ALT-BU-2018-3618-1
Branch p8 update bulletin.
Closed vulnerabilities
BDU:2018-01562
Уязвимость набора библиотек Network Security Services, связанная с ошибками при установлении соединения, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации
BDU:2019-01764
Уязвимость реализации протокола SSLv2 набора библиотек Network Security Services, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2019-04362
Уязвимость набора библиотек NSS (Network Security Services), связанная с ошибками генерации значений при обработке запроса ClientHello, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Modified: 2024-11-21
CVE-2018-12384
When handling a SSLv2-compatible ClientHello request, the server doesn't generate a new random value but sends an all-zero value instead. This results in full malleability of the ClientHello for SSLv2 used for TLS 1.2 in all versions prior to NSS 3.39. This does not impact TLS 1.3.
Closed vulnerabilities
BDU:2020-01729
Уязвимость плагина rustdoc языка программирования Rust, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2018-1000622
The Rust Programming Language rustdoc version Between 0.8 and 1.27.0 contains a CWE-427: Uncontrolled Search Path Element vulnerability in rustdoc plugins that can result in local code execution as a different user. This attack appear to be exploitable via using the --plugin flag without the --plugin-path flag. This vulnerability appears to have been fixed in 1.27.1.
- openSUSE-SU-2019:2203
- openSUSE-SU-2019:2203
- openSUSE-SU-2019:2244
- openSUSE-SU-2019:2244
- openSUSE-SU-2019:2294
- openSUSE-SU-2019:2294
- https://groups.google.com/forum/#%21topic/rustlang-security-announcements/4ybxYLTtXuM
- https://groups.google.com/forum/#%21topic/rustlang-security-announcements/4ybxYLTtXuM
- GLSA-201812-11
- GLSA-201812-11
Modified: 2024-11-21
CVE-2018-25008
In the standard library in Rust before 1.29.0, there is weak synchronization in the Arc::get_mut method. This synchronization issue can be lead to memory safety issues through race conditions.
Modified: 2024-11-21
CVE-2019-1010299
The Rust Programming Language Standard Library 1.18.0 and later is affected by: CWE-200: Information Exposure. The impact is: Contents of uninitialized memory could be printed to string or to log file. The component is: Debug trait implementation for std::collections::vec_deque::Iter. The attack vector is: The program needs to invoke debug printing for iterator over an empty VecDeque. The fixed version is: 1.30.0, nightly versions after commit b85e4cc8fadaabd41da5b9645c08c68b8f89908d.
Modified: 2024-11-21
CVE-2019-16760
Cargo prior to Rust 1.26.0 may download the wrong dependency if your package.toml file uses the `package` configuration key. Usage of the `package` key to rename dependencies in `Cargo.toml` is ignored in Rust 1.25.0 and prior. When Rust 1.25.0 and prior is used Cargo may download the wrong dependency, which could be squatted on crates.io to be a malicious package. This not only affects manifests that you write locally yourself, but also manifests published to crates.io. Rust 1.0.0 through Rust 1.25.0 is affected by this advisory because Cargo will ignore the `package` key in manifests. Rust 1.26.0 through Rust 1.30.0 are not affected and typically will emit an error because the `package` key is unstable. Rust 1.31.0 and after are not affected because Cargo understands the `package` key. Users of the affected versions are strongly encouraged to update their compiler to the latest available one. Preventing this issue from happening requires updating your compiler to be either Rust 1.26.0 or newer. There will be no point release for Rust versions prior to 1.26.0. Users of Rust 1.19.0 to Rust 1.25.0 can instead apply linked patches to mitigate the issue.
