ArchLinux: 202106-3: firefox: multiple issues | LinuxSecurity.com

Advisories

=========================================
Arch Linux Security Advisory ASA-202106-3

Severity: High
Date    : 2021-06-01
CVE-ID  : CVE-2021-29959 CVE-2021-29960 CVE-2021-29961 CVE-2021-29966
          CVE-2021-29967
Package : firefox
Type    : multiple issues
Remote  : Yes
Link    : https://security.archlinux.org/AVG-2018

Summary
=======

The package firefox before version 89.0-1 is vulnerable to multiple
issues including arbitrary code execution, content spoofing,
information disclosure and access restriction bypass.

Resolution
==========

Upgrade to 89.0-1.

# pacman -Syu "firefox>=89.0-1"

The problems have been fixed upstream in version 89.0.

Workaround
==========

None.

Description
===========

- CVE-2021-29959 (access restriction bypass)

When a user has already allowed a website to access microphone and
camera, disabling camera sharing would not fully prevent the website
from re-enabling it without an additional prompt. This was only
possible if the website kept recording with the microphone until re-
enabling the camera.

- CVE-2021-29960 (information disclosure)

Firefox used to cache the last filename used for printing a file. When
generating a filename for printing, Firefox usually suggests the web
page title. The caching and suggestion techniques combined may have
lead to the title of a website visited during private browsing mode
being stored on disk.

- CVE-2021-29961 (content spoofing)

When styling and rendering an oversized element, Firefox did
not apply correct clipping which allowed an attacker to paint over the
user interface.

- CVE-2021-29966 (arbitrary code execution)

Mozilla developers reported memory safety bugs present in Firefox 88.
Some of these bugs showed evidence of memory corruption and Mozilla
presumes that with enough effort some of these could have been
exploited to run arbitrary code.

- CVE-2021-29967 (arbitrary code execution)

Mozilla developers reported memory safety bugs present in Firefox 88.
Some of these bugs showed evidence of memory corruption and Mozilla
presumes that with enough effort some of these could have been
exploited to run arbitrary code.

Impact
======

A remote attacker could spoof the user interface, record audio and
video without an additional prompt, or execute arbitrary code through
crafted web pages. A local attacker could learn the title of a website
visited during private browsing mode.

References
==========

https://www.mozilla.org/security/advisories/mfsa2021-23/
https://bugzilla.mozilla.org/show_bug.cgi?id=1395819
https://bugzilla.mozilla.org/show_bug.cgi?id=1675965
https://bugzilla.mozilla.org/show_bug.cgi?id=1700235
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1660307%2C1686154%2C1702948%2C1708124
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1602862%2C1703191%2C1703760%2C1704722%2C1706041
https://security.archlinux.org/CVE-2021-29959
https://security.archlinux.org/CVE-2021-29960
https://security.archlinux.org/CVE-2021-29961
https://security.archlinux.org/CVE-2021-29966
https://security.archlinux.org/CVE-2021-29967

ArchLinux: 202106-3: firefox: multiple issues

June 3, 2021

Summary

- CVE-2021-29959 (access restriction bypass)
When a user has already allowed a website to access microphone and camera, disabling camera sharing would not fully prevent the website from re-enabling it without an additional prompt. This was only possible if the website kept recording with the microphone until re- enabling the camera.
- CVE-2021-29960 (information disclosure)
Firefox used to cache the last filename used for printing a file. When generating a filename for printing, Firefox usually suggests the web page title. The caching and suggestion techniques combined may have lead to the title of a website visited during private browsing mode being stored on disk.
- CVE-2021-29961 (content spoofing)
When styling and rendering an oversized element, Firefox did not apply correct clipping which allowed an attacker to paint over the user interface.
- CVE-2021-29966 (arbitrary code execution)
Mozilla developers reported memory safety bugs present in Firefox 88. Some of these bugs showed evidence of memory corruption and Mozilla presumes that with enough effort some of these could have been exploited to run arbitrary code.
- CVE-2021-29967 (arbitrary code execution)
Mozilla developers reported memory safety bugs present in Firefox 88. Some of these bugs showed evidence of memory corruption and Mozilla presumes that with enough effort some of these could have been exploited to run arbitrary code.

Resolution

Upgrade to 89.0-1.
# pacman -Syu "firefox>=89.0-1"
The problems have been fixed upstream in version 89.0.

References

https://www.mozilla.org/security/advisories/mfsa2021-23/ https://bugzilla.mozilla.org/show_bug.cgi?id=1395819 https://bugzilla.mozilla.org/show_bug.cgi?id=1675965 https://bugzilla.mozilla.org/show_bug.cgi?id=1700235 https://bugzilla.mozilla.org/buglist.cgi?bug_id=1660307%2C1686154%2C1702948%2C1708124 https://bugzilla.mozilla.org/buglist.cgi?bug_id=1602862%2C1703191%2C1703760%2C1704722%2C1706041 https://security.archlinux.org/CVE-2021-29959 https://security.archlinux.org/CVE-2021-29960 https://security.archlinux.org/CVE-2021-29961 https://security.archlinux.org/CVE-2021-29966 https://security.archlinux.org/CVE-2021-29967

Severity
Date : 2021-06-01
CVE-ID : CVE-2021-29959 CVE-2021-29960 CVE-2021-29961 CVE-2021-29966
CVE-2021-29967
Package : firefox
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-2018

Impact

A remote attacker could spoof the user interface, record audio and video without an additional prompt, or execute arbitrary code through crafted web pages. A local attacker could learn the title of a website visited during private browsing mode.

Workaround

None.

Related News

© 2022 Guardian Digital, Inc All Rights Reserved

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.