Описание
Security update for MozillaFirefox
This update for MozillaFirefox fixes the following issues:
Firefox Extended Support Release 128.5.0 ESR, fixed various security fixes and other quality improvements, MFSA 2024-64 (bsc#1233695):
- CVE-2024-11691: Memory corruption in Apple GPU drivers
- CVE-2024-11692: Select list elements could be shown over another site
- CVE-2024-11693: Download Protections were bypassed by .library-ms files on Windows
- CVE-2024-11694: CSP Bypass and XSS Exposure via Web Compatibility Shims
- CVE-2024-11695: URL Bar Spoofing via Manipulated Punycode and Whitespace Characters
- CVE-2024-11696: Unhandled Exception in Add-on Signature Verification
- CVE-2024-11697: Inproper Keypress Handling in Executable File Confirmation Dialog
- CVE-2024-11698: Fullscreen Lock-Up When Modal Dialog Interrupts Transition on macOS
- CVE-2024-11699: Memory safety bugs fixed in Firefox 133, Firefox ESR 128.5, and Thunderbird 128.5
Список пакетов
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production
SUSE Linux Enterprise Server 12 SP5-LTSS
SUSE Linux Enterprise Server LTSS Extended Security 12 SP5
Ссылки
- Link for SUSE-SU-2024:4074-1
- E-Mail link for SUSE-SU-2024:4074-1
- SUSE Security Ratings
- SUSE Bug 1233695
- SUSE CVE CVE-2024-11691 page
- SUSE CVE CVE-2024-11692 page
- SUSE CVE CVE-2024-11693 page
- SUSE CVE CVE-2024-11694 page
- SUSE CVE CVE-2024-11695 page
- SUSE CVE CVE-2024-11696 page
- SUSE CVE CVE-2024-11697 page
- SUSE CVE CVE-2024-11698 page
- SUSE CVE CVE-2024-11699 page
Описание
Certain WebGL operations on Apple silicon M series devices could have lead to an out-of-bounds write and memory corruption due to a flaw in Apple's GPU driver. *This bug only affected the application on Apple M series hardware. Other platforms were unaffected.* This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Firefox ESR < 115.18, Thunderbird < 133, Thunderbird < 128.5, and Thunderbird < 115.18.
Затронутые продукты
Ссылки
- CVE-2024-11691
- SUSE Bug 1233695
Описание
An attacker could cause a select dropdown to be shown over another tab; this could have led to user confusion and possible spoofing attacks. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5.
Затронутые продукты
Ссылки
- CVE-2024-11692
- SUSE Bug 1233695
Описание
The executable file warning was not presented when downloading .library-ms files. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.* This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5.
Затронутые продукты
Ссылки
- CVE-2024-11693
- SUSE Bug 1233695
Описание
Enhanced Tracking Protection's Strict mode may have inadvertently allowed a CSP `frame-src` bypass and DOM-based XSS through the Google SafeFrame shim in the Web Compatibility extension. This issue could have exposed users to malicious frames masquerading as legitimate content. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Firefox ESR < 115.18, Thunderbird < 133, Thunderbird < 128.5, and Thunderbird < 115.18.
Затронутые продукты
Ссылки
- CVE-2024-11694
- SUSE Bug 1233695
Описание
A crafted URL containing Arabic script and whitespace characters could have hidden the true origin of the page, resulting in a potential spoofing attack. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5.
Затронутые продукты
Ссылки
- CVE-2024-11695
- SUSE Bug 1233695
Описание
The application failed to account for exceptions thrown by the `loadManifestFromFile` method during add-on signature verification. This flaw, triggered by an invalid or unsupported extension manifest, could have caused runtime errors that disrupted the signature validation process. As a result, the enforcement of signature validation for unrelated add-ons may have been bypassed. Signature validation in this context is used to ensure that third-party applications on the user's computer have not tampered with the user's extensions, limiting the impact of this issue. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5.
Затронутые продукты
Ссылки
- CVE-2024-11696
- SUSE Bug 1233695
Описание
When handling keypress events, an attacker may have been able to trick a user into bypassing the "Open Executable File?" confirmation dialog. This could have led to malicious code execution. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5.
Затронутые продукты
Ссылки
- CVE-2024-11697
- SUSE Bug 1233695
Описание
A flaw in handling fullscreen transitions may have inadvertently caused the application to become stuck in fullscreen mode when a modal dialog was opened during the transition. This issue left users unable to exit fullscreen mode using standard actions like pressing "Esc" or accessing right-click menus, resulting in a disrupted browsing experience until the browser is restarted. *This bug only affects the application when running on macOS. Other operating systems are unaffected.* This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5.
Затронутые продукты
Ссылки
- CVE-2024-11698
- SUSE Bug 1233695
Описание
Memory safety bugs present in Firefox 132, Firefox ESR 128.4, and Thunderbird 128.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5.
Затронутые продукты
Ссылки
- CVE-2024-11699
- SUSE Bug 1233695