rpm package
suse/MozillaFirefox&distro=SUSE Linux Enterprise Server 12 SP2-LTSS
pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSS
Vulnerabilities (271)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2019-9793 | — | < 60.6.1esr-109.63.2 | 60.6.1esr-109.63.2 | Apr 26, 2019 | A mechanism was discovered that removes some bounds checking for string, array, or typed array accesses if Spectre mitigations have been disabled. This vulnerability could allow an attacker to create an arbitrary value in compiled JavaScript, for which the range analysis will inf | ||
| CVE-2019-9792 | — | < 60.6.1esr-109.63.2 | 60.6.1esr-109.63.2 | Apr 26, 2019 | The IonMonkey just-in-time (JIT) compiler can leak an internal JS_OPTIMIZED_OUT magic value to the running script during a bailout. This magic value can then be used by JavaScript to achieve memory corruption, which results in a potentially exploitable crash. This vulnerability a | ||
| CVE-2019-9791 | — | < 60.6.1esr-109.63.2 | 60.6.1esr-109.63.2 | Apr 26, 2019 | The type inference system allows the compilation of functions that can cause type confusions between arbitrary objects when compiled through the IonMonkey just-in-time (JIT) compiler and when the constructor function is entered through on-stack replacement (OSR). This allows for | ||
| CVE-2019-9790 | — | < 60.6.1esr-109.63.2 | 60.6.1esr-109.63.2 | Apr 26, 2019 | A use-after-free vulnerability can occur when a raw pointer to a DOM element on a page is obtained using JavaScript and the element is then removed while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60 | ||
| CVE-2019-9788 | — | < 60.6.1esr-109.63.2 | 60.6.1esr-109.63.2 | Apr 26, 2019 | Mozilla developers and community members reported memory safety bugs present in Firefox 65, Firefox ESR 60.5, and Thunderbird 60.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrar | ||
| CVE-2019-9810 | — | < 60.6.1esr-109.63.2 | 60.6.1esr-109.63.2 | Apr 26, 2019 | Incorrect alias information in IonMonkey JIT compiler for Array.prototype.slice method may lead to missing bounds check and a buffer overflow. This vulnerability affects Firefox < 66.0.1, Firefox ESR < 60.6.1, and Thunderbird < 60.6.1. | ||
| CVE-2019-9813 | — | < 60.6.1esr-109.63.2 | 60.6.1esr-109.63.2 | Apr 26, 2019 | Incorrect handling of __proto__ mutations may lead to type confusion in IonMonkey JIT code and can be leveraged for arbitrary memory read and write. This vulnerability affects Firefox < 66.0.1, Firefox ESR < 60.6.1, and Thunderbird < 60.6.1. | ||
| CVE-2018-5179 | — | < 68.2.0-109.95.2 | 68.2.0-109.95.2 | Apr 26, 2019 | A service worker can send the activate event on itself periodically which allows it to run perpetually, allowing it to monitor activity by users. Affects all versions prior to Firefox 60. | ||
| CVE-2018-18498 | — | < 60.4.0esr-109.55.1 | 60.4.0esr-109.55.1 | Feb 28, 2019 | A potential vulnerability leading to an integer overflow can occur during buffer size calculations for images when a raw value is used instead of the checked value. This leads to a possible out-of-bounds write. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, an | ||
| CVE-2018-18494 | — | < 60.4.0esr-109.55.1 | 60.4.0esr-109.55.1 | Feb 28, 2019 | A same-origin policy violation allowing the theft of cross-origin URL entries when using the Javascript location property to cause a redirection to another site using performance.getEntries(). This is a same-origin policy violation and could allow for data theft. This vulnerabili | ||
| CVE-2018-18493 | — | < 60.4.0esr-109.55.1 | 60.4.0esr-109.55.1 | Feb 28, 2019 | A buffer overflow can occur in the Skia library during buffer offset calculations with hardware accelerated canvas 2D actions due to the use of 32-bit calculations instead of 64-bit. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.4, F | ||
| CVE-2018-18492 | — | < 60.4.0esr-109.55.1 | 60.4.0esr-109.55.1 | Feb 28, 2019 | A use-after-free vulnerability can occur after deleting a selection element due to a weak reference to the select element in the options collection. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 6 | ||
| CVE-2018-12405 | — | < 60.4.0esr-109.55.1 | 60.4.0esr-109.55.1 | Feb 28, 2019 | Mozilla developers and community members reported memory safety bugs present in Firefox 63 and Firefox ESR 60.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulner | ||
