Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.2291 Critical: firefox security updates 26 June 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: firefox Publisher: Red Hat Operating System: Red Hat Enterprise Linux Server 7 Red Hat Enterprise Linux WS/Desktop 7 Red Hat Enterprise Linux Server 6 Red Hat Enterprise Linux WS/Desktop 6 Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2019-11708 CVE-2019-11707 Reference: ASB-2019.0166 ESB-2019.2274 ESB-2019.2273 ESB-2019.2250 ESB-2019.2245 Original Bulletin: https://access.redhat.com/errata/RHSA-2019:1603 https://access.redhat.com/errata/RHSA-2019:1604 Comment: This bulletin contains two (2) Red Hat security advisories. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Critical: firefox security update Advisory ID: RHSA-2019:1603-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2019:1603 Issue date: 2019-06-25 CVE Names: CVE-2019-11707 CVE-2019-11708 ===================================================================== 1. Summary: An update for firefox is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - aarch64, ppc64le, s390x 3. Description: Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 60.7.2 ESR. Security Fix(es): * Mozilla: Type confusion in Array.pop (CVE-2019-11707) * Mozilla: Sandbox escape using Prompt:Open (CVE-2019-11708) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Firefox must be restarted for the changes to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1721789 - CVE-2019-11707 Mozilla: Type confusion in Array.pop 1722673 - CVE-2019-11708 Mozilla: Sandbox escape using Prompt:Open 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: firefox-60.7.2-1.el7_6.src.rpm x86_64: firefox-60.7.2-1.el7_6.x86_64.rpm firefox-debuginfo-60.7.2-1.el7_6.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: firefox-60.7.2-1.el7_6.i686.rpm firefox-debuginfo-60.7.2-1.el7_6.i686.rpm Red Hat Enterprise Linux Server (v. 7): Source: firefox-60.7.2-1.el7_6.src.rpm ppc64: firefox-60.7.2-1.el7_6.ppc64.rpm firefox-debuginfo-60.7.2-1.el7_6.ppc64.rpm ppc64le: firefox-60.7.2-1.el7_6.ppc64le.rpm firefox-debuginfo-60.7.2-1.el7_6.ppc64le.rpm s390x: firefox-60.7.2-1.el7_6.s390x.rpm firefox-debuginfo-60.7.2-1.el7_6.s390x.rpm x86_64: firefox-60.7.2-1.el7_6.x86_64.rpm firefox-debuginfo-60.7.2-1.el7_6.x86_64.rpm Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7): Source: firefox-60.7.2-1.el7_6.src.rpm aarch64: firefox-60.7.2-1.el7_6.aarch64.rpm firefox-debuginfo-60.7.2-1.el7_6.aarch64.rpm ppc64le: firefox-60.7.2-1.el7_6.ppc64le.rpm firefox-debuginfo-60.7.2-1.el7_6.ppc64le.rpm s390x: firefox-60.7.2-1.el7_6.s390x.rpm firefox-debuginfo-60.7.2-1.el7_6.s390x.rpm Red Hat Enterprise Linux Server Optional (v. 7): x86_64: firefox-60.7.2-1.el7_6.i686.rpm firefox-debuginfo-60.7.2-1.el7_6.i686.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: firefox-60.7.2-1.el7_6.src.rpm x86_64: firefox-60.7.2-1.el7_6.x86_64.rpm firefox-debuginfo-60.7.2-1.el7_6.