openSUSE: 2020:1574-1: important: MozillaFirefox
Description
This update for MozillaFirefox fixes the following issues: -Firefox was updated to 78.3.0 ESR (bsc#1176756, MFSA 2020-43) - CVE-2020-15677: Download origin spoofing via redirect - CVE-2020-15676: Fixed an XSS when pasting attacker-controlled data into a contenteditable element - CVE-2020-15678: When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free scenario - CVE-2020-15673: Fixed memory safety bugs - Enhance fix for wayland-detection (bsc#1174420) - Attempt to fix langpack-parallelization by introducing separate obj-dirs for each lang (bsc#1173986, bsc#1167976) This update was imported from the SUSE:SLE-15:Update update project.
Patch
Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.2: zypper in -t patch openSUSE-2020-1574=1
Package List
- openSUSE Leap 15.2 (x86_64): MozillaFirefox-78.3.0-lp152.2.21.1 MozillaFirefox-branding-upstream-78.3.0-lp152.2.21.1 MozillaFirefox-buildsymbols-78.3.0-lp152.2.21.1 MozillaFirefox-debuginfo-78.3.0-lp152.2.21.1 MozillaFirefox-debugsource-78.3.0-lp152.2.21.1 MozillaFirefox-devel-78.3.0-lp152.2.21.1 MozillaFirefox-translations-common-78.3.0-lp152.2.21.1 MozillaFirefox-translations-other-78.3.0-lp152.2.21.1
References
https://www.suse.com/security/cve/CVE-2020-15673.html https://www.suse.com/security/cve/CVE-2020-15676.html https://www.suse.com/security/cve/CVE-2020-15677.html https://www.suse.com/security/cve/CVE-2020-15678.html https://bugzilla.suse.com/1167976 https://bugzilla.suse.com/1173986 https://bugzilla.suse.com/1174420 https://bugzilla.suse.com/1176756--