firefox-38.2.0-4.0.1.AXS4
エラータID: AXSA:2015-442:07
Mozilla Firefox is an open-source web browser, designed for standards
compliance, performance and portability.
With this update, following issues are fixed:
* CVE-2015-4473:
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2
allow remote attackers to cause a denial of service (memory corruption and application crash)
or possibly execute arbitrary code via unknown vectors.
* CVE-2015-4475:
The mozilla::AudioSink function in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 mishandles inconsistent
sample formats within MP3 audio data, which allows remote attackers to execute arbitrary code
or cause a denial of service (out-of-bounds read) via a malformed file.
* CVE-2015-4478:
Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 do not impose certain ECMAScript 6 requirements on JavaScript
object properties, which allows remote attackers to bypass the Same Origin Policy
via the reviver parameter to the JSON.parse method.
* CVE-2015-4479:
Multiple integer overflows in libstagefright in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allow remote attackers
to execute arbitrary code via a crafted saio chunk in MPEG-4 video data.
* CVE-2015-4480:
Integer overflow in the stagefright::SampleTable::isValid function in libstagefright in Mozilla Firefox before 40.0
and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code via crafted MPEG-4 video data with H.264 encoding.
* CVE-2015-4484:
The js::jit::AssemblerX86Shared::lock_addl function in the JavaScript implementation in Mozilla Firefox before 40.0
and Firefox ESR 38.x before 38.2 allows remote attackers to cause a denial of service (application crash) by
leveraging the use of shared memory and accessing (1) an Atomics object or (2) a SharedArrayBuffer object.
* CVE-2015-4485:
Heap-based buffer overflow in the resize_context_buffers function in libvpx in Mozilla Firefox before 40.0
and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code via malformed WebM video data.
* CVE-2015-4486:
The decrease_ref_count function in libvpx in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2
allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via malformed WebM video data.
* CVE-2015-4487:
The nsTSubstring::ReplacePrep function in Mozilla Firefox before 40.0, Firefox ESR 38.x before 38.2, and Firefox OS before 2.2
might allow remote attackers to cause a denial of service (memory corruption)
or possibly have unspecified other impact via unknown vectors, related to an "overflow."
* CVE-2015-4488:
Use-after-free vulnerability in the StyleAnimationValue class in Mozilla Firefox before 40.0, Firefox ESR 38.x before 38.2,
and Firefox OS before 2.2 allows remote attackers to have an unspecified impact by leveraging a StyleAnimationValue::operator self assignment.
* CVE-2015-4489:
The nsTArray_Impl class in Mozilla Firefox before 40.0, Firefox ESR 38.x before 38.2, and Firefox OS before 2.2
might allow remote attackers to cause a denial of service (memory corruption) or possibly
have unspecified other impact by leveraging a self assignment.
* CVE-2015-4491:
Integer overflow in the make_filter_table function in pixops/pixops.c in gdk-pixbuf before 2.31.5, as used in Mozilla Firefox
before 40.0 and Firefox ESR 38.x before 38.2 on Linux, Google Chrome on Linux, and other products, allows remote attackers
to execute arbitrary code or cause a denial of service (heap-based buffer overflow and application crash) via crafted bitmap
dimensions that are mishandled during scaling.
* CVE-2015-4492:
Use-after-free vulnerability in the XMLHttpRequest::Open implementation in Mozilla Firefox before 40.0 and Firefox ESR 38.x
before 38.2 might allow remote attackers to execute arbitrary code via a SharedWorker object that makes recursive calls
to the open method of an XMLHttpRequest object.
* CVE-2015-4493:
Heap-based buffer overflow in the stagefright::ESDS::parseESDescriptor function in libstagefright in Mozilla Firefox
before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code via an invalid size field
in an esds chunk in MPEG-4 video data.
Update packages.
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
The mozilla::AudioSink function in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 mishandles inconsistent sample formats within MP3 audio data, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via a malformed file.
Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 do not impose certain ECMAScript 6 requirements on JavaScript object properties, which allows remote attackers to bypass the Same Origin Policy via the reviver parameter to the JSON.parse method.
Multiple integer overflows in libstagefright in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allow remote attackers to execute arbitrary code via a crafted saio chunk in MPEG-4 video data.
Integer overflow in the stagefright::SampleTable::isValid function in libstagefright in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code via crafted MPEG-4 video data with H.264 encoding.
The js::jit::AssemblerX86Shared::lock_addl function in the JavaScript implementation in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to cause a denial of service (application crash) by leveraging the use of shared memory and accessing (1) an Atomics object or (2) a SharedArrayBuffer object.
Heap-based buffer overflow in the resize_context_buffers function in libvpx in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code via malformed WebM video data.
The decrease_ref_count function in libvpx in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via malformed WebM video data.
The nsTSubstring::ReplacePrep function in Mozilla Firefox before 40.0, Firefox ESR 38.x before 38.2, and Firefox OS before 2.2 might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, related to an "overflow."
Use-after-free vulnerability in the StyleAnimationValue class in Mozilla Firefox before 40.0, Firefox ESR 38.x before 38.2, and Firefox OS before 2.2 allows remote attackers to have an unspecified impact by leveraging a StyleAnimationValue::operator self assignment.
The nsTArray_Impl class in Mozilla Firefox before 40.0, Firefox ESR 38.x before 38.2, and Firefox OS before 2.2 might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging a self assignment.
Integer overflow in the make_filter_table function in pixops/pixops.c in gdk-pixbuf before 2.31.5, as used in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 on Linux, Google Chrome on Linux, and other products, allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and application crash) via crafted bitmap dimensions that are mishandled during scaling.
Use-after-free vulnerability in the XMLHttpRequest::Open implementation in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 might allow remote attackers to execute arbitrary code via a SharedWorker object that makes recursive calls to the open method of an XMLHttpRequest object.
Heap-based buffer overflow in the stagefright::ESDS::parseESDescriptor function in libstagefright in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code via an invalid size field in an esds chunk in MPEG-4 video data, a related issue to CVE-2015-1539.
N/A
SRPMS
- firefox-38.2.0-4.0.1.AXS4.src.rpm
MD5: 6b0255a1cfa557e294872560ceab7ed0
SHA-256: 6380275e7b3614ec40ce113b39a3f2c2d3b5155b1c4284964e0040e157d64cf3
Size: 319.07 MB
Asianux Server 4 for x86
- firefox-38.2.0-4.0.1.AXS4.i686.rpm
MD5: 072c26e5f1ee54cf0ea27636b1042471
SHA-256: ff766b7b65ca522b814b168f8a1b249bb11492d182afaa720f13d844f071b076
Size: 70.33 MB
Asianux Server 4 for x86_64
- firefox-38.2.0-4.0.1.AXS4.x86_64.rpm
MD5: 0892da8a25b3df8e3ceeff686c222797
SHA-256: 18b10fdca75cbdfdce1deee0f81a510dabb810d40fd9f0b2bbec1d7591bb4582
Size: 69.62 MB - firefox-38.2.0-4.0.1.AXS4.i686.rpm
MD5: 072c26e5f1ee54cf0ea27636b1042471
SHA-256: ff766b7b65ca522b814b168f8a1b249bb11492d182afaa720f13d844f071b076
Size: 70.33 MB