firefox-115.12.0-1.el8_10.ML.1

エラータID: AXSA:2024-8472:23

Release date: 
Thursday, June 27, 2024 - 10:05
Subject: 
firefox-115.12.0-1.el8_10.ML.1
Affected Channels: 
Asianux Server 8 for x86_64
Severity: 
High
Description: 

Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 115.12.0 ESR.

Security Fix(es):

* firefox: Use-after-free in networking (CVE-2024-5702)
* firefox: Use-after-free in JavaScript object transplant (CVE-2024-5688)
* firefox: External protocol handlers leaked by timing attack (CVE-2024-5690)
* firefox: Sandboxed iframes were able to bypass sandbox restrictions to open a new window (CVE-2024-5691)
* firefox: Cross-Origin Image leak via Offscreen Canvas (CVE-2024-5693)
* firefox: Memory Corruption in Text Fragments (CVE-2024-5696)
* firefox: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 (CVE-2024-5700)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2024-5688
If a garbage collection was triggered at the right time, a use-after-free could have occurred during object transplant. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12.
CVE-2024-5690
By monitoring the time certain operations take, an attacker could have guessed which external protocol handlers were functional on a user's system. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12.
CVE-2024-5691
By tricking the browser with a `X-Frame-Options` header, a sandboxed iframe could have presented a button that, if clicked by a user, would bypass restrictions to open a new window. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12.
CVE-2024-5693
Offscreen Canvas did not properly track cross-origin tainting, which could be used to access image data from another site in violation of same-origin policy. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12.
CVE-2024-5696
By manipulating the text in an `<input>` tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12.
CVE-2024-5700
Memory safety bugs present in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12.
CVE-2024-5702
Memory corruption in the networking stack could have led to a potentially exploitable crash. This vulnerability affects Firefox < 125, Firefox ESR < 115.12, and Thunderbird < 115.12.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. firefox-115.12.0-1.el8_10.ML.1.src.rpm
    MD5: a455d0bac3cf1a02e5e407025d7b9fec
    SHA-256: 2d42c5a368027bd279c4c0e8e60a2e756a3acdf45a731ec16291a6e3b6c11bb3
    Size: 705.20 MB

Asianux Server 8 for x86_64
  1. firefox-115.12.0-1.el8_10.ML.1.x86_64.rpm
    MD5: 8814b83e3f2eea70d46288e96426fe10
    SHA-256: 0e8716e17255d87288a118bdd351b00d5525c089ba71c6bb2c406da28b1d7316
    Size: 116.17 MB