#13495 closed enhancement (fixed)
seamonkey-2.53.2
Reported by: | Bruce Dubbs | Owned by: | Douglas R. Reno |
---|---|---|---|
Priority: | highest | Milestone: | 10.0 |
Component: | BOOK | Version: | SVN |
Severity: | normal | Keywords: | |
Cc: |
Description ¶
New point version.
Change History (9)
follow-up: 6 comment:1 by , 5 years ago
Owner: | changed from | to
---|---|
Priority: | normal → highest |
Status: | new → assigned |
comment:3 by , 5 years ago
The Firefox 60.3esr security advisory linked above
Announced October 23, 2018 Impact critical Products Firefox ESR Fixed in Firefox ESR 60.3 #CVE-2018-12391: HTTP Live Stream audio data is accessible cross-origin Reporter Jun Kokatsu Impact high Description During HTTP Live Stream playback on Firefox for Android, audio data can be accessed across origins in violation of security policies. Because the problem is in the underlying Android service, this issue is addressed by treating all HLS streams as cross-origin and opaque to access. Note: this issue only affects Firefox for Android. Desktop versions of Firefox are unaffected. References Bug 1478843 #CVE-2018-12392: Crash with nested event loops Reporter Nils Impact high Description When manipulating user events in nested loops while opening a document through script, it is possible to trigger a potentially exploitable crash due to poor event handling. References Bug 1492823 #CVE-2018-12393: Integer overflow during Unicode conversion while loading JavaScript Reporter R at Zero Day LLC Impact high Description A potential vulnerability was found in 32-bit builds where an integer overflow during the conversion of scripts to an internal UTF-16 representation could result in allocating a buffer too small for the conversion. This leads to a possible out-of-bounds write. Note: 64-bit builds are not vulnerable to this issue. References Bug 1495011 #CVE-2018-12395: WebExtension bypass of domain restrictions through header rewriting Reporter Rob Wu, Andrew Swan Impact moderate Description By rewriting the Host request headers using the webRequest API, a WebExtension can bypass domain restrictions through domain fronting. This would allow access to domains that share a host that are otherwise restricted. References Bug 1467523 #CVE-2018-12396: WebExtension content scripts can execute in disallowed contexts Reporter Rob Wu Impact moderate Description A vulnerability where a WebExtension can run content scripts in disallowed contexts following navigation or other events. This allows for potential privilege escalation by the WebExtension on sites where content scripts should not be run. References Bug 1483602 #CVE-2018-12397: Missing warning prompt when WebExtension requests local file access Reporter Rob Wu Impact moderate Description A WebExtension can request access to local files without the warning prompt stating that the extension will "Access your data for all websites" being displayed to the user. This allows extensions to run content scripts in local pages without permission warnings when a local file is opened. References Bug 1487478 #CVE-2018-12389: Memory safety bugs fixed in Firefox ESR 60.3 Reporter Mozilla developers and community Impact low Description Mozilla developers and community members Daniel Veditz and Philipp reported memory safety bugs present in Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. References Memory safety bugs fixed in Firefox ESR 60.3 #CVE-2018-12390: Memory safety bugs fixed in Firefox 63 and Firefox ESR 60.3 Reporter Mozilla developers and community Impact critical Description Mozilla developers and community members Christian Holler, Bob Owen, Boris Zbarsky, Calixte Denizet, Jason Kratzer, Jed Davis, Taegeon Lee, Philipp, Ronald Crane, Raul Gurzau, Gary Kwong, Tyson Smith, Raymond Forbes, and Bogdan Tara reported memory safety bugs present in Firefox 62 and Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. References Memory safety bugs fixed in Firefox 63 and Firefox ESR 60.3
comment:4 by , 5 years ago
The Thunderbird Advisory linked above
Mozilla Foundation Security Advisory 2018-19 Security vulnerabilities fixed in Thunderbird 60 Announced August 1, 2018 Impact critical Products Thunderbird Fixed in Thunderbird 60 In general, these flaws cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but are potentially risks in browser or browser-like contexts. #CVE-2018-12359: Buffer overflow using computed size of canvas element Reporter Nils Impact critical Description A buffer overflow can occur when rendering canvas content while adjusting the height and width of the <canvas> element dynamically, causing data to be written outside of the currently computed boundaries. This results in a potentially exploitable crash. References Bug 1459162 #CVE-2018-12360: Use-after-free when using focus() Reporter Nils Impact critical Description A use-after-free vulnerability can occur when deleting an input element during a mutation event handler triggered by focusing that element. This results in a potentially exploitable crash. References Bug 1459693 #CVE-2018-12361: Integer overflow in SwizzleData Reporter R at Zero Day LLC Impact critical Description An integer overflow can occur in the SwizzleData code while calculating buffer sizes. The overflowed value is used for subsequent graphics computations when their inputs are not sanitized which results in a potentially exploitable crash. References Bug 1463244 #CVE-2018-12362: Integer overflow in SSSE3 scaler Reporter F. Alonso (revskills) Impact high Description An integer overflow can occur during graphics operations done by the