firefox-60.3.0-1.0.1.el7.AXS7
エラータID: AXSA:2018-3376:08
以下項目について対処しました。
[Security Fix]
- Firefox にはメモリ安全性のバグが存在し,攻撃者がメモリ破壊を行い,
任意のコードを実行する脆弱性があります。(CVE-2018-12389), (CVE-2018-12390)
- Fireox には,スクリプトを通してドキュメントを開く際に,ネストしたルー
プの中のユーザイベントを処理すると,イベント処理が貧弱なために,
クラッシュを引き起こす可能性のある脆弱性があります。(CVE-2018-12392)
- Firefox の 32-bit 版のビルドで,内部の UTF-16 表現へ渡すスクリプト
の変換中に,整数オーバーフローが生じ,変換するには小さすぎるバッファを
割り当ててしまい,境界外への書き込みを引き起こす脆弱性があります。
(CVE-2018-12393)
- firefox には,webRequest API を用いて Host:request ヘッダを書き換える
際に,WebExtension が Domain fronting を通して,ドメインの制限を迂回する
脆弱性があります。(CVE-2018-12395)
- firefox には許可されないコンテクストで WebExtension がコンテンツ
スクリプトを実行できる問題が存在し,コンテンツスクリプトが実行される
べきではない場合にサイト上の WebExtension によって,権限昇格の可能性
がある脆弱性があります。(CVE-2018-12396)
- Firefox には,ローカルのファイルが開いている場合,権限についての警告な
しに,ローカルのページのコンテンツスクリプトを実行する脆弱性があります。
(CVE-2018-12397)
一部CVEの翻訳文はJVNからの引用になります。
http://jvndb.jvn.jp/
パッケージをアップデートしてください。
Mozilla developers and community members reported memory safety bugs present in Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR < 60.3 and Thunderbird < 60.3.
Mozilla developers and community members reported memory safety bugs present in Firefox 62 and Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 63, Firefox ESR < 60.3, and Thunderbird < 60.3.
When manipulating user events in nested loops while opening a document through script, it is possible to trigger a potentially exploitable crash due to poor event handling. This vulnerability affects Firefox < 63, Firefox ESR < 60.3, and Thunderbird < 60.3.
A potential vulnerability was found in 32-bit builds where an integer overflow during the conversion of scripts to an internal UTF-16 representation could result in allocating a buffer too small for the conversion. This leads to a possible out-of-bounds write. *Note: 64-bit builds are not vulnerable to this issue.*. This vulnerability affects Firefox < 63, Firefox ESR < 60.3, and Thunderbird < 60.3.
By rewriting the Host: request headers using the webRequest API, a WebExtension can bypass domain restrictions through domain fronting. This would allow access to domains that share a host that are otherwise restricted. This vulnerability affects Firefox ESR < 60.3 and Firefox < 63.
A vulnerability where a WebExtension can run content scripts in disallowed contexts following navigation or other events. This allows for potential privilege escalation by the WebExtension on sites where content scripts should not be run. This vulnerability affects Firefox ESR < 60.3 and Firefox < 63.
A WebExtension can request access to local files without the warning prompt stating that the extension will "Access your data for all websites" being displayed to the user. This allows extensions to run content scripts in local pages without permission warnings when a local file is opened. This vulnerability affects Firefox ESR < 60.3 and Firefox < 63.
N/A
SRPMS
- firefox-60.3.0-1.0.1.el7.AXS7.src.rpm
MD5: a4f4d6313636d026f1eec8db3d42e4e1
SHA-256: 1fc6c4810b4ec5153a8a1be979b2b0984c366bf8135678de9878b4b8256b147f
Size: 416.10 MB
Asianux Server 7 for x86_64
- firefox-60.3.0-1.0.1.el7.AXS7.x86_64.rpm
MD5: dac3da25f4f379be19e906f38837cb98
SHA-256: aafcdb3f4efc61d702f36d2a9018b1928dd22a129ef375bdd1981b0621b391ec
Size: 90.64 MB - firefox-60.3.0-1.0.1.el7.AXS7.i686.rpm
MD5: c0a3c84c461c60a1cd160f7c0c4120fd
SHA-256: 4f654a7bffcf3bbc98709e673afdbf4ba6d75958b29845a9946abd2493e43660
Size: 92.38 MB