openSUSE Security Update : MozillaFirefox (openSUSE-2020-1189)

high Nessus Plugin ID 139562

Language:

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for MozillaFirefox fixes the following issues :

This update for MozillaFirefox and pipewire fixes the following issues :

MozillaFirefox Extended Support Release 78.1.0 ESR

- Fixed: Various stability, functionality, and security fixes (bsc#1174538)

- CVE-2020-15652: Potential leak of redirect targets when loading scripts in a worker

- CVE-2020-6514: WebRTC data channel leaks internal address to peer

- CVE-2020-15655: Extension APIs could be used to bypass Same-Origin Policy

- CVE-2020-15653: Bypassing iframe sandbox when allowing popups

- CVE-2020-6463: Use-after-free in ANGLE gl::Texture::onUnbindAsSamplerTexture

- CVE-2020-15656: Type confusion for special arguments in IonMonkey

- CVE-2020-15658: Overriding file type when saving to disk

- CVE-2020-15657: DLL hijacking due to incorrect loading path

- CVE-2020-15654: Custom cursor can overlay user interface

- CVE-2020-15659: Memory safety bugs fixed in Firefox 79 and Firefox ESR 78.1

pipewire was updated to version 0.3.6 (bsc#1171433, jsc#ECO-2308) :

- Extensive memory leak fixing and stress testing was done. A big leak in screen sharing with DMA-BUF was fixed.

- Compile fixes

- Stability improvements in jack and pulseaudio layers.

- Added the old portal module to make the Camera portal work again. This will be moved to the session manager in future versions.

- Improvements to the GStreamer source and sink shutdown.

- Fix compatibility with v2 clients again when negotiating buffers.

This update was imported from the SUSE:SLE-15-SP2:Update update project.

Solution

Update the affected MozillaFirefox packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1171433

https://bugzilla.opensuse.org/show_bug.cgi?id=1174538

Plugin Details

Severity: High

ID: 139562

File Name: openSUSE-2020-1189.nasl

Version: 1.3

Type: local

Agent: unix

Published: 8/13/2020

Updated: 2/26/2024

Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2020-15659

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2020-6463

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:mozillafirefox, p-cpe:/a:novell:opensuse:mozillafirefox-branding-upstream, p-cpe:/a:novell:opensuse:mozillafirefox-buildsymbols, p-cpe:/a:novell:opensuse:mozillafirefox-debuginfo, p-cpe:/a:novell:opensuse:mozillafirefox-debugsource, p-cpe:/a:novell:opensuse:mozillafirefox-devel, p-cpe:/a:novell:opensuse:mozillafirefox-translations-common, p-cpe:/a:novell:opensuse:mozillafirefox-translations-other, p-cpe:/a:novell:opensuse:gstreamer-plugin-pipewire, p-cpe:/a:novell:opensuse:gstreamer-plugin-pipewire-debuginfo, p-cpe:/a:novell:opensuse:libpipewire-0_3-0, p-cpe:/a:novell:opensuse:libpipewire-0_3-0-debuginfo, p-cpe:/a:novell:opensuse:pipewire, p-cpe:/a:novell:opensuse:pipewire-debuginfo, p-cpe:/a:novell:opensuse:pipewire-debugsource, p-cpe:/a:novell:opensuse:pipewire-devel, p-cpe:/a:novell:opensuse:pipewire-libjack-0_3, p-cpe:/a:novell:opensuse:pipewire-libjack-0_3-debuginfo, p-cpe:/a:novell:opensuse:pipewire-libpulse-0_3, p-cpe:/a:novell:opensuse:pipewire-libpulse-0_3-debuginfo, p-cpe:/a:novell:opensuse:pipewire-modules, p-cpe:/a:novell:opensuse:pipewire-modules-debuginfo, p-cpe:/a:novell:opensuse:pipewire-spa-plugins-0_2, p-cpe:/a:novell:opensuse:pipewire-spa-plugins-0_2-debuginfo, p-cpe:/a:novell:opensuse:pipewire-spa-tools, p-cpe:/a:novell:opensuse:pipewire-spa-tools-debuginfo, p-cpe:/a:novell:opensuse:pipewire-tools, p-cpe:/a:novell:opensuse:pipewire-tools-debuginfo, cpe:/o:novell:opensuse:15.2

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/12/2020

Vulnerability Publication Date: 5/21/2020

Reference Information

CVE: CVE-2020-15652, CVE-2020-15653, CVE-2020-15654, CVE-2020-15655, CVE-2020-15656, CVE-2020-15657, CVE-2020-15658, CVE-2020-15659, CVE-2020-6463, CVE-2020-6514