(Oracle Issues Fix for Oracle Linux) Mozilla Firefox Multiple Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks, Bypass Security Restrictions, Obtain Potentially Sensitive Information, and Execute Arbitrary Code
SecurityTracker Alert ID: 1041217|
SecurityTracker URL: http://securitytracker.com/id/1041217
CVE-2018-12359, CVE-2018-12363, CVE-2018-12364, CVE-2018-12366
(Links to External Site)
Date: Jul 3 2018
Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information, User access via network|
Fix Available: Yes Vendor Confirmed: Yes |
Version(s): prior to 61.0|
Multiple vulnerabilities were reported in Mozilla Firefox. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site request forgery attacks. A remote user can bypass security controls on the target system. A remote user can obtain potentially sensitive information on the target system.|
A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system.
A buffer overflow may occur when rendering canvas content [CVE-2018-12359].
A use-after-free memory error may occur when using focus() [CVE-2018-12360].
An integer overflow may occur in the SwizzleData code while calculating buffer sizes [CVE-2018-12361].
An integer overflow may occur during graphics operations in the Supplemental Streaming SIMD Extensions 3 (SSSE3) scaler [CVE-2018-12362].
A segmentation fault may occur in the media recorder when the track type is changed during capture [CVE-2018-5156].
A use-after-free memory error may occur when script uses mutation events to append DOM nodes [CVE-2018-12363].
An integer overflow may occur in the Skia library when allocating memory for edge builders on some systems with at least 16 GB of RAM [CVE-2018-12371].
Other memory corruption errors may occur [CVE-2018-5186].
The browser does not warn users when opening executable files with the SettingContent-ms extension [CVE-2018-12368]. Windows-based systems are affected.
WebExtensions bundled with embedded experiments do not properly check access controls. A WebExtension can gain full browser permissions [CVE-2018-12369].
An NPAPI plugin can send non-simple requests to bypass cross-origin restrictions and conduct cross-site request forgery (CSRF) attacks [CVE-2018-12364].
An IPC child process can escape the content sandbox and list the names of arbitrary files on the file system [CVE-2018-12365].
An out-of-bounds memory read error may occur during QCMS color profile transformations [CVE-2018-12366].
The PerformanceNavigationTiming method can be used as a precision timer to attempt to bypass Spectre mitigations [CVE-2018-12367].
SameSite cookie protections are not validated in Reader View. A user can bypass cross-site request forgery protection [CVE-2018-12370].
A remote user can bypass same-origin restrictions via service workers and redirection [CVE-2018-12358].
Abdulrahman Alqabandi, Alex Gaynor, Andrea Marchesini, Ben Kelly, Boris Zbarsky, Christian Holler, Christoph Diehl, David Black, David Major, F. Alonso (revskills), Gary Kwong, Jason Kratzer, Jean-Yves Avenard, Jon Coppeard, Jonathan Kingston, Jun Kokatsu, Marcia Knous, Nicolas B. Pierron, Nils, Nils Ohlmeier, OSS-Fuzz, R, Randell Jesup, Ronald Crane, Sebastian Hengst, Ted Campbell, and anonymous reported these vulnerabilities.
A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.|
A remote user can take actions on the target system acting as the target authenticated user.
A remote user can bypass security controls on the target system.
A remote user can obtain potentially sensitive information on the target system.
Oracle has issued a fix for CVE-2018-12359, CVE-2018-12363, CVE-2018-12364, and CVE-2018-12366.|
The Oracle Linux advisory is available at:
Vendor URL: linux.oracle.com/errata/ELSA-2018-2113.html (Links to External Site)
Access control error, Boundary error, Input validation error|
|Underlying OS: Linux (Oracle)|
|Underlying OS Comments: 7|
This archive entry is a follow-up to the message listed below.|
Source Message Contents
Subject: [El-errata] ELSA-2018-2113 Critical: Oracle Linux 7 firefox security update|
Oracle Linux Security Advisory ELSA-2018-2113
The following updated rpms for Oracle Linux 7 have been uploaded to the
Unbreakable Linux Network:
Description of changes:
- Add firefox-oracle-default-prefs.js and remove the corresponding Red
- Disabled jemalloc on all second arches
- Updated to 60.1.0 ESR build2
- Disabled jemalloc on second arches
- Updated to 60.1.0 ESR
- Fixing bundled libffi issues
- Readded some requirements
- Added fix for mozilla BZ#1436242 - IPC crashes.
- Bundling libffi for the sec-arches
- Added openssl-devel for the Python
- Fixing bundled gtk3
- Added fix for mozilla BZ#1458492
- Added patch from rhbz#1498561 to fix ppc64(le) crashes.
- Disabled jemalloc on second arches
- Update to 60.0 ESR
- Update to 52.7.0 ESR
- Build Firefox for desktop arches only (x86_64 and ppc64le)
- Update to 52.6.0 ESR
El-errata mailing list