File _patchinfo of Package patchinfo.15914
<patchinfo incident="15914">
<issue tracker="bnc" id="1174538">VUL-0: CVE-2020-15652: MozillaFirefox,MozillaThunderbird: Update to 79/78.1ESR</issue>
<issue tracker="cve" id="2020-15657"/>
<issue tracker="cve" id="2020-15658"/>
<issue tracker="cve" id="2020-15656"/>
<issue tracker="cve" id="2020-6514"/>
<issue tracker="cve" id="2020-15653"/>
<issue tracker="cve" id="2020-15659"/>
<issue tracker="cve" id="2020-15654"/>
<issue tracker="cve" id="2020-15652"/>
<issue tracker="cve" id="2020-6463"/>
<issue tracker="cve" id="2020-15655"/>
<packager>cgrobertson</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for MozillaFirefox</summary>
<description>This update for MozillaFirefox fixes the following issues:
- Firefox Extended Support Release 78.1.0 ESR
* Fixed: Various stability, functionality, and security fixes (bsc#1174538)
* CVE-2020-15652: Potential leak of redirect targets when loading scripts in a worker
* CVE-2020-6514: WebRTC data channel leaks internal address to peer
* CVE-2020-15655: Extension APIs could be used to bypass Same-Origin Policy
* CVE-2020-15653: Bypassing iframe sandbox when allowing popups
* CVE-2020-6463: Use-after-free in ANGLE gl::Texture::onUnbindAsSamplerTexture
* CVE-2020-15656: Type confusion for special arguments in IonMonkey
* CVE-2020-15658: Overriding file type when saving to disk
* CVE-2020-15657: DLL hijacking due to incorrect loading path
* CVE-2020-15654: Custom cursor can overlay user interface
* CVE-2020-15659: Memory safety bugs fixed in Firefox 79 and Firefox ESR 78.1
</description>
</patchinfo>