Date: Thu, 5 Sep 2024 17:00:38 GMT From: Fernando =?utf-8?Q?Apestegu=C3=ADa?= <fernape@FreeBSD.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org Subject: git: b447efc7742e - main - security/vuxml: Firefox multiple vulnerabilities Message-ID: <202409051700.485H0cZU098757@gitrepo.freebsd.org>
next in thread | raw e-mail | index | archive | help
The branch main has been updated by fernape: URL: https://cgit.FreeBSD.org/ports/commit/?id=b447efc7742e2865d1367a5291e9940d853fffe0 commit b447efc7742e2865d1367a5291e9940d853fffe0 Author: Fernando ApesteguĂa <fernape@FreeBSD.org> AuthorDate: 2024-09-05 16:53:18 +0000 Commit: Fernando ApesteguĂa <fernape@FreeBSD.org> CommitDate: 2024-09-05 17:00:26 +0000 security/vuxml: Firefox multiple vulnerabilities CVE-2024-8381: * Base Score: 9.8 CRITICAL * Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVE-2024-8382: * Base Score: 8.8 HIGH * Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVE-2024-8383: * Base Score: 7.5 HIGH * Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVE-2024-8384: * Base Score: 9.8 CRITICAL * Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVE-2024-8385: * Base Score: 9.8 CRITICAL * Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVE-2024-8386: * Base Score: 6.1 MEDIUM * Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVE-2024-8387: * Base Score: 9.8 CRITICAL * Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVE-2024-8389: * Base Score: 9.8 CRITICAL * Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H --- security/vuxml/vuln/2024.xml | 80 ++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 80 insertions(+) diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml index cfd544457a48..04db8e5fbac3 100644 --- a/security/vuxml/vuln/2024.xml +++ b/security/vuxml/vuln/2024.xml @@ -1,3 +1,83 @@ + <vuln vid="a3a1caf5-6ba1-11ef-b9e8-b42e991fc52e"> + <topic>firefox -- multiple vulnerabilities</topic> + <affects> + <package> + <name>firefox</name> + <range><lt>130.0_1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>security@mozilla.org reports:</p> + <blockquote cite="https://bugzilla.mozilla.org/show_bug.cgi?id=1908496"> + <p>This entry contains 8 vulnerabilities:</p> + <ul> + <li>CVE-2024-8381: A potentially exploitable type + confusion could be triggered when looking up a property + name on an object being used as the `with` environment.</li> + <li>CVE-2024-8382: Internal browser event interfaces were + exposed to web content when privileged EventHandler listener + callbacks ran for those events. Web content that tried to + use those interfaces would not be able to use them with + elevated privileges, but their presence would indicate + certain browser features had been used, such as when a user + opened the Dev Tools console.</li> + <li>CVE-2024-8383: Firefox normally asks for confirmation + before asking the operating system to find an application to + handle a scheme that the browser does not support. It did not + ask before doing so for the Usenet-related schemes news: and + snews:. Since most operating systems don't have a + trusted newsreader installed by default, an unscrupulous + program that the user downloaded could register itself as a + handler. The website that served the application download + could then launch that application at will.</li> + <li>CVE-2024-8384: The JavaScript garbage collector could + mis-color cross-compartment objects if OOM conditions were + detected at the right point between two passes. This could have + led to memory corruption.</li> + <li>CVE-2024-8385: A difference in the handling of + StructFields and ArrayTypes in WASM could be used to trigger + an exploitable type confusion vulnerability.</li> + <li>CVE-2024-8386: If a site had been granted the permission + to open popup windows, it could cause Select elements to + appear on top of another site to perform a spoofing attack.</li> + <li>CVE-2024-8387: Memory safety bugs present in Firefox 129, + Firefox ESR 128.1, and Thunderbird 128.1. Some of these bugs + showed evidence of memory corruption and we presume that with + enough effort some of these could have been exploited to run + arbitrary code.</li> + <li>CVE-2024-8389: Memory safety bugs present in Firefox 129. + Some of these bugs showed evidence of memory corruption and we + presume that with enough effort some of these could have been + exploited to run arbitrary code.</li> + </ul> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2024-8381</cvename> + <url>https://nvd.nist.gov/vuln/detail/CVE-2024-8381</url> + <cvename>CVE-2024-8382</cvename> + <url>https://nvd.nist.gov/vuln/detail/CVE-2024-8382</url> + <cvename>CVE-2024-8383</cvename> + <url>https://nvd.nist.gov/vuln/detail/CVE-2024-8383</url> + <cvename>CVE-2024-8384</cvename> + <url>https://nvd.nist.gov/vuln/detail/CVE-2024-8384</url> + <cvename>CVE-2024-8385</cvename> + <url>https://nvd.nist.gov/vuln/detail/CVE-2024-8385</url> + <cvename>CVE-2024-8386</cvename> + <url>https://nvd.nist.gov/vuln/detail/CVE-2024-8386</url> + <cvename>CVE-2024-8387</cvename> + <url>https://nvd.nist.gov/vuln/detail/CVE-2024-8387</url> + <cvename>CVE-2024-8389</cvename> + <url>https://nvd.nist.gov/vuln/detail/CVE-2024-8389</url> + </references> + <dates> + <discovery>2024-09-03</discovery> + <entry>2024-09-05</entry> + </dates> + </vuln> + <vuln vid="7e079ce2-6b51-11ef-9a62-002590c1f29c"> <topic>FreeBSD -- umtx Kernel panic or Use-After-Free</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202409051700.485H0cZU098757>