[ALSA-2024:2883] Important: firefox security update
Type:
security
Severity:
important
Release date:
2024-05-21
Description:
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 115.11.0 ESR. Security Fix(es): * firefox: Arbitrary JavaScript execution in PDF.js (CVE-2024-4367) * firefox: IndexedDB files retained in private browsing mode (CVE-2024-4767) * firefox: Potential permissions request bypass via clickjacking (CVE-2024-4768) * firefox: Cross-origin responses could be distinguished between script and non-script content-types (CVE-2024-4769) * firefox: Use-after-free could occur when printing to PDF (CVE-2024-4770) * firefox: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11 (CVE-2024-4777) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 firefox-x11-115.11.0-1.el9_4.alma.1.aarch64.rpm 2af1aceb3658d034d0fe8b2f215a3311a67b382680ffd17ee4d2e67fb08e39f7
aarch64 firefox-115.11.0-1.el9_4.alma.1.aarch64.rpm b9a83546e2981c525cea225b5ab9c0a1b52525b88b3d388b2cd00f5f19cab3b3
ppc64le firefox-115.11.0-1.el9_4.alma.1.ppc64le.rpm 7c6d6123d3386e89bb7a8aa733c14e9166da6e8a3d174a671207ea24f9497305
ppc64le firefox-x11-115.11.0-1.el9_4.alma.1.ppc64le.rpm d20a33817137147cb5614ec93e1714463c7cde1ed5c7f92b2228ee37aa9c8f4a
s390x firefox-115.11.0-1.el9_4.alma.1.s390x.rpm 19da8633fc0877a24a07d9b33e0f20f38846195ec68d84a634f8af23a4d63c8a
s390x firefox-x11-115.11.0-1.el9_4.alma.1.s390x.rpm d595111073f40d70d4f95e7c9e4b00e611eedb8a874f2fae539a0cf3c13541e6
x86_64 firefox-x11-115.11.0-1.el9_4.alma.1.x86_64.rpm 58c9e8af8ae322c6f1ff003f9f5283b0ee1396a6d56380766374ce61f60d4b92
x86_64 firefox-115.11.0-1.el9_4.alma.1.x86_64.rpm 5d469a71daf853aecdc061f01fd90031211e20cecb238f43d9289bb59f0c079a
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.