A Mozilla acaba de lançar o Firefox 74, confira as melhorias e correções.
O Anúncio do lançamento foi feito em 10 de março de 2020.
"Versão 74.0, oferecida pela primeira vez para los usuários finais em 10 de março de 2020
Gostaríamos de agradecer especialmente a todos os novos moçambicanos que contribuíram para esta versão do Firefox."
Security Vulnerabilities fixed in Firefox 74
Announced
March 10, 2020
Impact
high
Products
Firefox
Fixed in
Firefox 74
#CVE-2020-6805: Use-after-free when removing data about origins
Reporter
Brian Carpenter
Impact
high
Description
When removing data about an origin whose tab was recently closed, a use-after-free could occur in the Quota manager, resulting in a potentially exploitable crash.
References
Bug 1610880
#CVE-2020-6806: BodyStream::OnInputStreamReady was missing protections against state confusion
Reporter
Sergei Glazunov of Google Project Zero
Impact
high
Description
By carefully crafting promise resolutions, it was possible to cause an out-of-bounds read off the end of an array resized during script execution. This could have led to memory corruption and a potentially exploitable crash.
References
Bug 1612308
#CVE-2020-6807: Use-after-free in cubeb during stream destruction
Reporter
C.M.Chang
Impact
high
Description
When a device was changed while a stream was about to be destroyed, the stream-reinit task may have been executed after the stream was destroyed, causing a use-after-free and a potentially exploitable crash.
References
Bug 1614971
#CVE-2020-6808: URL Spoofing via javascript: URL
Reporter
Abdulrahman Alqabandi
Impact
moderate
Description
When a JavaScript URL (javascript:) is evaluated and the result is a string, this string is parsed to create an HTML document, which is then presented. Previously, this document's URL (as reported by the document.location property, for example) was the originating javascript: URL which could lead to spoofing attacks; it is now correctly the URL of the originating document.
References
Bug 1247968
#CVE-2020-6809: Web Extensions with the all-urls permission could access local files
Reporter
Jan Biniok
Impact
moderate
Description
When a Web Extension had the all-urls permission and made a fetch request with a mode set to 'same-origin', it was possible for the Web Extension to read local files.
References
Bug 1420296
#CVE-2020-6810: Focusing a popup while in fullscreen could have obscured the fullscreen notification
Reporter
Avi Drissman of the Chrome security team
Impact
moderate
Description
After a website had entered fullscreen mode, it could have used a previously opened popup to obscure the notification that indicates the browser is in fullscreen mode. Combined with spoofing the browser chrome, this could have led to confusing the user about the current origin of the page and credential theft or other attacks.
References
Bug 1432856
#CVE-2020-6811: Devtools' 'Copy as cURL' feature did not fully escape website-controlled data, potentially leading to command injection
Reporter
Ophir LOJKINE
Impact
moderate
Description
The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP method of a request, which can be controlled by the website. If a user used the 'Copy as Curl' feature and pasted the command into a terminal, it could have resulted in command injection and arbitrary command execution.
References
Bug 1607742
#CVE-2019-20503: Out of bounds reads in sctp_load_addresses_from_init
Reporter
Natalie Silvanovich of Google Project Zero
Impact
moderate
Description
The inputs to sctp_load_addresses_from_init are verified by sctp_arethere_unrecognized_parameters; however, the two functions handled parameter bounds differently, resulting in out of bounds reads when parameters are partially outside a chunk.
References
Bug 1613765
#CVE-2020-6812: The names of AirPods with personally identifiable information were exposed to websites with camera or microphone permission
Reporter
Jan-Ivar Bruaroey
Impact
moderate
Description
The first time AirPods are connected to an iPhone, they become named after the user's name by default (e.g. Jane Doe's AirPods.) Websites with camera or microphone permission are able to enumerate device names, disclosing the user's name. To resolve this issue, Firefox added a special case that renames devices containing the substring 'AirPods' to simply 'AirPods'.
