rpm package
suse/MozillaFirefox&distro=SUSE Linux Enterprise Server 12 SP4
pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4
Vulnerabilities (192)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2019-11725 | — | < 68.1.0-109.89.1 | 68.1.0-109.89.1 | Jul 23, 2019 | When a user navigates to site marked as unsafe by the Safebrowsing API, warning messages are displayed and navigation is interrupted but resources from the same site loaded through websockets are not blocked, leading to the loading of unsafe resources and bypassing safebrowsing p | ||
| CVE-2019-11727 | — | < 68.1.0-109.89.1 | 68.1.0-109.89.1 | Jul 23, 2019 | A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messag | ||
| CVE-2019-11728 | — | < 68.1.0-109.89.1 | 68.1.0-109.89.1 | Jul 23, 2019 | The HTTP Alternative Services header, Alt-Svc, can be used by a malicious site to scan all TCP ports of any host that the accessible to a user when web content is loaded. This vulnerability affects Firefox < 68. | ||
| CVE-2019-11729 | — | < 60.8.0-109.83.3 | 60.8.0-109.83.3 | Jul 23, 2019 | Empty or malformed p256-ECDH public keys may trigger a segmentation fault due values being improperly sanitized before being copied into memory and used. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8. | ||
| CVE-2019-11730 | — | < 60.8.0-109.83.3 | 60.8.0-109.83.3 | Jul 23, 2019 | A vulnerability exists where if a user opens a locally saved HTML file, this file can use file: URIs to access other files in the same directory or sub-directories if the names are known or guessed. The Fetch API can then be used to read the contents of any files stored in these | ||
| CVE-2019-5785 | — | < 60.6.1esr-109.63.2 | 60.6.1esr-109.63.2 | Jun 27, 2019 | Incorrect convexity calculations in Skia in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. | ||
| CVE-2018-12404 | — | < 60.4.0esr-109.55.1 | 60.4.0esr-109.55.1 | May 2, 2019 | A cached side channel attack during handshakes using RSA encryption could allow for the decryption of encrypted content. This is a variant of the Adaptive Chosen Ciphertext attack (AKA Bleichenbacher attack) and affects all NSS versions prior to NSS 3.41. | ||
| CVE-2018-12384 | — | < 60.4.0esr-109.55.1 | 60.4.0esr-109.55.1 | Apr 29, 2019 | When handling a SSLv2-compatible ClientHello request, the server doesn't generate a new random value but sends an all-zero value instead. This results in full malleability of the ClientHello for SSLv2 used for TLS 1.2 in all versions prior to NSS 3.39. This does not impact TLS 1. | ||
| CVE-2019-9801 | — | < 60.6.1esr-109.63.2 | 60.6.1esr-109.63.2 | Apr 26, 2019 | Firefox will accept any registered Program ID as an external protocol handler and offer to launch this local application when given a matching URL on Windows operating systems. This should only happen if the program has specifically registered itself as a "URL Handler" in the Win | ||
| CVE-2019-9796 | — | < 60.6.1esr-109.63.2 | 60.6.1esr-109.63.2 | Apr 26, 2019 | A use-after-free vulnerability can occur when the SMIL animation controller incorrectly registers with the refresh driver twice when only a single registration is expected. When a registration is later freed with the removal of the animation controller element, the refresh driver | ||
| CVE-2019-9795 | — | < 60.6.1esr-109.63.2 | 60.6.1esr-109.63.2 | Apr 26, 2019 | A vulnerability where type-confusion in the IonMonkey just-in-time (JIT) compiler could potentially be used by malicious JavaScript to trigger a potentially exploitable crash. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66. | ||
| CVE-2019-9794 | — | < 60.6.1esr-109.63.2 | 60.6.1esr-109.63.2 | Apr 26, 2019 | A vulnerability was discovered where specific command line arguments are not properly discarded during Firefox invocation as a shell handler for URLs. This could be used to retrieve and execute files whose location is supplied through these command line arguments if Firefox is co | ||
| CVE-2019-9793 | — | < 60.6.1esr-109.63.2 | 60.6.1esr-109.63.2 | Apr 26, 2019 | A mechanism was discovered that removes some bounds checking for string, array, or typed array accesses if Spectre mitigations have been disabled. This vulnerability could allow an attacker to create an arbitrary value in compiled JavaScript, for which the range analysis will inf | ||
