firefox-128.2.0-1.el9_4.ML.1

エラータID: AXSA:2024-8867:30

Release date: 
Tuesday, October 1, 2024 - 10:11
Subject: 
firefox-128.2.0-1.el9_4.ML.1
Affected Channels: 
MIRACLE LINUX 9 for x86_64
Severity: 
High
Description: 

Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

Security Fix(es):

* firefox: 115.15/128.2 ESR ()
* mozilla: Type confusion when looking up a property name in a "with" block (CVE-2024-8381)
* mozilla: Internal event interfaces were exposed to web content when browser EventHandler listener callbacks ran (CVE-2024-8382)
* mozilla: Firefox did not ask before openings news: links in an external application (CVE-2024-8383)
* mozilla: Garbage collection could mis-color cross-compartment objects in OOM conditions (CVE-2024-8384)
* mozilla: WASM type confusion involving ArrayTypes (CVE-2024-8385)
* mozilla: SelectElements could be shown over another site if popups are allowed (CVE-2024-8386)
* mozilla: Memory safety bugs fixed in Firefox 130, Firefox ESR 128.2, and Thunderbird 128.2 (CVE-2024-8387)
* mozilla: Type Confusion in Async Generators in Javascript Engine (CVE-2024-7652)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2024-7652
An error in the ECMA-262 specification relating to Async Generators could have resulted in a type confusion, potentially leading to memory corruption and an exploitable crash. This vulnerability affects Firefox < 128, Firefox ESR < 115.13, Thunderbird < 115.13, and Thunderbird < 128.
CVE-2024-8381
A potentially exploitable type confusion could be triggered when looking up a property name on an object being used as the `with` environment. This vulnerability affects Firefox < 130, Firefox ESR < 128.2, Firefox ESR < 115.15, Thunderbird < 128.2, and Thunderbird < 115.15.
CVE-2024-8382
Internal browser event interfaces were exposed to web content when privileged EventHandler listener callbacks ran for those events. Web content that tried to use those interfaces would not be able to use them with elevated privileges, but their presence would indicate certain browser features had been used, such as when a user opened the Dev Tools console. This vulnerability affects Firefox < 130, Firefox ESR < 128.2, Firefox ESR < 115.15, Thunderbird < 128.2, and Thunderbird < 115.15.
CVE-2024-8383
Firefox normally asks for confirmation before asking the operating system to find an application to handle a scheme that the browser does not support. It did not ask before doing so for the Usenet-related schemes news: and snews:. Since most operating systems don't have a trusted newsreader installed by default, an unscrupulous program that the user downloaded could register itself as a handler. The website that served the application download could then launch that application at will. This vulnerability affects Firefox < 130, Firefox ESR < 128.2, and Firefox ESR < 115.15.
CVE-2024-8384
The JavaScript garbage collector could mis-color cross-compartment objects if OOM conditions were detected at the right point between two passes. This could have led to memory corruption. This vulnerability affects Firefox < 130, Firefox ESR < 128.2, Firefox ESR < 115.15, Thunderbird < 128.2, and Thunderbird < 115.15.
CVE-2024-8385
A difference in the handling of StructFields and ArrayTypes in WASM could be used to trigger an exploitable type confusion vulnerability. This vulnerability affects Firefox < 130, Firefox ESR < 128.2, and Thunderbird < 128.2.
CVE-2024-8386
If a site had been granted the permission to open popup windows, it could cause Select elements to appear on top of another site to perform a spoofing attack. This vulnerability affects Firefox < 130, Firefox ESR < 128.2, and Thunderbird < 128.2.
CVE-2024-8387
Memory safety bugs present in Firefox 129, Firefox ESR 128.1, and Thunderbird 128.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 130, Firefox ESR < 128.2, and Thunderbird < 128.2.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. firefox-128.2.0-1.el9_4.ML.1.src.rpm
    MD5: 9c6f695571d3533d4cc2575473f2035a
    SHA-256: b6541270fe46ba43788a9a6ffd86c09ef23afa635d8daf3e178656e29bb71557
    Size: 765.16 MB

Asianux Server 9 for x86_64
  1. firefox-128.2.0-1.el9_4.ML.1.x86_64.rpm
    MD5: 8f332294eae5f122b1c2a68a9cc92a1f
    SHA-256: e316d13d9173cde7df409cb6a56023a29ed8e2391d18e31664bf0f20f2e7312e
    Size: 122.53 MB
  2. firefox-x11-128.2.0-1.el9_4.ML.1.x86_64.rpm
    MD5: 033050d1d156beb303d27bbcafb0c76c
    SHA-256: 38b90114b5db680e5a56e555ebe5e54b77fce3e86c9ad9718964e2ac6fa229b5
    Size: 13.39 kB