Errata overview
Errata ID 367
Date 2015-12-09
Source package firefox-en
Fixed in version 1:38.4.0esr-ucs-4.0.61.201511191931
Description
Firefox ESR 38.4 fixes these issues:
* ASan: use-after-poison in sec_asn1d_parse_leaf() (CVE-2015-7181)
* ASN.1 decoder heap overflow when decoding constructed OCTET STRING
  (CVE-2015-7182)
* NSPR overflow in PL_ARENA_ALLOCATE can lead to crash (under ASAN),
  potential memory corruption (CVE-2015-7183)
* WebSocket secure requirements can be bypassed in a worker
  (CVE-2015-7197)
* Overflow in TextureStorage11 can cause memory-safety bug
  (CVE-2015-7198)
* Missing status checks in AddWeightedPathSegLists and
  SVGPathSegListSMILType::Interpolate cause memory-safety bugs
  (CVE-2015-7199)
* Missing status check in CryptoKey creates potential security bug
  (CVE-2015-7200)
* crashes in GC with Java applet (CVE-2015-7196) [only affected when
  java plugin is enabled]
* Arbitrary memory access in libjar (libxul) (CVE-2015-7194)
* CORS does a simple instead of preflighted request for POST with
  non-standard Content-Type header (CVE-2015-7193)
* Heap Buffer Overflow in nsJPEGEncoder (CVE-2015-7189)
* White-spaces in host IP address, leading to same origin policy
  bypass (CVE-2015-7188)
* Memory safety bugs fixed in Firefox ESR 38.4 and Firefox
  42. (CVE-2015-4513)
Additional notes
CVE ID CVE-2015-7181
CVE-2015-7182
CVE-2015-7183
CVE-2015-7197
CVE-2015-7198
CVE-2015-7199
CVE-2015-7200
CVE-2015-7196
CVE-2015-7194
CVE-2015-7193
CVE-2015-7189
CVE-2015-7188
CVE-2015-4513
UCS Bug number #39785