Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 930379 (CVE-2024-2609, CVE-2024-3302, CVE-2024-3854, CVE-2024-3857, CVE-2024-3859, CVE-2024-3861, CVE-2024-3864, MSFA-2024-18, MSFA-2024-19, MSFA-2024-20) - [Tracker] Mozilla Foundation Security Advisory for April 16th, 2024
Summary: [Tracker] Mozilla Foundation Security Advisory for April 16th, 2024
Status: RESOLVED FIXED
Alias: CVE-2024-2609, CVE-2024-3302, CVE-2024-3854, CVE-2024-3857, CVE-2024-3859, CVE-2024-3861, CVE-2024-3864, MSFA-2024-18, MSFA-2024-19, MSFA-2024-20
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal
Assignee: Gentoo Security
URL:
Whiteboard:
Keywords: Tracker
Depends on: CVE-2024-3853, CVE-2024-3855, CVE-2024-3856, CVE-2024-3858, CVE-2024-3860, CVE-2024-3862, CVE-2024-3865 930381 CVE-2024-4764, CVE-2024-4765, CVE-2024-4766, CVE-2024-4771, CVE-2024-4772, CVE-2024-4773, CVE-2024-4774, CVE-2024-4775, CVE-2024-4776, CVE-2024-4778 932375
Blocks: VU#421644
  Show dependency tree
 
Reported: 2024-04-21 17:42 UTC by Christopher Fore
Modified: 2024-08-06 05:43 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Christopher Fore 2024-04-21 17:42:56 UTC
https://www.mozilla.org/en-US/security/advisories/mfsa2024-18/
https://www.mozilla.org/en-US/security/advisories/mfsa2024-29/
https://www.mozilla.org/en-US/security/advisories/mfsa2024-20/

The following CVEs affect all products:

CVE-2024-2609 (Only Thunderbird and FireFox ESR):

The permission prompt input delay could expire while the window is not in focus. This makes it vulnerable to clickjacking by malicious websites.


CVE-2024-3302:

There was no limit to the number of HTTP/2 CONTINUATION frames that would be processed. A server could abuse this to create an Out of Memory condition in the browser.


CVE-2024-3852:

GetBoundName could return the wrong version of an object when JIT optimizations were applied.


CVE-2024-3854:

In some code patterns the JIT incorrectly optimized switch statements and generated code with out-of-bounds-reads.


CVE-2024-3857:

The JIT created incorrect code for arguments in certain cases. This led to potential use-after-free crashes during garbage collection.


CVE-2024-3859:

On 32-bit versions there were integer-overflows that led to an out-of-bounds-read that potentially could be triggered by a malformed OpenType font.


CVE-2024-3861:

If an AlignedBuffer were assigned to itself, the subsequent self-move could result in an incorrect reference count and later use-after-free.


CVE-2024-3864:

Memory safety bug present in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9. This bug showed evidence of memory corruption and we presume that with enough effort this could have been exploited to run arbitrary code.