firefox-60.3.0-1.0.1.AXS4
エラータID: AXSA:2018-3377:08
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 60.3.0 ESR.
Security Fix(es):
* Mozilla: Memory safety bugs fixed in Firefox 63 and Firefox ESR 60.3 (CVE-2018-12390)
* Mozilla: Crash with nested event loops (CVE-2018-12392)
* Mozilla: Integer overflow during Unicode conversion while loading JavaScript (CVE-2018-12393)
* Mozilla: WebExtension bypass of domain restrictions through header rewriting (CVE-2018-12395)
* Mozilla: WebExtension content scripts can execute in disallowed contexts (CVE-2018-12396)
* Mozilla: WebExtension local file permission check bypass (CVE-2018-12397)
* Mozilla: Memory safety bugs fixed in Firefox ESR 60.3 (CVE-2018-12389)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Asianux would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Christian Holler, Bob Owen, Boris Zbarsky, Calixte Denizet, Jason Kratzer, Jed Davis, Taegeon Lee, Philipp, Ronald Crane, Raul Gurzau, Gary Kwong, Tyson Smith, Raymond Forbes, Bogdan Tara, Nils, r, Rob Wu, Andrew Swan, and Daniel Veditz as the original reporters.
CVE-2018-12389
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be provided.
CVE-2018-12390
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be provided.
CVE-2018-12392
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be provided.
CVE-2018-12393
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be provided.
CVE-2018-12395
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be provided.
CVE-2018-12396
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be provided.
CVE-2018-12397
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be provided.
Update packages.
Mozilla developers and community members reported memory safety bugs present in Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR < 60.3 and Thunderbird < 60.3.
Mozilla developers and community members reported memory safety bugs present in Firefox 62 and Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 63, Firefox ESR < 60.3, and Thunderbird < 60.3.
When manipulating user events in nested loops while opening a document through script, it is possible to trigger a potentially exploitable crash due to poor event handling. This vulnerability affects Firefox < 63, Firefox ESR < 60.3, and Thunderbird < 60.3.
A potential vulnerability was found in 32-bit builds where an integer overflow during the conversion of scripts to an internal UTF-16 representation could result in allocating a buffer too small for the conversion. This leads to a possible out-of-bounds write. *Note: 64-bit builds are not vulnerable to this issue.*. This vulnerability affects Firefox < 63, Firefox ESR < 60.3, and Thunderbird < 60.3.
By rewriting the Host: request headers using the webRequest API, a WebExtension can bypass domain restrictions through domain fronting. This would allow access to domains that share a host that are otherwise restricted. This vulnerability affects Firefox ESR < 60.3 and Firefox < 63.
A vulnerability where a WebExtension can run content scripts in disallowed contexts following navigation or other events. This allows for potential privilege escalation by the WebExtension on sites where content scripts should not be run. This vulnerability affects Firefox ESR < 60.3 and Firefox < 63.
A WebExtension can request access to local files without the warning prompt stating that the extension will "Access your data for all websites" being displayed to the user. This allows extensions to run content scripts in local pages without permission warnings when a local file is opened. This vulnerability affects Firefox ESR < 60.3 and Firefox < 63.
N/A
SRPMS
- firefox-60.3.0-1.0.1.AXS4.src.rpm
MD5: b69e5e146422aab064398cb6c1b598b0
SHA-256: 9d3eb6f5409ec2c70259d66bd537489dc82e4459fe40edf17f63aa509fba6c6f
Size: 416.11 MB
Asianux Server 4 for x86
- firefox-60.3.0-1.0.1.AXS4.i686.rpm
MD5: 1c9796cce14561031a4dee70ea512198
SHA-256: b5ddc24c279fc37381b0a6fef90880ca60dc68e19847cde570c732638e781e64
Size: 114.58 MB
Asianux Server 4 for x86_64
- firefox-60.3.0-1.0.1.AXS4.x86_64.rpm
MD5: 98f892087ba09a3760244d97ff13eb34
SHA-256: 89ed430daa156c2391e87632ba6c1e49df2f476855d566a58ac7aa2ee153c1b3
Size: 114.77 MB - firefox-60.3.0-1.0.1.AXS4.i686.rpm
MD5: 1c9796cce14561031a4dee70ea512198
SHA-256: b5ddc24c279fc37381b0a6fef90880ca60dc68e19847cde570c732638e781e64
Size: 114.58 MB