Upstream information
Description
Mozilla Firefox before 42.0 on Android allows user-assisted remote attackers to bypass the Same Origin Policy and trigger (1) a download or (2) cached profile-data reading via a file: URL in a saved HTML document.SUSE information
Overall state of this security issue: Does not affect SUSE products
This issue is currently rated as having moderate severity.
National Vulnerability Database | |
---|---|
Base Score | 4.3 |
Vector | AV:N/AC:M/Au:N/C:P/I:N/A:N |
Access Vector | Network |
Access Complexity | Medium |
Authentication | None |
Confidentiality Impact | Partial |
Integrity Impact | None |
Availability Impact | None |
- openSUSE-SU-2015:1942-1, published Mon, 9 Nov 2015 23:10:09 +0100 (CET)
List of released packages
Product(s) | Fixed package version(s) | References |
---|---|---|
SUSE Linux Enterprise Module for Desktop Applications 15 SP1 |
| |
SUSE Linux Enterprise Module for Desktop Applications 15 SP2 |
| |
SUSE Linux Enterprise Module for Desktop Applications 15 |
| |
openSUSE 13.1 |
| Patchnames: openSUSE-2015-718 |
openSUSE Leap 15.0 |
| Patchnames: openSUSE Leap 15.0 GA MozillaFirefox |
openSUSE Leap 42.1 |
| Patchnames: openSUSE-2015-718 |
openSUSE Leap 42.2 |
| Patchnames: openSUSE Leap 42.2 GA MozillaFirefox |
openSUSE Leap 42.3 |
| Patchnames: openSUSE Leap 42.3 GA MozillaFirefox |
openSUSE Tumbleweed |
| Patchnames: openSUSE Tumbleweed GA MozillaFirefox openSUSE Tumbleweed GA seamonkey |