Mageia 2020-0377: firefox security update
Summary
Mozilla developer Jason Kratzer reported memory safety bugs present in Firefox
ESR 78.2. Some of these bugs showed evidence of memory corruption and we
presume that with enough effort some of these could have been exploited to run
arbitrary code (CVE-2020-15673).
Firefox sometimes ran the onload handler for SVG elements that the DOM
sanitizer decided to remove, resulting in a XSS issue due to JavaScript being
executed after pasting attacker-controlled data into a contenteditable element
(CVE-2020-15676).
By exploiting an Open Redirect vulnerability on a website, an attacker could
have spoofed the site displayed in the download file dialog to show the
original site (the one suffering from the open redirect) rather than the site
the file was actually downloaded from (CVE-2020-15677).
When recursing through graphical layers while scrolling, an iterator may have
become invalid, resulting in a potential use-after-free. This occurs because
the function APZCTreeManager::ComputeClippedCompo...
References
- https://bugs.mageia.org/show_bug.cgi?id=26711
- https://fedoraproject.org/wiki/Changes/CryptoPolicy
- https://fedoraproject.org/wiki/Changes/NSSLoadP11KitModules
- https://groups.google.com/g/mozilla.dev.tech.nspr/c/zrirzzoOjeg
- - - - - - - https://www.mozilla.org/en-US/security/advisories/mfsa2020-43/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15673
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15676
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15677
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15678
Resolution
MGASA-2020-0377 - Updated firefox packages fix security vulnerabilities
SRPMS
- 7/core/crypto-policies-20200813-1.mga7
- 7/core/p11-kit-0.23.21-1.mga7
- 7/core/nspr-4.29-1.mga7
- 7/core/rootcerts-20200911.00-1.mga7
- 7/core/nss-3.57.0-1.mga7
- 7/core/firefox-78.3.0-1.mga7
- 7/core/firefox-l10n-78.3.0-1.mga7