References
Bug 1616661
#CVE-2020-6813: @import statements in CSS could bypass the Content Security Policy nonce feature
Reporter
Matheus Vrech
Impact
low
Description
When protecting CSS blocks with the nonce feature of Content Security Policy, the @import statement in the CSS block could allow an attacker to inject arbitrary styles, bypassing the intent of the Content Security Policy.
References
Bug 1605814
#CVE-2020-6814: Memory safety bugs fixed in Firefox 74 and Firefox ESR 68.6
Reporter
Mozilla developers
Impact
high
Description
Mozilla developers Byron Campen, Jason Kratzer, and Christian Holler reported memory safety bugs present in Firefox 73 and Firefox ESR 68.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
References
Memory safety bugs fixed in Firefox 74 and Firefox ESR 68.6
#CVE-2020-6815: Memory and script safety bugs fixed in Firefox 74
Reporter
Mozilla developers and community
Impact
high
Description
Mozilla developers Jason Kratzer, Boris Zbarsky, Tyson Smith, and Alexandru Michis reported memory safety and script safety bugs present in Firefox 73. Some of these bugs showed evidence of memory corruption or escalation of privilege and we presume that with enough effort some of these could have been exploited to run arbitrary code.
References
Memory and script safety bugs fixed in Firefox 74
Fonte
Você pode aguardar a nova versão chegar em seu repositório ou instalar agora mesmo seguindo a nossa matéria abaixo.
Firefox 74
O Anúncio do lançamento foi feito em 10 de março de 2020.
"Versão 74.0, oferecida pela primeira vez para los usuários finais em 10 de março de 2020
Gostaríamos de agradecer especialmente a todos os novos moçambicanos que contribuíram para esta versão do Firefox."
Melhorias
- Seu gerenciamento de login foi aprimorado com a capacidade de reverter a classificação alfa (Nome Z-A) no Lockwise, que você pode acessar em Logins e Senhas.
- Agora, o Firefox simplifica a importação de seus favoritos e histórico do novo navegador Microsoft Edge no Windows e Mac.
- Os complementos instalados por aplicativos externos agora podem ser removidos usando o Gerenciador de Complementos (sobre: addons). No futuro, apenas usuários poderão instalar complementos; eles não podem ser instalados por um aplicativo.
- O Contêiner do Facebook impede que o Facebook o rastreie pela Web - logins, curtidas e comentários do Facebook são bloqueados automaticamente em sites que não são do Facebook. Mas quando precisamos de uma exceção, agora você pode criar uma adicionando sites personalizados ao contêiner do Facebook.
- O Firefox agora oferece melhor privacidade para suas chamadas de voz e vídeo na Web por meio do suporte ao mDNS ICE, ocultando o endereço IP do seu computador com um ID aleatório em determinados cenários do WebRTC.
Correções de bugs
Security Vulnerabilities fixed in Firefox 74
Announced
March 10, 2020
Impact
high
Products
Firefox
Fixed in
Firefox 74
#CVE-2020-6805: Use-after-free when removing data about origins
Reporter
Brian Carpenter
Impact
high
Description
When removing data about an origin whose tab was recently closed, a use-after-free could occur in the Quota manager, resulting in a potentially exploitable crash.
References
Bug 1610880
#CVE-2020-6806: BodyStream::OnInputStreamReady was missing protections against state confusion
Reporter
Sergei Glazunov of Google Project Zero
Impact
high
Description
By carefully crafting promise resolutions, it was possible to cause an out-of-bounds read off the end of an array resized during script execution. This could have led to memory corruption and a potentially exploitable crash.
References
Bug 1612308
#CVE-2020-6807: Use-after-free in cubeb during stream destruction
Reporter
C.M.Chang
Impact
high
Description
When a device was changed while a stream was about to be destroyed, the stream-reinit task may have been executed after the stream was destroyed, causing a use-after-free and a potentially exploitable crash.
