[GLSA-201605-06] Mozilla Products: Multiple vulnerabilities
Multiple vulnerabilities have been found in Firefox, Thunderbird, Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with the worst of which may allow remote execution of arbitrary code.
Background
Mozilla Firefox is an open-source web browser, Mozilla Thunderbird an
open-source email client, and the Network Security Service (NSS) is a
library implementing security features like SSL v.2/v.3, TLS, PKCS #5,
PKCS #7, PKCS #11, PKCS #12, S/MIME and X.509 certificates. The
SeaMonkey project is a community effort to deliver production-quality
releases of code derived from the application formerly known as
‘Mozilla Application Suite’.
Description
Multiple vulnerabilities have been discovered in Firefox, NSS, NSPR, and
Thunderbird. Please review the CVE identifiers referenced below for
details.
Impact
A remote attacker could entice a user to view a specially crafted web
page or email, possibly resulting in execution of arbitrary code or a
Denial of Service condition. Furthermore, a remote attacker may be able
to perform Man-in-the-Middle attacks, obtain sensitive information, spoof
the address bar, conduct clickjacking attacks, bypass security
restrictions and protection mechanisms, or have other unspecified
impacts.
Workaround
There is no known workaround at this time.
Resolution
All NSS users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-libs/nss-3.22.2"
All Thunderbird users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=mail-client/thunderbird-38.7.0"
All users of the Thunderbird binary package should upgrade to the latest
version:
# emerge --sync
# emerge --ask --oneshot --verbose
">=mail-client/thunderbird-bin-38.7.0"
All Firefox 38.7.x users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-client/firefox-38.7.0"
All users of the Firefox 38.7.x binary package should upgrade to the
latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-client/firefox-bin-38.7.0"
Package | Affected Version |
---|---|
pkg:ebuild/www-client/firefox?distro=gentoo | < 38.7.0 |
pkg:ebuild/www-client/firefox-bin?distro=gentoo | < 38.7.0 |
pkg:ebuild/mail-client/thunderbird?distro=gentoo | < 38.7.0 |
pkg:ebuild/mail-client/thunderbird-bin?distro=gentoo | < 38.7.0 |
pkg:ebuild/dev-libs/nss?distro=gentoo | < 3.22.2 |
pkg:ebuild/dev-libs/nspr?distro=gentoo | < 4.12 |
Package | Unaffected Version |
---|---|
pkg:ebuild/www-client/firefox?distro=gentoo | >= 38.7.0 |
pkg:ebuild/www-client/firefox-bin?distro=gentoo | >= 38.7.0 |
pkg:ebuild/mail-client/thunderbird?distro=gentoo | >= 38.7.0 |
pkg:ebuild/mail-client/thunderbird-bin?distro=gentoo | >= 38.7.0 |
pkg:ebuild/dev-libs/nss?distro=gentoo | >= 3.22.2 |
pkg:ebuild/dev-libs/nspr?distro=gentoo | >= 4.12 |
- ID
- GLSA-201605-06
- Severity
- normal
- URL
- https://security.gentoo.org/glsa/201605-06
- Published
-
2016-05-31T00:00:00
(8 years ago) - Modified
-
2017-01-20T00:00:00
(7 years ago) - Rights
- Gentoo Foundation, Inc.
- Other Advisories
-
- ALAS-2015-550
- ALAS-2015-569
- ALAS-2015-570
- ALAS-2015-571
- ALAS-2015-586
- ALAS-2015-608
- ALAS-2016-643
- ALAS-2016-645
- ALAS-2016-647
- ALAS-2016-651
- ALAS-2016-661
- ALAS-2016-667
- ALAS-2016-696
