Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 669430 (CVE-2018-12389, CVE-2018-12390, CVE-2018-12392, CVE-2018-12393, CVE-2018-12395, CVE-2018-12396, CVE-2018-12397, MFSA-2018-27) - <www-client/firefox{,-bin}-{60.3.0,63.0}: multiple vulnerabilities (MFSA-2018-27)
Summary: <www-client/firefox{,-bin}-{60.3.0,63.0}: multiple vulnerabilities (MFSA-2018...
Status: RESOLVED FIXED
Alias: CVE-2018-12389, CVE-2018-12390, CVE-2018-12392, CVE-2018-12393, CVE-2018-12395, CVE-2018-12396, CVE-2018-12397, MFSA-2018-27
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal
Assignee: Gentoo Security
URL: https://www.mozilla.org/en-US/securit...
Whiteboard: B2 [glsa+ cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2018-10-23 17:47 UTC by GLSAMaker/CVETool Bot
Modified: 2018-11-09 00:36 UTC (History)
1 user (show)

See Also:
Package list:
www-client/firefox-60.3.0
Runtime testing required: ---
stable-bot: sanity-check+


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description GLSAMaker/CVETool Bot gentoo-dev 2018-10-23 17:47:03 UTC
Incoming details.
Comment 1 Thomas Deutschmann (RETIRED) gentoo-dev 2018-10-23 17:50:33 UTC
CVE-2018-12392: Crash with nested event loops

Impact
    high

Description

When manipulating user events in nested loops while opening a document through script, it is possible to trigger a potentially exploitable crash due to poor event handling.
References


CVE-2018-12393: Integer overflow during Unicode conversion while loading JavaScript

Impact
    high

Description

A potential vulnerability was found in 32-bit builds where an integer overflow during the conversion of scripts to an internal UTF-16 representation could result in allocating a buffer too small for the conversion. This leads to a possible out-of-bounds write.
Note: 64-bit builds are not vulnerable to this issue.


CVE-2018-12395: WebExtension bypass of domain restrictions through header rewriting

Impact
    moderate

Description

By rewriting the Host request headers using the webRequest API, a WebExtension can bypass domain restrictions through domain fronting. This would allow access to domains that share a host that are otherwise restricted.
References


CVE-2018-12396: WebExtension content scripts can execute in disallowed contexts

Impact
    moderate

Description

A vulnerability where a WebExtension can run content scripts in disallowed contexts following navigation or other events. This allows for potential privilege escalation by the WebExtension on sites where content scripts should not be run.


CVE-2018-12397:

Impact
    moderate

Description

A WebExtension can request access to local files without the warning prompt stating that the extension will "Access your data for all websites" being displayed to the user. This allows extensions to run content scripts in local pages without permission warnings when a local file is opened.


CVE-2018-12389: Memory safety bugs fixed in Firefox ESR 60.3

Impact
    low

Description

Mozilla developers and community members Daniel Veditz and Philipp reported memory safety bugs present in Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code.


CVE-2018-12390: Memory safety bugs fixed in Firefox 63 and Firefox ESR 60.3

Impact
    critical

Description

Mozilla developers and community members Christian Holler, Bob Owen, Boris Zbarsky, Calixte Denizet, Jason Kratzer, Jed Davis, Taegeon Lee, Philipp, Ronald Crane, Raul Gurzau, Gary Kwong, Tyson Smith, Raymond Forbes, and Bogdan Tara reported memory safety bugs present in Firefox 62 and Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code.
Comment 2 Thomas Deutschmann (RETIRED) gentoo-dev 2018-10-24 12:42:02 UTC
@ Arches,

please test and mark stable: =www-client/firefox-60.3.0
Comment 3 Mikle Kolyada (RETIRED) archtester Gentoo Infrastructure gentoo-dev Security 2018-10-25 17:17:30 UTC
amd64 stable
Comment 4 Thomas Deutschmann (RETIRED) gentoo-dev 2018-10-26 18:51:01 UTC
x86 stable
Comment 5 Thomas Deutschmann (RETIRED) gentoo-dev 2018-10-31 21:42:20 UTC
New GLSA request filed.
Comment 6 GLSAMaker/CVETool Bot gentoo-dev 2018-11-09 00:36:25 UTC
This issue was resolved and addressed in
 GLSA 201811-04 at https://security.gentoo.org/glsa/201811-04
by GLSA coordinator Thomas Deutschmann (whissi).