References
Bug 1614971
#CVE-2020-6808: URL Spoofing via javascript: URL
Reporter
Abdulrahman Alqabandi
Impact
moderate
Description
When a JavaScript URL (javascript:) is evaluated and the result is a string, this string is parsed to create an HTML document, which is then presented. Previously, this document's URL (as reported by the document.location property, for example) was the originating javascript: URL which could lead to spoofing attacks; it is now correctly the URL of the originating document.
References
Bug 1247968
#CVE-2020-6809: Web Extensions with the all-urls permission could access local files
Reporter
Jan Biniok
Impact
moderate
Description
When a Web Extension had the all-urls permission and made a fetch request with a mode set to 'same-origin', it was possible for the Web Extension to read local files.
References
Bug 1420296
#CVE-2020-6810: Focusing a popup while in fullscreen could have obscured the fullscreen notification
Reporter
Avi Drissman of the Chrome security team
Impact
moderate
Description
After a website had entered fullscreen mode, it could have used a previously opened popup to obscure the notification that indicates the browser is in fullscreen mode. Combined with spoofing the browser chrome, this could have led to confusing the user about the current origin of the page and credential theft or other attacks.
References
Bug 1432856
#CVE-2020-6811: Devtools' 'Copy as cURL' feature did not fully escape website-controlled data, potentially leading to command injection
Reporter
Ophir LOJKINE
Impact
moderate
Description
The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP method of a request, which can be controlled by the website. If a user used the 'Copy as Curl' feature and pasted the command into a terminal, it could have resulted in command injection and arbitrary command execution.
References
Bug 1607742
#CVE-2019-20503: Out of bounds reads in sctp_load_addresses_from_init
Reporter
Natalie Silvanovich of Google Project Zero
Impact
moderate
Description
The inputs to sctp_load_addresses_from_init are verified by sctp_arethere_unrecognized_parameters; however, the two functions handled parameter bounds differently, resulting in out of bounds reads when parameters are partially outside a chunk.
References
Bug 1613765
#CVE-2020-6812: The names of AirPods with personally identifiable information were exposed to websites with camera or microphone permission
Reporter
Jan-Ivar Bruaroey
Impact
moderate
Description
The first time AirPods are connected to an iPhone, they become named after the user's name by default (e.g. Jane Doe's AirPods.) Websites with camera or microphone permission are able to enumerate device names, disclosing the user's name. To resolve this issue, Firefox added a special case that renames devices containing the substring 'AirPods' to simply 'AirPods'.
References
Bug 1616661
#CVE-2020-6813: @import statements in CSS could bypass the Content Security Policy nonce feature
Reporter
Matheus Vrech
Impact
low
Description
When protecting CSS blocks with the nonce feature of Content Security Policy, the @import statement in the CSS block could allow an attacker to inject arbitrary styles, bypassing the intent of the Content Security Policy.
References
Bug 1605814
#CVE-2020-6814: Memory safety bugs fixed in Firefox 74 and Firefox ESR 68.6
Reporter
Mozilla developers
Impact
high
Description
Mozilla developers Byron Campen, Jason Kratzer, and Christian Holler reported memory safety bugs present in Firefox 73 and Firefox ESR 68.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
References
Memory safety bugs fixed in Firefox 74 and Firefox ESR 68.6
#CVE-2020-6815: Memory and script safety bugs fixed in Firefox 74
Reporter
Mozilla developers and community
Impact
high
Description
Mozilla developers Jason Kratzer, Boris Zbarsky, Tyson Smith, and Alexandru Michis reported memory safety and script safety bugs present in Firefox 73. Some of these bugs showed evidence of memory corruption or escalation of privilege and we presume that with enough effort some of these could have been exploited to run arbitrary code.
References
Memory and script safety bugs fixed in Firefox 74
Fonte
Instalação
Você pode aguardar a nova versão chegar em seu repositório ou instalar agora mesmo seguindo a nossa matéria abaixo.
Comentários
Postar um comentário
olá, seja bem vindo ao Linux Dicas e suporte !!