- [oss-security] 20191008 CVE-2019-16760: Cargo prior to Rust 1.26.0 may download the wrong dependency
- [oss-security] 20191008 CVE-2019-16760: Cargo prior to Rust 1.26.0 may download the wrong dependency
- https://gist.github.com/pietroalbini/0d293b24a44babbeb6187e06eebd4992
- https://gist.github.com/pietroalbini/0d293b24a44babbeb6187e06eebd4992
- https://github.com/rust-lang/rust/security/advisories/GHSA-phjm-8x66-qw4r
- https://github.com/rust-lang/rust/security/advisories/GHSA-phjm-8x66-qw4r
- https://groups.google.com/forum/#%21topic/rustlang-security-announcements/rVQ5e3TDnpQ
- https://groups.google.com/forum/#%21topic/rustlang-security-announcements/rVQ5e3TDnpQ
Closed vulnerabilities
BDU:2018-01368
Уязвимость браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, связанная с ситуацией гонки в обработчике сигнала, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2018-01442
Уязвимость обработчика JavaScript-сценариев веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2019-03472
Уязвимость реализации протокола HTTP Live Streaming браузеров Firefox и Firefox ESR и почтового клиента Thunderbird для Android, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2019-04297
Уязвимость браузера Firefox, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2019-04298
Уязвимость системы для разработки дополнений WebExtensions браузеров Firefox, Firefox ESR, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2019-04299
Уязвимость системы для разработки дополнений WebExtensions браузеров Firefox, Firefox ESR, позволяющая нарушителю повысить свои привилегии
BDU:2019-04300
Уязвимость системы для разработки дополнений WebExtensions браузеров Firefox, Firefox ESR, позволяющая нарушителю получить несанкционированный доступ к локальным файлам
BDU:2019-04301
Уязвимость браузера Firefox, связанная с отсутствием мер по очистке входных данных, позволяющая нарушителю обойти защитный механизм CSP
BDU:2019-04302
Уязвимость компонента API браузера Firefox, позволяющая нарушителю подменить пользовательский интерфейс
BDU:2019-04303
Уязвимость браузера Firefox, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04304
Уязвимость компонента WebBrowserPersist браузера Firefox, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2019-04305
Уязвимость браузера Firefox, вызванная отсутствием предупреждения о смешанном содержимом, когда компонент веб-страницы favicon загружается через HTTP, позволяющая нарушителю проводить спуфинг-атаки
BDU:2019-04569
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2018-12388
Mozilla developers and community members reported memory safety bugs present in Firefox 62. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 63.
- 105721
- 105721
- 1041944
- 1041944
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1472639%2C1485698%2C1301547%2C1471427%2C1379411%2C1482122%2C1486314%2C1487167
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1472639%2C1485698%2C1301547%2C1471427%2C1379411%2C1482122%2C1486314%2C1487167
- USN-3801-1
- USN-3801-1
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-26/
Modified: 2024-11-21
CVE-2018-12390
Mozilla developers and community members reported memory safety bugs present in Firefox 62 and Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 63, Firefox ESR < 60.3, and Thunderbird < 60.3.
- 105718
- 105718
- 105769
- 105769
- 1041944
- 1041944
- RHSA-2018:3005
- RHSA-2018:3005
- RHSA-2018:3006
- RHSA-2018:3006
- RHSA-2018:3531
- RHSA-2018:3531
- RHSA-2018:3532
- RHSA-2018:3532
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1487098%2C1487660%2C1490234%2C1496159%2C1443748%2C1496340%2C1483905%2C1493347%2C1488803%2C1498701%2C1498482%2C1442010%2C1495245%2C1483699%2C1469486%2C1484905%2C1490561%2C1492524%2C1481844
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1487098%2C1487660%2C1490234%2C1496159%2C1443748%2C1496340%2C1483905%2C1493347%2C1488803%2C1498701%2C1498482%2C1442010%2C1495245%2C1483699%2C1469486%2C1484905%2C1490561%2C1492524%2C1481844
- [debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update
- [debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201811-04
- GLSA-201811-04
- GLSA-201811-13
- GLSA-201811-13
- USN-3801-1
- USN-3801-1
- USN-3868-1
- USN-3868-1
- DSA-4324
- DSA-4324
- DSA-4337
- DSA-4337
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-28/
- https://www.mozilla.org/security/advisories/mfsa2018-28/
Modified: 2024-11-21
CVE-2018-12391
During HTTP Live Stream playback on Firefox for Android, audio data can be accessed across origins in violation of security policies. Because the problem is in the underlying Android service, this issue is addressed by treating all HLS streams as cross-origin and opaque to access. *Note: this issue only affects Firefox for Android. Desktop versions of Firefox are unaffected.*. This vulnerability affects Firefox < 63, Firefox ESR < 60.3, and Thunderbird < 60.3.
