Mailinglist Archive: opensuse-security-announce (66 mails)

< Previous Next >
[security-announce] openSUSE-SU-2020:0002-1: important: Security update for MozillaFirefox
openSUSE Security Update: Security update for MozillaFirefox

Announcement ID: openSUSE-SU-2020:0002-1
Rating: important
References: #1157652 #1158328
Cross-References: CVE-2019-11745 CVE-2019-13722 CVE-2019-17005
CVE-2019-17008 CVE-2019-17009 CVE-2019-17010
CVE-2019-17011 CVE-2019-17012
Affected Products:
openSUSE Leap 15.1

An update that fixes 8 vulnerabilities is now available.


This update for MozillaFirefox fixes the following issues:

Mozilla Firefox was updated to 68.3esr (MFSA 2019-37 bsc#1158328)

Security issues fixed:

- CVE-2019-17008: Fixed a use-after-free in worker destruction
- CVE-2019-13722: Fixed a stack corruption due to incorrect number of
arguments in WebRTC code (bmo#1580156)
- CVE-2019-11745: Fixed an out of bounds write in NSS when encrypting with
a block cipher (bmo#1586176)
- CVE-2019-17009: Fixed an issue where updater temporary files accessible
to unprivileged processes (bmo#1510494)
- CVE-2019-17010: Fixed a use-after-free when performing device
orientation checks (bmo#1581084)
- CVE-2019-17005: Fixed a buffer overflow in plain text serializer
- CVE-2019-17011: Fixed a use-after-free when retrieving a document in
antitracking (bmo#1591334)
- CVE-2019-17012: Fixed multiple memmory issues (bmo#1449736, bmo#1533957,
bmo#1560667,bmo#1567209, bmo#1580288, bmo#1585760, bmo#1592502)

This update was imported from the SUSE:SLE-15:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended
installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.1:

zypper in -t patch openSUSE-2020-2=1

Package List:

- openSUSE Leap 15.1 (x86_64):



To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@xxxxxxxxxxxx
For additional commands, e-mail: opensuse-security-announce+help@xxxxxxxxxxxx

< Previous Next >
This Thread
  • No further messages