RLSA-2024:8726

See a problem?
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2024:8726.json
JSON Data
https://api.osv.dev/v1/vulns/RLSA-2024:8726
Related
Published
2024-11-08T15:57:59.128395Z
Modified
2024-11-08T15:59:33.928906Z
Summary
Moderate: firefox security update
Details

Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

Security Fix(es):

  • firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser (CVE-2024-10464)

  • firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response (CVE-2024-10461)

  • firefox: thunderbird: Permission leak via embed or object elements (CVE-2024-10458)

  • firefox: thunderbird: Use-after-free in layout with accessibility (CVE-2024-10459)

  • firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4 (CVE-2024-10467)

  • firefox: thunderbird: Clipboard "paste" button persisted across tabs (CVE-2024-10465)

  • firefox: DOM push subscription message could hang Firefox (CVE-2024-10466)

  • firefox: thunderbird: Cross origin video frame leak (CVE-2024-10463)

  • firefox: thunderbird: Origin of permission prompt could be spoofed by long URL (CVE-2024-10462)

  • firefox: thunderbird: Confusing display of origin for external protocol handler prompt (CVE-2024-10460)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:9 / firefox

Package

Name
firefox
Purl
pkg:rpm/rocky-linux/firefox?distro=rocky-linux-9&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:128.4.0-1.el9_4