SB2024120705 - Gentoo update for Mozilla Firefox



SB2024120705 - Gentoo update for Mozilla Firefox

Published: December 7, 2024 Updated: December 17, 2025

Security Bulletin ID SB2024120705
Severity
Critical
Patch available
YES
Number of vulnerabilities 49
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Critical 2% High 35% Medium 31% Low 33%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 49 secuirty vulnerabilities.


1) Race condition (CVE-ID: CVE-2024-6601)

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to a race condition in permission assignment. A remote attacker can trick the victim to visit a specially crafted website, bypass cross-origin container obtaining permissions of the top-level origin and gain access to sensitive information.


2) Buffer overflow (CVE-ID: CVE-2024-6602)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in NSS. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


3) Buffer overflow (CVE-ID: CVE-2024-6603)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in thread creation. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger memory corruption and crash the browser.


4) Buffer overflow (CVE-ID: CVE-2024-6604)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing HTML content. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


5) Out-of-bounds read (CVE-ID: CVE-2024-6606)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in clipboard component. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger an out-of-bounds read error and read contents of memory on the system.


6) Insufficient UI Warning of Dangerous Operations (CVE-ID: CVE-2024-6607)

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to the way the browsers handles escape button and pointerlock. It was possible to prevent a user from exiting pointerlock when pressing escape and to overlay customValidity notifications from a <select> element over certain permission prompts. This could be used to confuse a user into giving a site unintended permissions.


7) Insufficient UI Warning of Dangerous Operations (CVE-ID: CVE-2024-6608)

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exists due to an error when handling cursor and pointerlock. It was possible to move the cursor using pointerlock from an iframe. This allowed moving the cursor outside of the viewport and the Firefox window.


8) Double free (CVE-ID: CVE-2024-6609)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in NSS. A remote attacker can force the browser to free an elliptic curve key which was never allocated and crash the browser.


9) Unimplemented or Unsupported Feature in UI (CVE-ID: CVE-2024-6610)

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exists due to an error in form validation popups. A remote attacker can spam form validation messages to prevent users from exiting full-screen mode.


10) Information disclosure (CVE-ID: CVE-2024-6611)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to SameSite=Strict or Lax cookies could be sent to a nested iframe. A remote attacker can gain access to potentially sensitive information.


11) Security features bypass (CVE-ID: CVE-2024-6612)

The vulnerability allows a remote attacker to bypass CSP protection mechanism.

The vulnerability exists due to CSP violation leakage when using devtools. CSP violations generated links in the console tab of the developer tools, pointing to the violating resource. This caused a DNS prefetch which leaked that a CSP violation happened.


12) Infinite loop (CVE-ID: CVE-2024-6613)

The vulnerability allows a remote attacker to alter trace data,

The vulnerability exists due to infinite loop. The frame iterator could get stuck in a loop when encountering certain wasm frames leading to incorrect stack traces.


13) Infinite loop (CVE-ID: CVE-2024-6614)

The vulnerability allows a remote attacker to alter trace data.

The vulnerability exists due to infinite loop. The frame iterator could get stuck in a loop when encountering certain wasm frames leading to incorrect stack traces.


14) Buffer overflow (CVE-ID: CVE-2024-6615)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing HTML content. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


15) Multiple Interpretations of UI Input (CVE-ID: CVE-2024-7518)

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exist due to improper input interpretation in UI when handling select options. A remote attacler can obscure the fullscreen notification dialog by document content and perform spoofing attack.


16) Out-of-bounds read (CVE-ID: CVE-2024-7519)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to a boundary error when processing graphics shared memory. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger an out-of-bounds read and bypass browser sandbox.


17) Type Confusion (CVE-ID: CVE-2024-7520)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a type confusion error in WebAssembly. A remote attacker can trick the victim to visit a specially crafted website, trigger a type confusion error and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


18) Use-after-free (CVE-ID: CVE-2024-7521)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error in WebAssembly. A remote attacker can trick the victim to visit a specially crafted website, trigger a use-after-free error and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


19) Out-of-bounds read (CVE-ID: CVE-2024-7522)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to a boundary error in editor component. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger an out-of-bounds read and bypass browser sandbox.


20) Multiple Interpretations of UI Input (CVE-ID: CVE-2024-7523)

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exists due to an error when handling select options, which can obscure security prompts. A remote attacker can trick a victim into granting permissions.


21) Security features bypass (CVE-ID: CVE-2024-7524)

The vulnerability allows a remote attacker to bypass CSP policy.

Firefox adds web-compatibility shims in place of some tracking scripts blocked by Enhanced Tracking Protection. On a site protected by Content Security Policy in "strict-dynamic" mode, an attacker able to inject an HTML element could have used a DOM Clobbering attack on some of the shims and achieved XSS, bypassing the CSP strict-dynamic protection.


22) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2024-7525)

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due missing permission check when creating a StreamFilter. A web extension with minimal permissions can create a StreamFilter, which can be used to read and modify the response body of requests on any site.


23) Use of uninitialized resource (CVE-ID: CVE-2024-7526)

The vulnerability allows a remote attacker to bypass certain security restrictions.

The vulnerability exists due to usage of uninitialized resources in WebGL ANGLE. A remote attacker can trick the victim to visit a specially crafted website and gain access to sensitive information.


