Updated rootcerts, nss and firefox packages fix security vulnerabilities
Publication date: 27 Feb 2024Modification date: 27 Feb 2024
Type: security
Affected Mageia releases : 9
CVE: CVE-2023-5388 , CVE-2024-1546 , CVE-2024-1547 , CVE-2024-1548 , CVE-2024-1549 , CVE-2024-1550 , CVE-2024-1551 , CVE-2024-1552 , CVE-2024-1553
Description
The updated packages fix security vulnerabilities: Timing attack against RSA decryption in TLS. (CVE-2023-5388) Out-of-bounds memory read in networking channels. (CVE-2024-1546) Alert dialog could have been spoofed on another site. (CVE-2024-1547) Fullscreen Notification could have been hidden by select element. (CVE-2024-1548) Custom cursor could obscure the permission dialog. (CVE-2024-1549) Mouse cursor re-positioned unexpectedly could have led to unintended permission grants. (CVE-2024-1550) Multipart HTTP Responses would accept the Set-Cookie header in response parts. (CVE-2024-1551) Incorrect code generation on 32-bit ARM devices. (CVE-2024-1552) Memory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8. (CVE-2024-1553)
References
- https://bugs.mageia.org/show_bug.cgi?id=32876
- https://www.mozilla.org/en-US/firefox/115.8.0/releasenotes/
- https://www.mozilla.org/en-US/security/advisories/mfsa2024-06/
- https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_98.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1546
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1547
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1548
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1549
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1550
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1551
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1552
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1553
SRPMS
9/core
- rootcerts-20240215.00-1.mga9
- nss-3.98.0-1.mga9
- firefox-115.8.0-1.mga9
- firefox-l10n-115.8.0-1.mga9