- 105718
- 105718
- 105769
- 105769
- 1041944
- 1041944
- https://bugzilla.mozilla.org/show_bug.cgi?id=1478843
- https://bugzilla.mozilla.org/show_bug.cgi?id=1478843
- GLSA-201811-13
- GLSA-201811-13
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-28/
- https://www.mozilla.org/security/advisories/mfsa2018-28/
Modified: 2024-11-21
CVE-2018-12392
When manipulating user events in nested loops while opening a document through script, it is possible to trigger a potentially exploitable crash due to poor event handling. This vulnerability affects Firefox < 63, Firefox ESR < 60.3, and Thunderbird < 60.3.
- 105718
- 105718
- 105769
- 105769
- 1041944
- 1041944
- RHSA-2018:3005
- RHSA-2018:3005
- RHSA-2018:3006
- RHSA-2018:3006
- RHSA-2018:3531
- RHSA-2018:3531
- RHSA-2018:3532
- RHSA-2018:3532
- https://bugzilla.mozilla.org/show_bug.cgi?id=1492823
- https://bugzilla.mozilla.org/show_bug.cgi?id=1492823
- [debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update
- [debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201811-04
- GLSA-201811-04
- GLSA-201811-13
- GLSA-201811-13
- USN-3801-1
- USN-3801-1
- USN-3868-1
- USN-3868-1
- DSA-4324
- DSA-4324
- DSA-4337
- DSA-4337
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-28/
- https://www.mozilla.org/security/advisories/mfsa2018-28/
Modified: 2024-11-21
CVE-2018-12393
A potential vulnerability was found in 32-bit builds where an integer overflow during the conversion of scripts to an internal UTF-16 representation could result in allocating a buffer too small for the conversion. This leads to a possible out-of-bounds write. *Note: 64-bit builds are not vulnerable to this issue.*. This vulnerability affects Firefox < 63, Firefox ESR < 60.3, and Thunderbird < 60.3.
- 105718
- 105718
- 105769
- 105769
- 1041944
- 1041944
- RHSA-2018:3005
- RHSA-2018:3005
- RHSA-2018:3006
- RHSA-2018:3006
- RHSA-2018:3531
- RHSA-2018:3531
- RHSA-2018:3532
- RHSA-2018:3532
- https://bugzilla.mozilla.org/show_bug.cgi?id=1495011
- https://bugzilla.mozilla.org/show_bug.cgi?id=1495011
- [debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update
- [debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- [debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update
- GLSA-201811-04
- GLSA-201811-04
- GLSA-201811-13
- GLSA-201811-13
- USN-3801-1
- USN-3801-1
- USN-3868-1
- USN-3868-1
- DSA-4324
- DSA-4324
- DSA-4337
- DSA-4337
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-28/
- https://www.mozilla.org/security/advisories/mfsa2018-28/
Modified: 2024-11-21
CVE-2018-12395
By rewriting the Host: request headers using the webRequest API, a WebExtension can bypass domain restrictions through domain fronting. This would allow access to domains that share a host that are otherwise restricted. This vulnerability affects Firefox ESR < 60.3 and Firefox < 63.
- 105718
- 105718
- 1041944
- 1041944
- RHSA-2018:3005
- RHSA-2018:3005
- RHSA-2018:3006
- RHSA-2018:3006
- https://bugzilla.mozilla.org/show_bug.cgi?id=1467523
- https://bugzilla.mozilla.org/show_bug.cgi?id=1467523
- [debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update
- [debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update
- GLSA-201811-04
- GLSA-201811-04
- USN-3801-1
- USN-3801-1
- DSA-4324
- DSA-4324
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
Modified: 2024-11-21
CVE-2018-12396
A vulnerability where a WebExtension can run content scripts in disallowed contexts following navigation or other events. This allows for potential privilege escalation by the WebExtension on sites where content scripts should not be run. This vulnerability affects Firefox ESR < 60.3 and Firefox < 63.
