Multiple use-after-free vulnerabilities in OpenType Sanitiser, as used in Mozilla Firefox before 36.0, might allow remote attackers to trigger problematic Developer Console information or possibly have unspecified other impact by leveraging incorrect macro expansion, related to the ots::ots_gasp_parse function.
Link | Tags |
---|---|
https://security.gentoo.org/glsa/201504-01 | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html | third party advisory vendor advisory |
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html | |
https://bugzilla.mozilla.org/show_bug.cgi?id=1098497 | issue tracking |
http://www.securityfocus.com/bid/72754 | vdb entry third party advisory |
https://github.com/khaledhosny/ots/commit/003c62d28ae438aa8943cb31535563397f838a2c | issue tracking patch |
http://www.securitytracker.com/id/1031791 | vdb entry third party advisory |
http://www.mozilla.org/security/announce/2015/mfsa2015-23.html | vendor advisory |
http://lists.opensuse.org/opensuse-updates/2015-03/msg00067.html | third party advisory vendor advisory |
http://www.ubuntu.com/usn/USN-2505-1 | third party advisory vendor advisory |