| CVE-2018-12397 | — | < 60.3.0-109.50.2 | 60.3.0-109.50.2 | Feb 28, 2019 | A WebExtension can request access to local files without the warning prompt stating that the extension will "Access your data for all websites" being displayed to the user. This allows extensions to run content scripts in local pages without permission warnings when a local file | ||
| CVE-2018-12396 | — | < 60.3.0-109.50.2 | 60.3.0-109.50.2 | Feb 28, 2019 | A vulnerability where a WebExtension can run content scripts in disallowed contexts following navigation or other events. This allows for potential privilege escalation by the WebExtension on sites where content scripts should not be run. This vulnerability affects Firefox ESR < | ||
| CVE-2018-12395 | — | < 60.3.0-109.50.2 | 60.3.0-109.50.2 | Feb 28, 2019 | By rewriting the Host: request headers using the webRequest API, a WebExtension can bypass domain restrictions through domain fronting. This would allow access to domains that share a host that are otherwise restricted. This vulnerability affects Firefox ESR < 60.3 and Firefox < | ||
| CVE-2018-12393 | — | < 60.3.0-109.50.2 | 60.3.0-109.50.2 | Feb 28, 2019 | A potential vulnerability was found in 32-bit builds where an integer overflow during the conversion of scripts to an internal UTF-16 representation could result in allocating a buffer too small for the conversion. This leads to a possible out-of-bounds write. *Note: 64-bit build | ||
| CVE-2018-12392 | — | < 60.3.0-109.50.2 | 60.3.0-109.50.2 | Feb 28, 2019 | When manipulating user events in nested loops while opening a document through script, it is possible to trigger a potentially exploitable crash due to poor event handling. This vulnerability affects Firefox < 63, Firefox ESR < 60.3, and Thunderbird < 60.3. | ||
| CVE-2018-12390 | — | < 60.3.0-109.50.2 | 60.3.0-109.50.2 | Feb 28, 2019 | Mozilla developers and community members reported memory safety bugs present in Firefox 62 and Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulner | ||
| CVE-2018-12389 | — | < 60.3.0-109.50.2 | 60.3.0-109.50.2 | Feb 28, 2019 | Mozilla developers and community members reported memory safety bugs present in Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects |
- CVE-2019-9793Apr 26, 2019affected < 60.6.1esr-109.63.2fixed 60.6.1esr-109.63.2
A mechanism was discovered that removes some bounds checking for string, array, or typed array accesses if Spectre mitigations have been disabled. This vulnerability could allow an attacker to create an arbitrary value in compiled JavaScript, for which the range analysis will inf
- CVE-2019-9792Apr 26, 2019affected < 60.6.1esr-109.63.2fixed 60.6.1esr-109.63.2
The IonMonkey just-in-time (JIT) compiler can leak an internal JS_OPTIMIZED_OUT magic value to the running script during a bailout. This magic value can then be used by JavaScript to achieve memory corruption, which results in a potentially exploitable crash. This vulnerability a
- CVE-2019-9791Apr 26, 2019affected < 60.6.1esr-109.63.2fixed 60.6.1esr-109.63.2
The type inference system allows the compilation of functions that can cause type confusions between arbitrary objects when compiled through the IonMonkey just-in-time (JIT) compiler and when the constructor function is entered through on-stack replacement (OSR). This allows for
- CVE-2019-9790Apr 26, 2019affected < 60.6.1esr-109.63.2fixed 60.6.1esr-109.63.2
A use-after-free vulnerability can occur when a raw pointer to a DOM element on a page is obtained using JavaScript and the element is then removed while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60
- CVE-2019-9788Apr 26, 2019affected < 60.6.1esr-109.63.2fixed 60.6.1esr-109.63.2
Mozilla developers and community members reported memory safety bugs present in Firefox 65, Firefox ESR 60.5, and Thunderbird 60.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrar
- CVE-2019-9810Apr 26, 2019affected < 60.6.1esr-109.63.2fixed 60.6.1esr-109.63.2
Incorrect alias information in IonMonkey JIT compiler for Array.prototype.slice method may lead to missing bounds check and a buffer overflow. This vulnerability affects Firefox < 66.0.1, Firefox ESR < 60.6.1, and Thunderbird < 60.6.1.
