| Summary: | Firefox 102.9 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | critical | ||
| Priority: | Normal | CC: | andrewsfarm, davidwhodgins, fri, sysadmin-bugs, tarazed25 |
| Version: | 8 | Keywords: | advisory, validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | MGA8-64-OK | ||
| Source RPM: | nss, firefox | CVE: | |
| Status comment: | |||
| Bug Depends on: | |||
| Bug Blocks: | 31684 | ||
|
Description
David Walser
2023-03-13 17:05:23 CET
Security issues fixed: https://www.mozilla.org/en-US/security/advisories/mfsa2023-10/ Packages built and uploaded. Still pending freeze move in Cauldron. Advisory: ======================== Updated firefox packages fix security vulnerabilities: Sometimes, when invalidating JIT code while following an iterator, the newly generated code could be overwritten incorrectly. This could lead to a potentially exploitable crash (CVE-2023-25751). When accessing throttled streams, the count of available bytes needed to be checked in the calling function to be within bounds. This may have lead future code to be incorrect and vulnerable (CVE-2023-25752). While implementing on AudioWorklets, some code may have casted one type to another, invalid, dynamic type. This could have lead to a potentially exploitable crash (CVE-2023-28162). Dragging a URL from a cross-origin iframe that was removed during the drag could have lead to user confusion and website spoofing attacks (CVE-2023-28164). Mozilla developers Timothy Nikkel, Andrew McCreight, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox ESR 102.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code (CVE-2023-28176). References: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25751 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25752 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28162 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28164 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28176 https://groups.google.com/a/mozilla.org/g/dev-tech-crypto/c/HcRrYgEdGIo https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_89.html https://www.mozilla.org/en-US/security/advisories/mfsa2023-10/ Assigning to sysadmins for Cauldron freeze move (nss, firefox, firefox-l10n). Assignee:
luigiwalser =>
sysadmin-bugs OK mga8-64, Plasma, nvidia-current, kernel 5.15.88-desktop-1.mga8, Intel i7, Swedish - firefox-102.9.0-1.mga8.x86_64 - firefox-sv_SE-102.9.0-1.mga8.noarch - lib64nss3-3.89.0-1.mga8.x86_64 - nss-3.89.0-1.mga8.x86_64 Localisation OK Kept tabs, settings, plugins Three different login methods to Banking, shops Video sites working CC:
(none) =>
fri
Morgan Leijström
2023-03-15 13:12:55 CET
CC:
(none) =>
qa-bugs Cauldron update moved. Advisory in Comment 1. Package list in Comment 0. Version:
Cauldron =>
8
David Walser
2023-03-15 23:31:01 CET
CC:
qa-bugs =>
(none)
Nicolas Salguero
2023-03-16 09:39:13 CET
Blocks:
(none) =>
31684 Mga8, x64 Backed up bookmarks, just in case. Update works perfectly. No need to recover bookmarks. Last session restored.Web links from thunderbird work. Most used sites all OK. CC:
(none) =>
tarazed25 Updated Firefox and Thunderbird together, since they usually go out to the users that way. Tried several websites, played a weather forecast video, all without issues. Looks OK here. CC:
(none) =>
andrewsfarm I believe this and Thunderbird are both OK. In addition to in Mageia 8, I have been using both in Cauldron for several days now, with no issues. Validating the update. Advisory in Comment 1. Keywords:
(none) =>
validated_update
Dave Hodgins
2023-03-23 23:28:47 CET
Keywords:
(none) =>
advisory An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2023-0111.html Status:
NEW =>
RESOLVED RedHat has issued an advisory for this on March 20: https://access.redhat.com/errata/RHSA-2023:1336 |