Mageia 2019-0211: firefox security update
Summary
Sandbox escape via installation of malicious language pack. (CVE-2019-9811)
Script injection within domain through inner window reuse. (CVE-2019-11711)
Cross-origin POST requests can be made with NPAPI plugins by following 308
redirects. (CVE-2019-11712)
Use-after-free with HTTP/2 cached stream. (CVE-2019-11713)
Empty or malformed p256-ECDH public keys may trigger a segmentation fault.
(CVE-2019-11729)
HTML parsing error can contribute to content XSS. (CVE-2019-11715)
Caret character improperly escaped in origins. (CVE-2019-11717)
Out-of-bounds read when importing curve25519 private key. (CVE-2019-11719)
Same-origin policy treats all files in a directory as having the
same-origin. (CVE-2019-11730)
Memory safety bugs fixed in Firefox 68 and Firefox ESR 60.8.
(CVE-2019-11709)
References
- https://bugs.mageia.org/show_bug.cgi?id=25102
- https://www.mozilla.org/en-US/firefox/60.8.0/releasenotes/
- https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9811
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11711
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11712
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11713
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11729
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11715
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11717
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11719
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11730
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11709
Resolution
MGASA-2019-0211 - Updated firefox packages fix security vulnerability
SRPMS
- 6/core/firefox-60.8.0-1.mga6
- 6/core/firefox-l10n-60.8.0-1.mga6
- 6/core/nss-3.36.8-1.1.mga6
- 6/core/rootcerts-20190604.00-1.mga6