rhsa-2024_3783
Vulnerability from csaf_redhat
Published
2024-06-10 19:39
Modified
2024-11-24 16:01
Summary
Red Hat Security Advisory: firefox security update

Notes

Topic
An update for firefox is now available for Red Hat Enterprise Linux 8.10. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 115.11.0 ESR. Security Fix(es): * firefox: Arbitrary JavaScript execution in PDF.js (CVE-2024-4367) * firefox: IndexedDB files retained in private browsing mode (CVE-2024-4767) * firefox: Potential permissions request bypass via clickjacking (CVE-2024-4768) * firefox: Cross-origin responses could be distinguished between script and non-script content-types (CVE-2024-4769) * firefox: Use-after-free could occur when printing to PDF (CVE-2024-4770) * firefox: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11 (CVE-2024-4777) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for firefox is now available for Red Hat Enterprise Linux 8.10.\n\nRed Hat Product Security has rated this update as having a security impact of\nModerate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Mozilla Firefox is an open-source web browser, designed for standards\ncompliance, performance, and portability.\n\nThis update upgrades Firefox to version 115.11.0 ESR.\n\nSecurity Fix(es):\n\n* firefox: Arbitrary JavaScript execution in PDF.js (CVE-2024-4367)\n\n* firefox: IndexedDB files retained in private browsing mode (CVE-2024-4767)\n\n* firefox: Potential permissions request bypass via clickjacking (CVE-2024-4768)\n\n* firefox: Cross-origin responses could be distinguished between script and\nnon-script content-types (CVE-2024-4769)\n\n* firefox: Use-after-free could occur when printing to PDF (CVE-2024-4770)\n\n* firefox: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and\nThunderbird 115.11 (CVE-2024-4777)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:3783",
        "url": "https://access.redhat.com/errata/RHSA-2024:3783"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "2280382",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280382"
      },
      {
        "category": "external",
        "summary": "2280383",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280383"
      },
      {
        "category": "external",
        "summary": "2280384",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280384"
      },
      {
        "category": "external",
        "summary": "2280385",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280385"
      },
      {
        "category": "external",
        "summary": "2280386",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280386"
      },
      {
        "category": "external",
        "summary": "2280387",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280387"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_3783.json"
      }
    ],
    "title": "Red Hat Security Advisory: firefox security update",
    "tracking": {
      "current_release_date": "2024-11-24T16:01:29+00:00",
      "generator": {
        "date": "2024-11-24T16:01:29+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2024:3783",
      "initial_release_date": "2024-06-10T19:39:38+00:00",
      "revision_history": [
        {
          "date": "2024-06-10T19:39:38+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-06-10T19:39:38+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-24T16:01:29+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                  "product_id": "AppStream-8.10.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "firefox-0:115.11.0-1.el8_10.src",
                "product": {
                  "name": "firefox-0:115.11.0-1.el8_10.src",
                  "product_id": "firefox-0:115.11.0-1.el8_10.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox@115.11.0-1.el8_10?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "firefox-0:115.11.0-1.el8_10.aarch64",
                "product": {
                  "name": "firefox-0:115.11.0-1.el8_10.aarch64",
                  "product_id": "firefox-0:115.11.0-1.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox@115.11.0-1.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "firefox-debugsource-0:115.11.0-1.el8_10.aarch64",
                "product": {
                  "name": "firefox-debugsource-0:115.11.0-1.el8_10.aarch64",
                  "product_id": "firefox-debugsource-0:115.11.0-1.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox-debugsource@115.11.0-1.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "firefox-debuginfo-0:115.11.0-1.el8_10.aarch64",
                "product": {
                  "name": "firefox-debuginfo-0:115.11.0-1.el8_10.aarch64",
                  "product_id": "firefox-debuginfo-0:115.11.0-1.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox-debuginfo@115.11.0-1.el8_10?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "firefox-0:115.11.0-1.el8_10.ppc64le",
                "product": {
                  "name": "firefox-0:115.11.0-1.el8_10.ppc64le",
                  "product_id": "firefox-0:115.11.0-1.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox@115.11.0-1.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "firefox-debugsource-0:115.11.0-1.el8_10.ppc64le",
                "product": {
                  "name": "firefox-debugsource-0:115.11.0-1.el8_10.ppc64le",
                  "product_id": "firefox-debugsource-0:115.11.0-1.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox-debugsource@115.11.0-1.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "firefox-debuginfo-0:115.11.0-1.el8_10.ppc64le",
                "product": {
                  "name": "firefox-debuginfo-0:115.11.0-1.el8_10.ppc64le",
                  "product_id": "firefox-debuginfo-0:115.11.0-1.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox-debuginfo@115.11.0-1.el8_10?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "firefox-0:115.11.0-1.el8_10.x86_64",
                "product": {
                  "name": "firefox-0:115.11.0-1.el8_10.x86_64",
                  "product_id": "firefox-0:115.11.0-1.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox@115.11.0-1.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "firefox-debugsource-0:115.11.0-1.el8_10.x86_64",
                "product": {
