rpm package
suse/MozillaFirefox&distro=SUSE Linux Enterprise Server 12-LTSS
pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSS
Vulnerabilities (238)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2016-5285 | — | < 45.5.0esr-88.1 | 45.5.0esr-88.1 | Nov 15, 2019 | A Null pointer dereference vulnerability exists in Mozilla Network Security Services due to a missing NULL check in PK11_SignWithSymKey / ssl3_ComputeRecordMACConstantTime, which could let a remote malicious user cause a Denial of Service. | ||
| CVE-2019-9800 | — | < 60.7.0-109.72.1 | 60.7.0-109.72.1 | Jul 23, 2019 | Mozilla developers and community members reported memory safety bugs present in Firefox 66, Firefox ESR 60.6, and Thunderbird 60.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrar | ||
| CVE-2019-9815 | — | < 60.7.0-109.72.1 | 60.7.0-109.72.1 | Jul 23, 2019 | If hyperthreading is not disabled, a timing attack vulnerability exists, similar to previous Spectre attacks. Apple has shipped macOS 10.14.5 with an option to disable hyperthreading in applications running untrusted code in a thread through a new sysctl. Firefox now makes use of | ||
| CVE-2019-9816 | — | < 60.7.0-109.72.1 | 60.7.0-109.72.1 | Jul 23, 2019 | A possible vulnerability exists where type confusion can occur when manipulating JavaScript objects in object groups, allowing for the bypassing of security checks within these groups. *Note: this vulnerability has only been demonstrated with UnboxedObjects, which are disabled by | ||
| CVE-2019-9817 | — | < 60.7.0-109.72.1 | 60.7.0-109.72.1 | Jul 23, 2019 | Images from a different domain can be read using a canvas object in some circumstances. This could be used to steal image data from a different site in violation of same-origin policy. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7. | ||
| CVE-2019-9818 | — | < 60.7.0-109.72.1 | 60.7.0-109.72.1 | Jul 23, 2019 | A race condition is present in the crash generation server used to generate data for the crash reporter. This issue can lead to a use-after-free in the main process, resulting in a potentially exploitable crash and a sandbox escape. *Note: this vulnerability only affects Windows. | ||
| CVE-2019-9819 | — | < 60.7.0-109.72.1 | 60.7.0-109.72.1 | Jul 23, 2019 | A vulnerability where a JavaScript compartment mismatch can occur while working with the fetch API, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7. | ||
| CVE-2019-9820 | — | < 60.7.0-109.72.1 | 60.7.0-109.72.1 | Jul 23, 2019 | A use-after-free vulnerability can occur in the chrome event handler when it is freed while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7. | ||
| CVE-2019-11691 | — | < 60.7.0-109.72.1 | 60.7.0-109.72.1 | Jul 23, 2019 | A use-after-free vulnerability can occur when working with XMLHttpRequest (XHR) in an event loop, causing the XHR main thread to be called after it has been freed. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Fi | ||
| CVE-2019-11692 | — | < 60.7.0-109.72.1 | 60.7.0-109.72.1 | Jul 23, 2019 | A use-after-free vulnerability can occur when listeners are removed from the event listener manager while still in use, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7. | ||
| CVE-2019-11693 | — | < 60.7.0-109.72.1 | 60.7.0-109.72.1 | Jul 23, 2019 | The bufferdata function in WebGL is vulnerable to a buffer overflow with specific graphics drivers on Linux. This could result in malicious content freezing a tab or triggering a potentially exploitable crash. *Note: this issue only occurs on Linux. Other operating systems are un | ||
| CVE-2019-11694 | — | < 60.7.0-109.72.1 | 60.7.0-109.72.1 | Jul 23, 2019 | A vulnerability exists in the Windows sandbox where an uninitialized value in memory can be leaked to a renderer from a broker when making a call to access an otherwise unavailable file. This results in the potential leaking of information stored at that memory location. *Note: t | ||
| CVE-2019-11698 | — | < 60.7.0-109.72.1 | 60.7.0-109.72.1 | Jul 23, 2019 | If a crafted hyperlink is dragged and dropped to the bookmark bar or sidebar and the resulting bookmark is subsequently dragged and dropped into the web content area, an arbitrary query of a user's browser history can be run and transmitted to the content page via drop event data | ||
