RLSA-2024:3955

See a problem?
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2024:3955.json
JSON Data
https://api.osv.dev/v1/vulns/RLSA-2024:3955
Related
  • CVE-2024-5688
  • CVE-2024-5690
  • CVE-2024-5691
  • CVE-2024-5693
  • CVE-2024-5696
  • CVE-2024-5700
  • CVE-2024-5702
Published
2024-07-02T14:11:35.145045Z
Modified
2024-07-02T14:13:10.678266Z
Summary
Important: firefox security update
Details

Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 115.12.0 ESR.

Security Fix(es):

  • firefox: Use-after-free in networking (CVE-2024-5702)

  • firefox: Use-after-free in JavaScript object transplant (CVE-2024-5688)

  • firefox: External protocol handlers leaked by timing attack (CVE-2024-5690)

  • firefox: Sandboxed iframes were able to bypass sandbox restrictions to open a new window (CVE-2024-5691)

  • firefox: Cross-Origin Image leak via Offscreen Canvas (CVE-2024-5693)

  • firefox: Memory Corruption in Text Fragments (CVE-2024-5696)

  • firefox: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 (CVE-2024-5700)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:9 / firefox

Package

Name
firefox
Purl
pkg:rpm/rocky-linux/firefox?distro=rocky-linux-9&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:115.12.0-1.el9_4