Mozilla has released Firefox 68.4.0 today (January 6): https://www.mozilla.org/en-US/firefox/68.4.0/releasenotes/ We're also providing the NSS 3.48 with this update, which just missed making the last update: https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.48_release_notes
Packages built. Advisory to come later. nss-3.48.0-1.mga7 nss-doc-3.48.0-1.mga7 libnss3-3.48.0-1.mga7 libnss-devel-3.48.0-1.mga7 libnss-static-devel-3.48.0-1.mga7 firefox-68.4.0-1.mga7 firefox-devel-68.4.0-1.mga7 firefox-af-68.4.0-1.mga7 firefox-an-68.4.0-1.mga7 firefox-ar-68.4.0-1.mga7 firefox-ast-68.4.0-1.mga7 firefox-az-68.4.0-1.mga7 firefox-bg-68.4.0-1.mga7 firefox-bn-68.4.0-1.mga7 firefox-br-68.4.0-1.mga7 firefox-bs-68.4.0-1.mga7 firefox-ca-68.4.0-1.mga7 firefox-cs-68.4.0-1.mga7 firefox-cy-68.4.0-1.mga7 firefox-da-68.4.0-1.mga7 firefox-de-68.4.0-1.mga7 firefox-el-68.4.0-1.mga7 firefox-en_GB-68.4.0-1.mga7 firefox-en_US-68.4.0-1.mga7 firefox-eo-68.4.0-1.mga7 firefox-es_AR-68.4.0-1.mga7 firefox-es_CL-68.4.0-1.mga7 firefox-es_ES-68.4.0-1.mga7 firefox-es_MX-68.4.0-1.mga7 firefox-et-68.4.0-1.mga7 firefox-eu-68.4.0-1.mga7 firefox-fa-68.4.0-1.mga7 firefox-ff-68.4.0-1.mga7 firefox-fi-68.4.0-1.mga7 firefox-fr-68.4.0-1.mga7 firefox-fy_NL-68.4.0-1.mga7 firefox-ga_IE-68.4.0-1.mga7 firefox-gd-68.4.0-1.mga7 firefox-gl-68.4.0-1.mga7 firefox-gu_IN-68.4.0-1.mga7 firefox-he-68.4.0-1.mga7 firefox-hi_IN-68.4.0-1.mga7 firefox-hr-68.4.0-1.mga7 firefox-hsb-68.4.0-1.mga7 firefox-hu-68.4.0-1.mga7 firefox-hy_AM-68.4.0-1.mga7 firefox-id-68.4.0-1.mga7 firefox-is-68.4.0-1.mga7 firefox-it-68.4.0-1.mga7 firefox-ja-68.4.0-1.mga7 firefox-kk-68.4.0-1.mga7 firefox-km-68.4.0-1.mga7 firefox-kn-68.4.0-1.mga7 firefox-ko-68.4.0-1.mga7 firefox-lij-68.4.0-1.mga7 firefox-lt-68.4.0-1.mga7 firefox-lv-68.4.0-1.mga7 firefox-mk-68.4.0-1.mga7 firefox-mr-68.4.0-1.mga7 firefox-ms-68.4.0-1.mga7 firefox-nb_NO-68.4.0-1.mga7 firefox-nl-68.4.0-1.mga7 firefox-nn_NO-68.4.0-1.mga7 firefox-pa_IN-68.4.0-1.mga7 firefox-pl-68.4.0-1.mga7 firefox-pt_BR-68.4.0-1.mga7 firefox-pt_PT-68.4.0-1.mga7 firefox-ro-68.4.0-1.mga7 firefox-ru-68.4.0-1.mga7 firefox-si-68.4.0-1.mga7 firefox-sk-68.4.0-1.mga7 firefox-sl-68.4.0-1.mga7 firefox-sq-68.4.0-1.mga7 firefox-sr-68.4.0-1.mga7 firefox-sv_SE-68.4.0-1.mga7 firefox-ta-68.4.0-1.mga7 firefox-te-68.4.0-1.mga7 firefox-th-68.4.0-1.mga7 firefox-tr-68.4.0-1.mga7 firefox-uk-68.4.0-1.mga7 firefox-uz-68.4.0-1.mga7 firefox-vi-68.4.0-1.mga7 firefox-xh-68.4.0-1.mga7 firefox-zh_CN-68.4.0-1.mga7 firefox-zh_TW-68.4.0-1.mga7 from SRPMS: nss-3.48.0-1.mga7.src.rpm firefox-68.4.0-1.mga7.src.rpm firefox-l10n-68.4.0-1.mga7.src.rpm
Assignee: bugsquad => qa-bugs
32-bit - running mate - VBox - firefox-en_GB-68.4.0-1.mga7.noarch - firefox-en_US-68.4.0-1.mga7.noarch - libnss3-3.48.0-1.mga7.i586 I ran through a series of pages and links across pages. Seemed to work as designed.
