Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 716644 (CVE-2020-6821, CVE-2020-6822, CVE-2020-6823, CVE-2020-6824, CVE-2020-6825, CVE-2020-6826, MFSA-2020-12, MFSA-2020-13) - <www-client/firefox{-bin}-{68.7.0,75.0}: Multiple vulnerabilities (CVE-2020-{6821,6822,6823,6824,6825,6826})
Summary: <www-client/firefox{-bin}-{68.7.0,75.0}: Multiple vulnerabilities (CVE-2020-{...
Status: RESOLVED FIXED
Alias: CVE-2020-6821, CVE-2020-6822, CVE-2020-6823, CVE-2020-6824, CVE-2020-6825, CVE-2020-6826, MFSA-2020-12, MFSA-2020-13
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal major
Assignee: Gentoo Security
URL:
Whiteboard: A2 [glsa+ cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2020-04-08 05:24 UTC by Sam James
Modified: 2020-04-23 14:30 UTC (History)
1 user (show)

See Also:
Package list:
www-client/firefox-68.7.0
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-04-08 05:24:22 UTC
1) CVE-2020-6821

Description:
"Uninitialized memory could be read when using the WebGL copyTexSubImage method. When reading from areas partially or fully outside the source resource with WebG L's copyTexSubImage method, the specification requires the returned values be zero. Previously, this memory was uninitialized, leading to potentially sensitive data disclosure."

Bug (restricted): https://bugzilla.mozilla.org/show_bug.cgi?id=1625404
Affects: <68.7, <75

2) CVE-2020-6822

Description:
"Out of bounds write in GMPDecodeData when processing large images. On 32-bit builds, an out of bounds write could have occurred when processing an image larger than 4 GB in GMPDecodeData. It is possible that with enough effort this could have been exploited to run arbitrary code."

Bug (restricted): https://bugzilla.mozilla.org/show_bug.cgi?id=1544181
Affects: <68.7, <75

3) CVE-2020-6823

Description:
"Malicious Extension could obtain auth codes from OAuth login flows. A malicious extension could have called browser.identity.launchWebAuthFlow, controlling the redirect_uri, and through the Promise returned, obtain the Auth code and gain access to the user's account at the service provider."

Bug (restricted): https://bugzilla.mozilla.org/show_bug.cgi?id=1614919
Affects: <75

4) CVE-2020-6824

Description:
"Generated passwords may be identical on the same site between separate private browsing sessions. Initially, a user opens a Private Browsing Window and generates a password for a site, then closes the Private Browsing Window but leaves Firefox open. Subsequently, if the user had opened a new Private Browsing Window, revisited the same site, and generated a new password - the generated passwords would have been identical, rather than independent."

Bug (restricted): https://bugzilla.mozilla.org/show_bug.cgi?id=1621853
Affects: <75

5) CVE-2020-6825

Description:
"Memory safety bugs fixed in Firefox 75 and Firefox ESR 68.7. Mozilla developers and community members Tyson Smith and Christian Holler reported memory safety bugs present in Firefox 74 and Firefox ESR 68.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code."

Bugs (restricted): https://bugzilla.mozilla.org/buglist.cgi?bug_id=1572541%2C1620193%2C1620203
Affects: <68.7, <75

6) CVE-2020-6826

Description:
"Memory safety bugs fixed in Firefox 75. Mozilla developers Tyson Smith, Bob Clary, and Alexandru Michis reported memory safety bugs present in Firefox 74. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code."

Bugs (restricted): https://bugzilla.mozilla.org/buglist.cgi?bug_id=1613009%2C1613195%2C1616734%2C1617488%2C1619229%2C1620719%2C1624897
Affects: <75

---
URL (MFSA-2020-12): https://www.mozilla.org/en-US/security/advisories/mfsa2020-12/ (Firefox 75)
URL (MFSA-2020-13): https://www.mozilla.org/en-US/security/advisories/mfsa2020-13/ (ESR 68.7)
Comment 1 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-04-08 05:25:26 UTC
@maintainer(s), please advise if ready for stabilisation, or call yourself.
Comment 2 Thomas Deutschmann (RETIRED) gentoo-dev 2020-04-11 21:12:01 UTC
amd64 & x86 stable
Comment 3 Thomas Deutschmann (RETIRED) gentoo-dev 2020-04-11 21:12:16 UTC
amd64 & x86 stable
Comment 4 Mart Raudsepp gentoo-dev 2020-04-12 10:54:25 UTC
arm64 stable
Comment 5 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-04-12 11:42:24 UTC
@maintainer(s), please cleanup
Comment 6 Larry the Git Cow gentoo-dev 2020-04-12 13:14:38 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=5b615e9bc7e0d785b6eb90bf439d148509ec3f42

commit 5b615e9bc7e0d785b6eb90bf439d148509ec3f42
Author:     Thomas Deutschmann <whissi@gentoo.org>
AuthorDate: 2020-04-12 13:07:01 +0000
Commit:     Thomas Deutschmann <whissi@gentoo.org>
CommitDate: 2020-04-12 13:07:01 +0000

    www-client/firefox-bin: security cleanup
    
    Bug: https://bugs.gentoo.org/716644
    Package-Manager: Portage-2.3.98, Repoman-2.3.22
    Signed-off-by: Thomas Deutschmann <whissi@gentoo.org>

 www-client/firefox-bin/Manifest                  | 186 --------------
 www-client/firefox-bin/files/all-gentoo-2.js     |  12 -
 www-client/firefox-bin/firefox-bin-68.6.1.ebuild | 280 ---------------------
 www-client/firefox-bin/firefox-bin-74.0.1.ebuild | 296 -----------------------
 4 files changed, 774 deletions(-)

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=524b1941f309771720e8e92229e96bdf6f2383ab

commit 524b1941f309771720e8e92229e96bdf6f2383ab
Author:     Thomas Deutschmann <whissi@gentoo.org>
AuthorDate: 2020-04-12 13:05:15 +0000
Commit:     Thomas Deutschmann <whissi@gentoo.org>
CommitDate: 2020-04-12 13:05:15 +0000

    www-client/firefox: security cleanup
    
    Bug: https://bugs.gentoo.org/716644
    Package-Manager: Portage-2.3.98, Repoman-2.3.22
    Signed-off-by: Thomas Deutschmann <whissi@gentoo.org>

 www-client/firefox/Manifest                        | 185 ----
 .../firefox/files/firefox-73.0_fix_llvm9.patch     |  19 -
 .../files/firefox-73.0_fix_lto_pgo_builds.patch    |  51 --
 ...74.0-bug1607052-font-selection-regression.patch | 281 -------
 .../files/mozilla-bug1601707-gcc-fixup-72.patch    |  83 --
 .../files/mozilla-bug1601707-gcc-fixup.patch       | 114 ---
 www-client/firefox/firefox-68.6.1.ebuild           | 910 --------------------
 www-client/firefox/firefox-74.0.1.ebuild           | 927 ---------------------
 8 files changed, 2570 deletions(-)
Comment 7 NATTkA bot gentoo-dev 2020-04-12 17:16:46 UTC
Resetting sanity check; keywords are not fully specified and arches are not CC-ed.
Comment 8 Yury German Gentoo Infrastructure gentoo-dev 2020-04-16 06:32:13 UTC
Arches and Maintainer(s), Thank you for your work.

New GLSA Request filed.
Comment 9 GLSAMaker/CVETool Bot gentoo-dev 2020-04-23 14:30:47 UTC
This issue was resolved and addressed in
 GLSA 202004-11 at https://security.gentoo.org/glsa/202004-11
by GLSA coordinator Thomas Deutschmann (whissi).