Supplemental Streaming SIMD Extensions 3 (SSSE3) scaler, resulting in a potentially exploitable crash. References Bug 1452375 #CVE-2018-5156: Media recorder segmentation fault when track type is changed during capture Reporter Nils Impact high Description A vulnerability can occur when capturing a media stream when the media source type is changed as the capture is occuring. This can result in stream data being cast to the wrong type causing a potentially exploitable crash. References Bug 1453127 #CVE-2018-12363: Use-after-free when appending DOM nodes Reporter Nils Impact high Description A use-after-free vulnerability can occur when script uses mutation events to move DOM nodes between documents, resulting in the old document that held the node being freed but the node still having a pointer referencing it. This results in a potentially exploitable crash. References Bug 1464784 #CVE-2018-12364: CSRF attacks through 307 redirects and NPAPI plugins Reporter David Black Impact high Description NPAPI plugins, such as Adobe Flash, can send non-simple cross-origin requests, bypassing CORS by making a same-origin POST that does a 307 redirect to the target site. This allows for a malicious site to engage in cross-site request forgery (CSRF) attacks. References Bug 1436241 #CVE-2018-12365: Compromised IPC child process can list local filenames Reporter Alex Gaynor Impact moderate Description A compromised IPC child process can escape the content sandbox and list the names of arbitrary files on the file system without user consent or interaction. This could result in exposure of private local files. References Bug 1459206 #CVE-2018-12371: Integer overflow in Skia library during edge builder allocation Reporter anonymous Impact moderate Description An integer overflow vulnerability in the Skia library when allocating memory for edge builders on some systems with at least 16 GB of RAM. This results in the use of uninitialized memory, resulting in a potentially exploitable crash. References Bug 1465686 #CVE-2018-12366: Invalid data handling during QCMS transformations Reporter OSS-Fuzz Impact moderate Description An invalid grid size during QCMS (color profile) transformations can result in the out-of-bounds read interpreted as a float value. This could leak private data into the output. References Bug 1464039 #CVE-2018-12367: Timing attack mitigation of PerformanceNavigationTiming Reporter Andrea Marchesini Impact moderate Description In the previous mitigations for Spectre, the resolution or precision of various methods was reduced to counteract the ability to measure precise time intervals. In that work, PerformanceNavigationTiming was not adjusted but it was found that it could be used as a precision timer. References Bug 1462891 #CVE-2018-12368: No warning when opening executable SettingContent-ms files Reporter Abdulrahman Alqabandi Impact moderate Description Windows 10 does not warn users before opening executable files with the SettingContent-ms extension even when they have been downloaded from the internet and have the "Mark of the Web." Without the warning, unsuspecting users unfamiliar with this new file type might run an unwanted executable. This also allows a WebExtension with the limited downloads.open permission to execute arbitrary code without user interaction on Windows 10 systems Note: this issue only affects Windows operating systems. Other operating systems are unaffected. References Bug 1468217 The Tale of SettingContent-ms Files #CVE-2018-5187: Memory safety bugs fixed in Firefox 61, Firefox ESR 60.1, and Thunderbird 60 Reporter Mozilla developers and community Impact critical Description Mozilla developers and community members Christian Holler, Sebastian Hengst, Nils Ohlmeier, Jon Coppeard, Randell Jesup, Ted Campbell, Gary Kwong, and Jean-Yves Avenard reported memory safety bugs present in Firefox 60 and Firefox ESR 60. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. References Memory safety bugs fixed in Firefox 61, Firefox ESR 60.1, and Thunderbird 60 #CVE-2018-5188: Memory safety bugs fixed in Firefox 61, Firefox ESR 60.1, Firefox ESR 52.9, and Thunderbird 60 Reporter Mozilla developers and community Impact critical Description Mozilla developers and community members Alex Gaynor, Christoph Diehl, Christian Holler, Jason Kratzer, David Major, Jon Coppeard, Nicolas B. Pierron, Jason Kratzer, Marcia Knous, and Ronald Crane reported memory safety bugs present in Firefox 60, Firefox ESR 60, and Firefox ESR 52.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. References Memory safety bugs fixed in Firefox 61, Firefox ESR 60.1, Firefox ESR 52.9, and Thunderbird 60
comment:5 by , 5 years ago
That's not including the vulnerability fixes from Firefox-60.1esr all the way up to Firefox-74...
comment:6 by , 5 years ago
Replying to renodr:
What's New in SeaMonkey 2.53.2
Scrollbars have been switched over to the native gtk3 theme in bug 1625754. If your theme does not show scrollbar buttons and you would like to see them try editing ~/.config/gtk-3.0/gtk.css and adding the following:
* { -GtkScrollbar-has-backward-stepper: 1; -GtkScrollbar-has-forward-stepper: 1; }
I love this. Lets add it to the gtk3 configuration section.
Note:
See TracTickets
for help on using tickets.
This includes 14 major releases worth of Firefox security vulnerabilities, all the way up to 74. That's 150+ security fixes in this release, a bunch of them are likely high or critical. This is my first priority for the day, and I'm going to mark it as "Highest" as a result.
The rustc patch has been applied upstream.