firefox-60.2.0-1.0.1.el7.AXS7
エラータID: AXSA:2018-3322:05
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 60.2.0 ESR.
Security Fix(es):
* Mozilla: Memory safety bugs fixed in Firefox 62 and Firefox ESR 60.2 (CVE-2018-12376)
* Mozilla: Use-after-free in driver timers (CVE-2018-12377)
* Mozilla: Use-after-free in IndexedDB (CVE-2018-12378)
* Mozilla: Proxy bypass using automount and autofs (CVE-2017-16541)
* Mozilla: Out-of-bounds write with malicious MAR file (CVE-2018-12379)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Asianux would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Alex Gaynor, Boris Zbarsky, Christoph Diehl, Christian Holler, Jason Kratzer, Jed Davis, Tyson Smith, Bogdan Tara, Karl Tomlinson, Mats Palmgren, Nika Layzell, Ted Campbell, Nils, Zhanjia Song, and Holger Fuhrmannek as the original reporters.
CVE-2017-16541
Tor Browser before 7.0.9 on macOS and Linux allows remote attackers to bypass the intended anonymity feature and discover a client IP address via vectors involving a crafted web site that leverages file:// mishandling in Firefox, aka TorMoil. NOTE: Tails is unaffected.
CVE-2018-12376
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be provided.
CVE-2018-12377
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be provided.
CVE-2018-12378
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be provided.
CVE-2018-12379
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be provided.
Update packages.
Tor Browser before 7.0.9 on macOS and Linux allows remote attackers to bypass the intended anonymity feature and discover a client IP address via vectors involving a crafted web site that leverages file:// mishandling in Firefox, aka TorMoil. NOTE: Tails is unaffected.
Memory safety bugs present in Firefox 61 and Firefox ESR 60.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 62, Firefox ESR < 60.2, and Thunderbird < 60.2.1.
A use-after-free vulnerability can occur when refresh driver timers are refreshed in some circumstances during shutdown when the timer is deleted while still in use. This results in a potentially exploitable crash. This vulnerability affects Firefox < 62, Firefox ESR < 60.2, and Thunderbird < 60.2.1.
A use-after-free vulnerability can occur when an IndexedDB index is deleted while still in use by JavaScript code that is providing payload values to be stored. This results in a potentially exploitable crash. This vulnerability affects Firefox < 62, Firefox ESR < 60.2, and Thunderbird < 60.2.1.
When the Mozilla Updater opens a MAR format file which contains a very long item filename, an out-of-bounds write can be triggered, leading to a potentially exploitable crash. This requires running the Mozilla Updater manually on the local system with the malicious MAR file in order to occur. This vulnerability affects Firefox < 62, Firefox ESR < 60.2, and Thunderbird < 60.2.1.
N/A
SRPMS
- firefox-60.2.0-1.0.1.el7.AXS7.src.rpm
MD5: 28eda353d121aaefefbffdb69d3aa1e0
SHA-256: 6968a9ff1c94397eb399d3768b2d53fdb2d8c68a1a3610e5abb95a2b620b8ee2
Size: 415.66 MB
Asianux Server 7 for x86_64
- firefox-60.2.0-1.0.1.el7.AXS7.x86_64.rpm
MD5: db6f803ae2a5dc56259ea7c14e75dcec
SHA-256: 2e8fb6f5f8a76b48de49c0259aa46027215407ca44b319d55d06abf1e902c31a
Size: 90.58 MB - firefox-60.2.0-1.0.1.el7.AXS7.i686.rpm
MD5: a8eeac3a6e09bf08f938df11a1403ed1
SHA-256: 467e4fe2e474edf9f94a5693e9cfdba0a86434ac795da90411817957af2e5cca
Size: 92.34 MB