{"id":"MGASA-2020-0274","summary":"Updated firefox packages fix security vulnerability","details":"Updated nss and firefox packages fix security vulnerabilities:\n\nNSS has shown timing differences when performing DSA signatures, which\nwas exploitable and could eventually leak private keys (CVE-2020-12399).\n\nSide channel vulnerabilities during RSA key generation in NSS\n(CVE-2020-12402).\n\nWhen browsing a malicious page, a race condition in our \nSharedWorkerService could occur and lead to a potentially exploitable\ncrash due to a use-after-free (CVE-2020-12405).\n\nMozilla developer Iain Ireland discovered a missing type check during\nunboxed objects removal, resulting in a crash due to type confusion with\nNativeTypes. We presume that with enough effort that it could be exploited\nto run arbitrary code (CVE-2020-12406).\n\nMozilla developers Tom Tung and Karl Tomlinson reported memory safety bugs\npresent in Firefox ESR 68.8. Some of these bugs showed evidence of memory\ncorruption and we presume that with enough effort some of these could have\nbeen exploited to run arbitrary code (CVE-2020-12410).\n\nManipulating individual parts of a URL object could have caused an\nout-of-bounds read, leaking process memory to malicious JavaScript\n(CVE-2020-12418).\n\nWhen processing callbacks that occurred during window flushing in the parent\nprocess, the associated window may die; causing a use-after-free in\nnsGlobalWindowInner. This could have led to memory corruption and a\npotentially exploitable crash (CVE-2020-12419).\n\nWhen trying to connect to a STUN server, a race condition could have caused a\nuse-after-free of a pointer, leading to memory corruption and a potentially\nexploitable crash (CVE-2020-12420).\n\nWhen performing add-on updates, certificate chains terminating in\nnon-built-in-roots were rejected (even if they were legitimately added by an\nadministrator.) This could have caused add-ons to become out-of-date silently\nwithout notification to the user (CVE-2020-12421).\n","modified":"2026-04-16T04:44:30.075743925Z","published":"2020-07-04T22:47:21Z","upstream":["CVE-2020-12417","CVE-2020-12418","CVE-2020-12419","CVE-2020-12420","CVE-2020-12421"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2020-0274.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=26890"},{"type":"WEB","url":"https://groups.google.com/forum/#!topic/mozilla.dev.tech.nspr/YDlWqMPNR9Y"},{"type":"WEB","url":"https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.52.1_release_notes"},{"type":"ADVISORY","url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-21/"},{"type":"ADVISORY","url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-25/"},{"type":"WEB","url":"https://www.debian.org/lts/security/2020/dla-2266"}],"affected":[{"package":{"name":"nspr","ecosystem":"Mageia:7","purl":"pkg:rpm/mageia/nspr?arch=source&distro=mageia-7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.26-1.mga7"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2020-0274.json"}},{"package":{"name":"rootcerts","ecosystem":"Mageia:7","purl":"pkg:rpm/mageia/rootcerts?arch=source&distro=mageia-7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"20200612.00-1.mga7"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2020-0274.json"}},{"package":{"name":"nss","ecosystem":"Mageia:7","purl":"pkg:rpm/mageia/nss?arch=source&distro=mageia-7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.52.1-1.1.mga7"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2020-0274.json"}},{"package":{"name":"firefox","ecosystem":"Mageia:7","purl":"pkg:rpm/mageia/firefox?arch=source&distro=mageia-7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"68.10.0-1.mga7"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2020-0274.json"}},{"package":{"name":"firefox-l10n","ecosystem":"Mageia:7","purl":"pkg:rpm/mageia/firefox-l10n?arch=source&distro=mageia-7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"68.10.0-1.mga7"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2020-0274.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}