Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2019:2436-1

Опубликовано: 23 сент. 2019
Источник: suse-cvrf

Описание

Security update for MozillaFirefox

This update for MozillaFirefox to ESR 60.9 fixes the following issues:

Security issues fixed:

  • CVE-2019-11742: Fixed a same-origin policy violation involving SVG filters and canvas to steal cross-origin images. (bsc#1149303)
  • CVE-2019-11746: Fixed a use-after-free while manipulating video. (bsc#1149297)
  • CVE-2019-11744: Fixed an XSS caused by breaking out of title and textarea elements using innerHTML. (bsc#1149304)
  • CVE-2019-11753: Fixed a privilege escalation with Mozilla Maintenance Service in custom Firefox installation location. (bsc#1149295)
  • CVE-2019-11752: Fixed a use-after-free while extracting a key value in IndexedDB. (bsc#1149296)
  • CVE-2019-11743: Fixed a timing side-channel attack on cross-origin information, utilizing unload event attributes. (bsc#1149298)
  • CVE-2019-11740: Fixed several memory safety bugs. (bsc#1149299)

Список пакетов

HPE Helion OpenStack 8
MozillaFirefox-60.9.0-109.86.1
MozillaFirefox-translations-common-60.9.0-109.86.1
SUSE Enterprise Storage 4
MozillaFirefox-60.9.0-109.86.1
MozillaFirefox-devel-60.9.0-109.86.1
MozillaFirefox-translations-common-60.9.0-109.86.1
SUSE Enterprise Storage 5
MozillaFirefox-60.9.0-109.86.1
MozillaFirefox-translations-common-60.9.0-109.86.1
SUSE Linux Enterprise Desktop 12 SP4
MozillaFirefox-60.9.0-109.86.1
MozillaFirefox-translations-common-60.9.0-109.86.1
SUSE Linux Enterprise Server 12 SP1-LTSS
MozillaFirefox-60.9.0-109.86.1
MozillaFirefox-devel-60.9.0-109.86.1
MozillaFirefox-translations-common-60.9.0-109.86.1
SUSE Linux Enterprise Server 12 SP2-BCL
MozillaFirefox-60.9.0-109.86.1
MozillaFirefox-devel-60.9.0-109.86.1
MozillaFirefox-translations-common-60.9.0-109.86.1
SUSE Linux Enterprise Server 12 SP2-LTSS
MozillaFirefox-60.9.0-109.86.1
MozillaFirefox-devel-60.9.0-109.86.1
MozillaFirefox-translations-common-60.9.0-109.86.1
SUSE Linux Enterprise Server 12 SP3-BCL
MozillaFirefox-60.9.0-109.86.1
MozillaFirefox-translations-common-60.9.0-109.86.1
SUSE Linux Enterprise Server 12 SP3-LTSS
MozillaFirefox-60.9.0-109.86.1
MozillaFirefox-translations-common-60.9.0-109.86.1
SUSE Linux Enterprise Server 12 SP4
MozillaFirefox-60.9.0-109.86.1
MozillaFirefox-translations-common-60.9.0-109.86.1
SUSE Linux Enterprise Server 12 SP5
MozillaFirefox-60.9.0-109.86.1
MozillaFirefox-translations-common-60.9.0-109.86.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1
MozillaFirefox-60.9.0-109.86.1
MozillaFirefox-devel-60.9.0-109.86.1
MozillaFirefox-translations-common-60.9.0-109.86.1
SUSE Linux Enterprise Server for SAP Applications 12 SP2
MozillaFirefox-60.9.0-109.86.1
MozillaFirefox-devel-60.9.0-109.86.1
MozillaFirefox-translations-common-60.9.0-109.86.1
SUSE Linux Enterprise Server for SAP Applications 12 SP3
MozillaFirefox-60.9.0-109.86.1
MozillaFirefox-translations-common-60.9.0-109.86.1
SUSE Linux Enterprise Server for SAP Applications 12 SP4
MozillaFirefox-60.9.0-109.86.1
MozillaFirefox-translations-common-60.9.0-109.86.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5
MozillaFirefox-60.9.0-109.86.1
MozillaFirefox-translations-common-60.9.0-109.86.1
SUSE Linux Enterprise Software Development Kit 12 SP4
MozillaFirefox-devel-60.9.0-109.86.1
SUSE Linux Enterprise Software Development Kit 12 SP5
MozillaFirefox-devel-60.9.0-109.86.1
SUSE OpenStack Cloud 7
MozillaFirefox-60.9.0-109.86.1
MozillaFirefox-devel-60.9.0-109.86.1
MozillaFirefox-translations-common-60.9.0-109.86.1
SUSE OpenStack Cloud 8
MozillaFirefox-60.9.0-109.86.1
MozillaFirefox-translations-common-60.9.0-109.86.1
SUSE OpenStack Cloud Crowbar 8
MozillaFirefox-60.9.0-109.86.1
MozillaFirefox-translations-common-60.9.0-109.86.1

Описание

Mozilla developers and community members reported memory safety bugs present in Firefox 68, Firefox ESR 68, and Firefox 60.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 69, Thunderbird < 68.1, Thunderbird < 60.9, Firefox ESR < 60.9, and Firefox ESR < 68.1.


Затронутые продукты
HPE Helion OpenStack 8:MozillaFirefox-60.9.0-109.86.1
HPE Helion OpenStack 8:MozillaFirefox-translations-common-60.9.0-109.86.1
SUSE Enterprise Storage 4:MozillaFirefox-60.9.0-109.86.1
SUSE Enterprise Storage 4:MozillaFirefox-devel-60.9.0-109.86.1

Ссылки

Описание

A same-origin policy violation occurs allowing the theft of cross-origin images through a combination of SVG filters and a &lt;canvas&gt; element due to an error in how same-origin policy is applied to cached image content. The resulting same-origin policy violation could allow for data theft. This vulnerability affects Firefox < 69, Thunderbird < 68.1, Thunderbird < 60.9, Firefox ESR < 60.9, and Firefox ESR < 68.1.


Затронутые продукты
HPE Helion OpenStack 8:MozillaFirefox-60.9.0-109.86.1
HPE Helion OpenStack 8:MozillaFirefox-translations-common-60.9.0-109.86.1
SUSE Enterprise Storage 4:MozillaFirefox-60.9.0-109.86.1
SUSE Enterprise Storage 4:MozillaFirefox-devel-60.9.0-109.86.1

Ссылки

Описание

Navigation events were not fully adhering to the W3C's "Navigation-Timing Level 2" draft specification in some instances for the unload event, which restricts access to detailed timing attributes to only be same-origin. This resulted in potential cross-origin information exposure of history through timing side-channel attacks. This vulnerability affects Firefox < 69, Thunderbird < 68.1, Thunderbird < 60.9, Firefox ESR < 60.9, and Firefox ESR < 68.1.


Затронутые продукты
HPE Helion OpenStack 8:MozillaFirefox-60.9.0-109.86.1
HPE Helion OpenStack 8:MozillaFirefox-translations-common-60.9.0-109.86.1
SUSE Enterprise Storage 4:MozillaFirefox-60.9.0-109.86.1
SUSE Enterprise Storage 4:MozillaFirefox-devel-60.9.0-109.86.1

Ссылки

Описание

Some HTML elements, such as &lt;title&gt; and &lt;textarea&gt;, can contain literal angle brackets without treating them as markup. It is possible to pass a literal closing tag to .innerHTML on these elements, and subsequent content after that will be parsed as if it were outside the tag. This can lead to XSS if a site does not filter user input as strictly for these elements as it does for other elements. This vulnerability affects Firefox < 69, Thunderbird < 68.1, Thunderbird < 60.9, Firefox ESR < 60.9, and Firefox ESR < 68.1.


Затронутые продукты
HPE Helion OpenStack 8:MozillaFirefox-60.9.0-109.86.1
HPE Helion OpenStack 8:MozillaFirefox-translations-common-60.9.0-109.86.1
SUSE Enterprise Storage 4:MozillaFirefox-60.9.0-109.86.1
SUSE Enterprise Storage 4:MozillaFirefox-devel-60.9.0-109.86.1

Ссылки

Описание

A use-after-free vulnerability can occur while manipulating video elements if the body is freed while still in use. This results in a potentially exploitable crash. This vulnerability affects Firefox < 69, Thunderbird < 68.1, Thunderbird < 60.9, Firefox ESR < 60.9, and Firefox ESR < 68.1.


Затронутые продукты
HPE Helion OpenStack 8:MozillaFirefox-60.9.0-109.86.1
HPE Helion OpenStack 8:MozillaFirefox-translations-common-60.9.0-109.86.1
SUSE Enterprise Storage 4:MozillaFirefox-60.9.0-109.86.1
SUSE Enterprise Storage 4:MozillaFirefox-devel-60.9.0-109.86.1

Ссылки

Описание

It is possible to delete an IndexedDB key value and subsequently try to extract it during conversion. This results in a use-after-free and a potentially exploitable crash. This vulnerability affects Firefox < 69, Thunderbird < 68.1, Thunderbird < 60.9, Firefox ESR < 60.9, and Firefox ESR < 68.1.


Затронутые продукты
HPE Helion OpenStack 8:MozillaFirefox-60.9.0-109.86.1
HPE Helion OpenStack 8:MozillaFirefox-translations-common-60.9.0-109.86.1
SUSE Enterprise Storage 4:MozillaFirefox-60.9.0-109.86.1
SUSE Enterprise Storage 4:MozillaFirefox-devel-60.9.0-109.86.1

Ссылки

Описание

The Firefox installer allows Firefox to be installed to a custom user writable location, leaving it unprotected from manipulation by unprivileged users or malware. If the Mozilla Maintenance Service is manipulated to update this unprotected location and the updated maintenance service in the unprotected location has been altered, the altered maintenance service can run with elevated privileges during the update process due to a lack of integrity checks. This allows for privilege escalation if the executable has been replaced locally. <br>*Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.*. This vulnerability affects Firefox < 69, Firefox ESR < 60.9, and Firefox ESR < 68.1.


Затронутые продукты
HPE Helion OpenStack 8:MozillaFirefox-60.9.0-109.86.1
HPE Helion OpenStack 8:MozillaFirefox-translations-common-60.9.0-109.86.1
SUSE Enterprise Storage 4:MozillaFirefox-60.9.0-109.86.1
SUSE Enterprise Storage 4:MozillaFirefox-devel-60.9.0-109.86.1

Ссылки

Описание

Given a compromised sandboxed content process due to a separate vulnerability, it is possible to escape that sandbox by loading accounts.firefox.com in that process and forcing a log-in to a malicious Firefox Sync account. Preference settings that disable the sandbox are then synchronized to the local machine and the compromised browser would restart without the sandbox if a crash is triggered. This vulnerability affects Firefox ESR < 60.9, Firefox ESR < 68.1, and Firefox < 69.


Затронутые продукты
HPE Helion OpenStack 8:MozillaFirefox-60.9.0-109.86.1
HPE Helion OpenStack 8:MozillaFirefox-translations-common-60.9.0-109.86.1
SUSE Enterprise Storage 4:MozillaFirefox-60.9.0-109.86.1
SUSE Enterprise Storage 4:MozillaFirefox-devel-60.9.0-109.86.1

Ссылки
Уязвимость SUSE-SU-2019:2436-1