RHSA-2024_5391
Vulnerability from csaf_redhat - Published: 2024-08-14 15:05 - Updated: 2024-11-27 17:54The Mozilla Foundation Security Advisory describes this flaw as: Select options could obscure the fullscreen notification dialog. This could be used by a malicious site to perform a spoofing attack.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.x86_64 | — |
Vendor Fix
fix
|
The Mozilla Foundation Security Advisory describes this flaw as: Insufficient checks when processing graphics shared memory could have led to memory corruption. This could be leveraged by an attacker to perform a sandbox escape.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.x86_64 | — |
Vendor Fix
fix
|
The Mozilla Foundation Security Advisory describes this flaw as: A type confusion bug in WebAssembly could be leveraged by an attacker to potentially achieve code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.x86_64 | — |
Vendor Fix
fix
|
The Mozilla Foundation Security Advisory describes this flaw as: Incomplete WebAssembly exception handing could have led to a use-after-free.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.x86_64 | — |
Vendor Fix
fix
|
The Mozilla Foundation Security Advisory describes this flaw as: Editor code failed to check an attribute value. This could have led to an out-of-bounds read.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.x86_64 | — |
Vendor Fix
fix
|
The Mozilla Foundation Security Advisory describes this flaw as: Firefox adds web-compatibility shims in place of some tracking scripts blocked by Enhanced Tracking Protection. On a site protected by Content Security Policy in "strict-dynamic" mode, an attacker able to inject an HTML element could have used a DOM Clobbering attack on some of the shims and achieved XSS, bypassing the CSP strict-dynamic protection.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.x86_64 | — |
Vendor Fix
fix
|
The Mozilla Foundation Security Advisory describes this flaw as: It was possible for a web extension with minimal permissions to create a `StreamFilter` which could be used to read and modify the response body of requests on any site.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.x86_64 | — |
Vendor Fix
fix
|
The Mozilla Foundation Security Advisory describes this flaw as: ANGLE failed to initialize parameters which led to reading from uninitialized memory. This could be leveraged to leak sensitive data from memory.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.x86_64 | — |
Vendor Fix
fix
|
The Mozilla Foundation Security Advisory describes this flaw as: Unexpected marking work at the start of sweeping could have led to a use-after-free.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.x86_64 | — |
Vendor Fix
fix
|
The Mozilla Foundation Security Advisory describes this flaw as: Incorrect garbage collection interaction in IndexedDB could have led to a use-after-free.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.x86_64 | — |
Vendor Fix
fix
|
The Mozilla Foundation Security Advisory describes this flaw as: The date picker could partially obscure security prompts. This could be used by a malicious site to trick a user into granting permissions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for firefox is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.\n\nSecurity Fix(es):\n\n* Firefox: 115.14/128.1 ESR ()\n\n* mozilla: Fullscreen notification dialog can be obscured by document content (CVE-2024-7518)\n\n* mozilla: Out of bounds memory access in graphics shared memory handling (CVE-2024-7519)\n\n* mozilla: Type confusion in WebAssembly (CVE-2024-7520)\n\n* mozilla: Incomplete WebAssembly exception handing (CVE-2024-7521)\n\n* mozilla: Out of bounds read in editor component (CVE-2024-7522)\n\n* mozilla: CSP strict-dynamic bypass using web-compatibility shims (CVE-2024-7524)\n\n* mozilla: Missing permission check when creating a StreamFilter (CVE-2024-7525)\n\n* mozilla: Uninitialized memory used by WebGL (CVE-2024-7526)\n\n* mozilla: Use-after-free in JavaScript garbage collection (CVE-2024-7527)\n\n* mozilla: Use-after-free in IndexedDB (CVE-2024-7528)\n\n* mozilla: Document content could partially obscure security prompts (CVE-2024-7529)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:5391",
"url": "https://access.redhat.com/errata/RHSA-2024:5391"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_5391.json"
}
],
"title": "Red Hat Security Advisory: firefox security update",
"tracking": {
"current_release_date": "2024-11-27T17:54:20+00:00",
"generator": {
"date": "2024-11-27T17:54:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2024:5391",
"initial_release_date": "2024-08-14T15:05:34+00:00",
"revision_history": [
{
"date": "2024-08-14T15:05:34+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-08-14T15:05:34+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-27T17:54:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:115.14.0-2.el8_10.src",
"product": {
"name": "firefox-0:115.14.0-2.el8_10.src",
"product_id": "firefox-0:115.14.0-2.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@115.14.0-2.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:115.14.0-2.el8_10.aarch64",
"product": {
"name": "firefox-0:115.14.0-2.el8_10.aarch64",
"product_id": "firefox-0:115.14.0-2.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@115.14.0-2.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "firefox-debugsource-0:115.14.0-2.el8_10.aarch64",
"product": {
"name": "firefox-debugsource-0:115.14.0-2.el8_10.aarch64",
"product_id": "firefox-debugsource-0:115.14.0-2.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debugsource@115.14.0-2.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:115.14.0-2.el8_10.aarch64",
"product": {
"name": "firefox-debuginfo-0:115.14.0-2.el8_10.aarch64",
"product_id": "firefox-debuginfo-0:115.14.0-2.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@115.14.0-2.el8_10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:115.14.0-2.el8_10.ppc64le",
"product": {
"name": "firefox-0:115.14.0-2.el8_10.ppc64le",
"product_id": "firefox-0:115.14.0-2.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@115.14.0-2.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "firefox-debugsource-0:115.14.0-2.el8_10.ppc64le",
"product": {
"name": "firefox-debugsource-0:115.14.0-2.el8_10.ppc64le",
"product_id": "firefox-debugsource-0:115.14.0-2.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debugsource@115.14.0-2.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le",
