From fe935e6c40463fb91bd330c98aa5e426b7ec4d91 Mon Sep 17 00:00:00 2001 From: Jan Beich Date: Tue, 30 Jan 2018 00:53:51 +0000 Subject: [PATCH] security/vuxml: mark firefox < 58.0.1 as vulnerable --- security/vuxml/vuln.xml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 9436ee3ea32c..52a8658bd1e4 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,33 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> + + firefox -- Arbitrary code execution through unsanitized browser UI + + + firefox + 58.0.1,1 + + + + +

The Mozilla Foundation reports:

+
+

Mozilla developer Johann Hofmann reported that + unsanitized output in the browser UI can lead to arbitrary + code execution.

+
+ +
+ + https://bugzilla.mozilla.org/show_bug.cgi?id=1432966 + + + 2018-01-29 + 2018-01-29 + +
+ gcab -- stack overflow