firefox-68.11.0-1.0.1.AXS4
エラータID: AXSA:2020-254:16
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 68.11.0 ESR.
Security Fix(es):
* chromium-browser: Use after free in ANGLE (CVE-2020-6463)
* chromium-browser: Inappropriate implementation in WebRTC (CVE-2020-6514)
* Mozilla: Potential leak of redirect targets when loading scripts in a worker (CVE-2020-15652)
* Mozilla: Memory safety bugs fixed in Firefox 79 and Firefox ESR 68.11 (CVE-2020-15659)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2020-15652
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
CVE-2020-15659
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
CVE-2020-6463
Use after free in ANGLE in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2020-6514
Inappropriate implementation in WebRTC in Google Chrome prior to 84.0.4147.89 allowed an attacker in a privileged network position to potentially exploit heap corruption via a crafted SCTP stream.
Update packages.
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
Use after free in ANGLE in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Inappropriate implementation in WebRTC in Google Chrome prior to 84.0.4147.89 allowed an attacker in a privileged network position to potentially exploit heap corruption via a crafted SCTP stream.
N/A
SRPMS
- firefox-68.11.0-1.0.1.AXS4.src.rpm
MD5: e5a6bb473ddd37bf1f693c7d175bc0fc
SHA-256: 50f528e531ca00eefbf4ece1d9cde471e5f071a66b60ef6eb7fc18c48947cb66
Size: 512.96 MB
Asianux Server 4 for x86
- firefox-68.11.0-1.0.1.AXS4.i686.rpm
MD5: aacb5bddcb206f138d360e67638b33f4
SHA-256: 5acff266df53a68ee6c9ec71ecb43a029b203181e9f408152ac3f7cad86c251c
Size: 118.47 MB
Asianux Server 4 for x86_64
- firefox-68.11.0-1.0.1.AXS4.x86_64.rpm
MD5: eb22ee91f916652c6c21cc1a14b78de4
SHA-256: 77509f17321777299e583472c407a210a57aaa9d016c2669f384ad1e057bbc0b
Size: 118.57 MB - firefox-68.11.0-1.0.1.AXS4.i686.rpm
MD5: aacb5bddcb206f138d360e67638b33f4
SHA-256: 5acff266df53a68ee6c9ec71ecb43a029b203181e9f408152ac3f7cad86c251c
Size: 118.47 MB