UBUNTU-CVE-2015-0822

Source
https://ubuntu.com/security/CVE-2015-0822
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2015/UBUNTU-CVE-2015-0822.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2015-0822
Upstream
  • CVE-2015-0822
Downstream
Related
Published
2015-02-25T00:00:00Z
Modified
2026-04-22T10:01:02.024993Z
Severity
  • Ubuntu - medium
Summary
[none]
Details

The Form Autocompletion feature in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allows remote attackers to read arbitrary files via crafted JavaScript code.

References

Affected packages

Ubuntu:14.04:LTS / firefox

Package

Name
firefox
Purl
pkg:deb/ubuntu/firefox@36.0+build2-0ubuntu0.14.04.4?arch=source&distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
36.0+build2-0ubuntu0.14.04.4

Affected versions

24.*
24.0+build1-0ubuntu1
25.*
25.0+build3-0ubuntu0.13.10.1
28.*
28.0~b2+build1-0ubuntu2
28.0+build1-0ubuntu1
28.0+build2-0ubuntu1
28.0+build2-0ubuntu2
29.*
29.0+build1-0ubuntu0.14.04.2
30.*
30.0+build1-0ubuntu0.14.04.3
31.*
31.0+build1-0ubuntu0.14.04.1
32.*
32.0+build1-0ubuntu0.14.04.1
32.0.3+build1-0ubuntu0.14.04.1
33.*
33.0+build2-0ubuntu0.14.04.1
34.*
34.0+build2-0ubuntu0.14.04.1
35.*
35.0+build3-0ubuntu0.14.04.2
35.0.1+build1-0ubuntu0.14.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "36.0+build2-0ubuntu0.14.04.4",
            "binary_name": "firefox"
        },
        {
            "binary_version": "36.0+build2-0ubuntu0.14.04.4",
            "binary_name": "firefox-globalmenu"
        },
        {
            "binary_version": "36.0+build2-0ubuntu0.14.04.4",
            "binary_name": "firefox-mozsymbols"
        },
        {
            "binary_version": "36.0+build2-0ubuntu0.14.04.4",
            "binary_name": "firefox-testsuite"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2015/UBUNTU-CVE-2015-0822.json"

Ubuntu:14.04:LTS / thunderbird

Package

Name
thunderbird
Purl
pkg:deb/ubuntu/thunderbird@1:31.5.0+build1-0ubuntu0.14.04.1?arch=source&distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:31.5.0+build1-0ubuntu0.14.04.1

Affected versions

1:24.*
1:24.0+build1-0ubuntu1
1:24.0+build1-0ubuntu2
1:24.1.1+build1-0ubuntu0.13.10.1
1:24.1.1+build1-0ubuntu1
1:24.2.0+build1-0ubuntu1
1:24.4.0+build1-0ubuntu1
1:24.5.0+build1-0ubuntu0.14.04.1
1:24.6.0+build1-0ubuntu0.14.04.1
1:31.*
1:31.0+build1-0ubuntu0.14.04.1
1:31.1.1+build1-0ubuntu0.14.04.1
1:31.1.2+build1-0ubuntu0.14.04.1
1:31.2.0+build2-0ubuntu0.14.04.1
1:31.3.0+build1-0ubuntu0.14.04.1
1:31.4.0+build1-0ubuntu0.14.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1:31.5.0+build1-0ubuntu0.14.04.1",
            "binary_name": "thunderbird"
        },
        {
            "binary_version": "1:31.5.0+build1-0ubuntu0.14.04.1",
            "binary_name": "thunderbird-globalmenu"
        },
        {
            "binary_version": "1:31.5.0+build1-0ubuntu0.14.04.1",
            "binary_name": "thunderbird-gnome-support"
        },
        {
            "binary_version": "1:31.5.0+build1-0ubuntu0.14.04.1",
            "binary_name": "thunderbird-mozsymbols"
        },
        {
            "binary_version": "1:31.5.0+build1-0ubuntu0.14.04.1",
            "binary_name": "thunderbird-testsuite"
        },
        {
            "binary_version": "1:31.5.0+build1-0ubuntu0.14.04.1",
            "binary_name": "xul-ext-calendar-timezones"
        },
        {
            "binary_version": "1:31.5.0+build1-0ubuntu0.14.04.1",
            "binary_name": "xul-ext-gdata-provider"
        },
        {
            "binary_version": "1:31.5.0+build1-0ubuntu0.14.04.1",
            "binary_name": "xul-ext-lightning"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2015/UBUNTU-CVE-2015-0822.json"