Mageia Advisory for NSS and Firefox: Critical Vulnerability Fixes Explained
Summary
Use-after-free in networking. (CVE-2024-5702)
Use-after-free in JavaScript object transplant. (CVE-2024-5688)
External protocol handlers leaked by timing attack. (CVE-2024-5690)
Sandboxed iframes were able to bypass sandbox restrictions to open a new
window. (CVE-2024-5691)
Cross-Origin Image leak via Offscreen Canvas. (CVE-2024-5693)
Memory Corruption in Text Fragments. (CVE-2024-5696)
Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and
Thunderbird 115.12. (CVE-2024-5700)
References
- https://bugs.mageia.org/show_bug.cgi?id=33288
- https://www.mozilla.org/en-US/firefox/115.12.0/releasenotes/
- https://www.mozilla.org/en-US/security/advisories/mfsa2024-26/
- https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_101.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700
Resolution
MGASA-2024-0222 - Updated nss & firefox packages fix security vulnerabilities
SRPMS
- 9/core/nss-3.101.0-1.mga9
- 9/core/firefox-115.12.0-1.mga9
- 9/core/firefox-l10n-115.12.0-1.mga9