RedHat: RHSA-2019-0219:01 Critical: firefox security update

    Date30 Jan 2019
    CategoryRed Hat
    1935
    Posted ByAnthony Pell
    An update for firefox is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA256
    
    =====================================================================
                       Red Hat Security Advisory
    
    Synopsis:          Critical: firefox security update
    Advisory ID:       RHSA-2019:0219-01
    Product:           Red Hat Enterprise Linux
    Advisory URL:      https://access.redhat.com/errata/RHSA-2019:0219
    Issue date:        2019-01-30
    CVE Names:         CVE-2018-18500 CVE-2018-18501 CVE-2018-18505 
    =====================================================================
    
    1. Summary:
    
    An update for firefox is now available for Red Hat Enterprise Linux 7.
    
    Red Hat Product Security has rated this update as having a security impact
    of Critical. A Common Vulnerability Scoring System (CVSS) base score, which
    gives a detailed severity rating, is available for each vulnerability from
    the CVE link(s) in the References section.
    
    2. Relevant releases/architectures:
    
    Red Hat Enterprise Linux Client (v. 7) - x86_64
    Red Hat Enterprise Linux Client Optional (v. 7) - x86_64
    Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64
    Red Hat Enterprise Linux Server Optional (v. 7) - x86_64
    Red Hat Enterprise Linux Workstation (v. 7) - x86_64
    Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
    Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - aarch64, ppc64le, s390x
    
    3. Description:
    
    Mozilla Firefox is an open-source web browser, designed for standards
    compliance, performance, and portability.
    
    This update upgrades Firefox to version 60.5.0 ESR.
    
    Security Fix(es):
    
    * Mozilla: Use-after-free parsing HTML5 stream (CVE-2018-18500)
    
    * Mozilla: Memory safety bugs fixed in Firefox 65 and Firefox ESR 60.5
    (CVE-2018-18501)
    
    * Mozilla: Privilege escalation through IPC channel messages
    (CVE-2018-18505)
    
    For more details about the security issue(s), including the impact, a CVSS
    score, and other related information, refer to the CVE page(s) listed in
    the References section.
    
    Red Hat would like to thank the Mozilla project for reporting these issues.
    Upstream acknowledges Yaniv Frank (SophosLabs), Alex Gaynor, Christoph
    Diehl, Steven Crane, Jason Kratzer, Gary Kwong, Christian Holler, and Jed
    Davis as the original reporters.
    
    4. Solution:
    
    For details on how to apply this update, which includes the changes
    described in this advisory, refer to:
    
    https://access.redhat.com/articles/11258
    
    After installing the update, Firefox must be restarted for the changes to
    take effect.
    
    5. Bugs fixed (https://bugzilla.redhat.com/):
    
    1670631 - CVE-2018-18500 Mozilla: Use-after-free parsing HTML5 stream
    1670632 - CVE-2018-18501 Mozilla: Memory safety bugs fixed in Firefox 65 and Firefox ESR 60.5
    1670633 - CVE-2018-18505 Mozilla: Privilege escalation through IPC channel messages
    
    6. Package List:
    
    Red Hat Enterprise Linux Client (v. 7):
    
    Source:
    firefox-60.5.0-2.el7.src.rpm
    
    x86_64:
    firefox-60.5.0-2.el7.x86_64.rpm
    firefox-debuginfo-60.5.0-2.el7.x86_64.rpm
    
    Red Hat Enterprise Linux Client Optional (v. 7):
    
    x86_64:
    firefox-60.5.0-2.el7.i686.rpm
    firefox-debuginfo-60.5.0-2.el7.i686.rpm
    
    Red Hat Enterprise Linux Server (v. 7):
    
    Source:
    firefox-60.5.0-2.el7.src.rpm
    
    ppc64:
    firefox-60.5.0-2.el7.ppc64.rpm
    firefox-debuginfo-60.5.0-2.el7.ppc64.rpm
    
    ppc64le:
    firefox-60.5.0-2.el7.ppc64le.rpm
    firefox-debuginfo-60.5.0-2.el7.ppc64le.rpm
    
    s390x:
    firefox-60.5.0-2.el7.s390x.rpm
    firefox-debuginfo-60.5.0-2.el7.s390x.rpm
    
    x86_64:
    firefox-60.5.0-2.el7.x86_64.rpm
    firefox-debuginfo-60.5.0-2.el7.x86_64.rpm
    
    Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7):
    
    Source:
    firefox-60.5.0-2.el7.src.rpm
    
    aarch64:
    firefox-60.5.0-2.el7.aarch64.rpm
    firefox-debuginfo-60.5.0-2.el7.aarch64.rpm
    
    ppc64le:
    firefox-60.5.0-2.el7.ppc64le.rpm
    firefox-debuginfo-60.5.0-2.el7.ppc64le.rpm
    
    s390x:
    firefox-60.5.0-2.el7.s390x.rpm
    firefox-debuginfo-60.5.0-2.el7.s390x.rpm
    
    Red Hat Enterprise Linux Server Optional (v. 7):
    
    x86_64:
    firefox-60.5.0-2.el7.i686.rpm
    firefox-debuginfo-60.5.0-2.el7.i686.rpm
    
    Red Hat Enterprise Linux Workstation (v. 7):
    
    Source:
    firefox-60.5.0-2.el7.src.rpm
    
    x86_64:
    firefox-60.5.0-2.el7.x86_64.rpm
    firefox-debuginfo-60.5.0-2.el7.x86_64.rpm
    
    Red Hat Enterprise Linux Workstation Optional (v. 7):
    
    x86_64:
    firefox-60.5.0-2.el7.i686.rpm
    firefox-debuginfo-60.5.0-2.el7.i686.rpm
    
    These packages are GPG signed by Red Hat for security.  Our key and
    details on how to verify the signature are available from
    https://access.redhat.com/security/team/key/
    
    7. References:
    
    https://access.redhat.com/security/cve/CVE-2018-18500
    https://access.redhat.com/security/cve/CVE-2018-18501
    https://access.redhat.com/security/cve/CVE-2018-18505
    https://access.redhat.com/security/updates/classification/#critical
    
    8. Contact:
    
    The Red Hat security contact is . More contact
    details at https://access.redhat.com/security/team/contact/
    
    Copyright 2019 Red Hat, Inc.
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1
    
    iQIVAwUBXFHldtzjgjWX9erEAQgWzA//WDcd8wxgenVrw9L4jU1sMPhphQPvFwsE
    luDSUr4T2rVhz5hVqG/zKQSHxRN91hqi1j7/i8wqYvU40C5LaOCdktd2gyojN9VV
    iWFBnwKIhw15ne1x6jbolEZOFbfbO10VFgVCsoAY4rV7uQEIMrqsR2DtemGROXu6
    0hkJsYpDD9QBnCiiYqFde7mNd9GOj1a+lUbomSzyJankjE7secNBptzYH5hdl2df
    GvN+hKXKUrMUn+aRquaBs1hoO86rqCl9G1DGL0JoRmhCH8f0UhyzGMfvggVNeODF
    F3NKuwPHl4pVkKl1EfcdCZgzyko+1oQMnUUxEK+ZSE0oRRwBHUVIyZ8mgbrQNO4W
    U7sKw1q36MHfbHno701mS5phEDwFhPJc5Bg9xoF9cRvMffSiIKnb1hX6geeklQX1
    UWtqKYGn1UBe6WoI26Gk2F32dE1SNbcN6oRNJ/wjDd94Z1yvQjmMQRd3EFTh6hZh
    kX/+2nKLmg+RdjEjfwEWwV6tERTqD0Buol0IG//ICrW9G2mTn0DcWeKf1ttWS7Db
    BXhq4dRkgBVE6F606DiUSf5vfOTIUkIZWsHidc4j/IHxNPyOklf/K7YTrHST+yLW
    uVKTqermIS0bPbr/7A7Un2RzKx+nsblpTAjAEOoTFUVp3+nvrxBPkHE24Jnu4JC6
    u2hyVcX16kk=
    =Cq/B
    -----END PGP SIGNATURE-----
    
    --
    RHSA-announce mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.redhat.com/mailman/listinfo/rhsa-announce
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"22","type":"x","order":"1","pct":55,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":12.5,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"13","type":"x","order":"3","pct":32.5,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.