-
Notifications
You must be signed in to change notification settings - Fork 32
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
2 changed files
with
154 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,89 @@ | ||
## mfsa2024-37.yml | ||
announced: August 6, 2024 | ||
impact: high | ||
fixed_in: | ||
- Thunderbird 128.1 | ||
title: Security Vulnerabilities fixed in Thunderbird 128.1 | ||
description: | | ||
*In general, these flaws cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but are potential risks in browser or browser-like contexts.* | ||
advisories: | ||
CVE-2024-7518: | ||
title: Fullscreen notification dialog can be obscured by document content | ||
impact: high | ||
reporter: Shaheen Fazim | ||
description: | | ||
Select options could obscure the fullscreen notification dialog. This could be used by a malicious site to perform a spoofing attack. | ||
bugs: | ||
- url: 1875354 | ||
CVE-2024-7519: | ||
title: Out of bounds memory access in graphics shared memory handling | ||
impact: high | ||
reporter: dalmurino | ||
description: | | ||
Insufficient checks when processing graphics shared memory could have led to memory corruption. This could be leveraged by an attacker to perform a sandbox escape. | ||
bugs: | ||
- url: 1902307 | ||
CVE-2024-7520: | ||
title: Type confusion in WebAssembly | ||
impact: high | ||
reporter: Nan Wang | ||
description: | | ||
A type confusion bug in WebAssembly could be leveraged by an attacker to potentially achieve code execution. | ||
bugs: | ||
- url: 1903041 | ||
CVE-2024-7521: | ||
title: Incomplete WebAssembly exception handing | ||
impact: high | ||
reporter: Nils Bars | ||
description: | | ||
Incomplete WebAssembly exception handing could have led to a use-after-free. | ||
bugs: | ||
- url: 1904644 | ||
CVE-2024-7522: | ||
title: Out of bounds read in editor component | ||
impact: high | ||
reporter: Irvan Kurniawan | ||
description: | | ||
Editor code failed to check an attribute value. This could have led to an out-of-bounds read. | ||
bugs: | ||
- url: 1906727 | ||
CVE-2024-7525: | ||
title: Missing permission check when creating a StreamFilter | ||
impact: high | ||
reporter: Rob Wu | ||
description: | | ||
It was possible for a web extension with minimal permissions to create a <code>StreamFilter</code> which could be used to read and modify the response body of requests on any site. | ||
bugs: | ||
- url: 1909298 | ||
CVE-2024-7526: | ||
title: Uninitialized memory used by WebGL | ||
impact: high | ||
reporter: s48gs.w | ||
description: | | ||
ANGLE failed to initialize parameters which led to reading from uninitialized memory. This could be leveraged to leak sensitive data from memory. | ||
bugs: | ||
- url: 1910306 | ||
CVE-2024-7527: | ||
title: Use-after-free in JavaScript garbage collection | ||
impact: high | ||
reporter: Norisz Fay | ||
description: | | ||
Unexpected marking work at the start of sweeping could have led to a use-after-free. | ||
bugs: | ||
- url: 1871303 | ||
CVE-2024-7528: | ||
title: Use-after-free in IndexedDB | ||
impact: high | ||
reporter: Jason Kratzer | ||
description: | | ||
Incorrect garbage collection interaction in IndexedDB could have led to a use-after-free. | ||
bugs: | ||
- url: 1895951 | ||
CVE-2024-7529: | ||
title: Document content could partially obscure security prompts | ||
impact: moderate | ||
reporter: Hafiizh | ||
description: | | ||
The date picker could partially obscure security prompts. This could be used by a malicious site to trick a user into granting permissions. | ||
bugs: | ||
- url: 1903187 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,65 @@ | ||
## mfsa2024-38.yml | ||
announced: August 6, 2024 | ||
impact: high | ||
fixed_in: | ||
- Thunderbird 115.14 | ||
title: Security Vulnerabilities fixed in Thunderbird 115.14 | ||
description: | | ||
*In general, these flaws cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but are potential risks in browser or browser-like contexts.* | ||
advisories: | ||
CVE-2024-7519: | ||
title: Out of bounds memory access in graphics shared memory handling | ||
impact: high | ||
reporter: dalmurino | ||
description: | | ||
Insufficient checks when processing graphics shared memory could have led to memory corruption. This could be leveraged by an attacker to perform a sandbox escape. | ||
bugs: | ||
- url: 1902307 | ||
CVE-2024-7521: | ||
title: Incomplete WebAssembly exception handing | ||
impact: high | ||
reporter: Nils Bars | ||
description: | | ||
Incomplete WebAssembly exception handing could have led to a use-after-free. | ||
bugs: | ||
- url: 1904644 | ||
CVE-2024-7522: | ||
title: Out of bounds read in editor component | ||
impact: high | ||
reporter: Irvan Kurniawan | ||
description: | | ||
Editor code failed to check an attribute value. This could have led to an out-of-bounds read. | ||
bugs: | ||
- url: 1906727 | ||
CVE-2024-7525: | ||
title: Missing permission check when creating a StreamFilter | ||
impact: high | ||
reporter: Rob Wu | ||
description: | | ||
It was possible for a web extension with minimal permissions to create a <code>StreamFilter</code> which could be used to read and modify the response body of requests on any site. | ||
bugs: | ||
- url: 1909298 | ||
CVE-2024-7526: | ||
title: Uninitialized memory used by WebGL | ||
impact: high | ||
reporter: s48gs.w | ||
description: | | ||
ANGLE failed to initialize parameters which led to reading from uninitialized memory. This could be leveraged to leak sensitive data from memory. | ||
bugs: | ||
- url: 1910306 | ||
CVE-2024-7527: | ||
title: Use-after-free in JavaScript garbage collection | ||
impact: high | ||
reporter: Norisz Fay | ||
description: | | ||
Unexpected marking work at the start of sweeping could have led to a use-after-free. | ||
bugs: | ||
- url: 1871303 | ||
CVE-2024-7529: | ||
title: Document content could partially obscure security prompts | ||
impact: moderate | ||
reporter: Hafiizh | ||
description: | | ||
The date picker could partially obscure security prompts. This could be used by a malicious site to trick a user into granting permissions. | ||
bugs: | ||
- url: 1903187 |