CC: (none) => brtians1
Update details released: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17016 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17017 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17022 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17024 https://www.mozilla.org/en-US/security/advisories/mfsa2020-02/
Severity: normal => critical
And of course NSS 3.49 comes out the day after I build this: https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.49_release_notes Updating that again: nss-3.49.0-1.mga7 nss-doc-3.49.0-1.mga7 libnss3-3.49.0-1.mga7 libnss-devel-3.49.0-1.mga7 libnss-static-devel-3.49.0-1.mga7 from nss-3.49.0-1.mga7.src.rpm
Mozilla has released Firefox 68.4.1 today (January 8): https://www.mozilla.org/en-US/firefox/68.4.1/releasenotes/ Updating that now too...
Keywords: (none) => feedbackSummary: Firefox 68.4 => Firefox 68.4.1
Update built. nss-3.49.0-1.mga7 nss-doc-3.49.0-1.mga7 libnss3-3.49.0-1.mga7 libnss-devel-3.49.0-1.mga7 libnss-static-devel-3.49.0-1.mga7 firefox-68.4.1-1.mga7 firefox-devel-68.4.1-1.mga7 firefox-af-68.4.1-1.mga7 firefox-an-68.4.1-1.mga7 firefox-ar-68.4.1-1.mga7 firefox-ast-68.4.1-1.mga7 firefox-az-68.4.1-1.mga7 firefox-bg-68.4.1-1.mga7 firefox-bn-68.4.1-1.mga7 firefox-br-68.4.1-1.mga7 firefox-bs-68.4.1-1.mga7 firefox-ca-68.4.1-1.mga7 firefox-cs-68.4.1-1.mga7 firefox-cy-68.4.1-1.mga7 firefox-da-68.4.1-1.mga7 firefox-de-68.4.1-1.mga7 firefox-el-68.4.1-1.mga7 firefox-en_GB-68.4.1-1.mga7 firefox-en_US-68.4.1-1.mga7 firefox-eo-68.4.1-1.mga7 firefox-es_AR-68.4.1-1.mga7 firefox-es_CL-68.4.1-1.mga7 firefox-es_ES-68.4.1-1.mga7 firefox-es_MX-68.4.1-1.mga7 firefox-et-68.4.1-1.mga7 firefox-eu-68.4.1-1.mga7 firefox-fa-68.4.1-1.mga7 firefox-ff-68.4.1-1.mga7 firefox-fi-68.4.1-1.mga7 firefox-fr-68.4.1-1.mga7 firefox-fy_NL-68.4.1-1.mga7 firefox-ga_IE-68.4.1-1.mga7 firefox-gd-68.4.1-1.mga7 firefox-gl-68.4.1-1.mga7 firefox-gu_IN-68.4.1-1.mga7 firefox-he-68.4.1-1.mga7 firefox-hi_IN-68.4.1-1.mga7 firefox-hr-68.4.1-1.mga7 firefox-hsb-68.4.1-1.mga7 firefox-hu-68.4.1-1.mga7 firefox-hy_AM-68.4.1-1.mga7 firefox-id-68.4.1-1.mga7 firefox-is-68.4.1-1.mga7 firefox-it-68.4.1-1.mga7 firefox-ja-68.4.1-1.mga7 firefox-kk-68.4.1-1.mga7 firefox-km-68.4.1-1.mga7 firefox-kn-68.4.1-1.mga7 firefox-ko-68.4.1-1.mga7 firefox-lij-68.4.1-1.mga7 firefox-lt-68.4.1-1.mga7 firefox-lv-68.4.1-1.mga7 firefox-mk-68.4.1-1.mga7 firefox-mr-68.4.1-1.mga7 firefox-ms-68.4.1-1.mga7 firefox-nb_NO-68.4.1-1.mga7 firefox-nl-68.4.1-1.mga7 firefox-nn_NO-68.4.1-1.mga7 firefox-pa_IN-68.4.1-1.mga7 firefox-pl-68.4.1-1.mga7 firefox-pt_BR-68.4.1-1.mga7 firefox-pt_PT-68.4.1-1.mga7 firefox-ro-68.4.1-1.mga7 firefox-ru-68.4.1-1.mga7 firefox-si-68.4.1-1.mga7 firefox-sk-68.4.1-1.mga7 firefox-sl-68.4.1-1.mga7 firefox-sq-68.4.1-1.mga7 firefox-sr-68.4.1-1.mga7 firefox-sv_SE-68.4.1-1.mga7 firefox-ta-68.4.1-1.mga7 firefox-te-68.4.1-1.mga7 firefox-th-68.4.1-1.mga7 firefox-tr-68.4.1-1.mga7 firefox-uk-68.4.1-1.mga7 firefox-uz-68.4.1-1.mga7 firefox-vi-68.4.1-1.mga7 firefox-xh-68.4.1-1.mga7 firefox-zh_CN-68.4.1-1.mga7 firefox-zh_TW-68.4.1-1.mga7 from SRPMS: nss-3.49.0-1.mga7.src.rpm firefox-68.4.1-1.mga7.src.rpm firefox-l10n-68.4.1-1.mga7.src.rpm
Keywords: feedback => (none)
$ uname -a Linux localhost 5.4.6-desktop-2.mga7 #1 SMP Mon Dec 23 17:45:40 UTC 2019 i686 i686 i386 GNU/Linux VM $ firefox -v Mozilla Firefox 68.4.1esr used it for about an hour on some resource heavy websites. It seemed to function okay.
