firefox-60.2.0-1.0.1.AXS4
エラータID: AXSA:2018-3323:06
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 60.2.0 ESR.
Security Fix(es):
* Mozilla: Memory safety bugs fixed in Firefox 62 and Firefox ESR 60.2 (CVE-2018-12376)
* Mozilla: Use-after-free in driver timers (CVE-2018-12377)
* Mozilla: Use-after-free in IndexedDB (CVE-2018-12378)
* Mozilla: Proxy bypass using automount and autofs (CVE-2017-16541)
* Mozilla: Out-of-bounds write with malicious MAR file (CVE-2018-12379)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Asianux would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Alex Gaynor, Boris Zbarsky, Christoph Diehl, Christian Holler, Jason Kratzer, Jed Davis, Tyson Smith, Bogdan Tara, Karl Tomlinson, Mats Palmgren, Nika Layzell, Ted Campbell, Nils, Zhanjia Song, and Holger Fuhrmannek as the original reporters.
CVE-2017-16541
Tor Browser before 7.0.9 on macOS and Linux allows remote attackers to bypass the intended anonymity feature and discover a client IP address via vectors involving a crafted web site that leverages file:// mishandling in Firefox, aka TorMoil. NOTE: Tails is unaffected.
CVE-2018-12376
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be provided.
CVE-2018-12377
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be provided.
CVE-2018-12378
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be provided.
CVE-2018-12379
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be provided.
Update packages.
Tor Browser before 7.0.9 on macOS and Linux allows remote attackers to bypass the intended anonymity feature and discover a client IP address via vectors involving a crafted web site that leverages file:// mishandling in Firefox, aka TorMoil. NOTE: Tails is unaffected.
Memory safety bugs present in Firefox 61 and Firefox ESR 60.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 62, Firefox ESR < 60.2, and Thunderbird < 60.2.1.
A use-after-free vulnerability can occur when refresh driver timers are refreshed in some circumstances during shutdown when the timer is deleted while still in use. This results in a potentially exploitable crash. This vulnerability affects Firefox < 62, Firefox ESR < 60.2, and Thunderbird < 60.2.1.
A use-after-free vulnerability can occur when an IndexedDB index is deleted while still in use by JavaScript code that is providing payload values to be stored. This results in a potentially exploitable crash. This vulnerability affects Firefox < 62, Firefox ESR < 60.2, and Thunderbird < 60.2.1.
When the Mozilla Updater opens a MAR format file which contains a very long item filename, an out-of-bounds write can be triggered, leading to a potentially exploitable crash. This requires running the Mozilla Updater manually on the local system with the malicious MAR file in order to occur. This vulnerability affects Firefox < 62, Firefox ESR < 60.2, and Thunderbird < 60.2.1.
N/A
SRPMS
- firefox-60.2.0-1.0.1.AXS4.src.rpm
MD5: 72e761e46c41b15742435f1bbb3ebe2c
SHA-256: 10f7a0c0faa85bd8f949643c60a94fa41d63f2f4c6cd51265d986c84d9886743
Size: 415.66 MB
Asianux Server 4 for x86
- firefox-60.2.0-1.0.1.AXS4.i686.rpm
MD5: 22c48cd76e704e73679b05131b3c1b46
SHA-256: c293e341f814c312c1d538d11de1b791a3dca349e3992aca93285d5d909a676c
Size: 114.49 MB
Asianux Server 4 for x86_64
- firefox-60.2.0-1.0.1.AXS4.x86_64.rpm
MD5: 1d0f0cd57bcac8cbc7167ea278386c8c
SHA-256: 7d596805b08aea2434e2b0bbe17010ad64e8d6952a30946f9ff682d8f551a865
Size: 114.65 MB - firefox-60.2.0-1.0.1.AXS4.i686.rpm
MD5: 22c48cd76e704e73679b05131b3c1b46
SHA-256: c293e341f814c312c1d538d11de1b791a3dca349e3992aca93285d5d909a676c
Size: 114.49 MB