Wolfgang Rosenauer 19ab3bdb06 MFSA 2018-11 (bsc#1092548)
* CVE-2018-5154 (bmo#1443092)
    Use-after-free with SVG animations and clip paths
  * CVE-2018-5155 (bmo#1448774)
    Use-after-free with SVG animations and text paths
  * CVE-2018-5157 (bmo#1449898)
    Same-origin bypass of PDF Viewer to view protected PDF files
  * CVE-2018-5158 (bmo#1452075)
    Malicious PDF can inject JavaScript into PDF Viewer
  * CVE-2018-5159 (bmo#1441941)
    Integer overflow and out-of-bounds write in Skia
  * CVE-2018-5160 (bmo#1436117)
    Uninitialized memory use by WebRTC encoder
  * CVE-2018-5152 (bmo#1415644, bmo#1427289)
    WebExtensions information leak through webRequest API
  * CVE-2018-5153 (bmo#1436809)
    Out-of-bounds read in mixed content websocket messages
  * CVE-2018-5163 (bmo#1426353)
    Replacing cached data in JavaScript Start-up Bytecode Cache
  * CVE-2018-5164 (bmo#1416045)
    CSP not applied to all multipart content sent with
    multipart/x-mixed-replace
  * CVE-2018-5166 (bmo#1437325)
    WebExtension host permission bypass through filterReponseData
  * CVE-2018-5167 (bmo#1447969)
    Improper linkification of chrome: and javascript: content in
    web console and JavaScript debugger
  * CVE-2018-5168 (bmo#1449548)
    Lightweight themes can be installed without user interaction
  * CVE-2018-5169 (bmo#1319157)

OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=658
2018-05-09 19:58:20 +00:00
2018-05-08 13:14:23 +00:00
2018-05-08 13:14:23 +00:00
2018-01-23 09:55:12 +00:00
2018-03-13 19:46:06 +00:00
2017-09-05 10:10:37 +00:00
2018-05-08 13:14:23 +00:00
2011-01-28 17:09:26 +00:00
2018-05-08 13:14:23 +00:00
2018-05-09 19:58:20 +00:00
2018-05-08 13:14:23 +00:00
Description
No description provided
4.1 MiB
Languages
Shell 85%
Roff 10%
Perl 3.4%
JavaScript 1.6%