Lucene search

K
centosCentOS ProjectCESA-2020:2827
HistoryJul 08, 2020 - 5:23 p.m.

firefox security update

2020-07-0817:23:13
CentOS Project
lists.centos.org
90

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.01 Low

EPSS

Percentile

83.9%

CentOS Errata and Security Advisory CESA-2020:2827

Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 68.10.0 ESR.

Security Fix(es):

  • Mozilla: Memory corruption due to missing sign-extension for ValueTags on ARM64 (CVE-2020-12417)

  • Mozilla: Information disclosure due to manipulated URL object (CVE-2020-12418)

  • Mozilla: Use-after-free in nsGlobalWindowInner (CVE-2020-12419)

  • Mozilla: Use-After-Free when trying to connect to a STUN server (CVE-2020-12420)

  • Mozilla: Add-On updates did not respect the same certificate trust rules as software updates (CVE-2020-12421)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2020-July/085898.html

Affected packages:
firefox

Upstream details at:
https://access.redhat.com/errata/RHSA-2020:2827

OSVersionArchitecturePackageVersionFilename
CentOS7i686firefox< 68.10.0-1.el7.centosfirefox-68.10.0-1.el7.centos.i686.rpm
CentOS7x86_64firefox< 68.10.0-1.el7.centosfirefox-68.10.0-1.el7.centos.x86_64.rpm

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.01 Low

EPSS

Percentile

83.9%