Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 941168 (CV, CVE-2024-8900, CVE-2024-9391, CVE-2024-9392, CVE-2024-9395, CVE-2024-9396, CVE-2024-9397, CVE-2024-9399, CVE-2024-9400, CVE-2024-9401, CVE-2024-9402, CVE-2024-9403, E-2024-9398, MFSA2024-46, MFSA2024-47, MFSA2024-48, MFSA2024-49, MFSA2024-50) - [Tracker] Mozilla Foundation Security Advisory for October 1, 2024
Summary: [Tracker] Mozilla Foundation Security Advisory for October 1, 2024
Status: CONFIRMED
Alias: CV, CVE-2024-8900, CVE-2024-9391, CVE-2024-9392, CVE-2024-9395, CVE-2024-9396, CVE-2024-9397, CVE-2024-9399, CVE-2024-9400, CVE-2024-9401, CVE-2024-9402, CVE-2024-9403, E-2024-9398, MFSA2024-46, MFSA2024-47, MFSA2024-48, MFSA2024-49, MFSA2024-50
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal
Assignee: Gentoo Security
URL: https://www.mozilla.org/en-US/securit...
Whiteboard:
Keywords: Tracker
Depends on: 941171 941169 941170
Blocks:
  Show dependency tree
 
Reported: 2024-10-08 18:34 UTC by Christopher Fore
Modified: 2024-10-08 18:45 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Christopher Fore 2024-10-08 18:34:28 UTC
CVE-2024-9392:

A compromised content process could have allowed for the arbitrary loading of cross-origin pages.


CVE-2024-9396:

It is currently unknown if this issue is exploitable but a condition may arise where the structured clone of certain objects could lead to memory corruption.


CVE-2024-9397:

A missing delay in directory upload UI could have made it possible for an attacker to trick a user into granting permission via clickjacking.


CVE-2024-9398:

By checking the result of calls to `window.open` with specifically set protocol handlers, an attacker could determine if the application which implements that protocol handler is installed.


CVE-2024-9399:

A website configured to initiate a specially crafted WebTransport session could crash the Firefox process leading to a denial of service condition.


CVE-2024-9400:

A potential memory corruption vulnerability could be triggered if an attacker had the ability to trigger an OOM at a specific moment during JIT compilation.


CVE-2024-9401:

Memory safety bugs present in Firefox 130, Firefox ESR 115.15, Firefox ESR 128.2, and Thunderbird 128.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.


CVE-2024-9402:

Memory safety bugs present in Firefox 130, Firefox ESR 128.2, and Thunderbird 128.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.


CVE-2024-8900:

An attacker could write data to the user's clipboard, bypassing the user prompt, during a certain sequence of navigational events.


CVE-2024-9403:

Memory safety bugs present in Firefox 130. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.


Thunderbird 131: https://www.mozilla.org/en-US/security/advisories/mfsa2024-50/
Thunderbird 128.3: https://www.mozilla.org/en-US/security/advisories/mfsa2024-49/
Firefox ESR 115.16: https://www.mozilla.org/en-US/security/advisories/mfsa2024-48/
Firefox ESR 128.3: https://www.mozilla.org/en-US/security/advisories/mfsa2024-47/
Firefox 131: https://www.mozilla.org/en-US/security/advisories/mfsa2024-46/