Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2018:0681-1

Опубликовано: 15 мар. 2018
Источник: suse-cvrf

Описание

Security update for MozillaFirefox

This update for Mozilla Firefox to version 52.7.0esr fixes multiple issues.

Security issues fixed (bsc#1085130, MFSA 2018-07):

  • CVE-2018-5127: Buffer overflow manipulating SVG animatedPathSegList
  • CVE-2018-5129: Out-of-bounds write with malformed IPC messages
  • CVE-2018-5130: Mismatched RTP payload type can trigger memory corruption
  • CVE-2018-5131: Fetch API improperly returns cached copies of no-store/no-cache resources
  • CVE-2018-5144: Integer overflow during Unicode conversion
  • CVE-2018-5125: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7
  • CVE-2018-5145: Memory safety bugs fixed in Firefox ESR 52.7

The following bug fixes are included:

  • bsc#1076907: provide mimehandler(text/html)

Список пакетов

openSUSE Leap 42.3
MozillaFirefox-52.7-78.1
MozillaFirefox-branding-upstream-52.7-78.1
MozillaFirefox-buildsymbols-52.7-78.1
MozillaFirefox-devel-52.7-78.1
MozillaFirefox-translations-common-52.7-78.1
MozillaFirefox-translations-other-52.7-78.1

Описание

Memory safety bugs were reported in Firefox 58 and Firefox ESR 52.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 52.7, Firefox ESR < 52.7, and Firefox < 59.


Затронутые продукты
openSUSE Leap 42.3:MozillaFirefox-52.7-78.1
openSUSE Leap 42.3:MozillaFirefox-branding-upstream-52.7-78.1
openSUSE Leap 42.3:MozillaFirefox-buildsymbols-52.7-78.1
openSUSE Leap 42.3:MozillaFirefox-devel-52.7-78.1

Ссылки

Описание

A buffer overflow can occur when manipulating the SVG "animatedPathSegList" through script. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.7, Firefox ESR < 52.7, and Firefox < 59.


Затронутые продукты
openSUSE Leap 42.3:MozillaFirefox-52.7-78.1
openSUSE Leap 42.3:MozillaFirefox-branding-upstream-52.7-78.1
openSUSE Leap 42.3:MozillaFirefox-buildsymbols-52.7-78.1
openSUSE Leap 42.3:MozillaFirefox-devel-52.7-78.1

Ссылки

Описание

A lack of parameter validation on IPC messages results in a potential out-of-bounds write through malformed IPC messages. This can potentially allow for sandbox escape through memory corruption in the parent process. This vulnerability affects Thunderbird < 52.7, Firefox ESR < 52.7, and Firefox < 59.


Затронутые продукты
openSUSE Leap 42.3:MozillaFirefox-52.7-78.1
openSUSE Leap 42.3:MozillaFirefox-branding-upstream-52.7-78.1
openSUSE Leap 42.3:MozillaFirefox-buildsymbols-52.7-78.1
openSUSE Leap 42.3:MozillaFirefox-devel-52.7-78.1

Ссылки

Описание

When packets with a mismatched RTP payload type are sent in WebRTC connections, in some circumstances a potentially exploitable crash is triggered. This vulnerability affects Firefox ESR < 52.7 and Firefox < 59.


Затронутые продукты
openSUSE Leap 42.3:MozillaFirefox-52.7-78.1
openSUSE Leap 42.3:MozillaFirefox-branding-upstream-52.7-78.1
openSUSE Leap 42.3:MozillaFirefox-buildsymbols-52.7-78.1
openSUSE Leap 42.3:MozillaFirefox-devel-52.7-78.1

Ссылки

Описание

Under certain circumstances the "fetch()" API can return transient local copies of resources that were sent with a "no-store" or "no-cache" cache header instead of downloading a copy from the network as it should. This can result in previously stored, locally cached data of a website being accessible to users if they share a common profile while browsing. This vulnerability affects Firefox ESR < 52.7 and Firefox < 59.


Затронутые продукты
openSUSE Leap 42.3:MozillaFirefox-52.7-78.1
openSUSE Leap 42.3:MozillaFirefox-branding-upstream-52.7-78.1
openSUSE Leap 42.3:MozillaFirefox-buildsymbols-52.7-78.1
openSUSE Leap 42.3:MozillaFirefox-devel-52.7-78.1

Ссылки

Описание

An integer overflow can occur during conversion of text to some Unicode character sets due to an unchecked length parameter. This vulnerability affects Firefox ESR < 52.7 and Thunderbird < 52.7.


Затронутые продукты
openSUSE Leap 42.3:MozillaFirefox-52.7-78.1
openSUSE Leap 42.3:MozillaFirefox-branding-upstream-52.7-78.1
openSUSE Leap 42.3:MozillaFirefox-buildsymbols-52.7-78.1
openSUSE Leap 42.3:MozillaFirefox-devel-52.7-78.1

Ссылки

Описание

Memory safety bugs were reported in Firefox ESR 52.6. These bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR < 52.7 and Thunderbird < 52.7.


Затронутые продукты
openSUSE Leap 42.3:MozillaFirefox-52.7-78.1
openSUSE Leap 42.3:MozillaFirefox-branding-upstream-52.7-78.1
openSUSE Leap 42.3:MozillaFirefox-buildsymbols-52.7-78.1
openSUSE Leap 42.3:MozillaFirefox-devel-52.7-78.1

Ссылки