- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202412-04 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: Mozilla Firefox: Multiple Vulnerabilities Date: December 07, 2024 Bugs: #936215, #937467, #941169, #941174, #941224 ID: 202412-04 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which arbitrary code execution. Background ========== Mozilla Firefox is a popular open-source web browser from the Mozilla project. Affected packages ================= Package Vulnerable Unaffected ---------------------- --------------- ---------------- www-client/firefox < 128.3.1:esr >= 123.3.1:esr < 131.0.2:rapid >= 131.0.2:rapid www-client/firefox-bin < 128.3.1:esr >= 128.3.1:esr < 131.0.2:rapid >= 131.0.2:rapid Description =========== Multiple vulnerabilities have been discovered in Mozilla Firefox. Please review the CVE identifiers referenced below for details. Impact ====== Please review the referenced CVE identifiers for details. Workaround ========== There is no known workaround at this time. Resolution ========== All Mozilla Firefox users should upgrade to the latest version in their release channel: # emerge --sync # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-131.0.2:rapid" # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-128.3.1:esr" All Mozilla Firefox users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-client/firefox-131.0.2:rapid" # emerge --ask --oneshot --verbose ">=www-client/firefox-128.3.1:esr" References ========== [ 1 ] CVE-2024-6601 https://nvd.nist.gov/vuln/detail/CVE-2024-6601 [ 2 ] CVE-2024-6602 https://nvd.nist.gov/vuln/detail/CVE-2024-6602 [ 3 ] CVE-2024-6603 https://nvd.nist.gov/vuln/detail/CVE-2024-6603 [ 4 ] CVE-2024-6604 https://nvd.nist.gov/vuln/detail/CVE-2024-6604 [ 5 ] CVE-2024-6606 https://nvd.nist.gov/vuln/detail/CVE-2024-6606 [ 6 ] CVE-2024-6607 https://nvd.nist.gov/vuln/detail/CVE-2024-6607 [ 7 ] CVE-2024-6608 https://nvd.nist.gov/vuln/detail/CVE-2024-6608 [ 8 ] CVE-2024-6609 https://nvd.nist.gov/vuln/detail/CVE-2024-6609 [ 9 ] CVE-2024-6610 https://nvd.nist.gov/vuln/detail/CVE-2024-6610 [ 10 ] CVE-2024-6611 https://nvd.nist.gov/vuln/detail/CVE-2024-6611 [ 11 ] CVE-2024-6612 https://nvd.nist.gov/vuln/detail/CVE-2024-6612 [ 12 ] CVE-2024-6613 https://nvd.nist.gov/vuln/detail/CVE-2024-6613 [ 13 ] CVE-2024-6614 https://nvd.nist.gov/vuln/detail/CVE-2024-6614 [ 14 ] CVE-2024-6615 https://nvd.nist.gov/vuln/detail/CVE-2024-6615 [ 15 ] CVE-2024-7518 https://nvd.nist.gov/vuln/detail/CVE-2024-7518 [ 16 ] CVE-2024-7519 https://nvd.nist.gov/vuln/detail/CVE-2024-7519 [ 17 ] CVE-2024-7520 https://nvd.nist.gov/vuln/detail/CVE-2024-7520 [ 18 ] CVE-2024-7521 https://nvd.nist.gov/vuln/detail/CVE-2024-7521 [ 19 ] CVE-2024-7522 https://nvd.nist.gov/vuln/detail/CVE-2024-7522 [ 20 ] CVE-2024-7523 https://nvd.nist.gov/vuln/detail/CVE-2024-7523 [ 21 ] CVE-2024-7524 https://nvd.nist.gov/vuln/detail/CVE-2024-7524 [ 22 ] CVE-2024-7525 https://nvd.nist.gov/vuln/detail/CVE-2024-7525 [ 23 ] CVE-2024-7526 https://nvd.nist.gov/vuln/detail/CVE-2024-7526 [ 24 ] CVE-2024-7527 https://nvd.nist.gov/vuln/detail/CVE-2024-7527 [ 25 ] CVE-2024-7528 https://nvd.nist.gov/vuln/detail/CVE-2024-7528 [ 26 ] CVE-2024-7529 https://nvd.nist.gov/vuln/detail/CVE-2024-7529 [ 27 ] CVE-2024-7530 https://nvd.nist.gov/vuln/detail/CVE-2024-7530 [ 28 ] CVE-2024-7531 https://nvd.nist.gov/vuln/detail/CVE-2024-7531 [ 29 ] CVE-2024-8381 https://nvd.nist.gov/vuln/detail/CVE-2024-8381 [ 30 ] CVE-2024-8382 https://nvd.nist.gov/vuln/detail/CVE-2024-8382 [ 31 ] CVE-2024-8383 https://nvd.nist.gov/vuln/detail/CVE-2024-8383 [ 32 ] CVE-2024-8384 https://nvd.nist.gov/vuln/detail/CVE-2024-8384 [ 33 ] CVE-2024-8385 https://nvd.nist.gov/vuln/detail/CVE-2024-8385 [ 34 ] CVE-2024-8386 https://nvd.nist.gov/vuln/detail/CVE-2024-8386 [ 35 ] CVE-2024-8387 https://nvd.nist.gov/vuln/detail/CVE-2024-8387 [ 36 ] CVE-2024-8389 https://nvd.nist.gov/vuln/detail/CVE-2024-8389 [ 37 ] CVE-2024-8394 https://nvd.nist.gov/vuln/detail/CVE-2024-8394 [ 38 ] CVE-2024-8900 https://nvd.nist.gov/vuln/detail/CVE-2024-8900 [ 39 ] CVE-2024-9391 https://nvd.nist.gov/vuln/detail/CVE-2024-9391 [ 40 ] CVE-2024-9392 https://nvd.nist.gov/vuln/detail/CVE-2024-9392 [ 41 ] CVE-2024-9395 https://nvd.nist.gov/vuln/detail/CVE-2024-9395 [ 42 ] CVE-2024-9396 https://nvd.nist.gov/vuln/detail/CVE-2024-9396 [ 43 ] CVE-2024-9397 https://nvd.nist.gov/vuln/detail/CVE-2024-9397 [ 44 ] CVE-2024-9399 https://nvd.nist.gov/vuln/detail/CVE-2024-9399 [ 45 ] CVE-2024-9400 https://nvd.nist.gov/vuln/detail/CVE-2024-9400 [ 46 ] CVE-2024-9401 https://nvd.nist.gov/vuln/detail/CVE-2024-9401 [ 47 ] CVE-2024-9402 https://nvd.nist.gov/vuln/detail/CVE-2024-9402 [ 48 ] CVE-2024-9403 https://nvd.nist.gov/vuln/detail/CVE-2024-9403 [ 49 ] CVE-2024-9680 https://nvd.nist.gov/vuln/detail/CVE-2024-9680 [ 50 ] MFSA2024-29 [ 51 ] MFSA2024-30 [ 52 ] MFSA2024-31 [ 53 ] MFSA2024-33 [ 54 ] MFSA2024-34 [ 55 ] MFSA2024-35 [ 56 ] MFSA2024-38 [ 57 ] MFSA2024-39 [ 58 ] MFSA2024-40 [ 59 ] MFSA2024-41 [ 60 ] MFSA2024-43 [ 61 ] MFSA2024-44 [ 62 ] MFSA2024-46 [ 63 ] MFSA2024-47 [ 64 ] MFSA2024-48 [ 65 ] MFSA2024-49 [ 66 ] MFSA2024-50 [ 67 ] MFSA2024-51 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202412-04 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2024 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5