-
Notifications
You must be signed in to change notification settings - Fork 32
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
d321871
commit 1c7adcc
Showing
2 changed files
with
109 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,68 @@ | ||
## mfsa2024-43.yml | ||
announced: September 3, 2024 | ||
impact: high | ||
fixed_in: | ||
- Thunderbird 128.2 | ||
title: Security Vulnerabilities fixed in Thunderbird 128.2 | ||
description: | | ||
*In general, these flaws cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but are potential risks in browser or browser-like contexts.* | ||
advisories: | ||
CVE-2024-8385: | ||
title: WASM type confusion involving ArrayTypes | ||
impact: high | ||
reporter: Seunghyun Lee | ||
description: | | ||
A difference in the handling of StructFields and ArrayTypes in WASM could be used to trigger an exploitable type confusion vulnerability. | ||
bugs: | ||
- url: 1911909 | ||
CVE-2024-8381: | ||
title: Type confusion when looking up a property name in a "with" block | ||
impact: high | ||
reporter: Nils Bars | ||
description: | | ||
A potentially exploitable type confusion could be triggered when looking up a property name on an object being used as the <code>with</code> environment. | ||
bugs: | ||
- url: 1912715 | ||
CVE-2024-8382: | ||
title: Internal event interfaces were exposed to web content when browser EventHandler listener callbacks ran | ||
impact: moderate | ||
reporter: Gregory Pappas | ||
description: | | ||
Internal browser event interfaces were exposed to web content when privileged EventHandler listener callbacks ran for those events. Web content that tried to use those interfaces would not be able to use them with elevated privileges, but their presence would indicate certain browser features had been used, such as when a user opened the Dev Tools console. | ||
bugs: | ||
- url: 1906744 | ||
CVE-2024-8383: | ||
title: 'Firefox did not ask before openings news: links in an external application' | ||
impact: moderate | ||
reporter: D7 | ||
description: | | ||
Firefox normally asks for confirmation before asking the operating system to find an application to handle a scheme that the browser does not support. It did not ask before doing so for the Usenet-related schemes news: and snews:. Since most operating systems don't have a trusted newsreader installed by default, an unscrupulous program that the user downloaded could register itself as a handler. The website that served the application download could then launch that application at will. | ||
bugs: | ||
- url: 1908496 | ||
CVE-2024-8384: | ||
title: Garbage collection could mis-color cross-compartment objects in OOM conditions | ||
impact: moderate | ||
reporter: the Mozilla Fuzzing Team | ||
description: | | ||
The JavaScript garbage collector could mis-color cross-compartment objects if OOM conditions were detected at the right point between two passes. This could have led to memory corruption. | ||
bugs: | ||
- url: 1911288 | ||
CVE-2024-8386: | ||
title: SelectElements could be shown over another site if popups are allowed | ||
impact: low | ||
reporter: Shaheen Fazim, Hafiizh | ||
description: | | ||
If a site had been granted the permission to open popup windows, it could cause Select elements to appear on top of another site to perform a spoofing attack. | ||
bugs: | ||
- url: 1909529 | ||
- url: 1907032 | ||
- url: 1909163 | ||
CVE-2024-8387: | ||
title: Memory safety bugs fixed in Firefox 130, Firefox ESR 128.2, and Thunderbird 128.2 | ||
impact: high | ||
reporter: the Mozilla Fuzzing Team, Yury Delendik | ||
description: | | ||
Memory safety bugs present in Firefox 129, Firefox ESR 128.1, and Thunderbird 128.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. | ||
bugs: | ||
- url: 1857607, 1911858, 1914009 | ||
desc: Memory safety bugs fixed in Firefox 130, Firefox ESR 128.2, and Thunderbird 128.2 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,41 @@ | ||
## mfsa2024-44.yml | ||
announced: September 3, 2024 | ||
impact: high | ||
fixed_in: | ||
- Thunderbird 115.15 | ||
title: Security Vulnerabilities fixed in Thunderbird 115.15 | ||
description: | | ||
*In general, these flaws cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but are potential risks in browser or browser-like contexts.* | ||
advisories: | ||
CVE-2024-8381: | ||
title: Type confusion when looking up a property name in a "with" block | ||
impact: high | ||
reporter: Nils Bars | ||
description: | | ||
A potentially exploitable type confusion could be triggered when looking up a property name on an object being used as the <code>with</code> environment. | ||
bugs: | ||
- url: 1912715 | ||
CVE-2024-8382: | ||
title: Internal event interfaces were exposed to web content when browser EventHandler listener callbacks ran | ||
impact: moderate | ||
reporter: Gregory Pappas | ||
description: | | ||
Internal browser event interfaces were exposed to web content when privileged EventHandler listener callbacks ran for those events. Web content that tried to use those interfaces would not be able to use them with elevated privileges, but their presence would indicate certain browser features had been used, such as when a user opened the Dev Tools console. | ||
bugs: | ||
- url: 1906744 | ||
CVE-2024-8383: | ||
title: 'Thunderbird did not ask before openings news: links in an external application' | ||
impact: moderate | ||
reporter: D7 | ||
description: | | ||
Thunderbird normally asks for confirmation before asking the operating system to find an application to handle a scheme that the browser does not support. It did not ask before doing so for the Usenet-related schemes news: and snews:. Since most operating systems don't have a trusted newsreader installed by default, an unscrupulous program that the user downloaded could register itself as a handler. The website that served the application download could then launch that application at will. | ||
bugs: | ||
- url: 1908496 | ||
CVE-2024-8384: | ||
title: Garbage collection could mis-color cross-compartment objects in OOM conditions | ||
impact: moderate | ||
reporter: the Mozilla Fuzzing Team | ||
description: | | ||
The JavaScript garbage collector could mis-color cross-compartment objects if OOM conditions were detected at the right point between two passes. This could have led to memory corruption. | ||
bugs: | ||
- url: 1911288 |