Gentoo Archives: gentoo-announce

From: Sam James <sam@g.o>
To: gentoo-announce@l.g.o
Subject: [gentoo-announce] [ GLSA 202011-07 ] Mozilla Firefox: Remote code execution
Date: Wed, 11 Nov 2020 03:54:35
Message-Id: 7A01C344-C5B5-4D62-BAC5-6C02DEC41E30@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 202011-07
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 https://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: Mozilla Firefox: Remote code execution
9 Date: November 11, 2020
10 Bugs: #753773
11 ID: 202011-07
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 A use-after-free in Mozilla Firefox might allow remote attacker(s) to
19 execute arbitrary code.
20
21 Background
22 ==========
23
24 Mozilla Firefox is a popular open-source web browser from the Mozilla
25 project.
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 www-client/firefox < 82.0.3 >= 78.4.1:0/esr78
34 >= 82.0.3
35 2 www-client/firefox-bin < 78.4.1 >= 78.4.1:0/esr78
36 >= 82.0.3
37 -------------------------------------------------------------------
38 2 affected packages
39
40 Description
41 ===========
42
43 Invalid assumptions when emitting the the MCallGetProperty opcode in
44 the JavaScript JIT may result in a use-after-free condition.
45
46 Impact
47 ======
48
49 A remote attacker could possibly execute arbitrary code with the
50 privileges of the process, or cause a Denial of Service condition.
51
52 Workaround
53 ==========
54
55 There is no known workaround at this time.
56
57 Resolution
58 ==========
59
60 All Mozilla Firefox users should upgrade to the latest version:
61
62 # emerge --sync
63 # emerge --ask --oneshot --verbose ">=www-client/firefox-82.0.3"
64
65 All Mozilla Firefox (bin) users should upgrade to the latest version:
66
67 # emerge --sync
68 # emerge --ask --oneshot -v ">=www-client/firefox-bin-78.4.1:0/esr78"
69
70 All Mozilla Firefox (ESR) users should upgrade to the latest version:
71
72 # emerge --sync
73 # emerge --ask --oneshot --verbose ">=www-client/firefox-82.0.3"
74
75 All Mozilla Firefox (ESR) bin users should upgrade to the latest
76 version:
77
78 # emerge --sync
79 # emerge --ask --oneshot -v ">=www-client/firefox-bin-78.4.1:0/esr78"
80
81 References
82 ==========
83
84 [ 1 ] CVE-2020-26950
85 https://nvd.nist.gov/vuln/detail/CVE-2020-26950
86 [ 2 ] MFSA-2020-49
87 https://www.mozilla.org/en-US/security/advisories/mfsa2020-49/
88
89 Availability
90 ============
91
92 This GLSA and any updates to it are available for viewing at
93 the Gentoo Security Website:
94
95 https://security.gentoo.org/glsa/202011-07
96
97 Concerns?
98 =========
99
100 Security is a primary focus of Gentoo Linux and ensuring the
101 confidentiality and security of our users' machines is of utmost
102 importance to us. Any security concerns should be addressed to
103 security@g.o or alternatively, you may file a bug at
104 https://bugs.gentoo.org.
105
106 License
107 =======
108
109 Copyright 2020 Gentoo Foundation, Inc; referenced text
110 belongs to its owner(s).
111
112 The contents of this document are licensed under the
113 Creative Commons - Attribution / Share Alike license.
114
115 https://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature