Описание
Security update for MozillaFirefox
This update for MozillaFirefox to 60.2.2ESR fixes the following issues:
Security issues fixed:
MFSA 2018-24:
- CVE-2018-12386: A Type confusion in JavaScript allowed remote code execution (bsc#1110506)
- CVE-2018-12387: Array.prototype.push stack pointer vulnerability may have enabled exploits in the sandboxed content process (bsc#1110507)
MFSA 2018-23:
- CVE-2018-12385: Fixed a crash in TransportSecurityInfo due to cached data (bsc#1109363)
- CVE-2018-12383: Setting a master password did not delete unencrypted previously stored passwords (bsc#1107343)
Non security issues fixed:
- Avoid undefined behavior in IPC fd-passing code (bsc#1094767)
- Fixed a startup crash affecting users migrating from older ESR releases
- Clean up old NSS DB files after upgrading
- Fixed an endianness problem in bindgen's handling of bitfields, which was causing Firefox to crash on startup on big-endian machines. Also, updates the cc crate, which was buggy in the version that was originally vendored in. (bsc#1109465)
Список пакетов
SUSE Linux Enterprise Module for Desktop Applications 15
Ссылки
- Link for SUSE-SU-2018:3476-1
- E-Mail link for SUSE-SU-2018:3476-1
- SUSE Security Ratings
- SUSE Bug 1094767
- SUSE Bug 1107343
- SUSE Bug 1109363
- SUSE Bug 1109465
- SUSE Bug 1110506
- SUSE Bug 1110507
- SUSE CVE CVE-2018-12383 page
- SUSE CVE CVE-2018-12385 page
- SUSE CVE CVE-2018-12386 page
- SUSE CVE CVE-2018-12387 page
Описание
If a user saved passwords before Firefox 58 and then later set a master password, an unencrypted copy of these passwords is still accessible. This is because the older stored password file was not deleted when the data was copied to a new format starting in Firefox 58. The new master password is added only on the new file. This could allow the exposure of stored password data outside of user expectations. This vulnerability affects Firefox < 62, Firefox ESR < 60.2.1, and Thunderbird < 60.2.1.
Затронутые продукты
Ссылки
- CVE-2018-12383
- SUSE Bug 1107343
Описание
A potentially exploitable crash in TransportSecurityInfo used for SSL can be triggered by data stored in the local cache in the user profile directory. This issue is only exploitable in combination with another vulnerability allowing an attacker to write data into the local cache or from locally installed malware. This issue also triggers a non-exploitable startup crash for users switching between the Nightly and Release versions of Firefox if the same profile is used. This vulnerability affects Thunderbird < 60.2.1, Firefox ESR < 60.2.1, and Firefox < 62.0.2.
Затронутые продукты
Ссылки
- CVE-2018-12385
- SUSE Bug 1109363
Описание
A vulnerability in register allocation in JavaScript can lead to type confusion, allowing for an arbitrary read and write. This leads to remote code execution inside the sandboxed content process when triggered. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.
Затронутые продукты
Ссылки
- CVE-2018-12386
- SUSE Bug 1110506
Описание
A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.
Затронутые продукты
Ссылки
- CVE-2018-12387
- SUSE Bug 1110507