1.0 Introduction
Recently, Mozilla has released security updates to address vulnerabilities in multiple products in Mozilla Products.
2.0 Impact
A cyber threat actor could exploit one of these vulnerabilities to take control of an affected system.
3.0 Affected Products
- CVE-2024-7518: Fullscreen notification dialog can be obscured by document content
- CVE-2024-7519: Out of bounds memory access in graphics shared memory handling
- CVE-2024-7520: Type confusion in WebAssembly
- CVE-2024-7521: Incomplete WebAssembly exception handing
- CVE-2024-7521: Incomplete WebAssembly exception handing
- CVE-2024-7522: Out of bounds read in editor component
- CVE-2024-7523: Document content could partially obscure security prompts
- CVE-2024-7524: CSP strict-dynamic bypass using web-compatibility shims
- CVE-2024-7525: Missing permission check when creating a StreamFilter
- CVE-2024-7526: Uninitialized memory used by WebGL
- CVE-2024-7527: Use-after-free in JavaScript garbage collection
- CVE-2024-7528: Use-after-free in IndexedDB
- CVE-2024-7529: Document content could partially obscure security prompts
- CVE-2024-7530: Use-after-free in JavaScript code coverage collection
- CVE-2024-7531: PK11_Encrypt using CKM_CHACHA20 can reveal plaintext on Intel Sandy Bridge machines
4.0 Recommendations
CyberSecurity Malaysia encourages users and administrators to review Mozilla’s security advisories for more information and apply the necessary updates.
Kindly refer to the following URLs for more information:
- https://www.mozilla.org/en-US/security/advisories/mfsa2024-38/
- https://www.mozilla.org/en-US/security/advisories/mfsa2024-37/
- https://www.mozilla.org/en-US/security/advisories/mfsa2024-35/
- https://www.mozilla.org/en-US/security/advisories/mfsa2024-34/
- https://www.mozilla.org/en-US/security/advisories/mfsa2024-33/
Generally, CyberSecurity Malaysia advises the users of this devices to be updated with the latest security announcements by the vendor and follow best practice security policies to determine which updates should be applied.
For further enquiries, please contact us through the following channels:
E-mail: cyber999[at]cybersecurity.my
Phone: 1-300-88-2999 (monitored during business hours)
Mobile: +60 19 2665850 (24x7 call incident reporting)
Business Hours: Mon - Fri 08:30 -17:30 MYT
Web: https://www.mycert.org.my
5.0 References
- https://www.ghacks.net/2024/08/06/firefox-129-0-reader-view-enhancements-https-and-dns-improvements-and-security-fixes/
- https://www.mozilla.org/en-US/security/advisories/
- https://www.mozilla.org/en-US/security/advisories/mfsa2024-38/
- https://www.mozilla.org/en-US/security/advisories/mfsa2024-37/
- https://www.mozilla.org/en-US/security/advisories/mfsa2024-35/
- https://www.mozilla.org/en-US/security/advisories/mfsa2024-34/
- https://www.mozilla.org/en-US/security/advisories/mfsa2024-33/