Critical Mageia 2024-0049 Security Update for Firefox and NSS
Summary
The updated packages fix security vulnerabilities:
Timing attack against RSA decryption in TLS. (CVE-2023-5388)
Out-of-bounds memory read in networking channels. (CVE-2024-1546)
Alert dialog could have been spoofed on another site. (CVE-2024-1547)
Fullscreen Notification could have been hidden by select element.
(CVE-2024-1548)
Custom cursor could obscure the permission dialog. (CVE-2024-1549)
Mouse cursor re-positioned unexpectedly could have led to unintended
permission grants. (CVE-2024-1550)
Multipart HTTP Responses would accept the Set-Cookie header in response
parts. (CVE-2024-1551)
Incorrect code generation on 32-bit ARM devices. (CVE-2024-1552)
Memory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and
Thunderbird 115.8. (CVE-2024-1553)
References
- https://bugs.mageia.org/show_bug.cgi?id=32876
- https://www.mozilla.org/en-US/firefox/115.8.0/releasenotes/
- https://www.mozilla.org/en-US/security/advisories/mfsa2024-06/
- https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_98.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1546
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1547
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1548
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1549
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1550
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1551
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1552
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1553
Resolution
MGASA-2024-0049 - Updated rootcerts, nss and firefox packages fix security vulnerabilities
SRPMS
- 9/core/rootcerts-20240215.00-1.mga9
- 9/core/nss-3.98.0-1.mga9
- 9/core/firefox-115.8.0-1.mga9
- 9/core/firefox-l10n-115.8.0-1.mga9