
- (no CPE)range: < 3.19.2.1-29.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
20- www.mozilla.org/security/announce/2015/mfsa2015-131.htmlnvdVendor Advisory
- lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.htmlnvd
- lists.opensuse.org/opensuse-updates/2015-12/msg00037.htmlnvd
- lists.opensuse.org/opensuse-updates/2015-12/msg00049.htmlnvd
- rhn.redhat.com/errata/RHSA-2015-1982.htmlnvd
- rhn.redhat.com/errata/RHSA-2015-2519.htmlnvd
- www.debian.org/security/2015/dsa-3393nvd
- www.debian.org/security/2015/dsa-3410nvd
- www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.htmlnvd
- www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.htmlnvd
- www.securityfocus.com/bid/77411nvd
- www.securitytracker.com/id/1034069nvd
- www.ubuntu.com/usn/USN-2785-1nvd
- www.ubuntu.com/usn/USN-2819-1nvd
- bugzilla.mozilla.org/show_bug.cginvd
- security.gentoo.org/glsa/201512-10nvd
News mentions
0No linked articles in our index yet.