| CVE-2019-11707 | — | KEV | < 60.7.1-109.77.1 | 60.7.1-109.77.1 | Jul 23, 2019 | A type confusion vulnerability can occur when manipulating JavaScript objects due to issues in Array.pop. This can allow for an exploitable crash. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Firefox ESR < 60.7.1, Firefox < 67.0.3, an | |
| CVE-2019-11708 | — | KEV | < 60.7.2-109.80.1 | 60.7.2-109.80.1 | Jul 23, 2019 | Insufficient vetting of parameters passed with the Prompt:Open IPC message between child and parent processes can result in the non-sandboxed parent process opening web content chosen by a compromised child process. When combined with additional vulnerabilities this could result | |
| CVE-2019-5785 | — | < 60.6.1esr-109.63.2 | 60.6.1esr-109.63.2 | Jun 27, 2019 | Incorrect convexity calculations in Skia in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. | ||
| CVE-2018-12404 | — | < 60.4.0esr-109.55.1 | 60.4.0esr-109.55.1 | May 2, 2019 | A cached side channel attack during handshakes using RSA encryption could allow for the decryption of encrypted content. This is a variant of the Adaptive Chosen Ciphertext attack (AKA Bleichenbacher attack) and affects all NSS versions prior to NSS 3.41. | ||
| CVE-2018-12384 | — | < 60.4.0esr-109.55.1 | 60.4.0esr-109.55.1 | Apr 29, 2019 | When handling a SSLv2-compatible ClientHello request, the server doesn't generate a new random value but sends an all-zero value instead. This results in full malleability of the ClientHello for SSLv2 used for TLS 1.2 in all versions prior to NSS 3.39. This does not impact TLS 1. | ||
| CVE-2019-9801 | — | < 60.6.1esr-109.63.2 | 60.6.1esr-109.63.2 | Apr 26, 2019 | Firefox will accept any registered Program ID as an external protocol handler and offer to launch this local application when given a matching URL on Windows operating systems. This should only happen if the program has specifically registered itself as a "URL Handler" in the Win | ||
| CVE-2019-9796 | — | < 60.6.1esr-109.63.2 | 60.6.1esr-109.63.2 | Apr 26, 2019 | A use-after-free vulnerability can occur when the SMIL animation controller incorrectly registers with the refresh driver twice when only a single registration is expected. When a registration is later freed with the removal of the animation controller element, the refresh driver |
- CVE-2016-5285Nov 15, 2019affected < 45.5.0esr-88.1fixed 45.5.0esr-88.1
A Null pointer dereference vulnerability exists in Mozilla Network Security Services due to a missing NULL check in PK11_SignWithSymKey / ssl3_ComputeRecordMACConstantTime, which could let a remote malicious user cause a Denial of Service.
- CVE-2019-9800Jul 23, 2019affected < 60.7.0-109.72.1fixed 60.7.0-109.72.1
Mozilla developers and community members reported memory safety bugs present in Firefox 66, Firefox ESR 60.6, and Thunderbird 60.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrar
- CVE-2019-9815Jul 23, 2019affected < 60.7.0-109.72.1fixed 60.7.0-109.72.1
If hyperthreading is not disabled, a timing attack vulnerability exists, similar to previous Spectre attacks. Apple has shipped macOS 10.14.5 with an option to disable hyperthreading in applications running untrusted code in a thread through a new sysctl. Firefox now makes use of
- CVE-2019-9816Jul 23, 2019affected < 60.7.0-109.72.1fixed 60.7.0-109.72.1
A possible vulnerability exists where type confusion can occur when manipulating JavaScript objects in object groups, allowing for the bypassing of security checks within these groups. *Note: this vulnerability has only been demonstrated with UnboxedObjects, which are disabled by
- CVE-2019-9817Jul 23, 2019affected < 60.7.0-109.72.1fixed 60.7.0-109.72.1
Images from a different domain can be read using a canvas object in some circumstances. This could be used to steal image data from a different site in violation of same-origin policy. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
- CVE-2019-9818Jul 23, 2019affected < 60.7.0-109.72.1fixed 60.7.0-109.72.1
A race condition is present in the crash generation server used to generate data for the crash reporter. This issue can lead to a use-after-free in the main process, resulting in a potentially exploitable crash and a sandbox escape. *Note: this vulnerability only affects Windows.
