File _patchinfo of Package patchinfo
<patchinfo incident="4039"> <issue id="947003" tracker="bnc">VUL-0: MozillaFirefox 41 / 38.3.0 ESR security release</issue> <issue id="CVE-2015-4520" tracker="cve" /> <issue id="CVE-2015-4521" tracker="cve" /> <issue id="CVE-2015-4522" tracker="cve" /> <issue id="CVE-2015-4502" tracker="cve" /> <issue id="CVE-2015-4503" tracker="cve" /> <issue id="CVE-2015-4500" tracker="cve" /> <issue id="CVE-2015-4501" tracker="cve" /> <issue id="CVE-2015-4506" tracker="cve" /> <issue id="CVE-2015-4507" tracker="cve" /> <issue id="CVE-2015-4504" tracker="cve" /> <issue id="CVE-2015-4505" tracker="cve" /> <issue id="CVE-2015-4508" tracker="cve" /> <issue id="CVE-2015-7180" tracker="cve" /> <issue id="CVE-2015-4509" tracker="cve" /> <issue id="CVE-2015-7178" tracker="cve" /> <issue id="CVE-2015-7179" tracker="cve" /> <issue id="CVE-2015-7176" tracker="cve" /> <issue id="CVE-2015-7177" tracker="cve" /> <issue id="CVE-2015-7174" tracker="cve" /> <issue id="CVE-2015-7175" tracker="cve" /> <issue id="CVE-2015-4511" tracker="cve" /> <issue id="CVE-2015-4510" tracker="cve" /> <issue id="CVE-2015-4512" tracker="cve" /> <issue id="CVE-2015-4476" tracker="cve" /> <issue id="CVE-2015-4517" tracker="cve" /> <issue id="CVE-2015-4516" tracker="cve" /> <issue id="CVE-2015-4519" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>wrosenauer</packager> <description>MozillaFirefox was updated to Firefox 41.0 (bnc#947003) Security issues fixed: * MFSA 2015-96/CVE-2015-4500/CVE-2015-4501 Miscellaneous memory safety hazards * MFSA 2015-97/CVE-2015-4503 (bmo#994337) Memory leak in mozTCPSocket to servers * MFSA 2015-98/CVE-2015-4504 (bmo#1132467) Out of bounds read in QCMS library with ICC V4 profile attributes * MFSA 2015-99/CVE-2015-4476 (bmo#1162372) (Android only) Site attribute spoofing on Android by pasting URL with unknown scheme * MFSA 2015-100/CVE-2015-4505 (bmo#1177861) (Windows only) Arbitrary file manipulation by local user through Mozilla updater * MFSA 2015-101/CVE-2015-4506 (bmo#1192226) Buffer overflow in libvpx while parsing vp9 format video * MFSA 2015-102/CVE-2015-4507 (bmo#1192401) Crash when using debugger with SavedStacks in JavaScript * MFSA 2015-103/CVE-2015-4508 (bmo#1195976) URL spoofing in reader mode * MFSA 2015-104/CVE-2015-4510 (bmo#1200004) Use-after-free with shared workers and IndexedDB * MFSA 2015-105/CVE-2015-4511 (bmo#1200148) Buffer overflow while decoding WebM video * MFSA 2015-106/CVE-2015-4509 (bmo#1198435) Use-after-free while manipulating HTML media content * MFSA 2015-107/CVE-2015-4512 (bmo#1170390) Out-of-bounds read during 2D canvas display on Linux 16-bit color depth systems * MFSA 2015-108/CVE-2015-4502 (bmo#1105045) Scripted proxies can access inner window * MFSA 2015-109/CVE-2015-4516 (bmo#904886) JavaScript immutable property enforcement can be bypassed * MFSA 2015-110/CVE-2015-4519 (bmo#1189814) Dragging and dropping images exposes final URL after redirects * MFSA 2015-111/CVE-2015-4520 (bmo#1200856, bmo#1200869) Errors in the handling of CORS preflight request headers * MFSA 2015-112/CVE-2015-4517/CVE-2015-4521/CVE-2015-4522/ CVE-2015-7174/CVE-2015-7175/CVE-2015-7176/CVE-2015-7177/ CVE-2015-7180 Vulnerabilities found through code inspection * MFSA 2015-113/CVE-2015-7178/CVE-2015-7179 (bmo#1189860, bmo#1190526) (Windows only) Memory safety errors in libGLES in the ANGLE graphics library * MFSA 2015-114 (bmo#1167498, bmo#1153672) (Windows only) Information disclosure via the High Resolution Time API </description> <summary>Security update for MozillaFirefox</summary> </patchinfo>