{"id":"ALSA-2024:0608","summary":"Important: firefox security update","details":"Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.\n\nThis update upgrades Firefox to version 115.7.0 ESR.\n\nSecurity Fix(es):\n\n* Mozilla: Out of bounds write in ANGLE (CVE-2024-0741)\n* Mozilla: Failure to update user input timestamp (CVE-2024-0742)\n* Mozilla: Crash when listing printers on Linux (CVE-2024-0746)\n* Mozilla: Bypass of Content Security Policy when directive unsafe-inline was set (CVE-2024-0747)\n* Mozilla: Phishing site popup could show local origin in address bar (CVE-2024-0749)\n* Mozilla: Potential permissions request bypass via clickjacking (CVE-2024-0750)\n* Mozilla: Privilege escalation through devtools (CVE-2024-0751)\n* Mozilla: HSTS policy on subdomain could bypass policy of upper domain (CVE-2024-0753)\n* Mozilla: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7 (CVE-2024-0755)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.","modified":"2026-01-30T02:18:21.740093Z","published":"2024-01-30T00:00:00Z","related":["CVE-2024-0741","CVE-2024-0742","CVE-2024-0746","CVE-2024-0747","CVE-2024-0749","CVE-2024-0750","CVE-2024-0751","CVE-2024-0753","CVE-2024-0755"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:0608"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-0741"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-0742"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-0746"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-0747"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-0749"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-0750"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-0751"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-0753"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-0755"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2259926"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2259927"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2259928"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2259929"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2259930"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2259931"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2259932"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2259933"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2259934"},{"type":"ADVISORY","url":"https://errata.almalinux.org/8/ALSA-2024-0608.html"}],"affected":[{"package":{"name":"firefox","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/firefox"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"115.7.0-1.el8_9.alma.1"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2024:0608.json"}}],"schema_version":"1.7.3"}