Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 930380 (CVE-2024-3853, CVE-2024-3855, CVE-2024-3856, CVE-2024-3858, CVE-2024-3860, CVE-2024-3862, CVE-2024-3865) - <www-client/firefox{-bin,}-{125.0.1,115.10.0}: multiple vulnerabilities
Summary: <www-client/firefox{-bin,}-{125.0.1,115.10.0}: multiple vulnerabilities
Status: RESOLVED FIXED
Alias: CVE-2024-3853, CVE-2024-3855, CVE-2024-3856, CVE-2024-3858, CVE-2024-3860, CVE-2024-3862, CVE-2024-3865
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal
Assignee: Gentoo Security
URL:
Whiteboard: A2 [glsa+]
Keywords:
Depends on:
Blocks: CVE-2024-2609, CVE-2024-3302, CVE-2024-3854, CVE-2024-3857, CVE-2024-3859, CVE-2024-3861, CVE-2024-3864, MSFA-2024-18, MSFA-2024-19, MSFA-2024-20
  Show dependency tree
 
Reported: 2024-04-21 17:54 UTC by Christopher Fore
Modified: 2024-08-06 05:42 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Christopher Fore 2024-04-21 17:54:08 UTC
The following only effect rapid (125.0):

CVE-2024-3853:

A use-after-free could result if a JavaScript realm was in the process of being initialized when a garbage collection started.


CVE-2024-3855:

In certain cases the JIT incorrectly optimized MSubstr operations, which led to out-of-bounds reads.


CVE-2024-3856:

A use-after-free could occur during WASM execution if garbage collection ran during the creation of an array.


CVE-2024-3858:

It was possible to mutate a JavaScript object so that the JIT could crash while tracing it.


CVE-2024-3860:

An out-of-memory condition during object initialization could result in an empty shape list. If the JIT subsequently traced the object it would crash.


CVE-2024-3862:

The MarkStack assignment operator, part of the JavaScript engine, could access uninitialized memory if it were used in a self-assignment.


CVE-2024-3865:

Memory safety bugs present in Firefox 124. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.



See tracker for <115.10 vulnerabilities, as they affect all products.
Comment 1 Joonas Niilola gentoo-dev 2024-07-13 08:00:22 UTC
This is done.
Comment 2 Larry the Git Cow gentoo-dev 2024-08-06 05:41:07 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/data/glsa.git/commit/?id=4ebaf5fd697ce534e95ea08df9014968d851d710

commit 4ebaf5fd697ce534e95ea08df9014968d851d710
Author:     GLSAMaker <glsamaker@gentoo.org>
AuthorDate: 2024-08-06 05:40:35 +0000
Commit:     Hans de Graaff <graaff@gentoo.org>
CommitDate: 2024-08-06 05:41:04 +0000

    [ GLSA 202408-02 ] Mozilla Firefox: Multiple Vulnerabilities
    
    Bug: https://bugs.gentoo.org/930380
    Bug: https://bugs.gentoo.org/932374
    Bug: https://bugs.gentoo.org/935550
    Signed-off-by: GLSAMaker <glsamaker@gentoo.org>
    Signed-off-by: Hans de Graaff <graaff@gentoo.org>

 glsa-202408-02.xml | 110 +++++++++++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 110 insertions(+)