429 lines
14 KiB
JSON
429 lines
14 KiB
JSON
{
|
|
"document":{
|
|
"aggregate_severity":{
|
|
"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
|
|
"text":"High"
|
|
},
|
|
"category":"csaf_vex",
|
|
"csaf_version":"2.0",
|
|
"distribution":{
|
|
"tlp":{
|
|
"label":"WHITE",
|
|
"url":"https:/www.first.org/tlp/"
|
|
}
|
|
},
|
|
"lang":"en",
|
|
"notes":[
|
|
{
|
|
"text":"firefox security update",
|
|
"category":"general",
|
|
"title":"Synopsis"
|
|
},
|
|
{
|
|
"text":"An update for firefox is now available for openEuler-24.03-LTS.",
|
|
"category":"general",
|
|
"title":"Summary"
|
|
},
|
|
{
|
|
"text":"Mozilla Firefox is a standalone web browser, designed for standards compliance and performance. Its functionality can be enhanced via a plethora of extensions.\n\nSecurity Fix(es):\n\nIf a garbage collection was triggered at the right time, a use-after-free could have occurred during object transplant. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12.(CVE-2024-5688)\n\nA mismatch between allocator and deallocator could have lead to memory corruption. This vulnerability affects Firefox < 128, Firefox ESR < 115.13, Thunderbird < 115.13, and Thunderbird < 128.(CVE-2024-6602)",
|
|
"category":"general",
|
|
"title":"Description"
|
|
},
|
|
{
|
|
"text":"An update for firefox is now available for openEuler-24.03-LTS.\n\nopenEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.",
|
|
"category":"general",
|
|
"title":"Topic"
|
|
},
|
|
{
|
|
"text":"High",
|
|
"category":"general",
|
|
"title":"Severity"
|
|
},
|
|
{
|
|
"text":"firefox",
|
|
"category":"general",
|
|
"title":"Affected Component"
|
|
}
|
|
],
|
|
"publisher":{
|
|
"issuing_authority":"openEuler security committee",
|
|
"name":"openEuler",
|
|
"namespace":"https://www.openeuler.org",
|
|
"contact_details":"openeuler-security@openeuler.org",
|
|
"category":"vendor"
|
|
},
|
|
"references":[
|
|
{
|
|
"summary":"openEuler-SA-2024-1939",
|
|
"category":"self",
|
|
"url":"https://www.openeuler.org/en/security/security-bulletins/detail?id=openEuler-SA-2024-1939"
|
|
},
|
|
{
|
|
"summary":"CVE-2024-5688",
|
|
"category":"self",
|
|
"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-5688&packageName=firefox"
|
|
},
|
|
{
|
|
"summary":"CVE-2024-6602",
|
|
"category":"self",
|
|
"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-6602&packageName=firefox"
|
|
},
|
|
{
|
|
"summary":"nvd cve",
|
|
"category":"external",
|
|
"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-5688"
|
|
},
|
|
{
|
|
"summary":"nvd cve",
|
|
"category":"external",
|
|
"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-6602"
|
|
},
|
|
{
|
|
"summary":"openEuler-SA-2024-1939 vex file",
|
|
"category":"self",
|
|
"url":"https://repo.openeuler.org/security/data/csaf/advisories/2024/csaf-openEuler-SA-2024-1939.json"
