MGASA-2024-0153

Source
https://advisories.mageia.org/MGASA-2024-0153.html
Import Source
https://advisories.mageia.org/MGASA-2024-0153.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2024-0153
Related
Published
2024-04-27T06:26:16Z
Modified
2024-04-27T06:02:08Z
Summary
Updated firefox packages fix security vulnerabilities
Details

CVE-2024-3852: GetBoundName in the JIT returned the wrong object CVE-2024-3854: Out-of-bounds-read after mis-optimized switch statement CVE-2024-3857: Incorrect JITting of arguments led to use-after-free during garbage collection CVE-2024-2609: Permission prompt input delay could expire when not in focus CVE-2024-3859: Integer-overflow led to out-of-bounds-read in the OpenType sanitizer CVE-2024-3861: Potential use-after-free due to AlignedBuffer self-move CVE-2024-3863: Download Protections were bypassed by .xrm-ms files on Windows CVE-2024-3302: Denial of Service using HTTP/2 CONTINUATION frames CVE-2024-3864: Memory safety bug fixed in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10

References
Credits

Affected packages

Mageia:9 / firefox

Package

Name
firefox
Purl
pkg:rpm/mageia/firefox?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
115.10.0-1.mga9

Ecosystem specific

{
    "section": "core"
}

Mageia:9 / firefox-l10n

Package

Name
firefox-l10n
Purl
pkg:rpm/mageia/firefox-l10n?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
115.10.0-1.mga9

Ecosystem specific

{
    "section": "core"
}