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: firefox-60.7.2-1.el7_6.i686.rpm firefox-debuginfo-60.7.2-1.el7_6.i686.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2019-11707 https://access.redhat.com/security/cve/CVE-2019-11708 https://access.redhat.com/security/updates/classification/#critical https://www.mozilla.org/en-US/security/advisories/mfsa2019-18/ https://www.mozilla.org/en-US/security/advisories/mfsa2019-19/ 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2019 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXRKUCNzjgjWX9erEAQgZohAAjHaGI2GaPWW5tTSj2KqoyeAglwpYOlJT gFwCWxmfQ3UfSnUC5ZYagV5JgEW/fvxteg8T8Kw+YJpMjfmtquQlZeS6y/a6H6x3 JOYazcyr/QKRXx/q3Cs7ABNR1G1Dng1OdwKFQFXKSecO0NYD3TMiJL8gDlUE36nV joWbl4LqZ92bX8LwZ12ZyqpcJJbghtMZOyV/wAFGwwr7Cx/0T4Djc9kTEPcjWRLz ZJXEq25ILy5zeDrLqXJdPJoEuhBtvlbxQsryaQ2IDiEJMemxlCChdVUFLyzdFcTb MyPrUaHjvOp8lxTEGNyRTC2KdByJpdjuY8DGWzRwawWN7qqJfNFiDO6dOMW4P1Yp WOqYfwBINT7Qje/ap7WtmZ8tdqAvOmSL3wN70qGytUjEth8NE4oTN/K7V2yUs9jz 9Ty8sph11M6pRJZqgxmoEyzVD/SWi6QqHifwUzxG9si1qg2zxozWK7BL7pk6+GxB p1fMbgzYP/7AEHxzaGde7mCqfjXt3xirIjjpDnL+cF2kqwQ6llZlQfVItEGH3Qu2 GbSBEyZJvJfmvqwv0jFpsw0Ko82hIOLulgjtKkW/RD9QiowKVRlfS84lEEWmMXdJ Vg1A7D30wAqRRjax42/OdIvndKCLkZvxeJxRV9/jPi2Utlx5acTFYT3J7ThsXacZ xQIP4QKYhPo= =K6dc - -----END PGP SIGNATURE----- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Critical: firefox security update Advisory ID: RHSA-2019:1604-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2019:1604 Issue date: 2019-06-25 CVE Names: CVE-2019-11707 CVE-2019-11708 ===================================================================== 1. Summary: An update for firefox is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - x86_64 3. Description: Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 60.7.2 ESR. Security Fix(es): * Mozilla: Type confusion in Array.pop (CVE-2019-11707) * Mozilla: Sandbox escape using Prompt:Open (CVE-2019-11708) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Firefox must be restarted for the changes to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1721789 - CVE-2019-11707 Mozilla: Type confusion in Array.pop 1722673 - CVE-2019-11708 Mozilla: Sandbox escape using Prompt:Open 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: firefox-60.7.2-1.el6_10.src.rpm i386: firefox-60.7.2-1.el6_10.i686.rpm firefox-debuginfo-60.7.2-1.el6_10.i686.rpm x86_64: firefox-60.7.2-1.el6_10.x86_64.rpm firefox-debuginfo-60.7.2-1.el6_10.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): x86_64: firefox-60.7.2-1.el6_10.i686.rpm firefox-debuginfo-60.7.2-1.el6_10.i686.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: firefox-60.7.2-1.el6_10.src.rpm x86_64: firefox-60.7.2-1.el6_10.i686.rpm firefox-60.7.2-1.el6_10.x86_64.rpm firefox-debuginfo-60.7.2-1.el6_10.i686.rpm firefox-debuginfo-60.7.2-1.el6_10.