Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2018:3476-1

Опубликовано: 25 окт. 2018
Источник: suse-cvrf

Описание

Security update for MozillaFirefox

This update for MozillaFirefox to 60.2.2ESR fixes the following issues:

Security issues fixed:

MFSA 2018-24:

  • CVE-2018-12386: A Type confusion in JavaScript allowed remote code execution (bsc#1110506)
  • CVE-2018-12387: Array.prototype.push stack pointer vulnerability may have enabled exploits in the sandboxed content process (bsc#1110507)

MFSA 2018-23:

  • CVE-2018-12385: Fixed a crash in TransportSecurityInfo due to cached data (bsc#1109363)
  • CVE-2018-12383: Setting a master password did not delete unencrypted previously stored passwords (bsc#1107343)

Non security issues fixed:

  • Avoid undefined behavior in IPC fd-passing code (bsc#1094767)
  • Fixed a startup crash affecting users migrating from older ESR releases
  • Clean up old NSS DB files after upgrading
  • Fixed an endianness problem in bindgen's handling of bitfields, which was causing Firefox to crash on startup on big-endian machines. Also, updates the cc crate, which was buggy in the version that was originally vendored in. (bsc#1109465)

Список пакетов

SUSE Linux Enterprise Module for Desktop Applications 15
MozillaFirefox-60.2.2-3.13.3
MozillaFirefox-branding-SLE-60-4.5.3
MozillaFirefox-devel-60.2.2-3.13.3
MozillaFirefox-translations-common-60.2.2-3.13.3
MozillaFirefox-translations-other-60.2.2-3.13.3

Описание

If a user saved passwords before Firefox 58 and then later set a master password, an unencrypted copy of these passwords is still accessible. This is because the older stored password file was not deleted when the data was copied to a new format starting in Firefox 58. The new master password is added only on the new file. This could allow the exposure of stored password data outside of user expectations. This vulnerability affects Firefox < 62, Firefox ESR < 60.2.1, and Thunderbird < 60.2.1.


Затронутые продукты
SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-60.2.2-3.13.3
SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-branding-SLE-60-4.5.3
SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-devel-60.2.2-3.13.3
SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-common-60.2.2-3.13.3

Ссылки

Описание

A potentially exploitable crash in TransportSecurityInfo used for SSL can be triggered by data stored in the local cache in the user profile directory. This issue is only exploitable in combination with another vulnerability allowing an attacker to write data into the local cache or from locally installed malware. This issue also triggers a non-exploitable startup crash for users switching between the Nightly and Release versions of Firefox if the same profile is used. This vulnerability affects Thunderbird < 60.2.1, Firefox ESR < 60.2.1, and Firefox < 62.0.2.


Затронутые продукты
SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-60.2.2-3.13.3
SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-branding-SLE-60-4.5.3
SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-devel-60.2.2-3.13.3
SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-common-60.2.2-3.13.3

Ссылки

Описание

A vulnerability in register allocation in JavaScript can lead to type confusion, allowing for an arbitrary read and write. This leads to remote code execution inside the sandboxed content process when triggered. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.


Затронутые продукты
SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-60.2.2-3.13.3
SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-branding-SLE-60-4.5.3
SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-devel-60.2.2-3.13.3
SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-common-60.2.2-3.13.3

Ссылки

Описание

A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.


Затронутые продукты
SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-60.2.2-3.13.3
SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-branding-SLE-60-4.5.3
SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-devel-60.2.2-3.13.3
SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-common-60.2.2-3.13.3

Ссылки
Уязвимость SUSE-SU-2018:3476-1