Mozilla informed about a critical vulnerability that is being exploited in the wild. As far as I know the vulnerability got a scoring of 9.8 out of 10.0. So it seems very severe.
Now, if I check koji.fedoraproject.org I can see that a new firefox version (131.0.2) was built yesterday. However, today, 24h later, it still is not offered through the update channels for Fedora 40.
So I wonder, how slow or fast are those critical security fixes released usually on Fedora? 24h to fix an exploit, that needs no user interaction seems like a long time. I was using the tar.gz from Mozilla directly, but then some folks said: No, don’t use that, its not using all the security features, stick to the firefox version that comes with the distribution, this is much more hardened and much safer. Well, if fixes take so long that point doesn’t seem to make a lot of sense.
I just ran dnf info firefox on a VM running Fedora Server 40 as well as my laptop running the KDE spin of Fedora Workstation 40. On both, I am getting the following:
Available Packages
Name : firefox
Version : 131.0
Release : 2.fc40
Architecture : x86_64
Size : 77 M
Source : firefox-131.0-2.fc40.src.rpm
Repository : updates
Summary : Mozilla Firefox Web browser
URL : https://www.mozilla.org/firefox/
License : LicenseRef-Callaway-MPLv1.1 OR GPL-2.0-or-later OR LicenseRef-Callaway-LGPLv2+
Description : Mozilla Firefox is an open-source web browser, designed for standards
: compliance, performance and portability.
I have the following under /etc/yum.repos.d/fedora-updates.repo
Mozilla informed about a critical vulnerability that is being exploited in the wild. As far as I know the vulnerability got a scoring of 9.8 out of 10.0. So it seems very severe.
Now, if I check koji.fedoraproject.org I can see that a new firefox version (131.0.2) was built yesterday. However, today, 24h later, it still is not offered through the update channels for Fedora 40.
Yeah. It’s going to stable now.
So I wonder, how slow or fast are those critical security fixes released usually on Fedora? 24h to fix an exploit, that needs no user interaction seems like a long time. I was using the tar.gz from Mozilla directly, but then some folks said: No, don’t use that, its not using all the security features, stick to the firefox version that comes with the distribution, this is much more hardened and much safer. Well, if fixes take so long that point doesn’t seem to make a lot of sense.
It depends.
In general things do not get pushed out until they have had some
testing. If it’s broken, the fix is worse than the cure sometimes.
There was a dbus critical security update that we had a long while back
that got pushed out super fast and actually broke people’s ability to
get the working fixed version after that without manual intervention. ;(
Anyhow, this update is pushing to stable now, should be there in a
bit…