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: firefox-60.7.2-1.el6_10.src.rpm i386: firefox-60.7.2-1.el6_10.i686.rpm firefox-debuginfo-60.7.2-1.el6_10.i686.rpm ppc64: firefox-60.7.2-1.el6_10.ppc64.rpm firefox-debuginfo-60.7.2-1.el6_10.ppc64.rpm s390x: firefox-60.7.2-1.el6_10.s390x.rpm firefox-debuginfo-60.7.2-1.el6_10.s390x.rpm x86_64: firefox-60.7.2-1.el6_10.x86_64.rpm firefox-debuginfo-60.7.2-1.el6_10.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): x86_64: firefox-60.7.2-1.el6_10.i686.rpm firefox-debuginfo-60.7.2-1.el6_10.i686.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: firefox-60.7.2-1.el6_10.src.rpm i386: firefox-60.7.2-1.el6_10.i686.rpm firefox-debuginfo-60.7.2-1.el6_10.i686.rpm x86_64: firefox-60.7.2-1.el6_10.x86_64.rpm firefox-debuginfo-60.7.2-1.el6_10.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): x86_64: firefox-60.7.2-1.el6_10.i686.rpm firefox-debuginfo-60.7.2-1.el6_10.i686.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2019-11707 https://access.redhat.com/security/cve/CVE-2019-11708 https://access.redhat.com/security/updates/classification/#critical https://www.mozilla.org/en-US/security/advisories/mfsa2019-18/ https://www.mozilla.org/en-US/security/advisories/mfsa2019-19/ 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2019 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXRJjTNzjgjWX9erEAQjuKQ/+NDuHN50qnEBoNniuT6c9SJyL4dPkwSy1 9QmHbZtVmg1XRQWp1Sfu7RNAIPcq8yjYNOu1SarUuHtEUVh3LP1pjFUIAZAhngpF /Ke/VMgq0D6m9BPeE42ULb1Q9MAhCroCxoLwqr8SfliDepZeKUT9UpZBYi4xsD/A Qu7WbswGxjh3Tv9yzXFu59o4U9mGfDRDIXYfXkTex8nY00+KPSpr78jz5kUJJC6J CfGc9ts8ARgxz4o0FMI+0ZS4Nr3miOpWzL1/3D9O2vMg3YAF48gvpTkO/Q3l0tvy brf0eAV0MYjJ/iaXLSoQO2x5BpRkPg1ufeHGwxvYU5Q9iAoW6ccowKyXVvfaSB2b fD5mt91h6Ncdu603LgeK2UwzltCTzPJhBOp6KKcejFcchKCv7isvnJ2y/87rEy02 orjkA85TGPO3pVbf8zIIHwSp+l/iOSh3PzcuMk/d86uad8wh6Guco1e9/liiOYR6 MJ3ujulEmCQ3cFwNOsVuzM4uR4Noc6E685ChpXExWgAZjwiKQbTYo8g7RxStwC/g 1cDG6oV1kT/CXbZAEMMRuJ2y1QyV0OM6Uqo5v46haqHYDpqdIHEcU6OhlCDMI4yh LxBAEMi7oj5M5SKkwY6mWlp1Q6cQrCW6rba9Dwt3iy7iG/HW4h33pFuXEIn+d8bh SakcvyoFLpc= =8ILB - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXRK2a2aOgq3Tt24GAQikPQ/8DRYZbFaRku1b/bcDH0nWBb159QzqiNCM MzxDTwuhnZQIpeaLuqm4nHsH9TNWDb5BzpzkEIuMnNyDOlB7bVuhvImZG/dT+GZO g4p/MPEG4sy4h9YjLwsxBOLvhHT62YBENDeeJ5Zo019FCrycbNH5dp+fqeufg3eQ AzPYu2cR6a24TZjKIbdH+tv1pRTLSCA7poUzekVmUv4rneKG0L/mxwYaVtyCl58Y 04DhlxAysh0oxNfor9BaG0EBRpPjO2l8bGLnDwtIeh3a/Ncta7gf6dwlRfQRzxGl LIwW5X5vxhu7nj4xe/y5gLcnZWFxqG/uxlD1q+nv36ht4ztxGF9KUge479+Hy5T5 qeuO9sMYfHpjiauzIRPanjZEmKOKdaFOVsdmluNWFkehYOI40vW4Wf+JC6ZgrDWn 0j9MJ8ENNkFZPdk5BjJAjuofuJUqS36W4+GJmkW9aGUs5C0zffNACh4Tz3HOgRxE R6dXXvyjGY/BQXvNJ4Oh5aM82CQjxz1YeVa47zNlrLH3WayPH+meqXVlKNwljNI9 nk+QlUlKpfUa/2q4PLMFHxmEm62SwzTuaR5HtMgSRgotvxENpbqYUUhTN/nQF9sV 5rMDSRt+4mOMG1R0k9u50eF/5pYHcQwccmbTI4/MaFi/g2XZ9tVYFtggbfB6l7ie 6qKeQs1WMZQ= =qfx+ -----END PGP SIGNATURE-----