openSUSE: 2019:1534-1: important: MozillaFirefox

    Date10 Jun 2019
    CategoryopenSUSE
    261
    Posted ByLinuxSecurity Advisories
    An update that fixes 17 vulnerabilities is now available.
       openSUSE Security Update: Security update for MozillaFirefox
    ______________________________________________________________________________
    
    Announcement ID:    openSUSE-SU-2019:1534-1
    Rating:             important
    References:         #1135824 
    Cross-References:   CVE-2018-18511 CVE-2019-11691 CVE-2019-11692
                        CVE-2019-11693 CVE-2019-11694 CVE-2019-11698
                        CVE-2019-5798 CVE-2019-7317 CVE-2019-9797
                        CVE-2019-9800 CVE-2019-9815 CVE-2019-9816
                        CVE-2019-9817 CVE-2019-9818 CVE-2019-9819
                        CVE-2019-9820 CVE-2019-9821
    Affected Products:
                        openSUSE Leap 42.3
                        openSUSE Leap 15.0
    ______________________________________________________________________________
    
       An update that fixes 17 vulnerabilities is now available.
    
    Description:
    
       This update for MozillaFirefox fixes the following issues:
    
       MozillaFirefox was updated to 60.7.0esr (boo#1135824 MFSA 2019-14):
    
       * CVE-2018-18511: Cross-origin theft of images with
         ImageBitmapRenderingContext
       * CVE-2019-11691: Use-after-free in XMLHttpRequest
       * CVE-2019-11692: Use-after-free removing listeners in the event listener
         manager
       * CVE-2019-11693: Buffer overflow in WebGL bufferdata on Linux
       * CVE-2019-11694: (Windows only) Uninitialized memory memory leakage in
         Windows sandbox
       * CVE-2019-11698: Theft of user history data through drag and drop of
         hyperlinks to and from bookmarks
       * CVE-2019-5798: Out-of-bounds read in Skia
       * CVE-2019-7317: Use-after-free in png_image_free of libpng library
       * CVE-2019-9797: Cross-origin theft of images with createImageBitmap
       * CVE-2019-9800: Memory safety bugs fixed in Firefox 67 and Firefox ESR
         60.7
       * CVE-2019-9815: Disable hyperthreading on content JavaScript threads on
         macOS
       * CVE-2019-9816: Type confusion with object groups and UnboxedObjects
       * CVE-2019-9817: Stealing of cross-domain images using canvas
       * CVE-2019-9818: (Windows only) Use-after-free in crash generation server
       * CVE-2019-9819: Compartment mismatch with fetch API
       * CVE-2019-9820: Use-after-free of ChromeEventHandler by DocShell
       * CVE-2019-9821: Use-after-free in AssertWorkerThread
    
    
    Patch Instructions:
    
       To install this openSUSE Security Update use the SUSE recommended installation methods
       like YaST online_update or "zypper patch".
    
       Alternatively you can run the command listed for your product:
    
       - openSUSE Leap 42.3:
    
          zypper in -t patch openSUSE-2019-1534=1
    
       - openSUSE Leap 15.0:
    
          zypper in -t patch openSUSE-2019-1534=1
    
    
    
    Package List:
    
       - openSUSE Leap 42.3 (x86_64):
    
          MozillaFirefox-60.7.0-145.2
          MozillaFirefox-branding-upstream-60.7.0-145.2
          MozillaFirefox-buildsymbols-60.7.0-145.2
          MozillaFirefox-debuginfo-60.7.0-145.2
          MozillaFirefox-debugsource-60.7.0-145.2
          MozillaFirefox-devel-60.7.0-145.2
          MozillaFirefox-translations-common-60.7.0-145.2
          MozillaFirefox-translations-other-60.7.0-145.2
    
       - openSUSE Leap 15.0 (x86_64):
    
          MozillaFirefox-60.7.0-lp150.3.54.5
          MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5
          MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5
          MozillaFirefox-debuginfo-60.7.0-lp150.3.54.5
          MozillaFirefox-debugsource-60.7.0-lp150.3.54.5
          MozillaFirefox-devel-60.7.0-lp150.3.54.5
          MozillaFirefox-translations-common-60.7.0-lp150.3.54.5
          MozillaFirefox-translations-other-60.7.0-lp150.3.54.5
    
    
    References:
    
       https://www.suse.com/security/cve/CVE-2018-18511.html
       https://www.suse.com/security/cve/CVE-2019-11691.html
       https://www.suse.com/security/cve/CVE-2019-11692.html
       https://www.suse.com/security/cve/CVE-2019-11693.html
       https://www.suse.com/security/cve/CVE-2019-11694.html
       https://www.suse.com/security/cve/CVE-2019-11698.html
       https://www.suse.com/security/cve/CVE-2019-5798.html
       https://www.suse.com/security/cve/CVE-2019-7317.html
       https://www.suse.com/security/cve/CVE-2019-9797.html
       https://www.suse.com/security/cve/CVE-2019-9800.html
       https://www.suse.com/security/cve/CVE-2019-9815.html
       https://www.suse.com/security/cve/CVE-2019-9816.html
       https://www.suse.com/security/cve/CVE-2019-9817.html
       https://www.suse.com/security/cve/CVE-2019-9818.html
       https://www.suse.com/security/cve/CVE-2019-9819.html
       https://www.suse.com/security/cve/CVE-2019-9820.html
       https://www.suse.com/security/cve/CVE-2019-9821.html
       https://bugzilla.suse.com/1135824
    
    -- 
    

    LinuxSecurity Poll

    Have you used our RSS feeds?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 4 answer(s).
    /component/communitypolls/?task=poll.vote&format=json
    21
    radio
    [{"id":"77","title":"Yes, for articles","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"78","title":"Yes, for advisories","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"79","title":"Hybrid that contains both","votes":"0","type":"x","order":"3","pct":0,"resources":[]},{"id":"80","title":"No","votes":"0","type":"x","order":"4","pct":0,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.