安全公告详情

NS-SA-2021-0007

2021-03-09 12:54:27

简介

important: fwupdate/firefox security update

严重级别

important

主题

An update for fwupdate/firefox is now available for NewStart CGSL MAIN 5.04/CGSL CORE 5.04.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

fwupdate: fwupdate provides a simple command line interface to the UEFI firmware updates.
firefox: Mozilla Firefox is an open-source web browser, designed for standards compliance, performance and portability.


Security Fix(es):
fwupdate: A flaw was found in grub2, prior to version 2.06. An attacker may use the GRUB 2 flaw to hijack and tamper the GRUB verification process. This flaw also allows the bypass of Secure Boot protections. In order to load an untrusted or modified kernel, an attacker would first need to establish access to the system such as gaining physical access, obtain the ability to alter a pxe-boot network, or have remote access to a networked system with root access. With this access, an attacker could then craft a string to cause a buffer overflow by injecting a malicious payload that leads to arbitrary code execution within GRUB. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2020-10713)
fwupdate: bugfix
firefox: Use after free in ANGLE in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.(CVE-2020-6463)
firefox: Inappropriate implementation in WebRTC in Google Chrome prior to 84.0.4147.89 allowed an attacker in a privileged network position to potentially exploit heap corruption via a crafted SCTP stream.(CVE-2020-6514)
firefox: By observing the stack trace for JavaScript errors in web workers, it was possible to leak the result of a cross-origin redirect. This applied only to content that can be parsed as script. This vulnerability affects Firefox < 79, Firefox ESR < 68.11, Firefox ESR < 78.1, Thunderbird < 68.11, and Thunderbird < 78.1.(CVE-2020-15652)
firefox: Mozilla developers and community members reported memory safety bugs present in Firefox 78 and Firefox ESR 78.0. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 79, Firefox ESR < 68.11, Firefox ESR < 78.1, Thunderbird < 68.11, and Thunderbird < 78.1.(CVE-2020-15659)
firefox: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 5.04.F27B4.

影响组件

  • fwupdate
  • firefox

影响产品

  • CGSL MAIN 5.04
  • CGSL CORE 5.04

更新包

{"fix":[{"product":"CGSL MAIN 5.04","pkgs":[{"binary":["fwupdate-12-6.el7.centos.x86_64.rpm","fwupdate-debuginfo-12-6.el7.centos.x86_64.rpm","fwupdate-devel-12-6.el7.centos.x86_64.rpm","fwupdate-efi-12-6.el7.centos.x86_64.rpm","fwupdate-libs-12-6.el7.centos.x86_64.rpm"],"source":"fwupdate-12-6.el7.centos.src.rpm"},{"binary":["firefox-68.11.0-1.el7.centos.x86_64.rpm","firefox-debuginfo-68.11.0-1.el7.centos.x86_64.rpm"],"source":"firefox-68.11.0-1.el7.centos.src.rpm"}]},{"product":"CGSL CORE 5.04","pkgs":[{"binary":["fwupdate-devel-12-6.el7.centos.x86_64.rpm","fwupdate-12-6.el7.centos.x86_64.rpm","fwupdate-debuginfo-12-6.el7.centos.x86_64.rpm","fwupdate-efi-12-6.el7.centos.x86_64.rpm","fwupdate-libs-12-6.el7.centos.x86_64.rpm"],"source":"fwupdate-12-6.el7.centos.src.rpm"},{"binary":["firefox-68.11.0-1.el7.centos.x86_64.rpm","firefox-debuginfo-68.11.0-1.el7.centos.x86_64.rpm"],"source":"firefox-68.11.0-1.el7.centos.src.rpm"}]}]}

CVE

参考