firefox-128.2.0-1.0.1.el7.AXS7
エラータID: AXSA:2024-9386:39
Mozilla Firefox is an open-source web browser, designed for standards
compliance, performance, and portability.
Security Fix(es):
* firefox: 115.15/128.2 ESR ()
* mozilla: Type confusion when looking up a property name in a
"with" block (CVE-2024-8381)
* mozilla: Internal event interfaces were exposed to web content when browser
EventHandler listener callbacks ran (CVE-2024-8382)
* mozilla: Firefox did not ask before openings news: links in an external
application (CVE-2024-8383)
* mozilla: Garbage collection could mis-color cross-compartment objects in OOM
conditions (CVE-2024-8384)
* mozilla: WASM type confusion involving ArrayTypes (CVE-2024-8385)
* mozilla: SelectElements could be shown over another site if popups are
allowed (CVE-2024-8386)
* mozilla: Memory safety bugs fixed in Firefox 130, Firefox ESR 128.2, and
Thunderbird 128.2 (CVE-2024-8387)
* mozilla: Type Confusion in Async Generators in Javascript Engine
(CVE-2024-7652)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
CVE-2024-7652
An error in the ECMA-262 specification relating to Async Generators could have
resulted in a type confusion, potentially leading to memory corruption and an
exploitable crash. This vulnerability affects Firefox < 128, Firefox ESR <
115.13, Thunderbird < 115.13, and Thunderbird < 128.
CVE-2024-8381
A potentially exploitable type confusion could be triggered when looking up a
property name on an object being used as the `with` environment. This
vulnerability affects Firefox < 130, Firefox ESR < 128.2, Firefox ESR < 115.15,
Thunderbird < 128.2, and Thunderbird < 115.15.
CVE-2024-8382
Internal browser event interfaces were exposed to web content when privileged
EventHandler listener callbacks ran for those events. Web content that tried to
use those interfaces would not be able to use them with elevated privileges, but
their presence would indicate certain browser features had been used, such as
when a user opened the Dev Tools console. This vulnerability affects Firefox <
130, Firefox ESR < 128.2, Firefox ESR < 115.15, Thunderbird < 128.2, and
Thunderbird < 115.15.
CVE-2024-8383
Firefox normally asks for confirmation before asking the operating system to
find an application to handle a scheme that the browser does not support. It did
not ask before doing so for the Usenet-related schemes news: and snews:. Since
most operating systems don't have a trusted newsreader installed by default, an
unscrupulous program that the user downloaded could register itself as a
handler. The website that served the application download could then launch that
application at will. This vulnerability affects Firefox < 130, Firefox ESR <
128.2, and Firefox ESR < 115.15.
CVE-2024-8384
The JavaScript garbage collector could mis-color cross-compartment objects if
OOM conditions were detected at the right point between two passes. This could
have led to memory corruption. This vulnerability affects Firefox < 130, Firefox
ESR < 128.2, Firefox ESR < 115.15, Thunderbird < 128.2, and Thunderbird <
115.15.
CVE-2024-8385
A difference in the handling of StructFields and ArrayTypes in WASM could be
used to trigger an exploitable type confusion vulnerability. This vulnerability
affects Firefox < 130, Firefox ESR < 128.2, and Thunderbird < 128.2.
CVE-2024-8386
If a site had been granted the permission to open popup windows, it could cause
Select elements to appear on top of another site to perform a spoofing attack.
This vulnerability affects Firefox < 130, Firefox ESR < 128.2, and Thunderbird <
128.2.
CVE-2024-8387
Memory safety bugs present in Firefox 129, Firefox ESR 128.1, and Thunderbird
128.1. Some of these bugs showed evidence of memory corruption and we presume
that with enough effort some of these could have been exploited to run arbitrary
code. This vulnerability affects Firefox < 130, Firefox ESR < 128.2, and
Thunderbird < 128.2.
Update packages.
An error in the ECMA-262 specification relating to Async Generators could have resulted in a type confusion, potentially leading to memory corruption and an exploitable crash. This vulnerability affects Firefox < 128, Firefox ESR < 115.13, Thunderbird < 115.13, and Thunderbird < 128.
A potentially exploitable type confusion could be triggered when looking up a property name on an object being used as the `with` environment. This vulnerability affects Firefox < 130, Firefox ESR < 128.2, Firefox ESR < 115.15, Thunderbird < 128.2, and Thunderbird < 115.15.
Internal browser event interfaces were exposed to web content when privileged EventHandler listener callbacks ran for those events. Web content that tried to use those interfaces would not be able to use them with elevated privileges, but their presence would indicate certain browser features had been used, such as when a user opened the Dev Tools console. This vulnerability affects Firefox < 130, Firefox ESR < 128.2, Firefox ESR < 115.15, Thunderbird < 128.2, and Thunderbird < 115.15.
Firefox normally asks for confirmation before asking the operating system to find an application to handle a scheme that the browser does not support. It did not ask before doing so for the Usenet-related schemes news: and snews:. Since most operating systems don't have a trusted newsreader installed by default, an unscrupulous program that the user downloaded could register itself as a handler. The website that served the application download could then launch that application at will. This vulnerability affects Firefox < 130, Firefox ESR < 128.2, and Firefox ESR < 115.15.
The JavaScript garbage collector could mis-color cross-compartment objects if OOM conditions were detected at the right point between two passes. This could have led to memory corruption. This vulnerability affects Firefox < 130, Firefox ESR < 128.2, Firefox ESR < 115.15, Thunderbird < 128.2, and Thunderbird < 115.15.
A difference in the handling of StructFields and ArrayTypes in WASM could be used to trigger an exploitable type confusion vulnerability. This vulnerability affects Firefox < 130, Firefox ESR < 128.2, and Thunderbird < 128.2.
If a site had been granted the permission to open popup windows, it could cause Select elements to appear on top of another site to perform a spoofing attack. This vulnerability affects Firefox < 130, Firefox ESR < 128.2, and Thunderbird < 128.2.
Memory safety bugs present in Firefox 129, Firefox ESR 128.1, and Thunderbird 128.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 130, Firefox ESR < 128.2, and Thunderbird < 128.2.
N/A
Asianux Server 7 for x86_64
- firefox-128.2.0-1.0.1.el7.AXS7.x86_64.rpm
MD5: 066f4188be86e2e4cde145276e9fc7ce
SHA-256: 7cd85f8d717e17ef1ab3265dcd7662c1a7296914af57717604c6832275ec31ee
Size: 143.12 MB