- ALAS-2016-702
- ALAS-2020-1364
- DSA-3260-1
- DSA-3264-1
- DSA-3287-1
- DSA-3300-1
- DSA-3316-1
- DSA-3324-1
- DSA-3333-1
- DSA-3336-1
- DSA-3337-1
- DSA-3337-2
- DSA-3339-1
- DSA-3393-1
- DSA-3406-1
- DSA-3410-1
- DSA-3436-1
- DSA-3437-1
- DSA-3457-1
- DSA-3458-1
- DSA-3465-1
- DSA-3477-1
- DSA-3479-1
- DSA-3491-1
- DSA-3510-1
- DSA-3515-1
- DSA-3520-1
- DSA-3576-1
- DSA-3688-1
- ELSA-2015-0988
- ELSA-2015-1012
- ELSA-2015-1072
- ELSA-2015-1185
- ELSA-2015-1197
- ELSA-2015-1228
- ELSA-2015-1229
- ELSA-2015-1230
- ELSA-2015-1526
- ELSA-2015-1586
- ELSA-2015-1664
- ELSA-2015-1682
- ELSA-2015-1694
- ELSA-2015-1980
- ELSA-2015-1981
- ELSA-2016-0007
- ELSA-2016-0008
- ELSA-2016-0012
- ELSA-2016-0049
- ELSA-2016-0050
- ELSA-2016-0053
- ELSA-2016-0054
- ELSA-2016-0071
- ELSA-2016-0197
- ELSA-2016-0258
- ELSA-2016-0370
- ELSA-2016-0371
- ELSA-2016-0373
- ELSA-2016-0460
- ELSA-2016-0591
- ELSA-2016-0594
- ELSA-2016-0684
- ELSA-2016-0685
- ELSA-2020-1011
- FEDORA-2015-10047
- FEDORA-2015-10108
- FEDORA-2015-11414
- FEDORA-2015-11475
- FEDORA-2015-13925
- FEDORA-2015-13926
- FEDORA-2015-14010
- FEDORA-2015-14011
- FEDORA-2015-9048
- FEDORA-2015-9130
- FEDORA-2015-9161
- FEDORA-2016-338a7e9925
- FEDORA-2016-4154a4d0ba
- FREEBSD:10F7BC76-0335-4A88-B391-0B05B3A8CE1C
- FREEBSD:172B22CB-D3F6-11E5-AC9E-485D605F4717
- FREEBSD:1BCFD963-E483-41B8-AB8E-BAD5C3CE49C9
- FREEBSD:2225C5B4-1E5A-44FC-9920-B3201C384A15
- FREEBSD:34E60332-2448-4ED6-93F0-12713749F250
- FREEBSD:44D9DAEE-940C-4179-86BB-6E3FFD617869
- FREEBSD:4F00DAC0-1E18-4481-95AF-7AAAD63FD303
- FREEBSD:75091516-6F4B-4059-9884-6727023DC366
- FREEBSD:8305E215-1080-11E5-8BA2-000C2980A9F3
- FREEBSD:8F10FA04-CF6A-11E5-96D6-14DAE9D210B8
- FREEBSD:9D04936C-75F1-4A2C-9ADE-4C1708BE5DF9
- FREEBSD:ADFFE823-E692-4921-AE9C-0B825C218372
- FREEBSD:C4292768-5273-4F17-A267-C5FE35125CE4
- FREEBSD:C66A5632-708A-4727-8236-D65B2D5B2739
- FREEBSD:D9B43004-F5FD-4807-B1D7-DBF66455B244
- FREEBSD:F5B8B670-465C-11E5-A49D-BCAEC565249C
- GLSA-201506-02
- GLSA-201512-05
- GLSA-201512-10
- GLSA-201603-11
- GLSA-201701-35
- GLSA-201701-46
- GLSA-201701-63
- GLSA-201706-18
- GLSA-201801-15
- openSUSE-SU-2016:1769-1
- openSUSE-SU-2016:1778-1
- RHSA-2015:0988
- RHSA-2015:1012
- RHSA-2015:1072
- RHSA-2015:1185
- RHSA-2015:1228
- RHSA-2015:1229
- RHSA-2015:1485
- RHSA-2015:1486
- RHSA-2015:1526
- RHSA-2015:1544
- RHSA-2015:1586
- RHSA-2015:1682
- RHSA-2015:1694
- RHSA-2015:1981
- RHSA-2016:0007
- RHSA-2016:0008
- RHSA-2016:0012
- RHSA-2016:0049
- RHSA-2016:0050
- RHSA-2016:0053
- RHSA-2016:0054
- RHSA-2016:0071
- RHSA-2016:0098
- RHSA-2016:0099
- RHSA-2016:0101
- RHSA-2016:0197
- RHSA-2016:0258
- RHSA-2016:0370
- RHSA-2016:0373
- RHSA-2016:0460
- RHSA-2016:0591
- RHSA-2016:0594
- RHSA-2016:0685
- RHSA-2020:1011
- SSA:2015-244-01
- SSA:2015-310-02
- SUSE-SU-2015:0182-2
- SUSE-SU-2015:0543-1
- SUSE-SU-2015:0545-1
- SUSE-SU-2015:0545-2
- SUSE-SU-2015:0546-1
- SUSE-SU-2015:0547-1
- SUSE-SU-2015:0578-1
- SUSE-SU-2015:0620-1
- SUSE-SU-2015:0946-1
- SUSE-SU-2015:0960-1
- SUSE-SU-2015:0978-1
- SUSE-SU-2015:1143-1
- SUSE-SU-2015:1150-1
- SUSE-SU-2015:1177-1
- SUSE-SU-2015:1177-2
- SUSE-SU-2015:1182-1
- SUSE-SU-2015:1182-2
- SUSE-SU-2015:1183-1
