openSUSE: 2019:1534-1: important: MozillaFirefox

    Date10 Jun 2019
    CategoryopenSUSE
    382
    Posted ByLinuxSecurity Advisories
    An update that fixes 17 vulnerabilities is now available.
       openSUSE Security Update: Security update for MozillaFirefox
    ______________________________________________________________________________
    
    Announcement ID:    openSUSE-SU-2019:1534-1
    Rating:             important
    References:         #1135824 
    Cross-References:   CVE-2018-18511 CVE-2019-11691 CVE-2019-11692
                        CVE-2019-11693 CVE-2019-11694 CVE-2019-11698
                        CVE-2019-5798 CVE-2019-7317 CVE-2019-9797
                        CVE-2019-9800 CVE-2019-9815 CVE-2019-9816
                        CVE-2019-9817 CVE-2019-9818 CVE-2019-9819
                        CVE-2019-9820 CVE-2019-9821
    Affected Products:
                        openSUSE Leap 42.3
                        openSUSE Leap 15.0
    ______________________________________________________________________________
    
       An update that fixes 17 vulnerabilities is now available.
    
    Description:
    
       This update for MozillaFirefox fixes the following issues:
    
       MozillaFirefox was updated to 60.7.0esr (boo#1135824 MFSA 2019-14):
    
       * CVE-2018-18511: Cross-origin theft of images with
         ImageBitmapRenderingContext
       * CVE-2019-11691: Use-after-free in XMLHttpRequest
       * CVE-2019-11692: Use-after-free removing listeners in the event listener
         manager
       * CVE-2019-11693: Buffer overflow in WebGL bufferdata on Linux
       * CVE-2019-11694: (Windows only) Uninitialized memory memory leakage in
         Windows sandbox
       * CVE-2019-11698: Theft of user history data through drag and drop of
         hyperlinks to and from bookmarks
       * CVE-2019-5798: Out-of-bounds read in Skia
       * CVE-2019-7317: Use-after-free in png_image_free of libpng library
       * CVE-2019-9797: Cross-origin theft of images with createImageBitmap
       * CVE-2019-9800: Memory safety bugs fixed in Firefox 67 and Firefox ESR
         60.7
       * CVE-2019-9815: Disable hyperthreading on content JavaScript threads on
         macOS
       * CVE-2019-9816: Type confusion with object groups and UnboxedObjects
       * CVE-2019-9817: Stealing of cross-domain images using canvas
       * CVE-2019-9818: (Windows only) Use-after-free in crash generation server
       * CVE-2019-9819: Compartment mismatch with fetch API
       * CVE-2019-9820: Use-after-free of ChromeEventHandler by DocShell
       * CVE-2019-9821: Use-after-free in AssertWorkerThread
    
    
    Patch Instructions:
    
       To install this openSUSE Security Update use the SUSE recommended installation methods
       like YaST online_update or "zypper patch".
    
       Alternatively you can run the command listed for your product:
    
       - openSUSE Leap 42.3:
    
          zypper in -t patch openSUSE-2019-1534=1
    
       - openSUSE Leap 15.0:
    
          zypper in -t patch openSUSE-2019-1534=1
    
    
    
    Package List:
    
       - openSUSE Leap 42.3 (x86_64):
    
          MozillaFirefox-60.7.0-145.2
          MozillaFirefox-branding-upstream-60.7.0-145.2
          MozillaFirefox-buildsymbols-60.7.0-145.2
          MozillaFirefox-debuginfo-60.7.0-145.2
          MozillaFirefox-debugsource-60.7.0-145.2
          MozillaFirefox-devel-60.7.0-145.2
          MozillaFirefox-translations-common-60.7.0-145.2
          MozillaFirefox-translations-other-60.7.0-145.2
    
       - openSUSE Leap 15.0 (x86_64):
    
          MozillaFirefox-60.7.0-lp150.3.54.5
          MozillaFirefox-branding-upstream-60.7.0-lp150.3.54.5
          MozillaFirefox-buildsymbols-60.7.0-lp150.3.54.5
          MozillaFirefox-debuginfo-60.7.0-lp150.3.54.5
          MozillaFirefox-debugsource-60.7.0-lp150.3.54.5
          MozillaFirefox-devel-60.7.0-lp150.3.54.5
          MozillaFirefox-translations-common-60.7.0-lp150.3.54.5
          MozillaFirefox-translations-other-60.7.0-lp150.3.54.5
    
    
    References:
    
       https://www.suse.com/security/cve/CVE-2018-18511.html
       https://www.suse.com/security/cve/CVE-2019-11691.html
       https://www.suse.com/security/cve/CVE-2019-11692.html
       https://www.suse.com/security/cve/CVE-2019-11693.html
       https://www.suse.com/security/cve/CVE-2019-11694.html
       https://www.suse.com/security/cve/CVE-2019-11698.html
       https://www.suse.com/security/cve/CVE-2019-5798.html
       https://www.suse.com/security/cve/CVE-2019-7317.html
       https://www.suse.com/security/cve/CVE-2019-9797.html
       https://www.suse.com/security/cve/CVE-2019-9800.html
       https://www.suse.com/security/cve/CVE-2019-9815.html
       https://www.suse.com/security/cve/CVE-2019-9816.html
       https://www.suse.com/security/cve/CVE-2019-9817.html
       https://www.suse.com/security/cve/CVE-2019-9818.html
       https://www.suse.com/security/cve/CVE-2019-9819.html
       https://www.suse.com/security/cve/CVE-2019-9820.html
       https://www.suse.com/security/cve/CVE-2019-9821.html
       https://bugzilla.suse.com/1135824
    
    -- 
    

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"15","type":"x","order":"1","pct":53.57,"resources":[]},{"id":"88","title":"Should be more technical","votes":"4","type":"x","order":"2","pct":14.29,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"9","type":"x","order":"3","pct":32.14,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.