Mageia 2018-0396: firefox security update
Summary
Updated firefox packages fix security vulnerabilities:
A vulnerability in register allocation in JavaScript can lead to type
confusion, allowing for an arbitrary read and write. This leads to remote
code execution inside the sandboxed content process when triggered
(CVE-2018-12386).
A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push
with multiple arguments that results in the stack pointer being off by 8 bytes
after a bailout. This leaks a memory address to the calling function which can
be used as part of an exploit inside the sandboxed content process
(CVE-2018-12387).
References
- https://bugs.mageia.org/show_bug.cgi?id=23653
- https://www.mozilla.org/en-US/security/advisories/mfsa2018-24/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12386
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12387
Resolution
MGASA-2018-0396 - Updated firefox packages fix security vulnerabilities
SRPMS
- 6/core/firefox-60.2.2-1.mga6
- 6/core/firefox-l10n-60.2.2-1.mga6