                  "name": "firefox-debugsource-0:115.11.0-1.el8_10.x86_64",
                  "product_id": "firefox-debugsource-0:115.11.0-1.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox-debugsource@115.11.0-1.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "firefox-debuginfo-0:115.11.0-1.el8_10.x86_64",
                "product": {
                  "name": "firefox-debuginfo-0:115.11.0-1.el8_10.x86_64",
                  "product_id": "firefox-debuginfo-0:115.11.0-1.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox-debuginfo@115.11.0-1.el8_10?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "firefox-0:115.11.0-1.el8_10.s390x",
                "product": {
                  "name": "firefox-0:115.11.0-1.el8_10.s390x",
                  "product_id": "firefox-0:115.11.0-1.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox@115.11.0-1.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "firefox-debugsource-0:115.11.0-1.el8_10.s390x",
                "product": {
                  "name": "firefox-debugsource-0:115.11.0-1.el8_10.s390x",
                  "product_id": "firefox-debugsource-0:115.11.0-1.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox-debugsource@115.11.0-1.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "firefox-debuginfo-0:115.11.0-1.el8_10.s390x",
                "product": {
                  "name": "firefox-debuginfo-0:115.11.0-1.el8_10.s390x",
                  "product_id": "firefox-debuginfo-0:115.11.0-1.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox-debuginfo@115.11.0-1.el8_10?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:115.11.0-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.aarch64"
        },
        "product_reference": "firefox-0:115.11.0-1.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:115.11.0-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.ppc64le"
        },
        "product_reference": "firefox-0:115.11.0-1.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:115.11.0-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.s390x"
        },
        "product_reference": "firefox-0:115.11.0-1.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:115.11.0-1.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.src"
        },
        "product_reference": "firefox-0:115.11.0-1.el8_10.src",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:115.11.0-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.x86_64"
        },
        "product_reference": "firefox-0:115.11.0-1.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:115.11.0-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.aarch64"
        },
        "product_reference": "firefox-debuginfo-0:115.11.0-1.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:115.11.0-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.ppc64le"
        },
        "product_reference": "firefox-debuginfo-0:115.11.0-1.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:115.11.0-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.s390x"
        },
        "product_reference": "firefox-debuginfo-0:115.11.0-1.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:115.11.0-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.x86_64"
        },
        "product_reference": "firefox-debuginfo-0:115.11.0-1.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debugsource-0:115.11.0-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.aarch64"
        },
        "product_reference": "firefox-debugsource-0:115.11.0-1.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debugsource-0:115.11.0-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.ppc64le"
        },
        "product_reference": "firefox-debugsource-0:115.11.0-1.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debugsource-0:115.11.0-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.s390x"
        },
        "product_reference": "firefox-debugsource-0:115.11.0-1.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debugsource-0:115.11.0-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.x86_64"
        },
        "product_reference": "firefox-debugsource-0:115.11.0-1.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "the Mozilla project"
          ]
        },
        {
          "names": [
            "Thomas Rinsma of Codean Labs"
          ],
          "summary": "Acknowledged by upstream."
        }
      ],
      "cve": "CVE-2024-4367",
      "cwe": {
        "id": "CWE-754",
        "name": "Improper Check for Unusual or Exceptional Conditions"
      },
      "discovery_date": "2024-05-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2280382"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes this flaw as follows: A type check was missing when handling fonts in PDF.js, which would allow arbitrary JavaScript execution in the PDF.js context.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Mozilla: Arbitrary JavaScript execution in PDF.js",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-4367"
        },
        {
          "category": "external",
          "summary": "RHBZ#2280382",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280382"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-4367",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-4367"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4367",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4367"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-22/#CVE-2024-4367",
          "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-22/#CVE-2024-4367"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-23/#CVE-2024-4367",
          "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-23/#CVE-2024-4367"
        }
      ],
      "release_date": "2024-05-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-06-10T19:39:38+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:3783"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "Mozilla: Arbitrary JavaScript execution in PDF.js"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "the Mozilla project"
          ]
        },
        {
          "names": [
            "Kim Do Hun via Tor Browser"
          ],
          "summary": "Acknowledged by upstream."
