SUSE: 2020:14502-1 important: MozillaFirefox
Summary
This update for MozillaFirefox fixes the following issues: - Firefox was updated to 78.3.0 ESR (bsc#1176756, MFSA 2020-43) - CVE-2020-15677: Download origin spoofing via redirect - CVE-2020-15676: Fixed an XSS when pasting attacker-controlled data into a contenteditable element - CVE-2020-15678: When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free scenario - CVE-2020-15673: Fixed memory safety bugs - Attempt to fix langpack-parallelization by introducing separate obj-dirs for each lang (bsc#1173986, bsc#1167976) - Fixed problems with compiler builtins on SLE-11 (bsc#1175046) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11-SP4-LTSS: zypper in -t patch slessp4-MozillaFirefox-14502=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-MozillaFirefox-14502=1 Package List: - SUSE Linux Enterprise Server 11-SP4-LTSS (x86_64): MozillaFirefox-78.3.0-78.93.1 MozillaFirefox-translations-common-78.3.0-78.93.1 MozillaFirefox-translations-other-78.3.0-78.93.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (x86_64): MozillaFirefox-debuginfo-78.3.0-78.93.1
References
#1167976 #1173986 #1175046 #1176756
Cross- CVE-2020-15673 CVE-2020-15676 CVE-2020-15677
CVE-2020-15678
Affected Products:
SUSE Linux Enterprise Server 11-SP4-LTSS
SUSE Linux Enterprise Debuginfo 11-SP4
https://www.suse.com/security/cve/CVE-2020-15673.html
https://www.suse.com/security/cve/CVE-2020-15676.html
https://www.suse.com/security/cve/CVE-2020-15677.html
https://www.suse.com/security/cve/CVE-2020-15678.html
https://bugzilla.suse.com/1167976
https://bugzilla.suse.com/1173986
https://bugzilla.suse.com/1175046
https://bugzilla.suse.com/1176756