| Summary: | Firefox 78.6 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | critical | ||
| Priority: | Normal | CC: | andrewsfarm, fri, ouaurelien, sysadmin-bugs, tarazed25, wrw105 |
| Version: | 7 | Keywords: | advisory, validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | mga7-64-ok mga7-32-ok | ||
| Source RPM: | nss, firefox | CVE: | CVE-2020-16042, CVE-2020-26971, CVE-2020-26973, CVE-2020-26974, CVE-2020-26978, CVE-2020-35111, CVE-2020-35113 |
| Status comment: | |||
|
Description
David Walser
2020-12-15 01:40:12 CET
Should be available on mirrors in a few hours. Packages in Comment 0. Advisory to come. Assignee:
bugsquad =>
qa-bugs mga7, x64
Installed the nss, firefox packages, firefox-en-{GB,US}, including -devel.
Restarted firefox and restored previous session. So far so good.
Connected to NAS drive monitor OK. Thunderbird weblinks work.
$ firefox localhost:631
brings up CUPS server page.CC:
(none) =>
tarazed25 "Rosanna Toto" in search bar brought up a Youtube video. Sound and video working fine. Advisory: ======================== Updated firefox packages fix security vulnerabilities: When a BigInt was right-shifted the backing store was not properly cleared, allowing uninitialized memory to be read (CVE-2020-16042). Certain blit values provided by the user were not properly constrained leading to a heap buffer overflow in WebGL on some video drivers (CVE-2020-26971). Certain input to the CSS Sanitizer confused it, resulting in incorrect components being removed. This could have been used as a sanitizer bypass (CVE-2020-26973). When flex-basis was used on a table wrapper, a StyleGenericFlexBasis object could have been incorrectly cast to the wrong type. This resulted in a heap user-after-free, memory corruption, and a potentially exploitable crash (CVE-2020-26974). Using techniques that built on the slipstream research, a malicious webpage could have exposed both an internal network's hosts as well as services running on the user's local machine (CVE-2020-26978). When an extension with the proxy permission registered to receive <all_urls>, the proxy.onRequest callback was not triggered for view-source URLs. While web content cannot navigate to such URLs, a user opening View Source could have inadvertently leaked their IP address (CVE-2020-35111). Mozilla developer Christian Holler reported memory safety bugs present in Firefox ESR 78.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code (CVE-2020-35113). References: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.60_release_notes https://www.mozilla.org/en-US/security/advisories/mfsa2020-55/ Tested mga7-64 General browsing, youtube video, jetstream javascript, all OK CC:
(none) =>
wrw105 Tested mga7-32 as above, but unable to access browserbench.org for jetstream tests due to rootcerts update not recognizing its cert. otherwise, looks good. Whiteboard:
mga7-64-ok =>
mga7-64-ok mga7-32-ok RedHat has issued an advisory for this today (December 16): https://access.redhat.com/errata/RHSA-2020:5562 64 bit OK here too. Nvidia, Plasma Banking sites, video sites... CC:
(none) =>
fri Updated both Firefox and Thunderbird in one operation. Both look good. Validating. Advisory in Comment 4. Keywords:
(none) =>
validated_update Advisory pushed to SVN. CC:
(none) =>
ouaurelien An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2020-0461.html Resolution:
(none) =>
FIXED |