Security update for MozillaFirefox

SUSE Security Update: Security update for MozillaFirefox
Announcement ID: SUSE-SU-2018:2890-1
Rating: important
References: #1107343
Cross-References:CVE-2017-16541 CVE-2018-12376 CVE-2018-12377 CVE-2018-12378 CVE-2018-12379 CVE-2018-12381
Affected Products:
  • SUSE Linux Enterprise Module for Desktop Applications 15

An update that fixes 6 vulnerabilities is now available.

Description:

This update for MozillaFirefox to ESR 60.2 fixes several issues.
These general changes are part of the version 60 release.

  • New browser engine with speed improvements
  • Redesigned graphical user interface elements
  • Unified address and search bar for new installations
  • New tab page listing top visited, recently visited and recommended pages
  • Support for configuration policies in enterprise deployments via JSON files
  • Support for Web Authentication, allowing the use of USB tokens for authentication to web sites

The following changes affect compatibility:
  • Now exclusively supports extensions built using the WebExtension API.
  • Unsupported legacy extensions will no longer work in Firefox 60 ESR
  • TLS certificates issued by Symantec before June 1st, 2016 are no longer trusted The "security.pki.distrust_ca_policy" preference can be set to 0 to reinstate trust in those certificates

The following issues affect performance:
  • new format for storing private keys, certificates and certificate trust If the user home or data directory is on a network file system, it is recommended that users set the following environment variable to avoid slowdowns: NSS_SDB_USE_CACHE=yes This setting is not recommended for local, fast file systems.

These security issues were fixed:
  • CVE-2018-12381: Dragging and dropping Outlook email message results in page navigation (bsc#1107343).
  • CVE-2017-16541: Proxy bypass using automount and autofs (bsc#1107343).
  • CVE-2018-12376: Various memory safety bugs (bsc#1107343).
  • CVE-2018-12377: Use-after-free in refresh driver timers (bsc#1107343).
  • CVE-2018-12378: Use-after-free in IndexedDB (bsc#1107343).
  • CVE-2018-12379: Out-of-bounds write with malicious MAR file (bsc#1107343).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Linux Enterprise Module for Desktop Applications 15:
    zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-2018-2053=1

Package List:

  • SUSE Linux Enterprise Module for Desktop Applications 15 (aarch64 ppc64le x86_64):
    • MozillaFirefox-60.2.0-3.10.1
    • MozillaFirefox-branding-SLE-60-4.3.1
    • MozillaFirefox-debuginfo-60.2.0-3.10.1
    • MozillaFirefox-debugsource-60.2.0-3.10.1
    • MozillaFirefox-devel-60.2.0-3.10.1
    • MozillaFirefox-translations-common-60.2.0-3.10.1
    • MozillaFirefox-translations-other-60.2.0-3.10.1

References: