| Summary: | Firefox 78.6.1 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | critical | ||
| Priority: | Normal | CC: | andrewsfarm, ouaurelien, sysadmin-bugs, wrw105 |
| Version: | 7 | Keywords: | advisory, validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | mga7-64-ok mga7-32-ok | ||
| Source RPM: | nss, firefox | CVE: | |
| Status comment: | |||
|
Description
David Walser
2021-01-07 00:23:22 CET
Advisory will be as follows. Advisory: ======================== Updated firefox packages fix security vulnerability: A malicious peer could have modified a COOKIE-ECHO chunk in a SCTP packet in a way that potentially resulted in a use-after-free. We presume that with enough effort it could have been exploited to run arbitrary code (CVE-2020-16044). References: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16044 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.60.1_release_notes https://www.mozilla.org/en-US/security/advisories/mfsa2021-01/ tested mga7-64 General browsing, video, Jetstream all OK Whiteboard:
(none) =>
mga7-64-ok Tested MGA7-32 as above, apart from Jetstream, due to rootcerts issue. all OK. Whiteboard:
mga7-64-ok =>
mga7-64-ok mga7-32-ok Firefox use is so widespread that I thought a few more tests on differing hardware, arches, and DEs would be in order before validating. To that end, I have checked this on 2 64-bit Plasma systems, one with Intel graphics and a wired Internet connection, and another with AMD processor and graphics, with Atheros-based wifi. I also checked on a 32-bit Xfce system with Intel processor, graphics, and wifi. All tests were OK. No issues noted. That should be enough. Validating. Advisory in Comment 1, package list in Comment 0. Keywords:
(none) =>
validated_update Advisory pushed to SVN. CC:
(none) =>
ouaurelien An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2021-0012.html Resolution:
(none) =>
FIXED RedHat has issued an advisory for this today (January 11): https://access.redhat.com/errata/RHSA-2021:0052 |