- CVE-2019-9813Apr 26, 2019affected < 60.6.1esr-109.63.2fixed 60.6.1esr-109.63.2
Incorrect handling of __proto__ mutations may lead to type confusion in IonMonkey JIT code and can be leveraged for arbitrary memory read and write. This vulnerability affects Firefox < 66.0.1, Firefox ESR < 60.6.1, and Thunderbird < 60.6.1.
- CVE-2018-5179Apr 26, 2019affected < 68.2.0-109.95.2fixed 68.2.0-109.95.2
A service worker can send the activate event on itself periodically which allows it to run perpetually, allowing it to monitor activity by users. Affects all versions prior to Firefox 60.
- CVE-2018-18498Feb 28, 2019affected < 60.4.0esr-109.55.1fixed 60.4.0esr-109.55.1
A potential vulnerability leading to an integer overflow can occur during buffer size calculations for images when a raw value is used instead of the checked value. This leads to a possible out-of-bounds write. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, an
- CVE-2018-18494Feb 28, 2019affected < 60.4.0esr-109.55.1fixed 60.4.0esr-109.55.1
A same-origin policy violation allowing the theft of cross-origin URL entries when using the Javascript location property to cause a redirection to another site using performance.getEntries(). This is a same-origin policy violation and could allow for data theft. This vulnerabili
- CVE-2018-18493Feb 28, 2019affected < 60.4.0esr-109.55.1fixed 60.4.0esr-109.55.1
A buffer overflow can occur in the Skia library during buffer offset calculations with hardware accelerated canvas 2D actions due to the use of 32-bit calculations instead of 64-bit. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.4, F
- CVE-2018-18492Feb 28, 2019affected < 60.4.0esr-109.55.1fixed 60.4.0esr-109.55.1
A use-after-free vulnerability can occur after deleting a selection element due to a weak reference to the select element in the options collection. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 6
- CVE-2018-12405Feb 28, 2019affected < 60.4.0esr-109.55.1fixed 60.4.0esr-109.55.1
Mozilla developers and community members reported memory safety bugs present in Firefox 63 and Firefox ESR 60.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulner
- CVE-2018-12397Feb 28, 2019affected < 60.3.0-109.50.2fixed 60.3.0-109.50.2
A WebExtension can request access to local files without the warning prompt stating that the extension will "Access your data for all websites" being displayed to the user. This allows extensions to run content scripts in local pages without permission warnings when a local file
- CVE-2018-12396Feb 28, 2019affected < 60.3.0-109.50.2fixed 60.3.0-109.50.2
A vulnerability where a WebExtension can run content scripts in disallowed contexts following navigation or other events. This allows for potential privilege escalation by the WebExtension on sites where content scripts should not be run. This vulnerability affects Firefox ESR <
- CVE-2018-12395Feb 28, 2019affected < 60.3.0-109.50.2fixed 60.3.0-109.50.2
By rewriting the Host: request headers using the webRequest API, a WebExtension can bypass domain restrictions through domain fronting. This would allow access to domains that share a host that are otherwise restricted. This vulnerability affects Firefox ESR < 60.3 and Firefox <
- CVE-2018-12393Feb 28, 2019affected < 60.3.0-109.50.2fixed 60.3.0-109.50.2
A potential vulnerability was found in 32-bit builds where an integer overflow during the conversion of scripts to an internal UTF-16 representation could result in allocating a buffer too small for the conversion. This leads to a possible out-of-bounds write. *Note: 64-bit build
- CVE-2018-12392Feb 28, 2019affected < 60.3.0-109.50.2fixed 60.3.0-109.50.2
When manipulating user events in nested loops while opening a document through script, it is possible to trigger a potentially exploitable crash due to poor event handling. This vulnerability affects Firefox < 63, Firefox ESR < 60.3, and Thunderbird < 60.3.
- CVE-2018-12390Feb 28, 2019affected < 60.3.0-109.50.2fixed 60.3.0-109.50.2
Mozilla developers and community members reported memory safety bugs present in Firefox 62 and Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulner
- CVE-2018-12389Feb 28, 2019affected < 60.3.0-109.50.2fixed 60.3.0-109.50.2
Mozilla developers and community members reported memory safety bugs present in Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects
Page 10 of 14