From 8a433f18006955337bf6a00df3ca2f3a963a1fe4 Mon Sep 17 00:00:00 2001 From: Jan Beich Date: Fri, 28 Aug 2015 12:34:31 +0000 Subject: [PATCH] Document recent mozilla vulnerabilities --- security/vuxml/vuln.xml | 43 +++++++++++++++++++++++++++++++++++++++++ 1 file changed, 43 insertions(+) diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 51e78af25a15..877faf7422c8 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,44 @@ Notes: --> + + mozilla -- multiple vulnerabilities + + + firefox + 40.0.3,1 + + + linux-firefox + 40.0.3,1 + + + firefox-esr + 38.2.1,1 + + + + +

The Mozilla Project reports:

+
+

MFSA 2015-95 Add-on notification bypass through data URLs

+

MFSA 2015-94 Use-after-free when resizing canvas element + during restyling

+
+ +
+ + CVE-2015-4497 + CVE-2015-4498 + https://www.mozilla.org/security/advisories/mfsa2015-94/ + https://www.mozilla.org/security/advisories/mfsa2015-95/ + + + 2015-08-27 + 2015-08-28 + +
+ go -- multiple vulnerabilities @@ -7756,6 +7794,8 @@ Notes:

MFSA-2015-57 Privilege escalation through IPC channel messages

MFSA-2015-58 Mozilla Windows updater can be run outside of application directory

+

MFSA 2015-93 Integer overflows in libstagefright while processing + MP4 video metadata

@@ -7775,6 +7815,7 @@ Notes: CVE-2015-2717 CVE-2015-2718 CVE-2015-2720 + CVE-2015-4496 https://www.mozilla.org/security/advisories/mfsa2015-46/ https://www.mozilla.org/security/advisories/mfsa2015-47/ https://www.mozilla.org/security/advisories/mfsa2015-48/ @@ -7788,10 +7829,12 @@ Notes: https://www.mozilla.org/security/advisories/mfsa2015-56/ https://www.mozilla.org/security/advisories/mfsa2015-57/ https://www.mozilla.org/security/advisories/mfsa2015-58/ + https://www.mozilla.org/security/advisories/mfsa2015-93/ 2015-05-12 2015-05-12 + 2015-08-28