Arch Linux Security Advisory ASA-201806-14 ========================================== Severity: Critical Date : 2018-06-27 CVE-ID : CVE-2018-5186 CVE-2018-5187 CVE-2018-5188 CVE-2018-12356 CVE-2018-12358 CVE-2018-12359 CVE-2018-12360 CVE-2018-12361 CVE-2018-12362 CVE-2018-12363 CVE-2018-12364 CVE-2018-12365 CVE-2018-12366 CVE-2018-12367 CVE-2018-12369 CVE-2018-12370 CVE-2018-12371 Package : firefox Type : multiple issues Remote : Yes Link : https://security.archlinux.org/AVG-727 Summary ======= The package firefox before version 61.0-1 is vulnerable to multiple issues including arbitrary code execution, cross-site request forgery, same-origin policy bypass, access restriction bypass and information disclosure. Resolution ========== Upgrade to 61.0-1. # pacman -Syu "firefox>=61.0-1" The problems have been fixed upstream in version 61.0. Workaround ========== None. Description =========== - CVE-2018-5186 (arbitrary code execution) Several memory safety bugs have been found in Firefox before 61.0. Some of these bugs showed evidence of memory corruption and Mozilla presumes that with enough effort some of these could be exploited to run arbitrary code. - CVE-2018-5187 (arbitrary code execution) Several memory safety bugs have been found in Firefox before 61.0. Some of these bugs showed evidence of memory corruption and Mozilla presumes that with enough effort some of these could be exploited to run arbitrary code. - CVE-2018-5188 (arbitrary code execution) Several memory safety bugs have been found in Firefox before 61.0. Some of these bugs showed evidence of memory corruption and Mozilla presumes that with enough effort some of these could be exploited to run arbitrary code. - CVE-2018-12356 (arbitrary code execution) An issue was discovered in password-store.sh in pass in Simple Password Store 1.7 through 1.7.1. The signature verification routine parses the output of GnuPG with an incomplete regular expression, which allows remote attackers to spoof file signatures on configuration files and extensions scripts. Modifying the configuration file allows the attacker to inject additional encryption keys under their control, thereby disclosing passwords to the attacker. Modifying the extension scripts allows the attacker arbitrary code execution. - CVE-2018-12358 (same-origin policy bypass) Service workers in Firefox before 61.0 can use redirection to avoid the tainting of cross-origin resources in some instances, allowing a malicious site to read responses which are supposed to be opaque. - CVE-2018-12359 (arbitrary code execution) A buffer overflow can occur in Firefox before 61.0 when rendering canvas content while adjusting the height and width of the element dynamically, causing data to be written outside of the currently computed boundaries. This results in a potentially exploitable crash. - CVE-2018-12360 (arbitrary code execution) A use-after-free vulnerability can occur in Firefox before 61.0 when deleting an input element during a mutation event handler triggered by focusing that element. This results in a potentially exploitable crash. - CVE-2018-12361 (arbitrary code execution) An integer overflow can occur in Firefox before 61.0 in the SwizzleData code while calculating buffer sizes. The overflowed value is used for subsequent graphics computations when their inputs are not sanitized which results in a potentially exploitable crash. - CVE-2018-12362 (arbitrary code execution) An integer overflow can occur in Firefox before 61.0 during graphics operations done by the Supplemental Streaming SIMD Extensions 3 (SSSE3) scaler, resulting in a potentially exploitable crash. - CVE-2018-12363 (arbitrary code execution) A use-after-free vulnerability can occur in Firefox before 61.0 when script uses mutation events to move DOM nodes between documents, resulting in the old document that held the node being freed but the node still having a pointer referencing it. This results in a potentially exploitable crash. - CVE-2018-12364 (cross-site request forgery) A security issue has been found in Firefox before 61.0 where NPAPI plugins, such as Adobe Flash, can send non-simple cross-origin requests, bypassing CORS by making a same-origin POST that does a 307 redirect to the target site. This allows for a malicious site to engage in cross-site request forgery (CSRF) attacks. - CVE-2018-12365 (information disclosure) A security issue has been found in Firefox before 61.0 where a compromised IPC child process can escape the content sandbox and list the names of arbitrary files on the file system without user consent or interaction. This could result in exposure of private local files. - CVE-2018-12366 (information disclosure) An invalid grid size during QCMS (color profile) transformations can result in the out-of-bounds read interpreted as a float