        }
      ],
      "cve": "CVE-2024-4767",
      "cwe": {
        "id": "CWE-212",
        "name": "Improper Removal of Sensitive Information Before Storage or Transfer"
      },
      "discovery_date": "2024-05-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2280383"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes this flaw as follows: If the `browser.privatebrowsing.autostart` preference is enabled, IndexedDB files were not properly deleted when the window was closed. This preference is disabled by default in Firefox.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Mozilla: IndexedDB files retained in private browsing mode",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-4767"
        },
        {
          "category": "external",
          "summary": "RHBZ#2280383",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280383"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-4767",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-4767"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4767",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4767"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-22/#CVE-2024-4767",
          "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-22/#CVE-2024-4767"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-23/#CVE-2024-4767",
          "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-23/#CVE-2024-4767"
        }
      ],
      "release_date": "2024-05-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-06-10T19:39:38+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:3783"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "Mozilla: IndexedDB files retained in private browsing mode"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "the Mozilla project"
          ]
        },
        {
          "names": [
            "Hafiizh"
          ],
          "summary": "Acknowledged by upstream."
        }
      ],
      "cve": "CVE-2024-4768",
      "cwe": {
        "id": "CWE-451",
        "name": "User Interface (UI) Misrepresentation of Critical Information"
      },
      "discovery_date": "2024-05-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2280384"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes this flaw as follows: A bug in popup notifications\u0027 interaction with WebAuthn made it easier for an attacker to trick a user into granting permissions.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Mozilla: Potential permissions request bypass via clickjacking",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-4768"
        },
        {
          "category": "external",
          "summary": "RHBZ#2280384",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280384"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-4768",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-4768"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4768",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4768"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-22/#CVE-2024-4768",
          "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-22/#CVE-2024-4768"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-23/#CVE-2024-4768",
          "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-23/#CVE-2024-4768"
        }
      ],
      "release_date": "2024-05-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-06-10T19:39:38+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:3783"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "Mozilla: Potential permissions request bypass via clickjacking"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "the Mozilla project"
          ]
        },
        {
          "names": [
            "Shaheen Fazim"
          ],
          "summary": "Acknowledged by upstream."
        }
      ],
      "cve": "CVE-2024-4769",
      "cwe": {
        "id": "CWE-829",
        "name": "Inclusion of Functionality from Untrusted Control Sphere"
      },
      "discovery_date": "2024-05-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2280385"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes this flaw as follows: When importing resources using Web Workers, error messages would distinguish the difference between `application/javascript` responses and non-script responses. This could have been abused to learn information cross-origin.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Mozilla: Cross-origin responses could be distinguished between script and non-script content-types",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-4769"
        },
        {
          "category": "external",
          "summary": "RHBZ#2280385",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280385"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-4769",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-4769"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4769",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4769"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-22/#CVE-2024-4769",
          "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-22/#CVE-2024-4769"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-23/#CVE-2024-4769",
          "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-23/#CVE-2024-4769"
        }
      ],
      "release_date": "2024-05-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-06-10T19:39:38+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:3783"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "Mozilla: Cross-origin responses could be distinguished between script and non-script content-types"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "the Mozilla project"
          ]
        },
        {
          "names": [
            "Irvan Kurniawan"
          ],
          "summary": "Acknowledged by upstream."
        }
      ],
      "cve": "CVE-2024-4770",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-05-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2280386"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes this flaw as follows: When saving a page to PDF, certain font styles could have led to a potential use-after-free crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Mozilla: Use-after-free could occur when printing to PDF",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-4770"
        },
        {
          "category": "external",
          "summary": "RHBZ#2280386",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280386"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-4770",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-4770"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4770",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4770"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-22/#CVE-2024-4770",
          "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-22/#CVE-2024-4770"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-23/#CVE-2024-4770",
          "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-23/#CVE-2024-4770"
        }
      ],
      "release_date": "2024-05-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-06-10T19:39:38+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:3783"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "Mozilla: Use-after-free could occur when printing to PDF"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "the Mozilla project"
          ]
        },
        {
          "names": [
            "Daniel Holbert and the Mozilla Fuzzing Team"
          ],
          "summary": "Acknowledged by upstream."
        }
      ],
      "cve": "CVE-2024-4777",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "discovery_date": "2024-05-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2280387"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes this flaw as follows: Memory safety bugs present in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10. Some of these bugs showed evidence of memory corruption, and we presume that with enough effort, some of these could have been exploited to run arbitrary code.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Mozilla: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-4777"
        },
        {
          "category": "external",
          "summary": "RHBZ#2280387",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280387"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-4777",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-4777"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4777",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4777"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-22/#CVE-2024-4777",
          "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-22/#CVE-2024-4777"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-23/#CVE-2024-4777",
          "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-23/#CVE-2024-4777"
        }
      ],
      "release_date": "2024-05-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-06-10T19:39:38+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:3783"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:115.11.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:115.11.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:115.11.0-1.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "Mozilla: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.