"product": {
"name": "firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le",
"product_id": "firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@115.14.0-2.el8_10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:115.14.0-2.el8_10.x86_64",
"product": {
"name": "firefox-0:115.14.0-2.el8_10.x86_64",
"product_id": "firefox-0:115.14.0-2.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@115.14.0-2.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "firefox-debugsource-0:115.14.0-2.el8_10.x86_64",
"product": {
"name": "firefox-debugsource-0:115.14.0-2.el8_10.x86_64",
"product_id": "firefox-debugsource-0:115.14.0-2.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debugsource@115.14.0-2.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:115.14.0-2.el8_10.x86_64",
"product": {
"name": "firefox-debuginfo-0:115.14.0-2.el8_10.x86_64",
"product_id": "firefox-debuginfo-0:115.14.0-2.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@115.14.0-2.el8_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:115.14.0-2.el8_10.s390x",
"product": {
"name": "firefox-0:115.14.0-2.el8_10.s390x",
"product_id": "firefox-0:115.14.0-2.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@115.14.0-2.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "firefox-debugsource-0:115.14.0-2.el8_10.s390x",
"product": {
"name": "firefox-debugsource-0:115.14.0-2.el8_10.s390x",
"product_id": "firefox-debugsource-0:115.14.0-2.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debugsource@115.14.0-2.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:115.14.0-2.el8_10.s390x",
"product": {
"name": "firefox-debuginfo-0:115.14.0-2.el8_10.s390x",
"product_id": "firefox-debuginfo-0:115.14.0-2.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@115.14.0-2.el8_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:115.14.0-2.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.aarch64"
},
"product_reference": "firefox-0:115.14.0-2.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:115.14.0-2.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.ppc64le"
},
"product_reference": "firefox-0:115.14.0-2.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:115.14.0-2.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.s390x"
},
"product_reference": "firefox-0:115.14.0-2.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:115.14.0-2.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.src"
},
"product_reference": "firefox-0:115.14.0-2.el8_10.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:115.14.0-2.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.x86_64"
},
"product_reference": "firefox-0:115.14.0-2.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:115.14.0-2.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.aarch64"
},
"product_reference": "firefox-debuginfo-0:115.14.0-2.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le"
},
"product_reference": "firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:115.14.0-2.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.s390x"
},
"product_reference": "firefox-debuginfo-0:115.14.0-2.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:115.14.0-2.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.x86_64"
},
"product_reference": "firefox-debuginfo-0:115.14.0-2.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debugsource-0:115.14.0-2.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.aarch64"
},
"product_reference": "firefox-debugsource-0:115.14.0-2.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debugsource-0:115.14.0-2.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.ppc64le"
},
"product_reference": "firefox-debugsource-0:115.14.0-2.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debugsource-0:115.14.0-2.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.s390x"
},
"product_reference": "firefox-debugsource-0:115.14.0-2.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debugsource-0:115.14.0-2.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.x86_64"
},
"product_reference": "firefox-debugsource-0:115.14.0-2.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-7518",
"discovery_date": "2024-08-06T13:21:34.668960+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2303135"
}
],
"notes": [
{
"category": "description",
"text": "The Mozilla Foundation Security Advisory describes this flaw as:\n\nSelect options could obscure the fullscreen notification dialog. This could be used by a malicious site to perform a spoofing attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mozilla: Fullscreen notification dialog can be obscured by document content",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-7518"
},
{
"category": "external",
"summary": "RHBZ#2303135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303135"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-7518",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7518"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-7518",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-7518"
},
{
"category": "external",
"summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-34/#CVE-2024-7518",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-34/#CVE-2024-7518"
}
],
"release_date": "2024-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-14T15:05:34+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5391"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "mozilla: Fullscreen notification dialog can be obscured by document content"
},
{
"cve": "CVE-2024-7519",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-08-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2303136"
}
],
"notes": [
{
"category": "description",
"text": "The Mozilla Foundation Security Advisory describes this flaw as:\n\nInsufficient checks when processing graphics shared memory could have led to memory corruption. This could be leveraged by an attacker to perform a sandbox escape.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mozilla: Out of bounds memory access in graphics shared memory handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-7519"
},
{
"category": "external",
"summary": "RHBZ#2303136",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303136"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-7519",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7519"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-7519",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-7519"
},
{
"category": "external",
"summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-34/#CVE-2024-7519",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-34/#CVE-2024-7519"
}
],
"release_date": "2024-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-14T15:05:34+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5391"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "mozilla: Out of bounds memory access in graphics shared memory handling"
},
{
"cve": "CVE-2024-7520",
"discovery_date": "2024-08-06T13:21:45.983287+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2303137"
}
],
"notes": [
{
"category": "description",
"text": "The Mozilla Foundation Security Advisory describes this flaw as:\n\nA type confusion bug in WebAssembly could be leveraged by an attacker to potentially achieve code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mozilla: Type confusion in WebAssembly",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-7520"
},
{
"category": "external",
"summary": "RHBZ#2303137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303137"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-7520",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7520"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-7520",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-7520"
},
{
"category": "external",
"summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-34/#CVE-2024-7520",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-34/#CVE-2024-7520"
}
],
"release_date": "2024-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-14T15:05:34+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5391"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "mozilla: Type confusion in WebAssembly"
},
{
"cve": "CVE-2024-7521",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-08-06T13:21:54.201075+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2303138"
}
],
"notes": [
{
"category": "description",
"text": "The Mozilla Foundation Security Advisory describes this flaw as:\n\nIncomplete WebAssembly exception handing could have led to a use-after-free.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mozilla: Incomplete WebAssembly exception handing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-7521"
},
{
"category": "external",
"summary": "RHBZ#2303138",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303138"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-7521",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7521"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-7521",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-7521"
},
{
"category": "external",
"summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-34/#CVE-2024-7521",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-34/#CVE-2024-7521"
}
],
"release_date": "2024-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-14T15:05:34+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5391"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "mozilla: Incomplete WebAssembly exception handing"
},
{
"cve": "CVE-2024-7522",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-08-06T13:22:02.082189+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2303139"
}
],
"notes": [
{
"category": "description",
"text": "The Mozilla Foundation Security Advisory describes this flaw as:\n\nEditor code failed to check an attribute value. This could have led to an out-of-bounds read.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mozilla: Out of bounds read in editor component",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-7522"
},
{
"category": "external",
"summary": "RHBZ#2303139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303139"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-7522",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7522"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-7522",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-7522"
},
{
"category": "external",
"summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-34/#CVE-2024-7522",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-34/#CVE-2024-7522"
}
],
"release_date": "2024-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-14T15:05:34+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5391"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "mozilla: Out of bounds read in editor component"
},
{
"cve": "CVE-2024-7524",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2024-08-06T13:22:08.199860+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2303141"
}
],
"notes": [
{
"category": "description",
"text": "The Mozilla Foundation Security Advisory describes this flaw as:\n\nFirefox adds web-compatibility shims in place of some tracking scripts blocked by Enhanced Tracking Protection. On a site protected by Content Security Policy in \"strict-dynamic\" mode, an attacker able to inject an HTML element could have used a DOM Clobbering attack on some of the shims and achieved XSS, bypassing the CSP strict-dynamic protection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mozilla: CSP strict-dynamic bypass using web-compatibility shims",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-7524"
},
{
"category": "external",
"summary": "RHBZ#2303141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303141"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-7524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7524"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-7524",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-7524"
},
{
"category": "external",
"summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-34/#CVE-2024-7524",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-34/#CVE-2024-7524"
}
],
"release_date": "2024-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-14T15:05:34+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5391"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "mozilla: CSP strict-dynamic bypass using web-compatibility shims"
},
{
"cve": "CVE-2024-7525",
"cwe": {
"id": "CWE-269",
"name": "Improper Privilege Management"
},
"discovery_date": "2024-08-06T13:22:13.807947+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2303142"
}
],
"notes": [
{
"category": "description",
"text": "The Mozilla Foundation Security Advisory describes this flaw as:\n\nIt was possible for a web extension with minimal permissions to create a `StreamFilter` which could be used to read and modify the response body of requests on any site.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mozilla: Missing permission check when creating a StreamFilter",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-7525"
