MGASA-2024-0023

Source
https://advisories.mageia.org/MGASA-2024-0023.html
Import Source
https://advisories.mageia.org/MGASA-2024-0023.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2024-0023
Related
Published
2024-02-04T02:49:27Z
Modified
2024-02-04T01:25:28Z
Summary
Updated nss and firefox packages fix some security vulnerabilities
Details

Out of bounds write in ANGLE. (CVE-2024-0741)

Failure to update user input timestamp. (CVE-2024-0742)

Crash when listing printers on Linux. (CVE-2024-0746)

Bypass of Content Security Policy when directive unsafe-inline was set. (CVE-2024-0747)

Phishing site popup could show local origin in address bar. (CVE-2024-0749)

Potential permissions request bypass via clickjacking. (CVE-2024-0750)

Privilege escalation through devtools. (CVE-2024-0751)

HSTS policy on subdomain could bypass policy of upper domain. (CVE-2024-0753)

Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7. (CVE-2024-0755)

References
Credits

Affected packages

Mageia:9 / nss

Package

Name
nss
Purl
pkg:rpm/mageia/nss?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.97.0-1.mga9

Ecosystem specific

{
    "section": "core"
}

Mageia:9 / firefox

Package

Name
firefox
Purl
pkg:rpm/mageia/firefox?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
115.7.0-1.mga9

Ecosystem specific

{
    "section": "core"
}

Mageia:9 / firefox-l10n

Package

Name
firefox-l10n
Purl
pkg:rpm/mageia/firefox-l10n?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
115.7.0-1.mga9

Ecosystem specific

{
    "section": "core"
}