|
|
}
|
|
],
|
|
"title":"An update for firefox is now available for openEuler-24.03-LTS",
|
|
"tracking":{
|
|
"initial_release_date":"2024-08-02T19:42:17+08:00",
|
|
"revision_history":[
|
|
{
|
|
"date":"2024-08-02T19:42:17+08:00",
|
|
"summary":"Initial",
|
|
"number":"1.0.0"
|
|
},
|
|
{
|
|
"date":"2024-08-05T11:31:17+08:00",
|
|
"summary":"final",
|
|
"number":"2.0.0"
|
|
}
|
|
],
|
|
"generator":{
|
|
"date":"2024-08-05T11:31:17+08:00",
|
|
"engine":{
|
|
"name":"openEuler CSAF Tool V1.0"
|
|
}
|
|
},
|
|
"current_release_date":"2024-08-05T11:31:17+08:00",
|
|
"id":"openEuler-SA-2024-1939",
|
|
"version":"2.0.0",
|
|
"status":"final"
|
|
}
|
|
},
|
|
"product_tree":{
|
|
"branches":[
|
|
{
|
|
"name":"openEuler",
|
|
"category":"vendor",
|
|
"branches":[
|
|
{
|
|
"name":"openEuler",
|
|
"branches":[
|
|
{
|
|
"product":{
|
|
"product_identification_helper":{
|
|
"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
|
|
},
|
|
"product_id":"openEuler-24.03-LTS",
|
|
"name":"openEuler-24.03-LTS"
|
|
},
|
|
"name":"openEuler-24.03-LTS",
|
|
"category":"product_version"
|
|
}
|
|
],
|
|
"category":"product_name"
|
|
},
|
|
{
|
|
"name":"aarch64",
|
|
"branches":[
|
|
{
|
|
"product":{
|
|
"product_identification_helper":{
|
|
"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
|
|
},
|
|
"product_id":"firefox-debugsource-115.13.0-1.oe2403.aarch64.rpm",
|
|
"name":"firefox-debugsource-115.13.0-1.oe2403.aarch64.rpm"
|
|
},
|
|
"name":"firefox-debugsource-115.13.0-1.oe2403.aarch64.rpm",
|
|
"category":"product_version"
|
|
},
|
|
{
|
|
"product":{
|
|
"product_identification_helper":{
|
|
"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
|
|
},
|
|
"product_id":"firefox-debuginfo-115.13.0-1.oe2403.aarch64.rpm",
|
|
"name":"firefox-debuginfo-115.13.0-1.oe2403.aarch64.rpm"
|
|
},
|
|
"name":"firefox-debuginfo-115.13.0-1.oe2403.aarch64.rpm",
|
|
"category":"product_version"
|
|
},
|
|
{
|
|
"product":{
|
|
"product_identification_helper":{
|
|
"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
|
|
},
|
|
"product_id":"firefox-115.13.0-1.oe2403.aarch64.rpm",
|
|
"name":"firefox-115.13.0-1.oe2403.aarch64.rpm"
|
|
},
|
|
"name":"firefox-115.13.0-1.oe2403.aarch64.rpm",
|
|
"category":"product_version"
|
|
}
|
|
],
|
|
"category":"product_name"
|
|
},
|
|
{
|
|
"name":"src",
|
|
"branches":[
|
|
{
|
|
"product":{
|
|
"product_identification_helper":{
|
|
"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
|
|
},
|
|
"product_id":"firefox-115.13.0-1.oe2403.src.rpm",
|
|
"name":"firefox-115.13.0-1.oe2403.src.rpm"
|
|
},
|
|
"name":"firefox-115.13.0-1.oe2403.src.rpm",
|
|
"category":"product_version"
|
|
}
|
|
],
|
|
"category":"product_name"
|
|
},
|
|
{
|
|
"name":"x86_64",
|
|
"branches":[
|
|
{
|
|
"product":{
|
|
"product_identification_helper":{
