Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2019:2251-1

Опубликовано: 04 окт. 2019
Источник: suse-cvrf

Описание

Security update for MozillaFirefox

This update for MozillaFirefox to 68.1 fixes the following issues:

Security issues fixed:

  • CVE-2019-9811: Fixed a sandbox escape via installation of malicious language pack. (bsc#1140868)
  • CVE-2019-9812: Fixed a sandbox escape through Firefox Sync. (bsc#1149294)
  • CVE-2019-11710: Fixed several memory safety bugs. (bsc#1140868)
  • CVE-2019-11714: Fixed a potentially exploitable crash in Necko. (bsc#1140868)
  • CVE-2019-11716: Fixed a sandbox bypass. (bsc#1140868)
  • CVE-2019-11718: Fixed inadequate sanitation in the Activity Stream component. (bsc#1140868)
  • CVE-2019-11720: Fixed a character encoding XSS vulnerability. (bsc#1140868)
  • CVE-2019-11721: Fixed a homograph domain spoofing issue through unicode latin 'kra' character. (bsc#1140868)
  • CVE-2019-11723: Fixed a cookie leakage during add-on fetching across private browsing boundaries. (bsc#1140868)
  • CVE-2019-11724: Fixed an outdated permission, granting access to retired site input.mozilla.org. (bsc#1140868)
  • CVE-2019-11725: Fixed a Safebrowsing bypass involving WebSockets. (bsc#1140868)
  • CVE-2019-11727: Fixed a vulnerability where it possible to force NSS to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. (bsc#1141322)
  • CVE-2019-11728: Fixed an improper handling of the Alt-Svc header that allowed remote port scans. (bsc#1140868)
  • CVE-2019-11733: Fixed an insufficient protection of stored passwords in 'Saved Logins'. (bnc#1145665)
  • CVE-2019-11735: Fixed several memory safety bugs. (bnc#1149293)
  • CVE-2019-11736: Fixed a file manipulation and privilege escalation in Mozilla Maintenance Service. (bnc#1149292)
  • CVE-2019-11738: Fixed a content security policy bypass through hash-based sources in directives. (bnc#1149302)
  • CVE-2019-11740: Fixed several memory safety bugs. (bsc#1149299)
  • CVE-2019-11742: Fixed a same-origin policy violation involving SVG filters and canvas to steal cross-origin images. (bsc#1149303)
  • CVE-2019-11743: Fixed a timing side-channel attack on cross-origin information, utilizing unload event attributes. (bsc#1149298)
  • CVE-2019-11744: Fixed an XSS caused by breaking out of title and textarea elements using innerHTML. (bsc#1149304)
  • CVE-2019-11746: Fixed a use-after-free while manipulating video. (bsc#1149297)
  • CVE-2019-11752: Fixed a use-after-free while extracting a key value in IndexedDB. (bsc#1149296)
  • CVE-2019-11753: Fixed a privilege escalation with Mozilla Maintenance Service in custom Firefox installation location. (bsc#1149295)

Non-security issues fixed:

  • Latest update now also released for s390x. (bsc#1109465)
  • Fixed a segmentation fault on s390vsl082. (bsc#1117473)
  • Fixed a crash on SLES15 s390x. (bsc#1124525)
  • Fixed a segmentation fault. (bsc#1133810)

This update was imported from the SUSE:SLE-15:Update update project.

Список пакетов

openSUSE Leap 15.1
MozillaFirefox-68.1.0-lp151.2.14.1
MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1
MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1
MozillaFirefox-devel-68.1.0-lp151.2.14.1
MozillaFirefox-translations-common-68.1.0-lp151.2.14.1
MozillaFirefox-translations-other-68.1.0-lp151.2.14.1

Описание

Mozilla developers and community members reported memory safety bugs present in Firefox 67. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 68.


Затронутые продукты
openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1

Ссылки

Описание

Necko can access a child on the wrong thread during UDP connections, resulting in a potentially exploitable crash in some instances. This vulnerability affects Firefox < 68.


Затронутые продукты
openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1

Ссылки

Описание

Until explicitly accessed by script, window.globalThis is not enumerable and, as a result, is not visible to code such as Object.getOwnPropertyNames(window). Sites that deploy a sandboxing that depends on enumerating and freezing access to the window object may miss this, allowing their sandboxes to be bypassed. This vulnerability affects Firefox < 68.


Затронутые продукты
openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1

Ссылки

Описание

Activity Stream can display content from sent from the Snippet Service website. This content is written to innerHTML on the Activity Stream page without sanitization, allowing for a potential access to other information available to the Activity Stream, such as browsing history, if the Snipper Service were compromised. This vulnerability affects Firefox < 68.


