- Issued:
- 2024-11-13
- Updated:
- 2024-11-13
RHSA-2024:9554 - Security Advisory
Synopsis
Important: firefox security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for firefox is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
- firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill) (CVE-2024-9680)
- firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser (CVE-2024-10464)
- firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response (CVE-2024-10461)
- firefox: thunderbird: Permission leak via embed or object elements (CVE-2024-10458)
- firefox: thunderbird: Use-after-free in layout with accessibility (CVE-2024-10459)
- firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4 (CVE-2024-10467)
- firefox: thunderbird: Clipboard "paste" button persisted across tabs (CVE-2024-10465)
- firefox: DOM push subscription message could hang Firefox (CVE-2024-10466)
- firefox: thunderbird: Cross origin video frame leak (CVE-2024-10463)
- firefox: thunderbird: Origin of permission prompt could be spoofed by long URL (CVE-2024-10462)
- firefox: thunderbird: Confusing display of origin for external protocol handler prompt (CVE-2024-10460)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
Affected Products
- Red Hat Enterprise Linux for x86_64 9 x86_64
- Red Hat Enterprise Linux for IBM z Systems 9 s390x
- Red Hat Enterprise Linux for Power, little endian 9 ppc64le
- Red Hat Enterprise Linux for ARM 64 9 aarch64
Fixes
- BZ - 2317442 - CVE-2024-9680 firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill)
- BZ - 2322424 - CVE-2024-10464 firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser
- BZ - 2322425 - CVE-2024-10461 firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response
- BZ - 2322428 - CVE-2024-10458 firefox: thunderbird: Permission leak via embed or object elements
- BZ - 2322429 - CVE-2024-10459 firefox: thunderbird: Use-after-free in layout with accessibility
- BZ - 2322433 - CVE-2024-10467 firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4
- BZ - 2322434 - CVE-2024-10465 firefox: thunderbird: Clipboard "paste" button persisted across tabs
- BZ - 2322438 - CVE-2024-10466 firefox: DOM push subscription message could hang Firefox
- BZ - 2322439 - CVE-2024-10463 firefox: thunderbird: Cross origin video frame leak
- BZ - 2322440 - CVE-2024-10462 firefox: thunderbird: Origin of permission prompt could be spoofed by long URL
- BZ - 2322444 - CVE-2024-10460 firefox: thunderbird: Confusing display of origin for external protocol handler prompt
CVEs
Red Hat Enterprise Linux for x86_64 9
SRPM | |
---|---|
firefox-128.4.0-1.el9_5.src.rpm | SHA-256: 228571c6db39fa4084370edab77e32fc8b05f47cbcd27608bac06f0d9b683abf |
x86_64 | |
firefox-128.4.0-1.el9_5.x86_64.rpm | SHA-256: f42eae55ca1c9383b46a5a8e9ebf093ef4589301371a09cc650108379501b4a0 |
firefox-debuginfo-128.4.0-1.el9_5.x86_64.rpm | SHA-256: f48cc9dfd42ad1a1adb86ac57d04a02fef9b726ba700d954ae67d6b59dd905ed |
firefox-debugsource-128.4.0-1.el9_5.x86_64.rpm | SHA-256: 3bec647d5d34e9ae53b80fcf45d7a977982400c5ce3a222906d3068242fed1c6 |
firefox-x11-128.4.0-1.el9_5.x86_64.rpm | SHA-256: e8395dfa84ca408185f5c82cb6034b8c44cc9cea46e74e4917ea0f2b047f97ca |
Red Hat Enterprise Linux for IBM z Systems 9
SRPM | |
---|---|
firefox-128.4.0-1.el9_5.src.rpm | SHA-256: 228571c6db39fa4084370edab77e32fc8b05f47cbcd27608bac06f0d9b683abf |
s390x | |
firefox-128.4.0-1.el9_5.s390x.rpm | SHA-256: d0a17df9284ae3b2e34dd77e952af1094a283d55bab8e5fdb515600d0f9ee831 |
firefox-debuginfo-128.4.0-1.el9_5.s390x.rpm | SHA-256: bb7b5a13ca4f7e6a406f819cb68839c848b2caf79348d0708fa7071d6379f079 |
firefox-debugsource-128.4.0-1.el9_5.s390x.rpm | SHA-256: 36c987fdabc0885176c92c2cb43a6b0d1f66a1dd469bedcd3f07d684e2789a05 |
firefox-x11-128.4.0-1.el9_5.s390x.rpm | SHA-256: d0eb5e108115dff240b95e0666afe0f5d57ceb79317910ce0f7f64fbc1d1267f |
Red Hat Enterprise Linux for Power, little endian 9
SRPM | |
---|---|
firefox-128.4.0-1.el9_5.src.rpm | SHA-256: 228571c6db39fa4084370edab77e32fc8b05f47cbcd27608bac06f0d9b683abf |
ppc64le | |
firefox-128.4.0-1.el9_5.ppc64le.rpm | SHA-256: 6432d727ff3e55441d1c8bcbe4fd5fd96835002e88c0b96d174cb0d8cd35aaec |
firefox-debuginfo-128.4.0-1.el9_5.ppc64le.rpm | SHA-256: 9515c2fa83f0319002b9eff256a3ad4f4e534f266d2b27c2fd3fd71a46076e1d |
firefox-debugsource-128.4.0-1.el9_5.ppc64le.rpm | SHA-256: 65228c0015b2fef32cb1aa4702850a0532d1b9e9d3bdc49232d65d869e42c4a9 |
firefox-x11-128.4.0-1.el9_5.ppc64le.rpm | SHA-256: cc5a7b92f653d227b4745c24a8fb0a6a2e20327dd13d7d2a5792308e46504de4 |
Red Hat Enterprise Linux for ARM 64 9
SRPM | |
---|---|
firefox-128.4.0-1.el9_5.src.rpm | SHA-256: 228571c6db39fa4084370edab77e32fc8b05f47cbcd27608bac06f0d9b683abf |
aarch64 | |
firefox-128.4.0-1.el9_5.aarch64.rpm | SHA-256: b01735469538f34152477270f081ee5b56c4f67040f0ca7f0587b9663767fd53 |
firefox-debuginfo-128.4.0-1.el9_5.aarch64.rpm | SHA-256: c8ec0db165b9ccec419b984e1c1fca329e59ec299371d12dd84c9fd7aa892a38 |
firefox-debugsource-128.4.0-1.el9_5.aarch64.rpm | SHA-256: 3ecf638f3428440328c06d1a89698fcb6a18d0181f40d69a0198fe4b27cf7cdf |
firefox-x11-128.4.0-1.el9_5.aarch64.rpm | SHA-256: c30368f66d77df9f884aefa4b0f6f52a9ebf6dfa40bf46da60ef834719dada20 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.