Bugzilla – Bug 1010425
VUL-0: CVE-2016-9071: MozillaFirefox: Probe browser history via HSTS/301 redirect + CSP
Last modified: 2019-10-31 15:38:39 UTC
Security vulnerabilities fixed in Firefox 50 https://www.mozilla.org/security/announce/2016/mfsa2016-89.html Discovered by: Xiaoyin Liu Content Security Policy combined with HTTP to HTTPS redirection can be used by malicious server to verify whether a known site is within a user's browser history. https://bugzilla.mozilla.org/show_bug.cgi?id=1285003
bugbot adjusting priority
This issue is fixed in MozillaFirefox 50 (openSUSE) only, not Mozilla Firefox ESR (SLE)
Releasing Mozilla Firefox 50. My understanding is that this issue is exclusive to 50 and not ESR, Thunderbird or Seamonkey: closing
openSUSE-SU-2016:2861-1: An update that fixes 19 vulnerabilities is now available. Category: security (important) Bug References: 1009026,1010395,1010399,1010401,1010402,1010404,1010405,1010406,1010408,1010409,1010410,1010420,1010421,1010422,1010423,1010424,1010425,1010426,1010427 CVE References: CVE-2016-5289,CVE-2016-5290,CVE-2016-5291,CVE-2016-5292,CVE-2016-5296,CVE-2016-5297,CVE-2016-9063,CVE-2016-9064,CVE-2016-9066,CVE-2016-9067,CVE-2016-9068,CVE-2016-9069,CVE-2016-9070,CVE-2016-9071,CVE-2016-9073,CVE-2016-9074,CVE-2016-9075,CVE-2016-9076,CVE-2016-9077 Sources used: openSUSE Leap 42.2 (src): MozillaFirefox-50.0-39.2, mozilla-nss-3.26.2-32.1 openSUSE Leap 42.1 (src): MozillaFirefox-50.0-39.1, mozilla-nss-3.26.2-32.1 openSUSE 13.2 (src): MozillaFirefox-50.0-88.1, mozilla-nss-3.26.2-49.1
SUSE-SU-2019:2872-1: An update that fixes 51 vulnerabilities is now available. Category: security (important) Bug References: 1010399,1010405,1010406,1010408,1010409,1010421,1010423,1010424,1010425,1010426,1025108,1043008,1047281,1074235,1092611,1120374,1137990,1149429,1154738,959933,983922 CVE References: CVE-2016-2830,CVE-2016-5289,CVE-2016-5292,CVE-2016-9063,CVE-2016-9067,CVE-2016-9068,CVE-2016-9069,CVE-2016-9071,CVE-2016-9073,CVE-2016-9075,CVE-2016-9076,CVE-2016-9077,CVE-2017-7789,CVE-2018-5150,CVE-2018-5151,CVE-2018-5152,CVE-2018-5153,CVE-2018-5154,CVE-2018-5155,CVE-2018-5157,CVE-2018-5158,CVE-2018-5159,CVE-2018-5160,CVE-2018-5163,CVE-2018-5164,CVE-2018-5165,CVE-2018-5166,CVE-2018-5167,CVE-2018-5168,CVE-2018-5169,CVE-2018-5172,CVE-2018-5173,CVE-2018-5174,CVE-2018-5175,CVE-2018-5176,CVE-2018-5177,CVE-2018-5178,CVE-2018-5179,CVE-2018-5180,CVE-2018-5181,CVE-2018-5182,CVE-2018-5183,CVE-2019-11757,CVE-2019-11758,CVE-2019-11759,CVE-2019-11760,CVE-2019-11761,CVE-2019-11762,CVE-2019-11763,CVE-2019-11764,CVE-2019-15903 Sources used: SUSE OpenStack Cloud Crowbar 8 (src): MozillaFirefox-68.2.0-109.95.2 SUSE OpenStack Cloud 8 (src): MozillaFirefox-68.2.0-109.95.2 SUSE OpenStack Cloud 7 (src): MozillaFirefox-68.2.0-109.95.2 SUSE Linux Enterprise Software Development Kit 12-SP5 (src): MozillaFirefox-68.2.0-109.95.2 SUSE Linux Enterprise Software Development Kit 12-SP4 (src): MozillaFirefox-68.2.0-109.95.2 SUSE Linux Enterprise Server for SAP 12-SP3 (src): MozillaFirefox-68.2.0-109.95.2 SUSE Linux Enterprise Server for SAP 12-SP2 (src): MozillaFirefox-68.2.0-109.95.2 SUSE Linux Enterprise Server for SAP 12-SP1 (src): MozillaFirefox-68.2.0-109.95.2 SUSE Linux Enterprise Server 12-SP5 (src): MozillaFirefox-68.2.0-109.95.2 SUSE Linux Enterprise Server 12-SP4 (src): MozillaFirefox-68.2.0-109.95.2 SUSE Linux Enterprise Server 12-SP3-LTSS (src): MozillaFirefox-68.2.0-109.95.2 SUSE Linux Enterprise Server 12-SP3-BCL (src): MozillaFirefox-68.2.0-109.95.2 SUSE Linux Enterprise Server 12-SP2-LTSS (src): MozillaFirefox-68.2.0-109.95.2 SUSE Linux Enterprise Server 12-SP2-BCL (src): MozillaFirefox-68.2.0-109.95.2 SUSE Linux Enterprise Server 12-SP1-LTSS (src): MozillaFirefox-68.2.0-109.95.2 SUSE Linux Enterprise Desktop 12-SP4 (src): MozillaFirefox-68.2.0-109.95.2 SUSE Enterprise Storage 5 (src): MozillaFirefox-68.2.0-109.95.2 HPE Helion Openstack 8 (src): MozillaFirefox-68.2.0-109.95.2 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.