24) Use-after-free (CVE-ID: CVE-2024-7527)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error in JavaScript garbage collection. A remote attacker can trick the victim into visiting a specially crafted website, trigger a use-after-free error and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


25) Use-after-free (CVE-ID: CVE-2024-7528)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error in IndexedDB. A remote attacker can trick the victim into visiting a specially crafted website, trigger a use-after-free error and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


26) Multiple Interpretations of UI Input (CVE-ID: CVE-2024-7529)

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exist due to improper handling of the date picker, which can obscure security prompts. A remote attacker use a malicious site to trick a victim into granting permissions.


27) Use-after-free (CVE-ID: CVE-2024-7530)

The vulnerability allows a remote attacker to crash the browser

The vulnerability exists due to a use-after-free error in JavaScript code coverage collection. A remote attacker can trick the victim into visiting a specially crafted website, trigger a use-after-free error and crash the browser.


28) Cryptographic issues (CVE-ID: CVE-2024-7531)

The vulnerability allows a remote attacker to gain access to sensitive information.

Calling PK11_Encrypt() in NSS using CKM_CHACHA20 and the same buffer for input and output can result in plaintext on an Intel Sandy Bridge processor. In Firefox this only affects the QUIC header protection feature when the connection is using the ChaCha20-Poly1305 cipher suite. The most likely outcome is connection failure, but if the connection persists despite the high packet loss it could be possible for a network observer to identify packets as coming from the same source despite a network path change.


29) Type Confusion (CVE-ID: CVE-2024-8381)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a type confusion error when looking up a property name in a "with" block. A remote attacker can trick the victim into visiting a specially crafted website, trigger a type confusion error and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


30) Exposed dangerous method or function (CVE-ID: CVE-2024-8382)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to internal browser event interfaces are exposed to web content when privileged EventHandler listener callbacks ran for those events. A remote attacker can indicate usage of certain browser features, such as when a user opens the Dev Tools console.


31) Improper Authorization in Handler for Custom URL Scheme (CVE-ID: CVE-2024-8383)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to a missing confirmation dialog when opening the Usenet-related schemes "news:" and "snews:". A remote attacker can trick the victim into downloading a malicious application that can be launched at will without any additional prompts.


32) Buffer overflow (CVE-ID: CVE-2024-8384)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in JavaScript garbage collector when HTML content. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


33) Type Confusion (CVE-ID: CVE-2024-8385)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a type confusion error when handling StructFields and ArrayTypes in WASM. A remote attacker can trick the victim into visiting a specially crafted website, trigger a type confusion error and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


34) Improper Restriction of Rendered UI Layers or Frames (CVE-ID: CVE-2024-8386)

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exists due to an error when displaying SelectElements popup if a site had been granted the permission to open popup windows. A remote attacker can perform spoofing attack.


35) Buffer overflow (CVE-ID: CVE-2024-8387)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing HTML content. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


36) Buffer overflow (CVE-ID: CVE-2024-8389)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing HTML content. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


37) Use-after-free (CVE-ID: CVE-2024-8394)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a use-after-free error when aborting verification of an OTR chat session. A remote attacker can crash the application.


38) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2024-8900)

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to application does not properly impose security restrictions. A remote attacker can write data to the user's clipboard, bypassing the user prompt, during a certain sequence of navigational events.


39) Improper Restriction of Rendered UI Layers or Frames (CVE-ID: CVE-2024-9391)

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exists due to an error when exiting fullscreen mode. A user who enables full-screen mode on a specially crafted web page could potentially be prevented from exiting full screen mode. This may allow spoofing of other sites as the address bar is no longer visible.


40) Security features bypass (CVE-ID: CVE-2024-9392)

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to an unspecified error. A compromised content process perform arbitrary loading of cross-origin pages.



41) Spoofing attack (CVE-ID: CVE-2024-9395)

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exists due to incorrect processing of filenames. A specially crafted filename containing a large number of spaces could obscure the file's extension when displayed in the download dialog.


42) Buffer overflow (CVE-ID: CVE-2024-9396)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when cloning certain objects. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


43) Insufficient UI Warning of Dangerous Operations (CVE-ID: CVE-2024-9397)

The vulnerability allows a remote attacker to perform clickjacking attacks.

The vulnerability exists due to a missing delay in directory upload UI. A remote attacker can trick a user into granting permission via clickjacking.


44) Input validation error (CVE-ID: CVE-2024-9399)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input when handling WebTransport. A remote attacker can trick the victim into visiting a specially crafted website and crash the browser.


45) Resource exhaustion (CVE-ID: CVE-2024-9400)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources during JIT compilation. A remote attacker can crash the browser.


46) Buffer overflow (CVE-ID: CVE-2024-9401)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing HTML content. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


47) Buffer overflow (CVE-ID: CVE-2024-9402)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing HTML content. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


48) Buffer overflow (CVE-ID: CVE-2024-9403)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing HTML content. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


49) Use-after-free (CVE-ID: CVE-2024-9680)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error in Animation timeline. A remote attacker can trick the victim into visiting a specially crafted website, trigger a use-after-free error and execute arbitrary code on the system.

Note, the vulnerability is being actively exploited in the wild.


Remediation

Install update from vendor's website.