Описание
When Multi-Account Containers was enabled, DNS requests could have bypassed a SOCKS proxy when the domain name was invalid or the SOCKS proxy was not responding. This vulnerability affects Firefox < 140 and Thunderbird < 140.
Отчет
Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 10 | firefox | Not affected | ||
Red Hat Enterprise Linux 10 | rhel10/firefox-flatpak | Not affected | ||
Red Hat Enterprise Linux 6 | firefox | Not affected | ||
Red Hat Enterprise Linux 7 | firefox | Not affected | ||
Red Hat Enterprise Linux 8 | firefox | Not affected | ||
Red Hat Enterprise Linux 9 | firefox | Not affected |
Показывать по
Дополнительная информация
Статус:
EPSS
3.4 Low
CVSS3
Связанные уязвимости
When Multi-Account Containers was enabled, DNS requests could have bypassed a SOCKS proxy when the domain name was invalid or the SOCKS proxy was not responding. This vulnerability affects Firefox < 140 and Thunderbird < 140.
When Multi-Account Containers was enabled, DNS requests could have bypassed a SOCKS proxy when the domain name was invalid or the SOCKS proxy was not responding. This vulnerability affects Firefox < 140 and Thunderbird < 140.
When Multi-Account Containers was enabled, DNS requests could have byp ...
When Multi-Account Containers was enabled, DNS requests could have bypassed a SOCKS proxy when the domain name was invalid or the SOCKS proxy was not responding. This vulnerability affects Firefox < 140.
Уязвимость функции Multi-Account Container браузера Mozilla Firefox, позволяющая нарушителю обойти существующие ограничения безопасности прокси-сервера SOCKS и раскрыть защищаемую информацию
EPSS
3.4 Low
CVSS3