Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 672956 (CVE-2018-12405, CVE-2018-18492, CVE-2018-18493, CVE-2018-18494, CVE-2018-18498, MFSA-2018-30)

Summary: <www-client/firefox{,-bin}-{60.4.0,64.0}: multiple vulnerabilities (MFSA-2018-30)
Product: Gentoo Security Reporter: GLSAMaker/CVETool Bot <glsamaker>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: normal CC: mozilla
Priority: Normal Flags: stable-bot: sanity-check+
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://www.mozilla.org/en-US/security/advisories/mfsa2018-30/
Whiteboard: B2 [glsa+ cve]
Package list:
www-client/firefox-60.4.0
Runtime testing required: ---

Description GLSAMaker/CVETool Bot gentoo-dev 2018-12-11 22:59:18 UTC
Incoming details.
Comment 1 Thomas Deutschmann (RETIRED) gentoo-dev 2018-12-11 23:02:33 UTC
CVE-2018-18492: Use-after-free with select element

Impact
    high

Description

A use-after-free vulnerability can occur after deleting a selection element due to a weak reference to the select element in the options collection. This results in a potentially exploitable crash.


CVE-2018-18493: Buffer overflow in accelerated 2D canvas with Skia

Impact
    high

Description

A buffer overflow can occur in the Skia library during buffer offset calculations with hardware accelerated canvas 2D actions due to the use of 32-bit calculations instead of 64-bit. This results in a potentially exploitable crash.


CVE-2018-18494: Same-origin policy violation using location attribute and performance.getEntries to steal cross-origin URLs

Impact
    high

Description

A same-origin policy violation allowing the theft of cross-origin URL entries when using the Javascript location property to cause a redirection to another site using performance.getEntries(). This is a same-origin policy violation and could allow for data theft.


CVE-2018-18498: Integer overflow when calculating buffer sizes for images

Impact
    low

Description

A potential vulnerability leading to an integer overflow can occur during buffer size calculations for images when a raw value is used instead of the checked value. This leads to a possible out-of-bounds write.


CVE-2018-12405: Memory safety bugs fixed in Firefox 64 and Firefox ESR 60.4

Impact
    critical

Description

Mozilla developers and community members Christian Holler, Diego Calleja, Andrew McCreight, Jon Coppeard, Natalia Csoregi, Nicolas B. Pierron, and Tyson Smith reported memory safety bugs present in Firefox 63 and Firefox ESR 60.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code.
Comment 2 Thomas Deutschmann (RETIRED) gentoo-dev 2018-12-13 12:52:42 UTC
x86 stable
Comment 3 Larry the Git Cow gentoo-dev 2018-12-13 15:45:14 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=459fdfc1e21663e1290a85dd90cefebb53cb88a7

commit 459fdfc1e21663e1290a85dd90cefebb53cb88a7
Author:     Thomas Deutschmann <whissi@gentoo.org>
AuthorDate: 2018-12-13 15:43:35 +0000
Commit:     Thomas Deutschmann <whissi@gentoo.org>
CommitDate: 2018-12-13 15:45:05 +0000

    www-client/firefox: security cleanup
    
    Bug: https://bugs.gentoo.org/672956
    Package-Manager: Portage-2.3.52, Repoman-2.3.12
    Signed-off-by: Thomas Deutschmann <whissi@gentoo.org>

 www-client/firefox/Manifest                        | 277 ---------
 .../firefox-63.0.1-support-latest-cbindgen.patch   |  29 -
 www-client/firefox/firefox-60.3.0-r1.ebuild        | 419 --------------
 www-client/firefox/firefox-63.0.1-r1.ebuild        | 643 ---------------------
 www-client/firefox/firefox-63.0.3.ebuild           | 641 --------------------
 5 files changed, 2009 deletions(-)
Comment 4 Thomas Deutschmann (RETIRED) gentoo-dev 2019-02-06 14:20:33 UTC
Added to an existing GLSA request.
Comment 5 GLSAMaker/CVETool Bot gentoo-dev 2019-03-10 19:50:49 UTC
This issue was resolved and addressed in
 GLSA 201903-04 at https://security.gentoo.org/glsa/201903-04
by GLSA coordinator Aaron Bauman (b-man).