SUSE: 2020:2747-1 important: MozillaFirefox
Summary
This update for MozillaFirefox fixes the following issues: -Firefox was updated to 78.3.0 ESR (bsc#1176756, MFSA 2020-43) - CVE-2020-15677: Download origin spoofing via redirect - CVE-2020-15676: Fixed an XSS when pasting attacker-controlled data into a contenteditable element - CVE-2020-15678: When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free scenario - CVE-2020-15673: Fixed memory safety bugs - Enhance fix for wayland-detection (bsc#1174420) - Attempt to fix langpack-parallelization by introducing separate obj-dirs for each lang (bsc#1173986, bsc#1167976) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Module for Desktop Applications 15-SP1: zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-2747=1 Package List: - SUSE Linux Enterprise Module for Desktop Applications 15-SP1 (aarch64 ppc64le s390x x86_64): MozillaFirefox-78.3.0-3.108.1 MozillaFirefox-debuginfo-78.3.0-3.108.1 MozillaFirefox-debugsource-78.3.0-3.108.1 MozillaFirefox-translations-common-78.3.0-3.108.1 MozillaFirefox-translations-other-78.3.0-3.108.1 - SUSE Linux Enterprise Module for Desktop Applications 15-SP1 (aarch64 ppc64le x86_64): MozillaFirefox-devel-78.3.0-3.108.1
References
#1167976 #1173986 #1174420 #1176756
Cross- CVE-2020-15673 CVE-2020-15676 CVE-2020-15677
CVE-2020-15678
Affected Products:
SUSE Linux Enterprise Module for Desktop Applications 15-SP1
https://www.suse.com/security/cve/CVE-2020-15673.html
https://www.suse.com/security/cve/CVE-2020-15676.html
https://www.suse.com/security/cve/CVE-2020-15677.html
https://www.suse.com/security/cve/CVE-2020-15678.html
https://bugzilla.suse.com/1167976
https://bugzilla.suse.com/1173986
https://bugzilla.suse.com/1174420
https://bugzilla.suse.com/1176756