Search 211766 CVE descriptions
and 97459 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory (SUSE-SU-2018:3476-1)
Summary:The remote host is missing an update for the 'MozillaFirefox' package(s) announced via the SUSE-SU-2018:3476-1 advisory.
The remote host is missing an update for the 'MozillaFirefox' package(s) announced via the SUSE-SU-2018:3476-1 advisory.

Vulnerability Insight:
This update for MozillaFirefox to 60.2.2ESR fixes the following issues:

Security issues fixed:

MFSA 2018-24:
CVE-2018-12386: A Type confusion in JavaScript allowed remote code
execution (bsc#1110506)

CVE-2018-12387: Array.prototype.push stack pointer vulnerability may
have enabled exploits in the sandboxed content process (bsc#1110507)

MFSA 2018-23:
CVE-2018-12385: Fixed a crash in TransportSecurityInfo due to cached
data (bsc#1109363)

CVE-2018-12383: Setting a master password did not delete unencrypted
previously stored passwords (bsc#1107343)

Non security issues fixed:
Avoid undefined behavior in IPC fd-passing code (bsc#1094767)

Fixed a startup crash affecting users migrating from older ESR releases

Clean up old NSS DB files after upgrading

Fixed an endianness problem in bindgen's handling of bitfields, which
was causing Firefox to crash on startup on big-endian machines. Also,
updates the cc crate, which was buggy in the version that was originally
vendored in. (bsc#1109465)

Affected Software/OS:
'MozillaFirefox' package(s) on SUSE Linux Enterprise Module for Desktop Applications 15

Please install the updated package(s).

CVSS Score:

CVSS Vector:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2018-12383
Common Vulnerability Exposure (CVE) ID: CVE-2018-12385
Common Vulnerability Exposure (CVE) ID: CVE-2018-12386
Common Vulnerability Exposure (CVE) ID: CVE-2018-12387
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2021 E-Soft Inc. All rights reserved.