FS#3205 - Firefox Update Desperately Needed
|
Details
Please update the Firefox package in [current]. 1.0.7 came
out today, and it has been far too long since the last
update (1.0.4). That makes us more than two months and three
versions behind on a major package.
A list of the MANY security issues (not including other fixes) Archlinux's Firefox package has: (taken from http://www.mozilla.org/products/firefox/releases/1.0.7.html and http://www.mozilla.org/projects/security/known-vulnerabilities.html#Firefox) - Fix for a potential buffer overflow vulnerability when loading a hostname with all soft-hyphens - Fix to prevent URLs passed from external programs from being parsed by the shell (Linux only) - Code execution through shared function objects - XHTML node spoofing - Javascript prompt origin spoofing - Standalone applications can run arbitrary code through the browser - The return of frame-injection spoofing - Possibly exploitable crash in InstallVersion.compareTo() - Script injection from Firefox sidebar panel using data: - Same-origin violation with InstallTrigger callback - Code execution via "Set as Wallpaper" (doesn't really apply to Linux) - XBL scripts ran even when Javascript disabled - Content-generated event vulnerabilities I run nightly builds, myself, but it is a pressing concern of mine that we keep packages secure when there are readily available fixes that require a very small amount of effort to implement. This has been expressed a few times on the forums, with the latest thread being http://bbs.archlinux.org/viewtopic.php?t=15311 |
This task depends upon
Edit: still no source available..
Apparently they didn't flag some of the files for 1.0.7 properly, so until that happens it's not even available via CVS, much less a source tarball.
We'll just have to wait, it seems :-)
I want to note that I realize my report seemed quite pushy, though that was not my intention. I filed this bug mainly so everyone is properly aware of the security issues and can take the appropriate precautions to prevent them from being exploited. I have yet to hear about any cases of these bugs being exploited, but it's better to know about it and be safe than to magically bork your system and wonder what happened. Also, I understand everyone is quite busy with GCC4 and libtool-slay as well.
"Apparently around 26,750 files were tagged and 450 missed. I'm not sure why but it looks like the tag process exited abruptly. This should be fixed now."
Hopefully that fixes the source not available issue.