File _patchinfo of Package patchinfo.35101
<patchinfo incident="35101">
<issue tracker="bnc" id="1228648">VUL-0: MozillaFirefox / MozillaThunderbird: update to 129 and 128.1esr/115.14esr</issue>
<issue tracker="bnc" id="1226316">VUL-0: MozillaFirefox / MozillaThunderbird: update to 128.0 and 115.13esr / 128.0esr</issue>
<issue tracker="cve" id="2024-6605"/>
<issue tracker="cve" id="2024-6606"/>
<issue tracker="cve" id="2024-6607"/>
<issue tracker="cve" id="2024-6608"/>
<issue tracker="cve" id="2024-6609"/>
<issue tracker="cve" id="2024-6610"/>
<issue tracker="cve" id="2024-6600"/>
<issue tracker="cve" id="2024-6601"/>
<issue tracker="cve" id="2024-6602"/>
<issue tracker="cve" id="2024-6603"/>
<issue tracker="cve" id="2024-6611"/>
<issue tracker="cve" id="2024-6612"/>
<issue tracker="cve" id="2024-6613"/>
<issue tracker="cve" id="2024-6614"/>
<issue tracker="cve" id="2024-6604"/>
<issue tracker="cve" id="2024-6615"/>
<issue tracker="cve" id="2024-7518"/>
<issue tracker="cve" id="2024-7519"/>
<issue tracker="cve" id="2024-7520"/>
<issue tracker="cve" id="2024-7521"/>
<issue tracker="cve" id="2024-7522"/>
<issue tracker="cve" id="2024-7524"/>
<issue tracker="cve" id="2024-7525"/>
<issue tracker="cve" id="2024-7526"/>
<issue tracker="cve" id="2024-7527"/>
<issue tracker="cve" id="2024-7528"/>
<issue tracker="cve" id="2024-7529"/>
<issue tracker="cve" id="2024-7531"/>
<packager>MSirringhaus</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for MozillaFirefox</summary>
<description>This update for MozillaFirefox fixes the following issues:
Update to Firefox Extended Support Release 128.1.0 ESR (MFSA 2024-35, bsc#1228648)
- CVE-2024-7518: Fullscreen notification dialog can be obscured by document
- CVE-2024-7519: Out of bounds memory access in graphics shared memory handling
- CVE-2024-7520: Type confusion in WebAssembly
- CVE-2024-7521: Incomplete WebAssembly exception handing
- CVE-2024-7522: Out of bounds read in editor component
- CVE-2024-7524: CSP strict-dynamic bypass using web-compatibility shims
- CVE-2024-7525: Missing permission check when creating a StreamFilter
- CVE-2024-7526: Uninitialized memory used by WebGL
- CVE-2024-7527: Use-after-free in JavaScript garbage collection
- CVE-2024-7528: Use-after-free in IndexedDB
- CVE-2024-7529: Document content could partially obscure security prompts
- CVE-2024-7531: PK11_Encrypt using CKM_CHACHA20 can reveal plaintext on Intel
</description>
</patchinfo>