value, in Firefox before 61.0. This could leak private data into the output. - CVE-2018-12367 (information disclosure) A security issue has been found in Firefox before 61.0. In the previous mitigations for Spectre, the resolution or precision of various methods was reduced to counteract the ability to measure precise time intervals. In that work, PerformanceNavigationTiming was not adjusted but it was found that it could be used as a precision timer. - CVE-2018-12369 (access restriction bypass) WebExtensions bundled with embedded experiments were not correctly checked for proper authorization before Firefox 61.0. This allowed a malicious WebExtension to gain full browser permissions. - CVE-2018-12370 (access restriction bypass) In the Reader View of Firefox before 61.0, SameSite cookie protections are not checked on exiting. This allows for a payload to be triggered when Reader View is exited if loaded by a malicious site while Reader mode is active, bypassing CSRF protections. - CVE-2018-12371 (arbitrary code execution) An integer overflow vulnerability has been found in the Skia library shipped with Firefox before 61.0, when allocating memory for edge builders on some systems with at least 16 GB of RAM. This results in the use of uninitialized memory, resulting in a potentially exploitable crash. Impact ====== A remote attacker can access sensitive information, bypass various security mechanisms and execute arbitrary code on the affected host. References ========== https://www.mozilla.org/en-US/security/advisories/mfsa2018-15 https://www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-5186 https://bugzilla.mozilla.org/buglist.cgi?bug_id=1464872%2C1463329%2C1419373%2C1412882%2C1413033%2C1444673%2C1454448%2C1453505%2C1438671 https://www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-5187 https://bugzilla.mozilla.org/buglist.cgi?bug_id=1461324%2C1414829%2C1395246%2C1467938%2C1461619%2C1425930%2C1438556%2C1454285%2C1459568%2C1463884 https://www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-5188 https://bugzilla.mozilla.org/buglist.cgi?bug_id=1456189%2C1456975%2C1465898%2C1392739%2C1451297%2C1464063%2C1437842%2C1442722%2C1452576%2C1450688%2C1458264%2C1458270%2C1465108%2C1464829%2C1464079%2C1463494%2C1458048 https://neopg.io/blog/pass-signature-spoof/ https://marc.info/?l=oss-security&m=152901317028506 https://github.com/zx2c4/password-store/commit/8683403b77f59c56fcb1f05c61ab33b9fd61a30d https://www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12358 https://bugzilla.mozilla.org/show_bug.cgi?id=1467852 https://www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12359 https://bugzilla.mozilla.org/show_bug.cgi?id=1459162 https://www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12360 https://bugzilla.mozilla.org/show_bug.cgi?id=1459693 https://www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12361 https://bugzilla.mozilla.org/show_bug.cgi?id=1463244 https://www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12362 https://bugzilla.mozilla.org/show_bug.cgi?id=1452375 https://www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12363 https://bugzilla.mozilla.org/show_bug.cgi?id=1464784 https://www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12364 https://bugzilla.mozilla.org/show_bug.cgi?id=1436241 https://www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12365 https://bugzilla.mozilla.org/show_bug.cgi?id=1459206 https://www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12366 https://bugzilla.mozilla.org/show_bug.cgi?id=1464039 https://www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12367 https://bugzilla.mozilla.org/show_bug.cgi?id=1462891 https://www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12369 https://bugzilla.mozilla.org/show_bug.cgi?id=1454909 https://www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12370 https://bugzilla.mozilla.org/show_bug.cgi?id=1456652 https://www.mozilla.org/en-US/security/advisories/mfsa2018-15/#CVE-2018-12371 https://bugzilla.mozilla.org/show_bug.cgi?id=1465686 https://security.archlinux.org/CVE-2018-5186 https://security.archlinux.org/CVE-2018-5187 https://security.archlinux.org/CVE-2018-5188 https://security.archlinux.org/CVE-2018-12356 https://security.archlinux.org/CVE-2018-12358 https://security.archlinux.org/CVE-2018-12359 https://security.archlinux.org/CVE-2018-12360 https://security.archlinux.org/CVE-2018-12361 https://security.archlinux.org/CVE-2018-12362 https://security.archlinux.org/CVE-2018-12363 https://security.archlinux.org/CVE-2018-12364 https://security.archlinux.org/CVE-2018-12365 https://security.archlinux.org/CVE-2018-12366 https://security.archlinux.org/CVE-2018-12367 https://security.archlinux.org/CVE-2018-12369 https://security.archlinux.org/CVE-2018-12370 https://security.archlinux.org/CVE-2018-12371