|
|
"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
|
|
},
|
|
"product_id":"firefox-debugsource-115.13.0-1.oe2403.x86_64.rpm",
|
|
"name":"firefox-debugsource-115.13.0-1.oe2403.x86_64.rpm"
|
|
},
|
|
"name":"firefox-debugsource-115.13.0-1.oe2403.x86_64.rpm",
|
|
"category":"product_version"
|
|
},
|
|
{
|
|
"product":{
|
|
"product_identification_helper":{
|
|
"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
|
|
},
|
|
"product_id":"firefox-debuginfo-115.13.0-1.oe2403.x86_64.rpm",
|
|
"name":"firefox-debuginfo-115.13.0-1.oe2403.x86_64.rpm"
|
|
},
|
|
"name":"firefox-debuginfo-115.13.0-1.oe2403.x86_64.rpm",
|
|
"category":"product_version"
|
|
},
|
|
{
|
|
"product":{
|
|
"product_identification_helper":{
|
|
"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
|
|
},
|
|
"product_id":"firefox-115.13.0-1.oe2403.x86_64.rpm",
|
|
"name":"firefox-115.13.0-1.oe2403.x86_64.rpm"
|
|
},
|
|
"name":"firefox-115.13.0-1.oe2403.x86_64.rpm",
|
|
"category":"product_version"
|
|
}
|
|
],
|
|
"category":"product_name"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"relationships":[
|
|
{
|
|
"relates_to_product_reference":"openEuler-24.03-LTS",
|
|
"product_reference":"firefox-debugsource-115.13.0-1.oe2403.aarch64.rpm",
|
|
"full_product_name":{
|
|
"product_id":"openEuler-24.03-LTS:firefox-debugsource-115.13.0-1.oe2403.aarch64",
|
|
"name":"firefox-debugsource-115.13.0-1.oe2403.aarch64 as a component of openEuler-24.03-LTS"
|
|
},
|
|
"category":"default_component_of"
|
|
},
|
|
{
|
|
"relates_to_product_reference":"openEuler-24.03-LTS",
|
|
"product_reference":"firefox-debuginfo-115.13.0-1.oe2403.aarch64.rpm",
|
|
"full_product_name":{
|
|
"product_id":"openEuler-24.03-LTS:firefox-debuginfo-115.13.0-1.oe2403.aarch64",
|
|
"name":"firefox-debuginfo-115.13.0-1.oe2403.aarch64 as a component of openEuler-24.03-LTS"
|
|
},
|
|
"category":"default_component_of"
|
|
},
|
|
{
|
|
"relates_to_product_reference":"openEuler-24.03-LTS",
|
|
"product_reference":"firefox-115.13.0-1.oe2403.aarch64.rpm",
|
|
"full_product_name":{
|
|
"product_id":"openEuler-24.03-LTS:firefox-115.13.0-1.oe2403.aarch64",
|
|
"name":"firefox-115.13.0-1.oe2403.aarch64 as a component of openEuler-24.03-LTS"
|
|
},
|
|
"category":"default_component_of"
|
|
},
|
|
{
|
|
"relates_to_product_reference":"openEuler-24.03-LTS",
|
|
"product_reference":"firefox-115.13.0-1.oe2403.src.rpm",
|
|
"full_product_name":{
|
|
"product_id":"openEuler-24.03-LTS:firefox-115.13.0-1.oe2403.src",
|
|
"name":"firefox-115.13.0-1.oe2403.src as a component of openEuler-24.03-LTS"
|
|
},
|
|
"category":"default_component_of"
|
|
},
|
|
{
|
|
"relates_to_product_reference":"openEuler-24.03-LTS",
|
|
"product_reference":"firefox-debugsource-115.13.0-1.oe2403.x86_64.rpm",
|
|
"full_product_name":{
|
|
