Incoming details.
CVE-2018-18492: Use-after-free with select element Impact high Description A use-after-free vulnerability can occur after deleting a selection element due to a weak reference to the select element in the options collection. This results in a potentially exploitable crash. CVE-2018-18493: Buffer overflow in accelerated 2D canvas with Skia Impact high Description A buffer overflow can occur in the Skia library during buffer offset calculations with hardware accelerated canvas 2D actions due to the use of 32-bit calculations instead of 64-bit. This results in a potentially exploitable crash. CVE-2018-18494: Same-origin policy violation using location attribute and performance.getEntries to steal cross-origin URLs Impact high Description A same-origin policy violation allowing the theft of cross-origin URL entries when using the Javascript location property to cause a redirection to another site using performance.getEntries(). This is a same-origin policy violation and could allow for data theft. CVE-2018-18498: Integer overflow when calculating buffer sizes for images Impact low Description A potential vulnerability leading to an integer overflow can occur during buffer size calculations for images when a raw value is used instead of the checked value. This leads to a possible out-of-bounds write. CVE-2018-12405: Memory safety bugs fixed in Firefox 64 and Firefox ESR 60.4 Impact critical Description Mozilla developers and community members Christian Holler, Diego Calleja, Andrew McCreight, Jon Coppeard, Natalia Csoregi, Nicolas B. Pierron, and Tyson Smith reported memory safety bugs present in Firefox 63 and Firefox ESR 60.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code.
x86 stable
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=459fdfc1e21663e1290a85dd90cefebb53cb88a7 commit 459fdfc1e21663e1290a85dd90cefebb53cb88a7 Author: Thomas Deutschmann <whissi@gentoo.org> AuthorDate: 2018-12-13 15:43:35 +0000 Commit: Thomas Deutschmann <whissi@gentoo.org> CommitDate: 2018-12-13 15:45:05 +0000 www-client/firefox: security cleanup Bug: https://bugs.gentoo.org/672956 Package-Manager: Portage-2.3.52, Repoman-2.3.12 Signed-off-by: Thomas Deutschmann <whissi@gentoo.org> www-client/firefox/Manifest | 277 --------- .../firefox-63.0.1-support-latest-cbindgen.patch | 29 - www-client/firefox/firefox-60.3.0-r1.ebuild | 419 -------------- www-client/firefox/firefox-63.0.1-r1.ebuild | 643 --------------------- www-client/firefox/firefox-63.0.3.ebuild | 641 -------------------- 5 files changed, 2009 deletions(-)
Added to an existing GLSA request.
This issue was resolved and addressed in GLSA 201903-04 at https://security.gentoo.org/glsa/201903-04 by GLSA coordinator Aaron Bauman (b-man).