},
{
"category": "external",
"summary": "RHBZ#2303142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303142"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-7525",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7525"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-7525",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-7525"
},
{
"category": "external",
"summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-34/#CVE-2024-7525",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-34/#CVE-2024-7525"
}
],
"release_date": "2024-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-14T15:05:34+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5391"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "mozilla: Missing permission check when creating a StreamFilter"
},
{
"cve": "CVE-2024-7526",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"discovery_date": "2024-08-06T13:22:17.234413+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2303143"
}
],
"notes": [
{
"category": "description",
"text": "The Mozilla Foundation Security Advisory describes this flaw as:\n\nANGLE failed to initialize parameters which led to reading from uninitialized memory. This could be leveraged to leak sensitive data from memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mozilla: Uninitialized memory used by WebGL",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-7526"
},
{
"category": "external",
"summary": "RHBZ#2303143",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303143"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-7526",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7526"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-7526",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-7526"
},
{
"category": "external",
"summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-34/#CVE-2024-7526",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-34/#CVE-2024-7526"
}
],
"release_date": "2024-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-14T15:05:34+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5391"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "mozilla: Uninitialized memory used by WebGL"
},
{
"cve": "CVE-2024-7527",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-08-06T13:22:20.006010+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2303144"
}
],
"notes": [
{
"category": "description",
"text": "The Mozilla Foundation Security Advisory describes this flaw as:\n\nUnexpected marking work at the start of sweeping could have led to a use-after-free.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mozilla: Use-after-free in JavaScript garbage collection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-7527"
},
{
"category": "external",
"summary": "RHBZ#2303144",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303144"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-7527",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7527"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-7527",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-7527"
},
{
"category": "external",
"summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-34/#CVE-2024-7527",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-34/#CVE-2024-7527"
}
],
"release_date": "2024-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-14T15:05:34+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5391"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "mozilla: Use-after-free in JavaScript garbage collection"
},
{
"cve": "CVE-2024-7528",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-08-06T13:22:23.248023+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2303145"
}
],
"notes": [
{
"category": "description",
"text": "The Mozilla Foundation Security Advisory describes this flaw as:\n\nIncorrect garbage collection interaction in IndexedDB could have led to a use-after-free.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mozilla: Use-after-free in IndexedDB",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-7528"
},
{
"category": "external",
"summary": "RHBZ#2303145",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303145"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-7528",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7528"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-7528",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-7528"
},
{
"category": "external",
"summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-34/#CVE-2024-7528",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-34/#CVE-2024-7528"
}
],
"release_date": "2024-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-14T15:05:34+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5391"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "mozilla: Use-after-free in IndexedDB"
},
{
"cve": "CVE-2024-7529",
"discovery_date": "2024-08-06T13:22:26.614166+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2303146"
}
],
"notes": [
{
"category": "description",
"text": "The Mozilla Foundation Security Advisory describes this flaw as:\n\nThe date picker could partially obscure security prompts. This could be used by a malicious site to trick a user into granting permissions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mozilla: Document content could partially obscure security prompts",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-7529"
},
{
"category": "external",
"summary": "RHBZ#2303146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303146"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-7529",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7529"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-7529",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-7529"
},
{
"category": "external",
"summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-34/#CVE-2024-7529",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-34/#CVE-2024-7529"
}
],
"release_date": "2024-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-14T15:05:34+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5391"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.14.0-2.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.14.0-2.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mozilla: Document content could partially obscure security prompts"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.