Затронутые продукты
openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1

Ссылки

Описание

Some unicode characters are incorrectly treated as whitespace during the parsing of web content instead of triggering parsing errors. This allows malicious code to then be processed, evading cross-site scripting (XSS) filtering. This vulnerability affects Firefox < 68.


Затронутые продукты
openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1

Ссылки

Описание

The unicode latin 'kra' character can be used to spoof a standard 'k' character in the addressbar. This allows for domain spoofing attacks as do not display as punycode text, allowing for user confusion. This vulnerability affects Firefox < 68.


Затронутые продукты
openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1

Ссылки

Описание

A vulnerability exists during the installation of add-ons where the initial fetch ignored the origin attributes of the browsing context. This could leak cookies in private browsing mode or across different "containers" for people who use the Firefox Multi-Account Containers Web Extension. This vulnerability affects Firefox < 68.


Затронутые продукты
openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1

Ссылки

Описание

Application permissions give additional remote troubleshooting permission to the site input.mozilla.org, which has been retired and now redirects to another site. This additional permission is unnecessary and is a potential vector for malicious attacks. This vulnerability affects Firefox < 68.


Затронутые продукты
openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1

Ссылки

Описание

When a user navigates to site marked as unsafe by the Safebrowsing API, warning messages are displayed and navigation is interrupted but resources from the same site loaded through websockets are not blocked, leading to the loading of unsafe resources and bypassing safebrowsing protections. This vulnerability affects Firefox < 68.


Затронутые продукты
openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1

Ссылки

Описание

A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages. This vulnerability affects Firefox < 68.


Затронутые продукты
openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1

Ссылки

Описание

The HTTP Alternative Services header, Alt-Svc, can be used by a malicious site to scan all TCP ports of any host that the accessible to a user when web content is loaded. This vulnerability affects Firefox < 68.


Затронутые продукты
openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1

Ссылки

Описание

When a master password is set, it is required to be entered again before stored passwords can be accessed in the 'Saved Logins' dialog. It was found that locally stored passwords can be copied to the clipboard thorough the 'copy password' context menu item without re-entering the master password if the master password had been previously entered in the same session, allowing for potential theft of stored passwords. This vulnerability affects Firefox < 68.0.2 and Firefox ESR < 68.0.2.


Затронутые продукты
openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1

Ссылки

Описание

Mozilla developers and community members reported memory safety bugs present in Firefox 68 and Firefox ESR 68. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 69 and Firefox ESR < 68.1.


Затронутые продукты
openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1

Ссылки

Описание

The Mozilla Maintenance Service does not guard against files being hardlinked to another file in the updates directory, allowing for the replacement of local files, including the Maintenance Service executable, which is run with privileged access. Additionally, there was a race condition during checks for junctions and symbolic links by the Maintenance Service, allowing for potential local file and directory manipulation to be undetected in some circumstances. This allows for potential privilege escalation by a user with unprivileged local access. <br>*Note: These attacks requires local system access and only affects Windows. Other operating systems are not affected.*. This vulnerability affects Firefox < 69 and Firefox ESR < 68.1.


Затронутые продукты
openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1

Ссылки

Описание

If a Content Security Policy (CSP) directive is defined that uses a hash-based source that takes the empty string as input, execution of any javascript: URIs will be allowed. This could allow for malicious JavaScript content to be run, bypassing CSP permissions. This vulnerability affects Firefox < 69 and Firefox ESR < 68.1.


Затронутые продукты
openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1

Ссылки

Описание

Mozilla developers and community members reported memory safety bugs present in Firefox 68, Firefox ESR 68, and Firefox 60.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 69, Thunderbird < 68.1, Thunderbird < 60.9, Firefox ESR < 60.9, and Firefox ESR < 68.1.


Затронутые продукты
openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1

Ссылки

Описание

A same-origin policy violation occurs allowing the theft of cross-origin images through a combination of SVG filters and a &lt;canvas&gt; element due to an error in how same-origin policy is applied to cached image content. The resulting same-origin policy violation could allow for data theft. This vulnerability affects Firefox < 69, Thunderbird < 68.1, Thunderbird < 60.9, Firefox ESR < 60.9, and Firefox ESR < 68.1.


Затронутые продукты
openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1

Ссылки

Описание

Navigation events were not fully adhering to the W3C's "Navigation-Timing Level 2" draft specification in some instances for the unload event, which restricts access to detailed timing attributes to only be same-origin. This resulted in potential cross-origin information exposure of history through timing side-channel attacks. This vulnerability affects Firefox < 69, Thunderbird < 68.1, Thunderbird < 60.9, Firefox ESR < 60.9, and Firefox ESR < 68.1.


