Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2020:2100-1

Опубликовано: 31 июл. 2020
Источник: suse-cvrf

Описание

Security update for MozillaFirefox

This update for MozillaFirefox fixes the following issues:

  • Firefox Extended Support Release 78.1.0 ESR
    • Fixed: Various stability, functionality, and security fixes (bsc#1174538)
    • CVE-2020-15652: Potential leak of redirect targets when loading scripts in a worker
    • CVE-2020-6514: WebRTC data channel leaks internal address to peer
    • CVE-2020-15655: Extension APIs could be used to bypass Same-Origin Policy
    • CVE-2020-15653: Bypassing iframe sandbox when allowing popups
    • CVE-2020-6463: Use-after-free in ANGLE gl::Texture::onUnbindAsSamplerTexture
    • CVE-2020-15656: Type confusion for special arguments in IonMonkey
    • CVE-2020-15658: Overriding file type when saving to disk
    • CVE-2020-15657: DLL hijacking due to incorrect loading path
    • CVE-2020-15654: Custom cursor can overlay user interface
    • CVE-2020-15659: Memory safety bugs fixed in Firefox 79 and Firefox ESR 78.1

Список пакетов

HPE Helion OpenStack 8
MozillaFirefox-78.1.0-112.8.1
MozillaFirefox-devel-78.1.0-112.8.1
MozillaFirefox-translations-common-78.1.0-112.8.1
Image SLES12-SP4-SAP-Azure-LI-BYOS-Production
MozillaFirefox-78.1.0-112.8.1
Image SLES12-SP4-SAP-Azure-VLI-BYOS-Production
MozillaFirefox-78.1.0-112.8.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
MozillaFirefox-78.1.0-112.8.1
Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production
MozillaFirefox-78.1.0-112.8.1
SUSE Enterprise Storage 5
MozillaFirefox-78.1.0-112.8.1
MozillaFirefox-devel-78.1.0-112.8.1
MozillaFirefox-translations-common-78.1.0-112.8.1
SUSE Linux Enterprise Server 12 SP2-BCL
MozillaFirefox-78.1.0-112.8.1
MozillaFirefox-devel-78.1.0-112.8.1
MozillaFirefox-translations-common-78.1.0-112.8.1
SUSE Linux Enterprise Server 12 SP2-LTSS
MozillaFirefox-78.1.0-112.8.1
MozillaFirefox-devel-78.1.0-112.8.1
MozillaFirefox-translations-common-78.1.0-112.8.1
SUSE Linux Enterprise Server 12 SP3-BCL
MozillaFirefox-78.1.0-112.8.1
MozillaFirefox-devel-78.1.0-112.8.1
MozillaFirefox-translations-common-78.1.0-112.8.1
SUSE Linux Enterprise Server 12 SP3-LTSS
MozillaFirefox-78.1.0-112.8.1
MozillaFirefox-devel-78.1.0-112.8.1
MozillaFirefox-translations-common-78.1.0-112.8.1
SUSE Linux Enterprise Server 12 SP4-LTSS
MozillaFirefox-78.1.0-112.8.1
MozillaFirefox-devel-78.1.0-112.8.1
MozillaFirefox-translations-common-78.1.0-112.8.1
SUSE Linux Enterprise Server 12 SP5
MozillaFirefox-78.1.0-112.8.1
MozillaFirefox-devel-78.1.0-112.8.1
MozillaFirefox-translations-common-78.1.0-112.8.1
SUSE Linux Enterprise Server for SAP Applications 12 SP2
MozillaFirefox-78.1.0-112.8.1
MozillaFirefox-devel-78.1.0-112.8.1
MozillaFirefox-translations-common-78.1.0-112.8.1
SUSE Linux Enterprise Server for SAP Applications 12 SP3
MozillaFirefox-78.1.0-112.8.1
MozillaFirefox-devel-78.1.0-112.8.1
MozillaFirefox-translations-common-78.1.0-112.8.1
SUSE Linux Enterprise Server for SAP Applications 12 SP4
MozillaFirefox-78.1.0-112.8.1
MozillaFirefox-devel-78.1.0-112.8.1
MozillaFirefox-translations-common-78.1.0-112.8.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5
MozillaFirefox-78.1.0-112.8.1
MozillaFirefox-devel-78.1.0-112.8.1
MozillaFirefox-translations-common-78.1.0-112.8.1
SUSE Linux Enterprise Software Development Kit 12 SP5
MozillaFirefox-devel-78.1.0-112.8.1
SUSE OpenStack Cloud 7
MozillaFirefox-78.1.0-112.8.1
MozillaFirefox-devel-78.1.0-112.8.1
MozillaFirefox-translations-common-78.1.0-112.8.1
SUSE OpenStack Cloud 8
MozillaFirefox-78.1.0-112.8.1
MozillaFirefox-devel-78.1.0-112.8.1
MozillaFirefox-translations-common-78.1.0-112.8.1
SUSE OpenStack Cloud 9
MozillaFirefox-78.1.0-112.8.1
MozillaFirefox-devel-78.1.0-112.8.1
MozillaFirefox-translations-common-78.1.0-112.8.1
SUSE OpenStack Cloud Crowbar 8
MozillaFirefox-78.1.0-112.8.1
MozillaFirefox-devel-78.1.0-112.8.1
MozillaFirefox-translations-common-78.1.0-112.8.1
SUSE OpenStack Cloud Crowbar 9
MozillaFirefox-78.1.0-112.8.1
MozillaFirefox-devel-78.1.0-112.8.1
MozillaFirefox-translations-common-78.1.0-112.8.1

