File _patchinfo of Package patchinfo.14680

<patchinfo incident="14680">
  <issue tracker="bnc" id="1168874">VUL-0: MozillaFirefox 75 / 68.7esr: MSFA 2020-12 / 2020-13</issue>
  <issue tracker="cve" id="2020-6822"/>
  <issue tracker="cve" id="2020-6821"/>
  <issue tracker="cve" id="2020-6825"/>
  <issue tracker="cve" id="2020-6828"/>
  <issue tracker="cve" id="2020-6827"/>
  <packager>MSirringhaus</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for MozillaFirefox</summary>
  <description>This update for MozillaFirefox to version 68.7.0 ESR fixes the following issues:

- CVE-2020-6821: Uninitialized memory could be read when using the WebGL copyTexSubImage method (bsc#1168874).
- CVE-2020-6822: Fixed out of bounds write in GMPDecodeData when processing large images (bsc#1168874).
- CVE-2020-6825: Fixed Memory safety bugs (bsc#1168874).
- CVE-2020-6827: Custom Tabs could have the URI spoofed (bsc#1168874).
- CVE-2020-6828: Preference overwrite via crafted Intent (bsc#1168874).
</description>
</patchinfo>
openSUSE Build Service is sponsored by