tor-browser

The Tor Browser
git clone https://git.dasho.dev/tor-browser.git
Log | Files | Refs | README | LICENSE

080 Security Backports.md (4382B)


🛡️ **Security Backports**

<details> <summary>Explanation of Variables</summary>

- Example: 102.8.0

- Example: 110

- Example: 12

- Example: either 0 or 5; Alpha's is always (Stable + 5) % 10

- Example: build1 </details>

NOTE: It is assumed the tor-browser rebases (stable and alpha) have already happened and there exists a build1 build tags for both base-browser and tor-browser (stable and alpha)

**Bookkeeping**

**Security Vulnerabilities Report**: https://www.mozilla.org/en-US/security/advisories/

- firefox/geckoview: https://github.com/mozilla/gecko-dev

- CVEs which are explicitly labeled as 'Android' only - CVEs which are fixed in Rapid Release but not in ESR - 'Memory safety bugs' fixed in Rapid Release but not in ESR

- Create link to the CVE on mozilla.org - Example: https://www.mozilla.org/en-US/security/advisories/mfsa2023-05/#CVE-2023-25740 - Create link to the associated Bugzilla issues (found in the CVE description) - Create links to the relevant gecko-dev/other commit hashes which need to be backported OR a brief justification for why the fix does not need to be backported - To find the gecko-dev version of a mozilla-central, search for a unique string in the relevant mozilla-central commit message in the gecko-dev/release branch log. - NOTE: This process is unfortunately somewhat poorly defined/ad-hoc given the general variation in how Bugzilla issues are labeled and resolved. In general this is going to involve a bit of hunting to identify needed commits or determining whether or not the fix is relevant.

CVEs

<!-- CVE Resolution Template, foreach CVE to investigate add an entry in the form:

- https://bugzilla.mozilla.org/show_bug.cgi?id=NNNNNN // Bugzilla issue - Note: Any relevant info about this fix, justification for why it is not necessary, etc - Patches - firefox: https://link.to/relevant/patch -->

**tor-browser**: https://gitlab.torproject.org/tpo/applications/tor-browser.git

- [ ] Backport patches to tor-browser stable branch - [ ] Open MR - [ ] Merge - [ ] cherry-pick patches onto: - [ ] base-browser stable - [ ] mullvad-browser stable - [ ] Sign/Tag commits: - In tor-browser-build.git, run signing script: `bash ./tools/browser/sign-tag.${PROJECTNAME} ${CHANNEL} ${BUILDN} ` - [ ] base-browser stable - [ ] tor-browser stable - [ ] mullvad-browser stable

- [ ] Push tags to upstream

<!-- Do not edit beneath this line <3 -->


/confidential /label ~"Apps::Product::TorBrowser" /label ~"Apps::Product::MullvadBrowser" /label ~"Apps::Type::Backport" /label ~"Apps::Impact::High" /label ~"Priority::Blocker"