rpm package
suse/MozillaFirefox&distro=SUSE Linux Enterprise Module for Desktop Applications 15 SP1
pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Desktop%20Applications%2015%20SP1
Vulnerabilities (165)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2020-12424 | — | < 78.0.1-3.94.2 | 78.0.1-3.94.2 | Jul 9, 2020 | When constructing a permission prompt for WebRTC, a URI was supplied from the content process. This URI was untrusted, and could have been the URI of an origin that was previously granted permission; bypassing the prompt. This vulnerability affects Firefox < 78. | ||
| CVE-2020-6831 | — | < 68.8.0-3.87.1 | 68.8.0-3.87.1 | May 26, 2020 | A buffer overflow could occur when parsing and validating SCTP chunks in WebRTC. This could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0. | ||
| CVE-2020-12387 | — | < 68.8.0-3.87.1 | 68.8.0-3.87.1 | May 26, 2020 | A race condition when running shutdown code for Web Worker led to a use-after-free vulnerability. This resulted in a potentially exploitable crash. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0. | ||
| CVE-2020-12388 | — | < 68.8.0-3.87.1 | 68.8.0-3.87.1 | May 26, 2020 | The Firefox content processes did not sufficiently lockdown access control which could result in a sandbox escape. *Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox ESR < 68.8 and Firefox < 76. | ||
| CVE-2020-12389 | — | < 68.8.0-3.87.1 | 68.8.0-3.87.1 | May 26, 2020 | The Firefox content processes did not sufficiently lockdown access control which could result in a sandbox escape. *Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox ESR < 68.8 and Firefox < 76. | ||
| CVE-2020-12392 | — | < 68.8.0-3.87.1 | 68.8.0-3.87.1 | May 26, 2020 | The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP POST data of a request, which can be controlled by the website. If a user used the 'Copy as cURL' feature and pasted the command into a terminal, it could have resulted in the disclosure of local | ||
| CVE-2020-12393 | — | < 68.8.0-3.87.1 | 68.8.0-3.87.1 | May 26, 2020 | The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP method of a request, which can be controlled by the website. If a user used the 'Copy as cURL' feature and pasted the command into a terminal, it could have resulted in command injection and arbi | ||
| CVE-2020-12395 | — | < 68.8.0-3.87.1 | 68.8.0-3.87.1 | May 26, 2020 | Mozilla developers and community members reported memory safety bugs present in Firefox 75 and Firefox ESR 68.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vuln | ||
| CVE-2020-6463 | — | < 78.1.0-3.100.2 | 78.1.0-3.100.2 | May 21, 2020 | Use after free in ANGLE in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | ||
| CVE-2020-6819 | — | KEV | < 68.6.1-3.81.1 | 68.6.1-3.81.1 | Apr 24, 2020 | Under certain conditions, when running the nsDocShell destructor, a race condition can cause a use-after-free. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Thunderbird < 68.7.0, Firefox < 74.0.1, and Firefox ESR < 68.6.1. | |
| CVE-2020-6820 | — | KEV | < 68.6.1-3.81.1 | 68.6.1-3.81.1 | Apr 24, 2020 | Under certain conditions, when handling a ReadableStream, a race condition can cause a use-after-free. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Thunderbird < 68.7.0, Firefox < 74.0.1, and Firefox ESR < 68.6.1. | |
| CVE-2020-6821 | — | < 68.7.0-3.84.2 | 68.7.0-3.84.2 | Apr 24, 2020 | When reading from areas partially or fully outside the source resource with WebGL's copyTexSubImage method, the specification requires the returned values be zero. Previously, this memory was uninitialized, leading to potentially sensitive data disclosure. This vulne | ||
| CVE-2020-6822 | — | < 68.7.0-3.84.2 | 68.7.0-3.84.2 | Apr 24, 2020 | On 32-bit builds, an out of bounds write could have occurred when processing an image larger than 4 GB in GMPDecodeData. It is possible that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 68.7.0, Fire | ||
| CVE-2020-6825 | — | < 68.7.0-3.84.2 | 68.7.0-3.84.2 | Apr 24, 2020 | Mozilla developers and community members Tyson Smith and Christian Holler reported memory safety bugs present in Firefox 74 and Firefox ESR 68.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited | ||
| CVE-2020-6827 | — | < 68.7.0-3.84.2 | 68.7.0-3.84.2 | Apr 24, 2020 | When following a link that opened an intent://-schemed URL, causing a custom tab to be opened, Firefox for Android could be tricked into displaying the incorrect URI. *Note: This issue only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerabi | ||
| CVE-2020-6828 | — | < 68.7.0-3.84.2 | 68.7.0-3.84.2 | Apr 24, 2020 | A malicious Android application could craft an Intent that would have been processed by Firefox for Android and potentially result in a file overwrite in the user's profile directory. One exploitation vector for this would be to supply a user.js file providing arbitrary malicious | ||
| CVE-2020-6805 | — | < 68.6.0-3.75.1 | 68.6.0-3.75.1 | Mar 25, 2020 | When removing data about an origin whose tab was recently closed, a use-after-free could occur in the Quota manager, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 68.6, Firefox < 74, Firefox < ESR68.6, and Firefox ESR < 68.6. | ||
| CVE-2020-6806 | — | < 68.6.0-3.75.1 | 68.6.0-3.75.1 | Mar 25, 2020 | By carefully crafting promise resolutions, it was possible to cause an out-of-bounds read off the end of an array resized during script execution. This could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.6, Firefox | ||
| CVE-2020-6807 | — | < 68.6.0-3.75.1 | 68.6.0-3.75.1 | Mar 25, 2020 | When a device was changed while a stream was about to be destroyed, the stream-reinit task may have been executed after the stream was destroyed, causing a use-after-free and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.6, Firefox < 74 | ||
| CVE-2020-6811 | — | < 68.6.0-3.75.1 | 68.6.0-3.75.1 | Mar 25, 2020 | The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP method of a request, which can be controlled by the website. If a user used the 'Copy as Curl' feature and pasted the command into a terminal, it could have resulted in command injection and arbi |
- CVE-2020-12424Jul 9, 2020affected < 78.0.1-3.94.2fixed 78.0.1-3.94.2
When constructing a permission prompt for WebRTC, a URI was supplied from the content process. This URI was untrusted, and could have been the URI of an origin that was previously granted permission; bypassing the prompt. This vulnerability affects Firefox < 78.
