{"id":"ALSA-2024:8726","summary":"Moderate: firefox security update","details":"Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.  \n\nSecurity Fix(es):  \n\n  * firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser (CVE-2024-10464)\n  * firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response (CVE-2024-10461)\n  * firefox: thunderbird: Permission leak via embed or object elements (CVE-2024-10458)\n  * firefox: thunderbird: Use-after-free in layout with accessibility (CVE-2024-10459)\n  * firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4 (CVE-2024-10467)\n  * firefox: thunderbird: Clipboard \"paste\" button persisted across tabs (CVE-2024-10465)\n  * firefox: DOM push subscription message could hang Firefox (CVE-2024-10466)\n  * firefox: thunderbird: Cross origin video frame leak (CVE-2024-10463)\n  * firefox: thunderbird: Origin of permission prompt could be spoofed by long URL (CVE-2024-10462)\n  * firefox: thunderbird: Confusing display of origin for external protocol handler prompt (CVE-2024-10460)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n","modified":"2026-01-30T01:49:45.701456Z","published":"2024-10-31T00:00:00Z","related":["CVE-2024-10458","CVE-2024-10459","CVE-2024-10460","CVE-2024-10461","CVE-2024-10462","CVE-2024-10463","CVE-2024-10464","CVE-2024-10465","CVE-2024-10466","CVE-2024-10467"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:8726"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-10458"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-10459"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-10460"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-10461"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-10462"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-10463"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-10464"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-10465"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-10466"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-10467"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2322424"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2322425"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2322428"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2322429"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2322433"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2322434"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2322438"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2322439"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2322440"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2322444"},{"type":"ADVISORY","url":"https://errata.almalinux.org/9/ALSA-2024-8726.html"}],"affected":[{"package":{"name":"firefox","ecosystem":"AlmaLinux:9","purl":"pkg:rpm/almalinux/firefox"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"128.4.0-1.el9_4"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux9/ALSA-2024:8726.json"}},{"package":{"name":"firefox-x11","ecosystem":"AlmaLinux:9","purl":"pkg:rpm/almalinux/firefox-x11"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"128.4.0-1.el9_4"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux9/ALSA-2024:8726.json"}}],"schema_version":"1.7.3"}