Описание

By observing the stack trace for JavaScript errors in web workers, it was possible to leak the result of a cross-origin redirect. This applied only to content that can be parsed as script. This vulnerability affects Firefox < 79, Firefox ESR < 68.11, Firefox ESR < 78.1, Thunderbird < 68.11, and Thunderbird < 78.1.


Затронутые продукты
HPE Helion OpenStack 8:MozillaFirefox-78.1.0-112.8.1
HPE Helion OpenStack 8:MozillaFirefox-devel-78.1.0-112.8.1
HPE Helion OpenStack 8:MozillaFirefox-translations-common-78.1.0-112.8.1
Image SLES12-SP4-SAP-Azure-LI-BYOS-Production:MozillaFirefox-78.1.0-112.8.1

Ссылки

Описание

An iframe sandbox element with the allow-popups flag could be bypassed when using noopener links. This could have led to security issues for websites relying on sandbox configurations that allowed popups and hosted arbitrary content. This vulnerability affects Firefox ESR < 78.1, Firefox < 79, and Thunderbird < 78.1.


Затронутые продукты
HPE Helion OpenStack 8:MozillaFirefox-78.1.0-112.8.1
HPE Helion OpenStack 8:MozillaFirefox-devel-78.1.0-112.8.1
HPE Helion OpenStack 8:MozillaFirefox-translations-common-78.1.0-112.8.1
Image SLES12-SP4-SAP-Azure-LI-BYOS-Production:MozillaFirefox-78.1.0-112.8.1

Ссылки

Описание

When in an endless loop, a website specifying a custom cursor using CSS could make it look like the user is interacting with the user interface, when they are not. This could lead to a perceived broken state, especially when interactions with existing browser dialogs and warnings do not work. This vulnerability affects Firefox ESR < 78.1, Firefox < 79, and Thunderbird < 78.1.


Затронутые продукты
HPE Helion OpenStack 8:MozillaFirefox-78.1.0-112.8.1
HPE Helion OpenStack 8:MozillaFirefox-devel-78.1.0-112.8.1
HPE Helion OpenStack 8:MozillaFirefox-translations-common-78.1.0-112.8.1
Image SLES12-SP4-SAP-Azure-LI-BYOS-Production:MozillaFirefox-78.1.0-112.8.1

Ссылки

Описание

A redirected HTTP request which is observed or modified through a web extension could bypass existing CORS checks, leading to potential disclosure of cross-origin information. This vulnerability affects Firefox ESR < 78.1, Firefox < 79, and Thunderbird < 78.1.