| CVE-2019-9792 | — | < 60.6.1esr-109.63.2 | 60.6.1esr-109.63.2 | Apr 26, 2019 | The IonMonkey just-in-time (JIT) compiler can leak an internal JS_OPTIMIZED_OUT magic value to the running script during a bailout. This magic value can then be used by JavaScript to achieve memory corruption, which results in a potentially exploitable crash. This vulnerability a | ||
| CVE-2019-9791 | — | < 60.6.1esr-109.63.2 | 60.6.1esr-109.63.2 | Apr 26, 2019 | The type inference system allows the compilation of functions that can cause type confusions between arbitrary objects when compiled through the IonMonkey just-in-time (JIT) compiler and when the constructor function is entered through on-stack replacement (OSR). This allows for | ||
| CVE-2019-9790 | — | < 60.6.1esr-109.63.2 | 60.6.1esr-109.63.2 | Apr 26, 2019 | A use-after-free vulnerability can occur when a raw pointer to a DOM element on a page is obtained using JavaScript and the element is then removed while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60 | ||
| CVE-2019-9788 | — | < 60.6.1esr-109.63.2 | 60.6.1esr-109.63.2 | Apr 26, 2019 | Mozilla developers and community members reported memory safety bugs present in Firefox 65, Firefox ESR 60.5, and Thunderbird 60.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrar | ||
| CVE-2019-9810 | — | < 60.6.1esr-109.63.2 | 60.6.1esr-109.63.2 | Apr 26, 2019 | Incorrect alias information in IonMonkey JIT compiler for Array.prototype.slice method may lead to missing bounds check and a buffer overflow. This vulnerability affects Firefox < 66.0.1, Firefox ESR < 60.6.1, and Thunderbird < 60.6.1. | ||
| CVE-2019-9813 | — | < 60.6.1esr-109.63.2 | 60.6.1esr-109.63.2 | Apr 26, 2019 | Incorrect handling of __proto__ mutations may lead to type confusion in IonMonkey JIT code and can be leveraged for arbitrary memory read and write. This vulnerability affects Firefox < 66.0.1, Firefox ESR < 60.6.1, and Thunderbird < 60.6.1. | ||
| CVE-2018-5179 | — | < 68.2.0-109.95.2 | 68.2.0-109.95.2 | Apr 26, 2019 | A service worker can send the activate event on itself periodically which allows it to run perpetually, allowing it to monitor activity by users. Affects all versions prior to Firefox 60. |
- CVE-2019-11725Jul 23, 2019affected < 68.1.0-109.89.1fixed 68.1.0-109.89.1
When a user navigates to site marked as unsafe by the Safebrowsing API, warning messages are displayed and navigation is interrupted but resources from the same site loaded through websockets are not blocked, leading to the loading of unsafe resources and bypassing safebrowsing p
- CVE-2019-11727Jul 23, 2019affected < 68.1.0-109.89.1fixed 68.1.0-109.89.1
A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messag
- CVE-2019-11728Jul 23, 2019affected < 68.1.0-109.89.1fixed 68.1.0-109.89.1
The HTTP Alternative Services header, Alt-Svc, can be used by a malicious site to scan all TCP ports of any host that the accessible to a user when web content is loaded. This vulnerability affects Firefox < 68.
- CVE-2019-11729Jul 23, 2019affected < 60.8.0-109.83.3fixed 60.8.0-109.83.3
Empty or malformed p256-ECDH public keys may trigger a segmentation fault due values being improperly sanitized before being copied into memory and used. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- CVE-2019-11730Jul 23, 2019affected < 60.8.0-109.83.3fixed 60.8.0-109.83.3
A vulnerability exists where if a user opens a locally saved HTML file, this file can use file: URIs to access other files in the same directory or sub-directories if the names are known or guessed. The Fetch API can then be used to read the contents of any files stored in these
- CVE-2019-5785Jun 27, 2019affected < 60.6.1esr-109.63.2fixed 60.6.1esr-109.63.2
Incorrect convexity calculations in Skia in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.
- CVE-2018-12404May 2, 2019affected < 60.4.0esr-109.55.1fixed 60.4.0esr-109.55.1
A cached side channel attack during handshakes using RSA encryption could allow for the decryption of encrypted content. This is a variant of the Adaptive Chosen Ciphertext attack (AKA Bleichenbacher attack) and affects all NSS versions prior to NSS 3.41.
