Security update for MozillaFirefox
Announcement ID: | SUSE-SU-2019:0871-1 |
Rating: | important |
References: | #1125330 #1127987 #1129821 #1130262 |
Cross-References: | CVE-2018-18335 CVE-2018-18356 CVE-2018-18506 CVE-2019-5785 CVE-2019-9788 CVE-2019-9790 CVE-2019-9791 CVE-2019-9792 CVE-2019-9793 CVE-2019-9794 CVE-2019-9795 CVE-2019-9796 CVE-2019-9801 CVE-2019-9810 CVE-2019-9813 |
Affected Products: |
|
An update that fixes 15 vulnerabilities is now available.
Description:
This update for MozillaFirefox to version ESR 60.6.1 fixes the following
issues:
Security issuess addressed:
- update to Firefox ESR 60.6.1 (bsc#1130262):
- CVE-2019-9813: Fixed Ionmonkey type confusion with __proto__ mutations
- CVE-2019-9810: Fixed IonMonkey MArraySlice incorrect alias information
- Update to Firefox ESR 60.6 (bsc#1129821):
- CVE-2018-18506: Fixed an issue with Proxy Auto-Configuration file
- CVE-2019-9801: Fixed an issue which could allow Windows programs to be exposed to web content
- CVE-2019-9788: Fixed multiple memory safety bugs
- CVE-2019-9790: Fixed a Use-after-free vulnerability when removing in-use DOM elements
- CVE-2019-9791: Fixed an incorrect Type inference for constructors entered through on-stack replacement with IonMonkey
- CVE-2019-9792: Fixed an issue where IonMonkey leaks JS_OPTIMIZED_OUT magic value to script
- CVE-2019-9793: Fixed multiple improper bounds checks when Spectre mitigations are disabled
- CVE-2019-9794: Fixed an issue where command line arguments not discarded during execution
- CVE-2019-9795: Fixed a Type-confusion vulnerability in IonMonkey JIT compiler
- CVE-2019-9796: Fixed a Use-after-free vulnerability in SMIL animation controller
- Update to Firefox ESR 60.5.1 (bsc#1125330):
- CVE-2018-18356: Fixed a use-after-free vulnerability in the Skia library which can occur when creating a path, leading to a potentially exploitable crash.
- CVE-2019-5785: Fixed an integer overflow vulnerability in the Skia library which can occur after specific transform operations, leading to a potentially exploitable crash.
- CVE-2018-18335: Fixed a buffer overflow vulnerability in the Skia library which can occur with Canvas 2D acceleration on macOS. This issue was addressed by disabling Canvas 2D acceleration in Firefox ESR. Note: this does not affect other versions and platforms where Canvas 2D acceleration is already disabled by default.
Other issue addressed:
- Fixed an issue with MozillaFirefox-translations-common which was causing error on update (bsc#1127987).
Release notes: https://www.mozilla.org/en-US/security/advisories/mfsa2019-12/ Release notes: https://www.mozilla.org/en-US/security/advisories/mfsa2019-08/ Release notes: https://www.mozilla.org/en-US/security/advisories/mfsa2019-05/
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Module for Open Buildservice Development Tools 15:
zypper in -t patch SUSE-SLE-Module-Development-Tools-OBS-15-2019-871=1
- SUSE Linux Enterprise Module for Desktop Applications 15:
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-2019-871=1
Package List:
- SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 (aarch64 ppc64le s390x x86_64):
- MozillaFirefox-branding-upstream-60.6.1-3.29.3
- MozillaFirefox-debuginfo-60.6.1-3.29.3
- MozillaFirefox-debugsource-60.6.1-3.29.3
- SUSE Linux Enterprise Module for Desktop Applications 15 (aarch64 ppc64le s390x x86_64):
- MozillaFirefox-60.6.1-3.29.3
- MozillaFirefox-debuginfo-60.6.1-3.29.3
- MozillaFirefox-debugsource-60.6.1-3.29.3
- MozillaFirefox-devel-60.6.1-3.29.3
- MozillaFirefox-translations-common-60.6.1-3.29.3
- MozillaFirefox-translations-other-60.6.1-3.29.3
References:
- https://www.suse.com/security/cve/CVE-2018-18335.html
- https://www.suse.com/security/cve/CVE-2018-18356.html
- https://www.suse.com/security/cve/CVE-2018-18506.html
- https://www.suse.com/security/cve/CVE-2019-5785.html
- https://www.suse.com/security/cve/CVE-2019-9788.html
- https://www.suse.com/security/cve/CVE-2019-9790.html
- https://www.suse.com/security/cve/CVE-2019-9791.html
- https://www.suse.com/security/cve/CVE-2019-9792.html
- https://www.suse.com/security/cve/CVE-2019-9793.html
- https://www.suse.com/security/cve/CVE-2019-9794.html
- https://www.suse.com/security/cve/CVE-2019-9795.html
- https://www.suse.com/security/cve/CVE-2019-9796.html
- https://www.suse.com/security/cve/CVE-2019-9801.html
- https://www.suse.com/security/cve/CVE-2019-9810.html
- https://www.suse.com/security/cve/CVE-2019-9813.html
- https://bugzilla.suse.com/1125330
- https://bugzilla.suse.com/1127987
- https://bugzilla.suse.com/1129821
- https://bugzilla.suse.com/1130262