Navigation events were not fully adhering to the W3C’s “Navigation-Timing Level 2” draft specification in some instances for the unload event, which restricts access to detailed timing attributes to only be same-origin. This resulted in potential cross-origin information exposure of history through timing side-channel attacks. This vulnerability affects Firefox < 69, Thunderbird < 68.1, Thunderbird < 60.9, Firefox ESR < 60.9, and Firefox ESR < 68.1.
CPE | Name | Operator | Version |
---|---|---|---|
firefox | lt | 69.0 | |
firefox_esr | lt | 60.9.0 | |
firefox_esr | ge | 68.0 | |
firefox_esr | lt | 68.1.0 | |
thunderbird | lt | 60.9.0 | |
thunderbird | ge | 68.0 | |
thunderbird | lt | 68.1.0 |
lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html
lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html
bugzilla.mozilla.org/show_bug.cgi?id=1560495
security.gentoo.org/glsa/201911-07
usn.ubuntu.com/4150-1/
w3c.github.io/navigation-timing
www.mozilla.org/security/advisories/mfsa2019-25/
www.mozilla.org/security/advisories/mfsa2019-26/
www.mozilla.org/security/advisories/mfsa2019-27/
www.mozilla.org/security/advisories/mfsa2019-29/
www.mozilla.org/security/advisories/mfsa2019-30/