Описание
Security update for MozillaFirefox, mozilla-nspr, mozilla-nss
This update for MozillaFirefox, mozilla-nspr, mozilla-nss fixes the following issues:
Update Firefox Extended Support Release to 68.3.0 ESR (MFSA 2019-37 / bsc#1158328)
Security issues fixed:
- CVE-2019-17008: Use-after-free in worker destruction (bmo#1546331).
- CVE-2019-13722: Stack corruption due to incorrect number of arguments in WebRTC code (bmo#1580156).
- CVE-2019-11745: Out of bounds write in NSS when encrypting with a block cipher (bmo#1586176).
- CVE-2019-17009: Updater temporary files accessible to unprivileged processes (bmo#1510494).
- CVE-2019-17010: Use-after-free when performing device orientation checks (bmo#1581084).
- CVE-2019-17005: Buffer overflow in plain text serializer (bmo#1584170).
- CVE-2019-17011: Use-after-free when retrieving a document in antitracking (bmo#1591334).
- CVE-2019-17012: Memory safety bugs fixed in Firefox 71 and Firefox ESR 68.3 (bmo#1449736, bmo#1533957, bmo#1560667, bmo#1567209, bmo#1580288, bmo#1585760, bmo#1592502).
Update mozilla-nss to version 3.47.1 (bsc#1158527):
Security issues fixed:
- CVE-2019-11745: EncryptUpdate should use maxout, not block size.
Bug fixes:
- Fix a crash that could be caused by client certificates during startup (bmo#1590495, bsc#1158527)
- Fix compile-time warnings from uninitialized variables in a perl script (bmo#1589810)
- Support AES HW acceleration on ARMv8 (bmo#1152625)
- Allow per-socket run-time ordering of the cipher suites presented in ClientHello (bmo#1267894)
- Add CMAC to FreeBL and PKCS #11 libraries (bmo#1570501)
- Remove arbitrary HKDF output limit by allocating space as needed (bmo#1577953)
Update mozilla-nspr to version 4.23:
Bug fixes:
- fixed a build failure that was introduced in 4.22
- correctness fix for Win64 socket polling
- whitespace in C files was cleaned up and no longer uses tab characters for indenting
- added support for the ARC architecture
- removed support for the following platforms: OSF1/Tru64, DGUX, IRIX, Symbian, BeOS
- correctness and build fixes
Список пакетов
SUSE Linux Enterprise Server 11 SP4-LTSS
Ссылки
- Link for SUSE-SU-2019:14260-1
- E-Mail link for SUSE-SU-2019:14260-1
- SUSE Security Ratings
- SUSE Bug 1158328
- SUSE Bug 1158527
- SUSE CVE CVE-2019-11745 page
- SUSE CVE CVE-2019-13722 page
- SUSE CVE CVE-2019-17005 page
- SUSE CVE CVE-2019-17008 page
- SUSE CVE CVE-2019-17009 page
- SUSE CVE CVE-2019-17010 page
- SUSE CVE CVE-2019-17011 page
- SUSE CVE CVE-2019-17012 page
Описание
When encrypting with a block cipher, if a call to NSC_EncryptUpdate was made with data smaller than the block size, a small out of bounds write could occur. This could have caused heap corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.
Затронутые продукты
Ссылки
- CVE-2019-11745
- SUSE Bug 1158328
- SUSE Bug 1158527
Описание
Inappropriate implementation in WebRTC in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Затронутые продукты
Ссылки
- CVE-2019-13722
- SUSE Bug 1158328
Описание
The plain text serializer used a fixed-size array for the number of <ol> elements it could process; however it was possible to overflow the static-sized array leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.
Затронутые продукты
Ссылки
- CVE-2019-17005
- SUSE Bug 1158328
Описание
When using nested workers, a use-after-free could occur during worker destruction. This resulted in a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.
Затронутые продукты
Ссылки
- CVE-2019-17008
- SUSE Bug 1158328
Описание
When running, the updater service wrote status and log files to an unrestricted location; potentially allowing an unprivileged process to locate and exploit a vulnerability in file handling in the updater service. *Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.*. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.
Затронутые продукты
Ссылки
- CVE-2019-17009
- SUSE Bug 1158328
Описание
Under certain conditions, when checking the Resist Fingerprinting preference during device orientation checks, a race condition could have caused a use-after-free and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.
Затронутые продукты
Ссылки
- CVE-2019-17010
- SUSE Bug 1158328
Описание
Under certain conditions, when retrieving a document from a DocShell in the antitracking code, a race condition could cause a use-after-free condition and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.
Затронутые продукты
Ссылки
- CVE-2019-17011
- SUSE Bug 1158328
Описание
Mozilla developers reported memory safety bugs present in Firefox 70 and Firefox ESR 68.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.
Затронутые продукты
Ссылки
- CVE-2019-17012
- SUSE Bug 1158328