"product_id":"openEuler-24.03-LTS:firefox-debugsource-115.13.0-1.oe2403.x86_64",
|
|
"name":"firefox-debugsource-115.13.0-1.oe2403.x86_64 as a component of openEuler-24.03-LTS"
|
|
},
|
|
"category":"default_component_of"
|
|
},
|
|
{
|
|
"relates_to_product_reference":"openEuler-24.03-LTS",
|
|
"product_reference":"firefox-debuginfo-115.13.0-1.oe2403.x86_64.rpm",
|
|
"full_product_name":{
|
|
"product_id":"openEuler-24.03-LTS:firefox-debuginfo-115.13.0-1.oe2403.x86_64",
|
|
"name":"firefox-debuginfo-115.13.0-1.oe2403.x86_64 as a component of openEuler-24.03-LTS"
|
|
},
|
|
"category":"default_component_of"
|
|
},
|
|
{
|
|
"relates_to_product_reference":"openEuler-24.03-LTS",
|
|
"product_reference":"firefox-115.13.0-1.oe2403.x86_64.rpm",
|
|
"full_product_name":{
|
|
"product_id":"openEuler-24.03-LTS:firefox-115.13.0-1.oe2403.x86_64",
|
|
"name":"firefox-115.13.0-1.oe2403.x86_64 as a component of openEuler-24.03-LTS"
|
|
},
|
|
"category":"default_component_of"
|
|
}
|
|
]
|
|
},
|
|
"vulnerabilities":[
|
|
{
|
|
"cve":"CVE-2024-5688",
|
|
"notes":[
|
|
{
|
|
"text":"If a garbage collection was triggered at the right time, a use-after-free could have occurred during object transplant. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12.",
|
|
"category":"description",
|
|
"title":"Vulnerability Description"
|
|
}
|
|
],
|
|
"product_status":{
|
|
"fixed":[
|
|
"openEuler-24.03-LTS:firefox-debugsource-115.13.0-1.oe2403.aarch64",
|
|
"openEuler-24.03-LTS:firefox-debuginfo-115.13.0-1.oe2403.aarch64",
|
|
"openEuler-24.03-LTS:firefox-115.13.0-1.oe2403.aarch64",
|
|
"openEuler-24.03-LTS:firefox-115.13.0-1.oe2403.src",
|
|
"openEuler-24.03-LTS:firefox-debugsource-115.13.0-1.oe2403.x86_64",
|
|
"openEuler-24.03-LTS:firefox-debuginfo-115.13.0-1.oe2403.x86_64",
|
|
"openEuler-24.03-LTS:firefox-115.13.0-1.oe2403.x86_64"
|
|
]
|
|
},
|
|
"remediations":[
|
|
{
|
|
"product_ids":[
|
|
"openEuler-24.03-LTS:firefox-debugsource-115.13.0-1.oe2403.aarch64",
|
|
"openEuler-24.03-LTS:firefox-debuginfo-115.13.0-1.oe2403.aarch64",
|
|
"openEuler-24.03-LTS:firefox-115.13.0-1.oe2403.aarch64",
|
|
"openEuler-24.03-LTS:firefox-115.13.0-1.oe2403.src",
|
|
"openEuler-24.03-LTS:firefox-debugsource-115.13.0-1.oe2403.x86_64",
|
|
"openEuler-24.03-LTS:firefox-debuginfo-115.13.0-1.oe2403.x86_64",
|
|
"openEuler-24.03-LTS:firefox-115.13.0-1.oe2403.x86_64"
|
|
],
|
|
"details":"firefox security update",
|
|
"category":"vendor_fix",
|
|
"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1939"
|
|
}
|
|
],
|
|
"scores":[
|
|
{
|
|
"cvss_v3":{
|
|
"baseSeverity":"HIGH",
|
|
"baseScore":7.5,
|
|
"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"version":"3.1"
|
|
},
|
|
"products":[
|
|
"openEuler-24.03-LTS:firefox-debugsource-115.13.0-1.oe2403.aarch64",
|
|