Затронутые продукты
HPE Helion OpenStack 8:MozillaFirefox-78.1.0-112.8.1
HPE Helion OpenStack 8:MozillaFirefox-devel-78.1.0-112.8.1
HPE Helion OpenStack 8:MozillaFirefox-translations-common-78.1.0-112.8.1
Image SLES12-SP4-SAP-Azure-LI-BYOS-Production:MozillaFirefox-78.1.0-112.8.1

Ссылки

Описание

JIT optimizations involving the Javascript arguments object could confuse later optimizations. This risk was already mitigated by various precautions in the code, resulting in this bug rated at only moderate severity. This vulnerability affects Firefox ESR < 78.1, Firefox < 79, and Thunderbird < 78.1.


Затронутые продукты
HPE Helion OpenStack 8:MozillaFirefox-78.1.0-112.8.1
HPE Helion OpenStack 8:MozillaFirefox-devel-78.1.0-112.8.1
HPE Helion OpenStack 8:MozillaFirefox-translations-common-78.1.0-112.8.1
Image SLES12-SP4-SAP-Azure-LI-BYOS-Production:MozillaFirefox-78.1.0-112.8.1

Ссылки

Описание

Firefox could be made to load attacker-supplied DLL files from the installation directory. This required an attacker that is already capable of placing files in the installation directory. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR < 78.1, Firefox < 79, and Thunderbird < 78.1.


Затронутые продукты
HPE Helion OpenStack 8:MozillaFirefox-78.1.0-112.8.1
HPE Helion OpenStack 8:MozillaFirefox-devel-78.1.0-112.8.1
HPE Helion OpenStack 8:MozillaFirefox-translations-common-78.1.0-112.8.1
Image SLES12-SP4-SAP-Azure-LI-BYOS-Production:MozillaFirefox-78.1.0-112.8.1

Ссылки

Описание

The code for downloading files did not properly take care of special characters, which led to an attacker being able to cut off the file ending at an earlier position, leading to a different file type being downloaded than shown in the dialog. This vulnerability affects Firefox ESR < 78.1, Firefox < 79, and Thunderbird < 78.1.


Затронутые продукты
HPE Helion OpenStack 8:MozillaFirefox-78.1.0-112.8.1
HPE Helion OpenStack 8:MozillaFirefox-devel-78.1.0-112.8.1
HPE Helion OpenStack 8:MozillaFirefox-translations-common-78.1.0-112.8.1
Image SLES12-SP4-SAP-Azure-LI-BYOS-Production:MozillaFirefox-78.1.0-112.8.1

Ссылки

Описание

Mozilla developers and community members reported memory safety bugs present in Firefox 78 and Firefox ESR 78.0. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 79, Firefox ESR < 68.11, Firefox ESR < 78.1, Thunderbird < 68.11, and Thunderbird < 78.1.


Затронутые продукты
HPE Helion OpenStack 8:MozillaFirefox-78.1.0-112.8.1
HPE Helion OpenStack 8:MozillaFirefox-devel-78.1.0-112.8.1
HPE Helion OpenStack 8:MozillaFirefox-translations-common-78.1.0-112.8.1
Image SLES12-SP4-SAP-Azure-LI-BYOS-Production:MozillaFirefox-78.1.0-112.8.1

Ссылки

Описание

Use after free in ANGLE in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.


Затронутые продукты
HPE Helion OpenStack 8:MozillaFirefox-78.1.0-112.8.1
HPE Helion OpenStack 8:MozillaFirefox-devel-78.1.0-112.8.1
HPE Helion OpenStack 8:MozillaFirefox-translations-common-78.1.0-112.8.1
Image SLES12-SP4-SAP-Azure-LI-BYOS-Production:MozillaFirefox-78.1.0-112.8.1

Ссылки

Описание

Inappropriate implementation in WebRTC in Google Chrome prior to 84.0.4147.89 allowed an attacker in a privileged network position to potentially exploit heap corruption via a crafted SCTP stream.


Затронутые продукты
HPE Helion OpenStack 8:MozillaFirefox-78.1.0-112.8.1
HPE Helion OpenStack 8:MozillaFirefox-devel-78.1.0-112.8.1
HPE Helion OpenStack 8:MozillaFirefox-translations-common-78.1.0-112.8.1
Image SLES12-SP4-SAP-Azure-LI-BYOS-Production:MozillaFirefox-78.1.0-112.8.1

Ссылки