| Summary: | Firefox 91.13 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | critical | ||
| Priority: | Normal | CC: | andrewsfarm, davidwhodgins, fri, sysadmin-bugs, thierry.vignaud |
| Version: | 8 | Keywords: | advisory, validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | MGA8-64-OK | ||
| Source RPM: | nspr, nss, firefox | CVE: | |
| Status comment: | |||
| Bug Depends on: | |||
| Bug Blocks: | 30766 | ||
|
Description
David Walser
2022-08-23 17:45:07 CEST
Advisory: ======================== Updated firefox packages fix security vulnerabilities: An attacker could have abused XSLT error handling to associate attacker-controlled content with another origin which was displayed in the address bar. This could have been used to fool the user into submitting data intended for the spoofed origin (CVE-2022-38472). A cross-origin iframe referencing an XSLT document would inherit the parent domain's permissions (such as microphone or camera access) (CVE-2022-38473). Members the Mozilla Fuzzing Team reported memory safety bugs present in Firefox ESR 91.12. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code (CVE-2022-38478). References: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38472 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38473 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38478 https://groups.google.com/a/mozilla.org/g/dev-tech-crypto/c/oOKOnyGPMQQ https://groups.google.com/a/mozilla.org/g/dev-tech-crypto/c/uceBXfAG1pM https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_82.html https://www.mozilla.org/en-US/security/advisories/mfsa2022-35/
David Walser
2022-08-23 18:05:32 CEST
Blocks:
(none) =>
30766 After this update eventually gets pushed, we'll need to do an internal build of 102.2 (not for release) to start the process of moving to the 102 branch, so we can have 102.3 ready to go shortly after its release. Moving Cauldron to 102.x took a *lot* of commits by Thierry, so I'll need him to help out with that. Blocks:
30766 =>
(none)
David Walser
2022-08-23 18:10:03 CEST
Blocks:
(none) =>
30766 Packages are building and should be available in a few hours. Thierry, see Comment 2 (also please update 102.x in Cauldron). CC:
(none) =>
thierry.vignaud Is there a reason why most, if not all packages in Comment 0 are listed twice? Also, the line just before the second nss-doc has two package names that are run together. It was that way for the last Firefox update, as well. CC:
(none) =>
andrewsfarm Haha, copy paste error. RedHat has issued an advisory for this today (August 24): https://access.redhat.com/errata/RHSA-2022:6174 No regressions in my usage. Waiting for a non English user to test before validating. CC:
(none) =>
davidwhodgins Tested with "LANG=fr.UTF-8 firefox". Menus are in French. Validating. Advisory committed to svn. Keywords:
(none) =>
advisory, validated_update mga8-64 OK for me Plasma, nvidia-current, swedish locale settings and tabs preserved video, banking, shops CC:
(none) =>
fri An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2022-0309.html Status:
NEW =>
RESOLVED |