Затронутые продукты
openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1

Ссылки

Описание

Some HTML elements, such as &lt;title&gt; and &lt;textarea&gt;, can contain literal angle brackets without treating them as markup. It is possible to pass a literal closing tag to .innerHTML on these elements, and subsequent content after that will be parsed as if it were outside the tag. This can lead to XSS if a site does not filter user input as strictly for these elements as it does for other elements. This vulnerability affects Firefox < 69, Thunderbird < 68.1, Thunderbird < 60.9, Firefox ESR < 60.9, and Firefox ESR < 68.1.


Затронутые продукты
openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1

Ссылки

Описание

A use-after-free vulnerability can occur while manipulating video elements if the body is freed while still in use. This results in a potentially exploitable crash. This vulnerability affects Firefox < 69, Thunderbird < 68.1, Thunderbird < 60.9, Firefox ESR < 60.9, and Firefox ESR < 68.1.


Затронутые продукты
openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1

Ссылки

Описание

The "Forget about this site" feature in the History pane is intended to remove all saved user data that indicates a user has visited a site. This includes removing any HTTP Strict Transport Security (HSTS) settings received from sites that use it. Due to a bug, sites on the pre-load list also have their HSTS setting removed. On the next visit to that site if the user specifies an http: URL rather than secure https: they will not be protected by the pre-loaded HSTS setting. After that visit the site's HSTS setting will be restored. This vulnerability affects Firefox < 69 and Firefox ESR < 68.1.


Затронутые продукты
openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1

Ссылки

Описание

WebRTC in Firefox will honor persisted permissions given to sites for access to microphone and camera resources even when in a third-party context. In light of recent high profile vulnerabilities in other software, a decision was made to no longer persist these permissions. This avoids the possibility of trusted WebRTC resources being invisibly embedded in web content and abusing permissions previously given by users. Users will now be prompted for permissions on each use. This vulnerability affects Firefox < 69 and Firefox ESR < 68.1.


Затронутые продукты
openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1

Ссылки

Описание

A vulnerability exists in WebRTC where malicious web content can use probing techniques on the getUserMedia API using constraints to reveal device properties of cameras on the system without triggering a user prompt or notification. This allows for the potential fingerprinting of users. This vulnerability affects Firefox < 69 and Firefox ESR < 68.1.


Затронутые продукты
openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1

Ссылки

Описание

A type confusion vulnerability exists in Spidermonkey, which results in a non-exploitable crash. This vulnerability affects Firefox < 69 and Firefox ESR < 68.1.


Затронутые продукты
openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1

Ссылки

Описание

Logging-related command line parameters are not properly sanitized when Firefox is launched by another program, such as when a user clicks on malicious links in a chat application. This can be used to write a log file to an arbitrary location such as the Windows 'Startup' folder. <br>*Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox < 69 and Firefox ESR < 68.1.


Затронутые продукты
openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1

Ссылки

Описание

It is possible to delete an IndexedDB key value and subsequently try to extract it during conversion. This results in a use-after-free and a potentially exploitable crash. This vulnerability affects Firefox < 69, Thunderbird < 68.1, Thunderbird < 60.9, Firefox ESR < 60.9, and Firefox ESR < 68.1.


Затронутые продукты
openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1

Ссылки

Описание

The Firefox installer allows Firefox to be installed to a custom user writable location, leaving it unprotected from manipulation by unprivileged users or malware. If the Mozilla Maintenance Service is manipulated to update this unprotected location and the updated maintenance service in the unprotected location has been altered, the altered maintenance service can run with elevated privileges during the update process due to a lack of integrity checks. This allows for privilege escalation if the executable has been replaced locally. <br>*Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.*. This vulnerability affects Firefox < 69, Firefox ESR < 60.9, and Firefox ESR < 68.1.


Затронутые продукты
openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1

Ссылки

Описание

As part of a winning Pwn2Own entry, a researcher demonstrated a sandbox escape by installing a malicious language pack and then opening a browser feature that used the compromised translation. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.


Затронутые продукты
openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1

Ссылки

Описание

Given a compromised sandboxed content process due to a separate vulnerability, it is possible to escape that sandbox by loading accounts.firefox.com in that process and forcing a log-in to a malicious Firefox Sync account. Preference settings that disable the sandbox are then synchronized to the local machine and the compromised browser would restart without the sandbox if a crash is triggered. This vulnerability affects Firefox ESR < 60.9, Firefox ESR < 68.1, and Firefox < 69.


Затронутые продукты
openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1
openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1

Ссылки
Уязвимость openSUSE-SU-2019:2251-1