- SUSE-SU-2015:1183-2
- SUSE-SU-2015:1184-1
- SUSE-SU-2015:1184-2
- SUSE-SU-2015:1185-1
- SUSE-SU-2015:1268-1
- SUSE-SU-2015:1268-2
- SUSE-SU-2015:1269-1
- SUSE-SU-2015:1319-1
- SUSE-SU-2015:1320-1
- SUSE-SU-2015:1329-1
- SUSE-SU-2015:1331-1
- SUSE-SU-2015:1345-1
- SUSE-SU-2015:1375-1
- SUSE-SU-2015:1449-1
- SUSE-SU-2015:1476-1
- SUSE-SU-2015:1482-1
- SUSE-SU-2015:1509-1
- SUSE-SU-2015:1526-1
- SUSE-SU-2015:1528-1
- SUSE-SU-2015:1544-1
- SUSE-SU-2015:1581-1
- SUSE-SU-2015:1663-1
- SUSE-SU-2015:1695-1
- SUSE-SU-2015:1787-1
- SUSE-SU-2015:1840-1
- SUSE-SU-2015:1851-1
- SUSE-SU-2015:1926-1
- SUSE-SU-2015:1978-1
- SUSE-SU-2015:1981-1
- SUSE-SU-2015:2195-1
- SUSE-SU-2015:2195-2
- SUSE-SU-2016:0149-1
- SUSE-SU-2016:0189-1
- SUSE-SU-2016:0224-1
- SUSE-SU-2016:0256-1
- SUSE-SU-2016:0262-1
- SUSE-SU-2016:0265-1
- SUSE-SU-2016:0269-1
- SUSE-SU-2016:0334-1
- SUSE-SU-2016:0338-1
- SUSE-SU-2016:0344-1
- SUSE-SU-2016:0390-1
- SUSE-SU-2016:0399-1
- SUSE-SU-2016:0401-1
- SUSE-SU-2016:0428-1
- SUSE-SU-2016:0431-1
- SUSE-SU-2016:0433-1
- SUSE-SU-2016:0554-1
- SUSE-SU-2016:0564-1
- SUSE-SU-2016:0584-1
- SUSE-SU-2016:0636-1
- SUSE-SU-2016:0727-1
- SUSE-SU-2016:0770-1
- SUSE-SU-2016:0777-1
- SUSE-SU-2016:0779-1
- SUSE-SU-2016:0909-1
- SUSE-SU-2016:1618-1
- SUSE-SU-2016:2209-1
- SUSE-SU-2016:2385-1
- SUSE-SU-2017:1175-1
- SUSE-SU-2017:1248-1
- SUSE-SU-2018:1768-1
- SUSE-SU-2018:2145-1
- SUSE-SU-2023:0586-1
- SUSE-SU-2023:4506-1
- SUSE-SU-2023:4507-1
- USN-2602-1
- USN-2603-1
- USN-2656-1
- USN-2656-2
- USN-2672-1
- USN-2673-1
- USN-2696-1
- USN-2702-1
- USN-2706-1
- USN-2712-1
- USN-2722-1
- USN-2785-1
- USN-2790-1
- USN-2791-1
- USN-2819-1
- USN-2863-1
- USN-2864-1
- USN-2865-1
- USN-2866-1
- USN-2880-1
- USN-2884-1
- USN-2893-1
- USN-2902-1
- USN-2903-1
- USN-2904-1
- USN-2917-1
- USN-2924-1
- USN-2927-1
- USN-2934-1
- USN-2973-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:ebuild/www-client/firefox?distro=gentoo | www-client | firefox | < 38.7.0 | gentoo | ||
Unaffected | pkg:ebuild/www-client/firefox?distro=gentoo | www-client | firefox | >= 38.7.0 | gentoo | ||
Affected | pkg:ebuild/www-client/firefox-bin?distro=gentoo | www-client | firefox-bin | < 38.7.0 | gentoo | ||
Unaffected | pkg:ebuild/www-client/firefox-bin?distro=gentoo | www-client | firefox-bin | >= 38.7.0 | gentoo | ||
Affected | pkg:ebuild/mail-client/thunderbird?distro=gentoo | mail-client | thunderbird | < 38.7.0 | gentoo | ||
Unaffected | pkg:ebuild/mail-client/thunderbird?distro=gentoo | mail-client | thunderbird | >= 38.7.0 | gentoo | ||
Affected | pkg:ebuild/mail-client/thunderbird-bin?distro=gentoo | mail-client | thunderbird-bin | < 38.7.0 | gentoo | ||
Unaffected | pkg:ebuild/mail-client/thunderbird-bin?distro=gentoo | mail-client | thunderbird-bin | >= 38.7.0 | gentoo | ||
Affected | pkg:ebuild/dev-libs/nss?distro=gentoo | dev-libs | nss | < 3.22.2 | gentoo | ||
Unaffected | pkg:ebuild/dev-libs/nss?distro=gentoo | dev-libs | nss | >= 3.22.2 | gentoo | ||
Affected | pkg:ebuild/dev-libs/nspr?distro=gentoo | dev-libs | nspr | < 4.12 | gentoo | ||
Unaffected | pkg:ebuild/dev-libs/nspr?distro=gentoo | dev-libs | nspr | >= 4.12 | gentoo |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |