File _patchinfo of Package patchinfo.15914

<patchinfo incident="15914">
  <issue tracker="bnc" id="1174538">VUL-0: CVE-2020-15652: MozillaFirefox,MozillaThunderbird: Update to 79/78.1ESR</issue>
  <issue tracker="cve" id="2020-15657"/>
  <issue tracker="cve" id="2020-15658"/>
  <issue tracker="cve" id="2020-15656"/>
  <issue tracker="cve" id="2020-6514"/>
  <issue tracker="cve" id="2020-15653"/>
  <issue tracker="cve" id="2020-15659"/>
  <issue tracker="cve" id="2020-15654"/>
  <issue tracker="cve" id="2020-15652"/>
  <issue tracker="cve" id="2020-6463"/>
  <issue tracker="cve" id="2020-15655"/>
  <packager>cgrobertson</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for MozillaFirefox</summary>
  <description>This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.1.0 ESR
  * Fixed: Various stability, functionality, and security fixes (bsc#1174538)
  * CVE-2020-15652: Potential leak of redirect targets when loading scripts in a worker
  * CVE-2020-6514: WebRTC data channel leaks internal address to peer
  * CVE-2020-15655: Extension APIs could be used to bypass Same-Origin Policy
  * CVE-2020-15653: Bypassing iframe sandbox when allowing popups
  * CVE-2020-6463: Use-after-free in ANGLE gl::Texture::onUnbindAsSamplerTexture
  * CVE-2020-15656: Type confusion for special arguments in IonMonkey
  * CVE-2020-15658: Overriding file type when saving to disk
  * CVE-2020-15657: DLL hijacking due to incorrect loading path
  * CVE-2020-15654: Custom cursor can overlay user interface
  * CVE-2020-15659: Memory safety bugs fixed in Firefox 79 and Firefox ESR 78.1
</description>
</patchinfo>
openSUSE Build Service is sponsored by