Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 932374 (CVE-2024-4764, CVE-2024-4765, CVE-2024-4766, CVE-2024-4771, CVE-2024-4772, CVE-2024-4773, CVE-2024-4774, CVE-2024-4775, CVE-2024-4776, CVE-2024-4778) - <www-client/firefox{-bin,}-{115.11.0,126.0}: multiple vulnerabilities
Summary: <www-client/firefox{-bin,}-{115.11.0,126.0}: multiple vulnerabilities
Status: CONFIRMED
Alias: CVE-2024-4764, CVE-2024-4765, CVE-2024-4766, CVE-2024-4771, CVE-2024-4772, CVE-2024-4773, CVE-2024-4774, CVE-2024-4775, CVE-2024-4776, CVE-2024-4778
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal major (vote)
Assignee: Gentoo Security
URL: https://www.mozilla.org/en-US/securit...
Whiteboard: A2 [ebuild/stable]
Keywords:
Depends on:
Blocks: CVE-2024-2609, CVE-2024-3302, CVE-2024-3854, CVE-2024-3857, CVE-2024-3859, CVE-2024-3861, CVE-2024-3864, MSFA2024-18, MSFA2024-19, MSFA2024-20
  Show dependency tree
 
Reported: 2024-05-21 15:32 UTC by Christopher Fore
Modified: 2024-05-21 15:36 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Christopher Fore 2024-05-21 15:32:58 UTC
The following only affect rapid (126.0):

CVE-2024-4764:

Multiple WebRTC threads could have claimed a newly connected audio input leading to use-after-free.


CVE-2024-4771:

A memory allocation check was missing which would lead to a use-after-free if the allocation failed. This could have triggered a crash or potentially be leveraged to achieve code execution.


CVE-2024-4772:

An HTTP digest authentication nonce value was generated using rand() which could lead to predictable values.


CVE-2024-4773:

When a network error occurred during page load, the prior content could have remained in view with a blank URL bar. This could have been used to obfuscate a spoofed web site.


CVE-2024-4774:

The ShmemCharMapHashEntry() code was susceptible to potentially undefined behavior by bypassing the move semantics for one of its data members.


CVE-2024-4775:

An iterator stop condition was missing when handling WASM code in the built-in profiler, potentially leading to invalid memory access and undefined behavior. Note: This issue only affects the application when the profiler is running.


CVE-2024-4776:

A file dialog shown while in full-screen mode could have resulted in the window remaining disabled.


CVE-2024-4778:

Memory safety bugs present in Firefox 125. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.



Please bump the -bin package for ESR.