- CVE-2018-12384Apr 29, 2019affected < 60.4.0esr-109.55.1fixed 60.4.0esr-109.55.1
When handling a SSLv2-compatible ClientHello request, the server doesn't generate a new random value but sends an all-zero value instead. This results in full malleability of the ClientHello for SSLv2 used for TLS 1.2 in all versions prior to NSS 3.39. This does not impact TLS 1.
- CVE-2019-9801Apr 26, 2019affected < 60.6.1esr-109.63.2fixed 60.6.1esr-109.63.2
Firefox will accept any registered Program ID as an external protocol handler and offer to launch this local application when given a matching URL on Windows operating systems. This should only happen if the program has specifically registered itself as a "URL Handler" in the Win
- CVE-2019-9796Apr 26, 2019affected < 60.6.1esr-109.63.2fixed 60.6.1esr-109.63.2
A use-after-free vulnerability can occur when the SMIL animation controller incorrectly registers with the refresh driver twice when only a single registration is expected. When a registration is later freed with the removal of the animation controller element, the refresh driver
- CVE-2019-9795Apr 26, 2019affected < 60.6.1esr-109.63.2fixed 60.6.1esr-109.63.2
A vulnerability where type-confusion in the IonMonkey just-in-time (JIT) compiler could potentially be used by malicious JavaScript to trigger a potentially exploitable crash. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.
- CVE-2019-9794Apr 26, 2019affected < 60.6.1esr-109.63.2fixed 60.6.1esr-109.63.2
A vulnerability was discovered where specific command line arguments are not properly discarded during Firefox invocation as a shell handler for URLs. This could be used to retrieve and execute files whose location is supplied through these command line arguments if Firefox is co
- CVE-2019-9793Apr 26, 2019affected < 60.6.1esr-109.63.2fixed 60.6.1esr-109.63.2
A mechanism was discovered that removes some bounds checking for string, array, or typed array accesses if Spectre mitigations have been disabled. This vulnerability could allow an attacker to create an arbitrary value in compiled JavaScript, for which the range analysis will inf
- CVE-2019-9792Apr 26, 2019affected < 60.6.1esr-109.63.2fixed 60.6.1esr-109.63.2
The IonMonkey just-in-time (JIT) compiler can leak an internal JS_OPTIMIZED_OUT magic value to the running script during a bailout. This magic value can then be used by JavaScript to achieve memory corruption, which results in a potentially exploitable crash. This vulnerability a
- CVE-2019-9791Apr 26, 2019affected < 60.6.1esr-109.63.2fixed 60.6.1esr-109.63.2
The type inference system allows the compilation of functions that can cause type confusions between arbitrary objects when compiled through the IonMonkey just-in-time (JIT) compiler and when the constructor function is entered through on-stack replacement (OSR). This allows for
- CVE-2019-9790Apr 26, 2019affected < 60.6.1esr-109.63.2fixed 60.6.1esr-109.63.2
A use-after-free vulnerability can occur when a raw pointer to a DOM element on a page is obtained using JavaScript and the element is then removed while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60
- CVE-2019-9788Apr 26, 2019affected < 60.6.1esr-109.63.2fixed 60.6.1esr-109.63.2
Mozilla developers and community members reported memory safety bugs present in Firefox 65, Firefox ESR 60.5, and Thunderbird 60.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrar
- CVE-2019-9810Apr 26, 2019affected < 60.6.1esr-109.63.2fixed 60.6.1esr-109.63.2
Incorrect alias information in IonMonkey JIT compiler for Array.prototype.slice method may lead to missing bounds check and a buffer overflow. This vulnerability affects Firefox < 66.0.1, Firefox ESR < 60.6.1, and Thunderbird < 60.6.1.
- CVE-2019-9813Apr 26, 2019affected < 60.6.1esr-109.63.2fixed 60.6.1esr-109.63.2
Incorrect handling of __proto__ mutations may lead to type confusion in IonMonkey JIT code and can be leveraged for arbitrary memory read and write. This vulnerability affects Firefox < 66.0.1, Firefox ESR < 60.6.1, and Thunderbird < 60.6.1.
- CVE-2018-5179Apr 26, 2019affected < 68.2.0-109.95.2fixed 68.2.0-109.95.2
A service worker can send the activate event on itself periodically which allows it to run perpetually, allowing it to monitor activity by users. Affects all versions prior to Firefox 60.
Page 6 of 10