firefox-68.11.0-1.0.1.el7.AXS7
エラータID: AXSA:2020-256:17
リリース日:
2020/08/05 Wednesday - 04:40
題名:
firefox-68.11.0-1.0.1.el7.AXS7
影響のあるチャネル:
Asianux Server 7 for x86_64
Severity:
High
Description:
以下項目について対処しました。
[Security Fix]
- Firefox、Thunderbird には、クロスオリジンリダイレクトの結果が漏洩してしまう脆弱性があります。
(CVE-2020-15652)
- Firefox、Thunderbird にはメモリ安全性のバグが存在し、それらのうちのいくつかにメモリ破壊や
任意のコードを実行できる可能性のある脆弱性があります。(CVE-2020-15659)
- Firefox、Thunderbird には開放後使用の脆弱性が存在し、巧妙に細工された HTML ページによって、
リモートの攻撃者がヒープベースのメモリを破壊する可能性のある脆弱性があります。
(CVE-2020-6463)
- Firefox、Thunderbird には不適切な実装が存在し、巧妙に細工された SCTP ストリームによって、
特権的なネットワークの地位を利用した攻撃者がヒープベースのメモリ破壊を行う可能性の
ある脆弱性があります。(CVE-2020-6514)
一部CVEの翻訳文はJVNからの引用になります。
http://jvndb.jvn.jp/
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2020-15652
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
CVE-2020-15659
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
CVE-2020-6463
Use after free in ANGLE in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Use after free in ANGLE in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2020-6514
Inappropriate implementation in WebRTC in Google Chrome prior to 84.0.4147.89 allowed an attacker in a privileged network position to potentially exploit heap corruption via a crafted SCTP stream.
Inappropriate implementation in WebRTC in Google Chrome prior to 84.0.4147.89 allowed an attacker in a privileged network position to potentially exploit heap corruption via a crafted SCTP stream.
追加情報:
N/A
ダウンロード:
SRPMS
- firefox-68.11.0-1.0.1.el7.AXS7.src.rpm
MD5: a0de3b0debbe7cafe8b15afef7b40585
SHA-256: 67c480bdb31b564b0447117fe0a1a3c56efc6524aac95c59804e0e7ffe89294f
Size: 512.96 MB
Asianux Server 7 for x86_64
- firefox-68.11.0-1.0.1.el7.AXS7.x86_64.rpm
MD5: 22a2ccc60e002f11bc48b73925513266
SHA-256: ba641a49c2f4bf6e52200c322770af9c46ffb94b0917be140497d984ca9aabfb
Size: 94.52 MB - firefox-68.11.0-1.0.1.el7.AXS7.i686.rpm
MD5: d9945263f09006158eb664d8f5fd4ec9
SHA-256: 6833918cbe4aed13a1713892ac8501b9e962f25d765930a8653fc748841d6fe0
Size: 97.36 MB