- CVE-2020-6831May 26, 2020affected < 68.8.0-3.87.1fixed 68.8.0-3.87.1
A buffer overflow could occur when parsing and validating SCTP chunks in WebRTC. This could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.
- CVE-2020-12387May 26, 2020affected < 68.8.0-3.87.1fixed 68.8.0-3.87.1
A race condition when running shutdown code for Web Worker led to a use-after-free vulnerability. This resulted in a potentially exploitable crash. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.
- CVE-2020-12388May 26, 2020affected < 68.8.0-3.87.1fixed 68.8.0-3.87.1
The Firefox content processes did not sufficiently lockdown access control which could result in a sandbox escape. *Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox ESR < 68.8 and Firefox < 76.
- CVE-2020-12389May 26, 2020affected < 68.8.0-3.87.1fixed 68.8.0-3.87.1
The Firefox content processes did not sufficiently lockdown access control which could result in a sandbox escape. *Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox ESR < 68.8 and Firefox < 76.
- CVE-2020-12392May 26, 2020affected < 68.8.0-3.87.1fixed 68.8.0-3.87.1
The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP POST data of a request, which can be controlled by the website. If a user used the 'Copy as cURL' feature and pasted the command into a terminal, it could have resulted in the disclosure of local
- CVE-2020-12393May 26, 2020affected < 68.8.0-3.87.1fixed 68.8.0-3.87.1
The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP method of a request, which can be controlled by the website. If a user used the 'Copy as cURL' feature and pasted the command into a terminal, it could have resulted in command injection and arbi
- CVE-2020-12395May 26, 2020affected < 68.8.0-3.87.1fixed 68.8.0-3.87.1
Mozilla developers and community members reported memory safety bugs present in Firefox 75 and Firefox ESR 68.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vuln
- CVE-2020-6463May 21, 2020affected < 78.1.0-3.100.2fixed 78.1.0-3.100.2
Use after free in ANGLE in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- affected < 68.6.1-3.81.1fixed 68.6.1-3.81.1
Under certain conditions, when running the nsDocShell destructor, a race condition can cause a use-after-free. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Thunderbird < 68.7.0, Firefox < 74.0.1, and Firefox ESR < 68.6.1.
- affected < 68.6.1-3.81.1fixed 68.6.1-3.81.1
Under certain conditions, when handling a ReadableStream, a race condition can cause a use-after-free. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Thunderbird < 68.7.0, Firefox < 74.0.1, and Firefox ESR < 68.6.1.
- CVE-2020-6821Apr 24, 2020affected < 68.7.0-3.84.2fixed 68.7.0-3.84.2
When reading from areas partially or fully outside the source resource with WebGL's copyTexSubImage method, the specification requires the returned values be zero. Previously, this memory was uninitialized, leading to potentially sensitive data disclosure. This vulne
- CVE-2020-6822Apr 24, 2020affected < 68.7.0-3.84.2fixed 68.7.0-3.84.2
On 32-bit builds, an out of bounds write could have occurred when processing an image larger than 4 GB in GMPDecodeData. It is possible that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 68.7.0, Fire
- CVE-2020-6825Apr 24, 2020affected < 68.7.0-3.84.2fixed 68.7.0-3.84.2
Mozilla developers and community members Tyson Smith and Christian Holler reported memory safety bugs present in Firefox 74 and Firefox ESR 68.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited
- CVE-2020-6827Apr 24, 2020affected < 68.7.0-3.84.2fixed 68.7.0-3.84.2
When following a link that opened an intent://-schemed URL, causing a custom tab to be opened, Firefox for Android could be tricked into displaying the incorrect URI. *Note: This issue only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerabi
- CVE-2020-6828Apr 24, 2020affected < 68.7.0-3.84.2fixed 68.7.0-3.84.2
A malicious Android application could craft an Intent that would have been processed by Firefox for Android and potentially result in a file overwrite in the user's profile directory. One exploitation vector for this would be to supply a user.js file providing arbitrary malicious
- CVE-2020-6805Mar 25, 2020affected < 68.6.0-3.75.1fixed 68.6.0-3.75.1
When removing data about an origin whose tab was recently closed, a use-after-free could occur in the Quota manager, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 68.6, Firefox < 74, Firefox < ESR68.6, and Firefox ESR < 68.6.
- CVE-2020-6806Mar 25, 2020affected < 68.6.0-3.75.1fixed 68.6.0-3.75.1
By carefully crafting promise resolutions, it was possible to cause an out-of-bounds read off the end of an array resized during script execution. This could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.6, Firefox
- CVE-2020-6807Mar 25, 2020affected < 68.6.0-3.75.1fixed 68.6.0-3.75.1
When a device was changed while a stream was about to be destroyed, the stream-reinit task may have been executed after the stream was destroyed, causing a use-after-free and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.6, Firefox < 74
- CVE-2020-6811Mar 25, 2020affected < 68.6.0-3.75.1fixed 68.6.0-3.75.1
The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP method of a request, which can be controlled by the website. If a user used the 'Copy as Curl' feature and pasted the command into a terminal, it could have resulted in command injection and arbi
Page 4 of 9