Mageia 2019-0376: firefox security update

    Date08 Dec 2019
    CategoryMageia
    160
    Posted ByLinuxSecurity Advisories
    Updated firefox packages fix security vulnerabilities: Stack corruption due to incorrect number of arguments in WebRTC code. (CVE-2019-13722)
    MGASA-2019-0376 - Updated firefox packages fix security vulnerabilities
    
    Publication date: 08 Dec 2019
    URL: https://advisories.mageia.org/MGASA-2019-0376.html
    Type: security
    Affected Mageia releases: 7
    CVE: CVE-2019-13722,
         CVE-2019-17005,
         CVE-2019-17008,
         CVE-2019-17009,
         CVE-2019-17010,
         CVE-2019-17011,
         CVE-2019-17012
    
    Updated firefox packages fix security vulnerabilities:
    
    Stack corruption due to incorrect number of arguments in WebRTC code.
    (CVE-2019-13722)
    
    Buffer overflow in plain text serializer. (CVE-2019-17005)
    
    Use-after-free in worker destruction. (CVE-2019-17008)
    
    Updater temporary files accessible to unprivileged processes. 
    (CVE-2019-17009)
    
    Use-after-free when performing device orientation checks.
    (CVE-2019-17010)
    
    Use-after-free when retrieving a document in antitracking.
    (CVE-2019-17011)
    
    Memory safety bugs fixed in Firefox 71 and Firefox ESR 68.3.
    (CVE-2019-17012)
    
    References:
    - https://bugs.mageia.org/show_bug.cgi?id=25820
    - https://www.mozilla.org/en-US/firefox/68.3.0/releasenotes/
    - https://www.mozilla.org/en-US/security/advisories/mfsa2019-37/
    - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13722
    - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005
    - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008
    - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17009
    - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010
    - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011
    - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012
    
    SRPMS:
    - 7/core/firefox-68.3.0-1.mga7
    - 7/core/firefox-l10n-68.3.0-1.mga7
    - 7/core/nspr-4.24-1.mga7
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"81","type":"x","order":"1","pct":56.25,"resources":[]},{"id":"88","title":"Should be more technical","votes":"21","type":"x","order":"2","pct":14.58,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"42","type":"x","order":"3","pct":29.17,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.