#17097 closed enhancement (fixed)

firefox-102.3.0esr

Reported by: ken@… Owned by: ken@…
Priority: normal Milestone: 11.3
Component: BOOK Version: git
Severity: normal Keywords:
Cc:

Description

The source is now available, the release notes should appear in perhaps 15 hours.

Change History (4)

comment:1 by ken@…, 20 months ago

Owner: changed from blfs-book to ken@…
Status: newassigned

comment:2 by ken@…, 19 months ago

from https://www.mozilla.org/en-US/firefox/102.3.0/releasenotes/

Security Vulnerabilities fixed in Firefox ESR 102.3

CVE-2022-40959: Bypassing FeaturePolicy restrictions on transient pages

Reporter Armin Ebert

Impact high

Description

During iframe navigation, certain pages did not have their FeaturePolicy fully initialized leading to a bypass that leaked device permissions into untrusted subdocuments.

CVE-2022-40960: Data-race when parsing non-UTF-8 URLs in threads

Reporter Armin Ebert

Impact high

Description

Concurrent use of the URL parser with non-UTF-8 data was not thread-safe. This could lead to a use-after-free causing a potentially exploitable crash.

CVE-2022-40958: Bypassing Secure Context restriction for cookies with Host and Secure prefix

Reporter Axel Chong (@Haxatron)

Impact moderate

Description

By injecting a cookie with certain special characters, an attacker on a shared subdomain which is not a secure context could set and thus overwrite cookies from a secure context, leading to session fixation and other attacks.

CVE-2022-40956: Content-Security-Policy base-uri bypass

Reporter Satoki Tsuji

Impact low

Description

When injecting an HTML base element, some requests would ignore the CSP's base-uri settings and accept the injected element's base instead.

CVE-2022-40957: Incoherent instruction cache when building WASM on ARM64

Reporter Gary Kwong

Impact low

Description

Inconsistent data in instruction and data cache when creating wasm code could lead to a potentially exploitable crash. This bug only affects Firefox on ARM64 platforms.

CVE-2022-40962: Memory safety bugs fixed in Firefox 105 and Firefox ESR 102.3

Reporter Mozilla developers and community

Impact high

Description

Mozilla developers Nika Layzell, Timothy Nikkel, Jeff Muizelaar, Sebastian Hengst, Andreas Pehrson, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 104 and Firefox ESR 102.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

(ken - reformatted, removed links to bugs which are not public or to non-existent search results)

comment:3 by ken@…, 19 months ago

Updated in g2a797e3f2c49 11.2-159.

Correct link for the upstream advisories is https://www.mozilla.org/en-US/security/advisories/mfsa2022-41/

Security Advisory SA 11.2-007 created.

comment:4 by ken@…, 19 months ago

Resolution: fixed
Status: assignedclosed
Note: See TracTickets for help on using tickets.