- CVE-2019-9819Jul 23, 2019affected < 60.7.0-109.72.1fixed 60.7.0-109.72.1
A vulnerability where a JavaScript compartment mismatch can occur while working with the fetch API, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
- CVE-2019-9820Jul 23, 2019affected < 60.7.0-109.72.1fixed 60.7.0-109.72.1
A use-after-free vulnerability can occur in the chrome event handler when it is freed while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
- CVE-2019-11691Jul 23, 2019affected < 60.7.0-109.72.1fixed 60.7.0-109.72.1
A use-after-free vulnerability can occur when working with XMLHttpRequest (XHR) in an event loop, causing the XHR main thread to be called after it has been freed. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Fi
- CVE-2019-11692Jul 23, 2019affected < 60.7.0-109.72.1fixed 60.7.0-109.72.1
A use-after-free vulnerability can occur when listeners are removed from the event listener manager while still in use, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.
- CVE-2019-11693Jul 23, 2019affected < 60.7.0-109.72.1fixed 60.7.0-109.72.1
The bufferdata function in WebGL is vulnerable to a buffer overflow with specific graphics drivers on Linux. This could result in malicious content freezing a tab or triggering a potentially exploitable crash. *Note: this issue only occurs on Linux. Other operating systems are un
- CVE-2019-11694Jul 23, 2019affected < 60.7.0-109.72.1fixed 60.7.0-109.72.1
A vulnerability exists in the Windows sandbox where an uninitialized value in memory can be leaked to a renderer from a broker when making a call to access an otherwise unavailable file. This results in the potential leaking of information stored at that memory location. *Note: t
- CVE-2019-11698Jul 23, 2019affected < 60.7.0-109.72.1fixed 60.7.0-109.72.1
If a crafted hyperlink is dragged and dropped to the bookmark bar or sidebar and the resulting bookmark is subsequently dragged and dropped into the web content area, an arbitrary query of a user's browser history can be run and transmitted to the content page via drop event data
- affected < 60.7.1-109.77.1fixed 60.7.1-109.77.1
A type confusion vulnerability can occur when manipulating JavaScript objects due to issues in Array.pop. This can allow for an exploitable crash. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Firefox ESR < 60.7.1, Firefox < 67.0.3, an
- affected < 60.7.2-109.80.1fixed 60.7.2-109.80.1
Insufficient vetting of parameters passed with the Prompt:Open IPC message between child and parent processes can result in the non-sandboxed parent process opening web content chosen by a compromised child process. When combined with additional vulnerabilities this could result
- CVE-2019-5785Jun 27, 2019affected < 60.6.1esr-109.63.2fixed 60.6.1esr-109.63.2
Incorrect convexity calculations in Skia in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.
- CVE-2018-12404May 2, 2019affected < 60.4.0esr-109.55.1fixed 60.4.0esr-109.55.1
A cached side channel attack during handshakes using RSA encryption could allow for the decryption of encrypted content. This is a variant of the Adaptive Chosen Ciphertext attack (AKA Bleichenbacher attack) and affects all NSS versions prior to NSS 3.41.
- CVE-2018-12384Apr 29, 2019affected < 60.4.0esr-109.55.1fixed 60.4.0esr-109.55.1
When handling a SSLv2-compatible ClientHello request, the server doesn't generate a new random value but sends an all-zero value instead. This results in full malleability of the ClientHello for SSLv2 used for TLS 1.2 in all versions prior to NSS 3.39. This does not impact TLS 1.
- CVE-2019-9801Apr 26, 2019affected < 60.6.1esr-109.63.2fixed 60.6.1esr-109.63.2
Firefox will accept any registered Program ID as an external protocol handler and offer to launch this local application when given a matching URL on Windows operating systems. This should only happen if the program has specifically registered itself as a "URL Handler" in the Win
- CVE-2019-9796Apr 26, 2019affected < 60.6.1esr-109.63.2fixed 60.6.1esr-109.63.2
A use-after-free vulnerability can occur when the SMIL animation controller incorrectly registers with the refresh driver twice when only a single registration is expected. When a registration is later freed with the removal of the animation controller element, the refresh driver
Page 1 of 12