Bug 40025

Summary: Firefox: Security issues from 38.4 (4.1)
Product: UCS Reporter: Arvid Requate <requate>
Component: Security updatesAssignee: Janek Walkenhorst <walkenhorst>
Status: CLOSED FIXED QA Contact: Philipp Hahn <hahn>
Severity: normal    
Priority: P5 CC: gohmann, walkenhorst
Version: UCS 4.1Flags: requate: Patch_Available+
Target Milestone: UCS 4.1-0-errata   
Hardware: Other   
OS: Linux   
URL: https://www.mozilla.org/en-US/security/known-vulnerabilities/firefox-esr/
What kind of report is it?: Security Issue What type of bug is this?: ---
Who will be affected by this bug?: --- How will those affected feel about the bug?: ---
User Pain: Enterprise Customer affected?:
School Customer affected?: ISV affected?:
Waiting Support: Flags outvoted (downgraded) after PO Review:
Ticket number: Bug group (optional): Security
Max CVSS v3 score:
Bug Depends on:    
Bug Blocks: 39785, 39786    

Description Arvid Requate univentionstaff 2015-11-18 18:41:39 CET
+++ This bug was initially created as a clone of Bug #39785 +++

Firefox ESR 38.4 fixes these issues:

* ASan: use-after-poison in sec_asn1d_parse_leaf() (CVE-2015-7181)
* ASN.1 decoder heap overflow when decoding constructed OCTET STRING (CVE-2015-7182)
* NSPR overflow in PL_ARENA_ALLOCATE can lead to crash (under ASAN), potential memory corruption (CVE-2015-7183)
* WebSocket secure requirements can be bypassed in a worker (CVE-2015-7197)
* Overflow in TextureStorage11 can cause memory-safety bug (CVE-2015-7198)
* Missing status checks in AddWeightedPathSegLists and SVGPathSegListSMILType::Interpolate cause memory-safety bugs (CVE-2015-7199)
* Missing status check in CryptoKey creates potential security bug (CVE-2015-7200)
* crashes in GC with Java applet (CVE-2015-7196) [only affected when java plugin is enabled]
* Arbitrary memory access in libjar (libxul) (CVE-2015-7194)
* CORS does a simple instead of preflighted request for POST with non-standard Content-Type header (CVE-2015-7193)
* Heap Buffer Overflow in nsJPEGEncoder (CVE-2015-7189)
* White-spaces in host IP address, leading to same origin policy bypass (CVE-2015-7188)
* Memory safety bugs fixed in Firefox ESR 38.4 and Firefox 42. (CVE-2015-4513)
Comment 1 Janek Walkenhorst univentionstaff 2015-11-19 19:39:13 CET
Tests: OK
Advisories: firefox-{de,en}.yaml
Comment 2 Philipp Hahn univentionstaff 2015-11-24 16:46:35 CET
OK: apt-get install firefox-de=1:38.3.0esr-ucs-4.0.64.201509241919
OK: apt-get install firefox-de # 1:38.4.0esr-ucs-4.1.65.201511191913
OK: apt-get purge firefox-de
OK: apt-get install firefox-de

OK: apt-get install firefox-en=1:38.3.0esr-ucs-4.0.59.201509241923
OK: apt-get install firefox-en # 1:38.4.0esr-ucs-4.1.60.201511191915
OK: apt-get purge firefox-en
OK: apt-get install firefox-en

OK: about: 38.4.0
OK: amd64 i386
OK: https://www.google.de/
OK: https://www.univention.de/
OK: https://forge.univention.org/
OK: http://www.tagesschau.de/
OK: https://www.youtube.com/

OK: firefox-??.yaml
OK: announce_errata -V firefox-de.yaml
OK: announce_errata -V firefox-en.yaml