Hi, I've installed the new version in Mageia VirtualBox x64Bits. Works fine. Greetings.
CC: (none) => joselp
I've installed the new version in Mageia 7 in my personal computer. Works fine. Bookmars, complements, preferences, ok. [jose@localhost ~]$ uname -a Linux localhost 5.4.8-desktop-3.mga7 #1 SMP Tue Jan 7 16:31:36 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux [jose@localhost ~]$ firefox -v Mozilla Firefox 68.4.1esr Greetings.
physical x86_64 box - nvidia, gnome working as designed.
Working fine here for x86_64, real hardware.
CC: (none) => tarazed25
(In reply to David Walser from comment #5) > Mozilla has released Firefox 68.4.1 today (January 8): > https://www.mozilla.org/en-US/firefox/68.4.1/releasenotes/ Details for that are out too: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17026 https://www.mozilla.org/en-US/security/advisories/mfsa2020-03/ which is being exploited in the wild according to an article I just read. Let's get this shipped. Advisory: ======================== Updated firefox packages fix security vulnerabilities: When pasting a <style> tag from the clipboard into a rich text editor, the CSS sanitizer incorrectly rewrites a @namespace rule. This could allow for injection into certain types of websites resulting in data exfiltration (CVE-2019-17016). Due to a missing case handling object types, a type confusion vulnerability could occur, resulting in a crash. We presume that with enough effort that it could be exploited to run arbitrary code (CVE-2019-17017). When pasting a <style> tag from the clipboard into a rich text editor, the CSS sanitizer does not escape < and > characters. Because the resulting string is pasted directly into the text node of the element this does not result in a direct injection into the webpage; however, if a webpage subsequently copies the node's innerHTML, assigning it to another innerHTML, this would result in an XSS vulnerability. Two WYSIWYG editors were identified with this behavior, more may exist (CVE-2019-17022). Mozilla developers reported memory safety bugs present in Firefox ESR 68.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code (CVE-2019-17024). Incorrect alias information in IonMonkey JIT compiler for setting array elements could lead to a type confusion. We are aware of targeted attacks in the wild abusing this flaw (CVE-2019-17026). References: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17016 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17017 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17022 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17024 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17026 https://www.mozilla.org/en-US/security/advisories/mfsa2020-02/ https://www.mozilla.org/en-US/security/advisories/mfsa2020-03/ https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.48_release_notes https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.49_release_notes https://www.mozilla.org/en-US/firefox/68.4.0/releasenotes/ https://www.mozilla.org/en-US/firefox/68.4.1/releasenotes/
Advisory committed to svn. Validating the update.
Keywords: (none) => advisory, validated_updateWhiteboard: (none) => MGA7-64-OKCC: (none) => davidwhodgins, sysadmin-bugs
An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2020-0027.html
Resolution: (none) => FIXEDStatus: NEW => RESOLVED
I pushed it even if armv7hl firefox is still building... Will move that separately,... but I see nss build failed too, both in mga7 and cauldron... So that needs to be fixed... Now with the new ec2 builders, armw7 builds goes from 4 core / 2GB ram systems to 16-core / 32GB ram builder the armv7 builds will be faster...
CC: (none) => tmb
RedHat has issued advisories for this today (January 13): https://access.redhat.com/errata/RHSA-2020:0085 https://access.redhat.com/errata/RHSA-2020:0086
The nss 3.49 update in this bug also fixed CVE-2019-17023: https://usn.ubuntu.com/4397-1/