- 105718
- 105718
- 1041944
- 1041944
- RHSA-2018:3005
- RHSA-2018:3005
- RHSA-2018:3006
- RHSA-2018:3006
- https://bugzilla.mozilla.org/show_bug.cgi?id=1483602
- https://bugzilla.mozilla.org/show_bug.cgi?id=1483602
- [debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update
- [debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update
- GLSA-201811-04
- GLSA-201811-04
- USN-3801-1
- USN-3801-1
- DSA-4324
- DSA-4324
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
Modified: 2024-11-21
CVE-2018-12397
A WebExtension can request access to local files without the warning prompt stating that the extension will "Access your data for all websites" being displayed to the user. This allows extensions to run content scripts in local pages without permission warnings when a local file is opened. This vulnerability affects Firefox ESR < 60.3 and Firefox < 63.
- 105718
- 105718
- 1041944
- 1041944
- RHSA-2018:3005
- RHSA-2018:3005
- RHSA-2018:3006
- RHSA-2018:3006
- https://bugzilla.mozilla.org/show_bug.cgi?id=1487478
- https://bugzilla.mozilla.org/show_bug.cgi?id=1487478
- [debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update
- [debian-lts-announce] 20181107 [SECURITY] [DLA 1571-1] firefox-esr security update
- GLSA-201811-04
- GLSA-201811-04
- USN-3801-1
- USN-3801-1
- DSA-4324
- DSA-4324
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
Modified: 2024-11-21
CVE-2018-12398
By using the reflected URL in some special resource URIs, such as chrome:, it is possible to inject stylesheets and bypass Content Security Policy (CSP). This vulnerability affects Firefox < 63.
- 105721
- 105721
- 1041944
- 1041944
- https://bugzilla.mozilla.org/show_bug.cgi?id=1460538
- https://bugzilla.mozilla.org/show_bug.cgi?id=1460538
- https://bugzilla.mozilla.org/show_bug.cgi?id=1488061
- https://bugzilla.mozilla.org/show_bug.cgi?id=1488061
- USN-3801-1
- USN-3801-1
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-26/
Modified: 2024-11-21
CVE-2018-12399
When a new protocol handler is registered, the API accepts a title argument which can be used to mislead users about which domain is registering the new protocol. This may result in the user approving a protocol handler that they otherwise would not have. This vulnerability affects Firefox < 63.
Modified: 2024-11-21
CVE-2018-12400
In private browsing mode on Firefox for Android, favicons are cached in the cache/icons folder as they are in non-private mode. This allows information leakage of sites visited during private browsing sessions. *Note: this issue only affects Firefox for Android. Desktop versions of Firefox are unaffected.*. This vulnerability affects Firefox < 63.
Modified: 2024-11-21
CVE-2018-12401
Some special resource URIs will cause a non-exploitable crash if loaded with optional parameters following a '?' in the parsed string. This could lead to denial of service (DOS) attacks. This vulnerability affects Firefox < 63.
Modified: 2024-11-21
CVE-2018-12402
The internal WebBrowserPersist code does not use correct origin context for a resource being saved. This manifests when sub-resources are loaded as part of "Save Page As..." functionality. For example, a malicious page could recover a visitor's Windows username and NTLM hash by including resources otherwise unreachable to the malicious page, if they can convince the visitor to save the complete web page. Similarly, SameSite cookies are sent on cross-origin requests when the "Save Page As..." menu item is selected to save a page, which can result in saving the wrong version of resources based on those cookies. This vulnerability affects Firefox < 63.
- 105721
- 105721
- 1041944
- 1041944
- https://bugzilla.mozilla.org/show_bug.cgi?id=1447087
- https://bugzilla.mozilla.org/show_bug.cgi?id=1447087
- https://bugzilla.mozilla.org/show_bug.cgi?id=1469916
- https://bugzilla.mozilla.org/show_bug.cgi?id=1469916
- USN-3801-1
- USN-3801-1
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://www.mozilla.org/security/advisories/mfsa2018-26/
Modified: 2024-11-21
CVE-2018-12403
If a site is loaded over a HTTPS connection but loads a favicon resource over HTTP, the mixed content warning is not displayed to users. This vulnerability affects Firefox < 63.
Closed bugs
sos vs autofs: сбор логов не выполняется
Closed bugs
Conky не работает вместе с apcupsd