SUSE Security Update: Security update for MozillaFirefox
______________________________________________________________________________

Announcement ID:    SUSE-SU-2020:14359-1
Rating:             important
References:         #1162828 #1171186 
Cross-References:   CVE-2020-12387 CVE-2020-12388 CVE-2020-12389
                    CVE-2020-12392 CVE-2020-12393 CVE-2020-12395
                    CVE-2020-6831
Affected Products:
                    SUSE Linux Enterprise Server 11-SP4-LTSS
______________________________________________________________________________

   An update that fixes 7 vulnerabilities is now available.

Description:

   This update for MozillaFirefox fixes the following issues:


   - Firefox Extended Support Release 68.8.0 ESR MFSA 2020-17 (bsc#1171186)
     * CVE-2020-12387 (bmo#1545345) Use-after-free during worker shutdown
     * CVE-2020-12388 (bmo#1618911) Sandbox escape with improperly guarded
       Access Tokens
     * CVE-2020-12389 (bmo#1554110) Sandbox escape with improperly separated
       process types
     * CVE-2020-6831 (bmo#1632241) Buffer overflow in SCTP chunk input
       validation
     * CVE-2020-12392 (bmo#1614468) Arbitrary local file access with 'Copy as
       cURL'
     * CVE-2020-12393 (bmo#1615471) Devtools' 'Copy as cURL' feature did not
       fully escape website-controlled data, potentially leading to command
       injection
     * CVE-2020-12395 (bmo#1595886, bmo#1611482, bmo#1614704, bmo#1624098,
       bmo#1625749, bmo#1626382, bmo#1628076, bmo#1631508) Memory safety bugs
       fixed in Firefox 76 and Firefox ESR 68.8

   - Since firefox-gcc8 now has disabled autoreqprov for firefox-libstdc++6
     and firefox-libgcc_s1, those packages don't provide some capabilities,
     we have to disable AutoReqProv in MozillaFirefox too so they're not
     added as automatic requirements. (bsc#1162828)


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 11-SP4-LTSS:

      zypper in -t patch slessp4-MozillaFirefox-14359=1



Package List:

   - SUSE Linux Enterprise Server 11-SP4-LTSS (x86_64):

      MozillaFirefox-68.8.0-78.73.1
      MozillaFirefox-debuginfo-68.8.0-78.73.1
      MozillaFirefox-translations-common-68.8.0-78.73.1
      MozillaFirefox-translations-other-68.8.0-78.73.1


References:

   https://www.suse.com/security/cve/CVE-2020-12387.html
   https://www.suse.com/security/cve/CVE-2020-12388.html
   https://www.suse.com/security/cve/CVE-2020-12389.html
   https://www.suse.com/security/cve/CVE-2020-12392.html
   https://www.suse.com/security/cve/CVE-2020-12393.html
   https://www.suse.com/security/cve/CVE-2020-12395.html
   https://www.suse.com/security/cve/CVE-2020-6831.html
   https://bugzilla.suse.com/1162828
   https://bugzilla.suse.com/1171186

_______________________________________________
sle-security-updates mailing list
sle-security-updates@lists.suse.com
http://lists.suse.com/mailman/listinfo/sle-security-updates

SUSE: 2020:14359-1 important: MozillaFirefox

May 11, 2020
An update that fixes 7 vulnerabilities is now available

Summary

This update for MozillaFirefox fixes the following issues: - Firefox Extended Support Release 68.8.0 ESR MFSA 2020-17 (bsc#1171186) * CVE-2020-12387 (bmo#1545345) Use-after-free during worker shutdown * CVE-2020-12388 (bmo#1618911) Sandbox escape with improperly guarded Access Tokens * CVE-2020-12389 (bmo#1554110) Sandbox escape with improperly separated process types * CVE-2020-6831 (bmo#1632241) Buffer overflow in SCTP chunk input validation * CVE-2020-12392 (bmo#1614468) Arbitrary local file access with 'Copy as cURL' * CVE-2020-12393 (bmo#1615471) Devtools' 'Copy as cURL' feature did not fully escape website-controlled data, potentially leading to command injection * CVE-2020-12395 (bmo#1595886, bmo#1611482, bmo#1614704, bmo#1624098, bmo#1625749, bmo#1626382, bmo#1628076, bmo#1631508) Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8 - Since firefox-gcc8 now has disabled autoreqprov for firefox-libstdc++6 and firefox-libgcc_s1, those packages don't provide some capabilities, we have to disable AutoReqProv in MozillaFirefox too so they're not added as automatic requirements. (bsc#1162828) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11-SP4-LTSS: zypper in -t patch slessp4-MozillaFirefox-14359=1 Package List: - SUSE Linux Enterprise Server 11-SP4-LTSS (x86_64): MozillaFirefox-68.8.0-78.73.1 MozillaFirefox-debuginfo-68.8.0-78.73.1 MozillaFirefox-translations-common-68.8.0-78.73.1 MozillaFirefox-translations-other-68.8.0-78.73.1

References

#1162828 #1171186

Cross- CVE-2020-12387 CVE-2020-12388 CVE-2020-12389

CVE-2020-12392 CVE-2020-12393 CVE-2020-12395

CVE-2020-6831

Affected Products:

SUSE Linux Enterprise Server 11-SP4-LTSS

https://www.suse.com/security/cve/CVE-2020-12387.html

https://www.suse.com/security/cve/CVE-2020-12388.html

https://www.suse.com/security/cve/CVE-2020-12389.html

https://www.suse.com/security/cve/CVE-2020-12392.html

https://www.suse.com/security/cve/CVE-2020-12393.html

https://www.suse.com/security/cve/CVE-2020-12395.html

https://www.suse.com/security/cve/CVE-2020-6831.html

https://bugzilla.suse.com/1162828

https://bugzilla.suse.com/1171186

Severity
Announcement ID: SUSE-SU-2020:14359-1
Rating: important

Related News