[ALSA-2024:8729] Moderate: firefox security update
Type:
security
Severity:
moderate
Release date:
2024-11-03
Description:
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser (CVE-2024-10464) * firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response (CVE-2024-10461) * firefox: thunderbird: Permission leak via embed or object elements (CVE-2024-10458) * firefox: thunderbird: Use-after-free in layout with accessibility (CVE-2024-10459) * firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4 (CVE-2024-10467) * firefox: thunderbird: Clipboard "paste" button persisted across tabs (CVE-2024-10465) * firefox: DOM push subscription message could hang Firefox (CVE-2024-10466) * firefox: thunderbird: Cross origin video frame leak (CVE-2024-10463) * firefox: thunderbird: Origin of permission prompt could be spoofed by long URL (CVE-2024-10462) * firefox: thunderbird: Confusing display of origin for external protocol handler prompt (CVE-2024-10460) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 firefox-128.4.0-1.el8_10.aarch64.rpm 9b13528a794826e1e09893dc5645a8ace2a7bc56c81f8172748cb84f605b63fb
ppc64le firefox-128.4.0-1.el8_10.ppc64le.rpm 3f76f89b1d0c09e9995eb3625fac003e88713305307a173004d844e2f7615179
s390x firefox-128.4.0-1.el8_10.s390x.rpm c62cfee6a963ac9fe0385ae66a8c5957e81bc5fd4a187648a1f54ea6dfb41c77
x86_64 firefox-128.4.0-1.el8_10.x86_64.rpm 9b4678ba70f0ace6bcf9036a9adff25455291a6f0cd631b9e43c927ebaf16a1f
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.