"openEuler-24.03-LTS:firefox-debuginfo-115.13.0-1.oe2403.aarch64",
|
|
"openEuler-24.03-LTS:firefox-115.13.0-1.oe2403.aarch64",
|
|
"openEuler-24.03-LTS:firefox-115.13.0-1.oe2403.src",
|
|
"openEuler-24.03-LTS:firefox-debugsource-115.13.0-1.oe2403.x86_64",
|
|
"openEuler-24.03-LTS:firefox-debuginfo-115.13.0-1.oe2403.x86_64",
|
|
"openEuler-24.03-LTS:firefox-115.13.0-1.oe2403.x86_64"
|
|
]
|
|
}
|
|
],
|
|
"threats":[
|
|
{
|
|
"details":"High",
|
|
"category":"impact"
|
|
}
|
|
],
|
|
"title":"CVE-2024-5688"
|
|
},
|
|
{
|
|
"cve":"CVE-2024-6602",
|
|
"notes":[
|
|
{
|
|
"text":"A mismatch between allocator and deallocator could have lead to memory corruption. This vulnerability affects Firefox < 128, Firefox ESR < 115.13, Thunderbird < 115.13, and Thunderbird < 128.",
|
|
"category":"description",
|
|
"title":"Vulnerability Description"
|
|
}
|
|
],
|
|
"product_status":{
|
|
"fixed":[
|
|
"openEuler-24.03-LTS:firefox-debugsource-115.13.0-1.oe2403.aarch64",
|
|
"openEuler-24.03-LTS:firefox-debuginfo-115.13.0-1.oe2403.aarch64",
|
|
"openEuler-24.03-LTS:firefox-115.13.0-1.oe2403.aarch64",
|
|
"openEuler-24.03-LTS:firefox-115.13.0-1.oe2403.src",
|
|
"openEuler-24.03-LTS:firefox-debugsource-115.13.0-1.oe2403.x86_64",
|
|
"openEuler-24.03-LTS:firefox-debuginfo-115.13.0-1.oe2403.x86_64",
|
|
"openEuler-24.03-LTS:firefox-115.13.0-1.oe2403.x86_64"
|
|
]
|
|
},
|
|
"remediations":[
|
|
{
|
|
"product_ids":[
|
|
"openEuler-24.03-LTS:firefox-debugsource-115.13.0-1.oe2403.aarch64",
|
|
"openEuler-24.03-LTS:firefox-debuginfo-115.13.0-1.oe2403.aarch64",
|
|
"openEuler-24.03-LTS:firefox-115.13.0-1.oe2403.aarch64",
|
|
"openEuler-24.03-LTS:firefox-115.13.0-1.oe2403.src",
|
|
"openEuler-24.03-LTS:firefox-debugsource-115.13.0-1.oe2403.x86_64",
|
|
"openEuler-24.03-LTS:firefox-debuginfo-115.13.0-1.oe2403.x86_64",
|
|
"openEuler-24.03-LTS:firefox-115.13.0-1.oe2403.x86_64"
|
|
],
|
|
"details":"firefox security update",
|
|
"category":"vendor_fix",
|
|
"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1939"
|
|
}
|
|
],
|
|
"scores":[
|
|
{
|
|
"cvss_v3":{
|
|
"baseSeverity":"MEDIUM",
|
|
"baseScore":6.1,
|
|
"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"version":"3.1"
|
|
},
|
|
"products":[
|
|
"openEuler-24.03-LTS:firefox-debugsource-115.13.0-1.oe2403.aarch64",
|
|
"openEuler-24.03-LTS:firefox-debuginfo-115.13.0-1.oe2403.aarch64",
|
|
"openEuler-24.03-LTS:firefox-115.13.0-1.oe2403.aarch64",
|
|
"openEuler-24.03-LTS:firefox-115.13.0-1.oe2403.src",
|
|
"openEuler-24.03-LTS:firefox-debugsource-115.13.0-1.oe2403.x86_64",
|
|
"openEuler-24.03-LTS:firefox-debuginfo-115.13.0-1.oe2403.x86_64",
|
|
"openEuler-24.03-LTS:firefox-115.13.0-1.oe2403.x86_64"
|
|
]
|
|
}
|
|
],
|
|
"threats":[
|
|
{
|
|
"details":"Medium",
|
|
"category":"impact"
|
|
}
|
|
],
|
|
"title":"CVE-2024-6602"
|
|
}
|
|
]
|
|
} |