SUSE-SU-2018:2890-1: important: Security update for MozillaFirefox

sle-security-updates at sle-security-updates at
Thu Sep 27 07:09:08 MDT 2018

   SUSE Security Update: Security update for MozillaFirefox

Announcement ID:    SUSE-SU-2018:2890-1
Rating:             important
References:         #1107343 
Cross-References:   CVE-2017-16541 CVE-2018-12376 CVE-2018-12377
                    CVE-2018-12378 CVE-2018-12379 CVE-2018-12381
Affected Products:
                    SUSE Linux Enterprise Module for Desktop Applications 15

   An update that fixes 6 vulnerabilities is now available.


   This update for MozillaFirefox to ESR 60.2 fixes several issues.

   These general changes are part of the version 60 release.

   - New browser engine with speed improvements
   - Redesigned graphical user interface elements
   - Unified address and search bar for new installations
   - New tab page listing top visited, recently visited and recommended pages
   - Support for configuration policies in enterprise deployments via JSON
   - Support for Web Authentication, allowing the use of USB tokens for
     authentication to web sites

   The following changes affect compatibility:

   - Now exclusively supports extensions built using the WebExtension API.
   - Unsupported legacy extensions will no longer work in Firefox 60 ESR
   - TLS certificates issued by Symantec before June 1st, 2016 are no longer
     trusted The "security.pki.distrust_ca_policy" preference can be set to 0
     to reinstate trust in those certificates

   The following issues affect performance:

   - new format for storing private keys, certificates and certificate trust
     If the user home or data directory is on a network file system, it is
     recommended that users set the following environment variable to avoid
     slowdowns: NSS_SDB_USE_CACHE=yes This setting is not recommended for
     local, fast file systems.

   These security issues were fixed:

   - CVE-2018-12381: Dragging and dropping Outlook email message results in
     page navigation (bsc#1107343).
   - CVE-2017-16541: Proxy bypass using automount and autofs (bsc#1107343).
   - CVE-2018-12376: Various memory safety bugs (bsc#1107343).
   - CVE-2018-12377: Use-after-free in refresh driver timers (bsc#1107343).
   - CVE-2018-12378: Use-after-free in IndexedDB (bsc#1107343).
   - CVE-2018-12379: Out-of-bounds write with malicious MAR file

Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Module for Desktop Applications 15:

      zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-2018-2053=1

Package List:

   - SUSE Linux Enterprise Module for Desktop Applications 15 (aarch64 ppc64le x86_64):



More information about the sle-security-updates mailing list